E-COMMERCE NOTES
E-COMMERCE NOTES
E-COMMERCE NOTES
BLOCK-1
CHAPTER-1: INTRODUCTION TO E-COMMERCE
The advantage of E-Commerce is to transact online. Transaction through online can be either on products or
services.
Payment processed
E – mail for
fulfilment
Scopes of M-Commerce:
i. Mobile banking: This application makes it possible to perform bank-related transaction.
ii. Mobile entertainment: This application offers services that provide entertainment through mobile devices.
Ex. Ring tones, gaming, movies etc.
iii. Mobile Information Services: This term refers to mobile services that provides information. Examples of
such services are news updates of any nature (finance, politics, sports, etc.) travel information, access to
search engine etc.
iv. Mobile marketing: This terms refers to services based on mobile communication technologies that
provide firms with new and innovative instruments to increase sales.
v. Mobile shopping: This application bundles services that allow for transactions involving purchase of
goods using mobile devices.
1|Page
[BCS-062 E-COMMERCE]
The following are some of the business models that fall into the above mentioned category:
Mail-Order Model: A website shop front is employed to sell physical goods which are then
posted or delivered. (Amazon.com)
Advertising Based Model: Where advertising revenues support the operation of a free service.
(Yahoo.com)
Subscription Model: User subscribe for access to a database of digital products; well suited for
combination with digital delivery. (Informationweek.com)
Free Trail Model: Software is available for free download or distributed on CD-ROM but will
only work for a limited period or will not be fully functional until a free is paid.
Direct Marketing Model: The use of e-mail based direct marketing (often end up as spam).
Real-Estate Model: Sell web space, domain names and e-mail addresses.
Incentive Scheme Models: Opportunities to win prizes or to secure “free” or inexpensive goods
or services are used to entice people to accept advertising or to provide personal information.
2|Page
[BCS-062 E-COMMERCE]
ii. Native Internet Business Model: Business activities that have evolved in the Internet environment and are
native to it.
The following are some of the business models that fall into above mentioned category:
Library Model: The Website that offers free information.
Freeware Model: It provides free software (basic version may be free) or open source software.
Information Barter Model: Some sort of exchange of information over the Internet between
individuals and organizations.
Digital Products Model: Images, movies, animation, audio, text, certificates and software will be
available as products.
Access Provision Model: Provides access to Internet from enterprises called Internet Service
Providers (ISPs).
Website Hosting and other Internet Services: Hosting web servers, e-mail as well as URL and
e-mail re-direction services.
3|Page
[BCS-062 E-COMMERCE]
1. What do you mean by E-Visibility? Write some strategies to increase e-visibility of e-commerce website.
Answer:
E-Visibility: Being able to stand out and getting customers is very challenging task in the ever growing global
market when too many e-commerce sites are competing for the same target customers.
E-visibility is a portal which provides visibility on orders, stock and transactions and further details on each of these
elements.
ii. Easy URL: The website UPL must be simple and catchy so that can be easily remembered.
iii. Adding icons of social networks: It helps users/followers and other potential customers to know about the
site and business.
iv. Advertising: Word of mouth marketing is more powerful than ever but even the conventional way of
advertising using media such as TV, newspapers, etc.
v. Social empire optimization: It is a process of imposing the visibility of website in the search engine’s
search result. The higher appearance of website in the search engine, the higher the probability of increase
of number of customers.
Human powered directories: These are actually compiled by human reviewers who examine and evaluate
description of website and then they rate the contents using their own criteria. Normally, this type of
combination is done for listing by paid search engines.
Link Popularity is a key factor for increasing ranking of web pages. It refers to the number and quality of
links that point to website.
Features of E-Shop:
i. Ease of Navigation: Effective navigation is very important and critical for e-shops because lost visitors
will result in lost sales. Large sites have huge range of products and have to be more careful as finding a
product of choice is a big task. Sufficient user testing will be extremely useful for identifying potential
navigation issues.
ii. Shopping cart, login and search options: An e-shop without these features is of no use. Many e-shops
provide private accounts to customers so that they can check their order history. Search options are
essential for finding suitable products for customers by customers, specifically in large websites.
iii. Deals, freebies and free shipping: People generally tend to buy more during sales and discounted periods.
Some are also attracted by free shipping. So making eye-catching banners with discount offers on the upper
part of home page of e-shop website will lead to increase in sales.
4|Page
[BCS-062 E-COMMERCE]
iv. Payment system Icons: E-shops have many customers from round the globe and each have their own
preferred payment system ranging from credit & debit card, gift vouchers and cash on delivery, etc. These
options always display the delivery and after sales terms and conditions.
v. Links from social media: Almost 30% of online purchases are accomplished after surfing through social
media sites such as Twitter and Facebook. They are good options as customers are inclined by public
opinion also.
vi. Phone number and online chats: The customer helpline numbers and online chat with customers to clear
queries are highly appreciated forms of value added customer service since E-shops are working 24X7 and
customer service can solve majority of pre-sales and after sales questions.
vii. Store finder: This feature is useful and must for E-shops that have wide dealer network. Many
international customers prefer to visit website to find nearest branch as well as for information but prefer to
visit nearest store physically.
viii. Trust marks: Trust marks are small images or a logo that shows a security guarantee by an external party
indicating that it is safe to shop onsite. Some of these trust marks come from Verisign, TRUSTe, McAfee,
etc.
4. Who are involves in delivery value chain? What are the aspects of delivery of e-shopper?
Answer:
The delivery value chain may have the involvement of the following groups of stakeholders:
E-Shoppers: BY products and delivery services from e-retailers.
E-Retailers: Buy delivery services from delivery operators and logistics intermediaries.
Delivery operators: Operate in the intersections that exist between e-shoppers, e-retailers and delivery
operator.
i. Home delivery: The product is shipped to the address given by customer. The home delivery of products
can be in the form of parcels of delivery by hand.
ii. Content delivery as electronic delivery: Also referred as online distributors, they deliver media content
like audio, video, games, downloadable add-ons of other products.
iii. Drop shipping: It is the way in which the retailers transfer the customer order and shipment details to
either the manufacturer, distributers or whole sellers who then deliver the products directly to customers.
This means that retailer does not have to keep goods in stock and saves time, money and space.
iv. Collect your own: Sometimes, traditional customers can’t trust for timely delivery of products so they pay
for the product online and select a local store using locator software and pick up the products from selected
locations. This will save time as queues are avoided at checkout time.
v. Printing out: Products like insurances policies, gift vouchers, tickets etc. can be e-mailed to customer and
the print outs of products can be easily redeemed at appropriate online or physical stores.
5|Page
[BCS-062 E-COMMERCE]
Pay Pal
Smart Cards
E-Wallet EFT
i. Credit cards: This is one of the frequently used modes of payment used for purchases by Internet as it is
the most convenient mode. But, it has spending limit based on user credit history.
Advantages:
Ease of use,
Increased sales as credit card orders are generally bigger in nature,
Secured than carrying cash, and
Authentication is online. Thus, retailers are sure of payment.
Disadvantages:
Cost of credit card processing is more than cash payment in some cases,
Phishing of Internet frauds pose a major security issue, and
Peer to peer transaction is not possible.
ii. Debit cards: Debit cards are quite similar to credit cards which are issued to customers by banks. The
major difference in debit card are credit card is that in case of debit card amount is immediately deducted
from account as soon as transaction is done. Like credit cards, there is no transaction of spending limit in
debit card.
Advantages:
Since amount is debited immediately from the corresponding account, chances of
becoming bankrupt are less.
Disadvantages:
Debit card security is major task, theft of user pin is much easier,
Debit cards are pay now option i.e. no grace period of paying your amount, and
Sometime the extra processing charges are added when paying through debit cards.
iii. Smart cards or Stored Value cards: Smart cards are also similar to credit and debit cards but they have
additional microprocessor chip added to the plastic cards. This chip stores the customer details and digital
cash value in it encrypted form and can be accessed using customer PIN only. Smart cards are more secure
and provide faster processing. Visa Cash card/Mondex cards are examples.
6|Page
[BCS-062 E-COMMERCE]
Advantages:
Atomic transactions,
Good for very small transactions,
Anonymous in nature,
Security of physical storage, and
It is currency neutral.
Disadvantages:
Due to lesser transaction limit, it is not suitable for B2B or B2C, and
Due to high interface cost, it is not suitable for C2C.
iv. EFT: EFT is the computer based system that transfers the money electronically from one account to
another. Sometimes, it is also known as e-cheque. Interbank transfers are example of EFT.
Advantages:
Scheduled electronic payment helps in managing delayed disbursements easily,
The manual cheque involves the cost of ordering cheques, stamps, envelopes, visit to
bank, etc. but, EFT reduces all such administrative costs. It requires less labor and
simplifies reconciliation of bills,
Money transfer is faster as transfer is normally done within 24 hours,
It provides greater control to approve payment by using built in feature of segregation
of duties. Only a password is required to issue payments, and
Process is secure when compared to cheques as no issue of lost or stolen cheques
arises.
Disadvantages:
It is limited to large companies,
Risk is involved as the account number added may be incorrect sometimes, and
The transactions are irreversible.
v. PayPal: This is also electronic payment system in which money is transferred between the accounts. It is
analogous to next banking.
The following is the process of validating the account particulars:
Customer gives PayPal account number,
PayPal transfers small amount to the account,
Customer confirms the payment amount,
If correct, authentication is treated as successful, and
PayPal sends email to both the payment sender and receiver of the transactions.
Advantages:
Easy to use, and
No Credit card is required
7. Write the advantages and disadvantages of the following online payments methods:
i. Credit Cards
ii. Debit Cards
iii. Smart Cards or Stored Value Cards
iv. EFT
v. PayPal
Answer:
i. Credit Cards:
Advantages:
Ease of use,
Increased sales as credit card orders are generally bigger in nature,
Secured than carrying cash, and
Authentication is online. Thus, retailers are sure of payment.
7|Page
[BCS-062 E-COMMERCE]
Disadvantages:
Cost of credit card processing is more than cash payment in some cases,
Phishing of Internet frauds pose a major security issue, and
Peer to peer transaction is not possible.
Disadvantages:
Debit card security is major task, theft of user pin is much easier,
Debit cards are pay now option i.e. no grace period of paying your amount, and
Sometime the extra processing charges are added when paying through debit cards.
Disadvantages:
Due to lesser transaction limit, it is not suitable for B2B or B2C, and
Due to high interface cost, it is not suitable for C2C.
iv. EFT:
Advantages:
Scheduled electronic payment helps in managing delayed disbursements easily,
The manual cheque involves the cost of ordering cheques, stamps, envelopes, visit to
bank, etc. but, EFT reduces all such administrative costs. It requires less labor and
simplifies reconciliation of bills,
Money transfer is faster as transfer is normally done within 24 hours,
It provides greater control to approve payment by using built in feature of segregation
of duties. Only a password is required to issue payments, and
Process is secure when compared to cheques as no issue of lost or stolen cheques
arises.
Disadvantages:
It is limited to large companies,
Risk is involved as the account number added may be incorrect sometimes, and
The transactions are irreversible.
v. PayPal:
Advantages:
Easy to use, and
No Credit card is required
8. What do you mean by after sales services? What steps should be taken to improve after sales services?
Answer:
Customer service is service given during and after sales. Poor or lack of service yields negative word of mouth
advertising which in turn keeps people away from our business.
8|Page
[BCS-062 E-COMMERCE]
Loyalty count: Give increased benefits to customers who are regular for their loyalty.
Feedback: Customer feedback and service helps to analyse you own business loopholes and problems.
This is useful to increase customer base.
9. What are the security features that can be implemented for success of e-commerce?
Answer:
The following are some of the security features that can be implemented for success of e-commerce:
Identification or Authentication: The persons/entities with whom we are communicating are really who
they say are
Confidentiality: The content of the message or transaction is kept confidential. It should only be read and
understood by the intended sender and receiver.
Integrity: The content of the message or transaction is not tampered accidentally or deliberately.
Non-repudiation: The sender and receiver cannot deny sending and receiving of the message or
transaction respectively. It is a guarantee that the sender of a message cannot later deny, having sent the
message and the recipient cannot deny, having received the message.
Access Control: Access to the protected information is only realized by the intended person or entity.
10. What are the two levels for securing information over the Internet? Explain each of them in details.
Answer:
There are two levels for securing information over the internet:
i. Digital Certificates: Digital certificates are electronic files that are used to uniquely identify people and
resources over the internet. They enable secure, confidential communications between two parties. Digital
certificates are issued by CA (Certifying Authorities), such as VeriSign or Entrust Technologies.
ii. SSL (Secure Socket Layer): SSL allows the client and server to communicate with each other in a way
that prevents the tampering of data that is being transmitted. SSL requires all information sent between a
client and a server be encrypted (by the server) when sent and decrypted (by the client) when received. SSL
also has the ability to detect any tampering of data.
Request to connect
Characteristics of EDI:
i. Provides structured and standardized format for business transactions such as purchase orders, sales orders,
bills etc.
ii. Provides electronic exchanges of data automatically.
iii. Automates most of the business transactions, and
iv. Drastic reduction of manual errors in overall transactions and business process.
2. Explain “Conventional Processing of Purchase Order (PO)” with the help of a suitable diagram.
Answer:
PO Sent
10 | P a g e
[BCS-062 E-COMMERCE]
Application Layer
Format Layer
Format Layer: This layer processes the documents in EDI formats. Two popular industry wide EDI standard
formats are ANSI X12 and EDIFACT (Electronic Data Interchange for Administration, Commerce and Transport).
Data Transport Layer: This layer is responsible for automatically transferring the EDI. Though e-mail is a popular
format of data exchange, there are other transportations mechanisms such as FTP, HTTP, HTTPS and X.435, etc.
Data Connection Layer: This layer consists of enterprise network infrastructure which is used to transport data.
This include dial-up/modem based connections, Internet, point-to-point communication etc.
ii. EDIFACT: EDIFACT (Electronic Data Interchange for Administration, Commerce and Transport) is an
EDI standard format developed under UN (United Nations). Hence, EDIFACT is also denoted as
UN/EDIFACT.
This is the international standard which consists of the following four key elements:
Syntax which defines the message structure.
Data elements within the document.
Segments which groups the date elements.
Messages which are an ordered group of segments and symbolize a business transaction.
11 | P a g e
[BCS-062 E-COMMERCE]
ii. HIPAA (Health Insurance Portability and Accountability Act) standard in healthcare requires EDI,
iii. Automotive industry uses EDI for streamlining operations with suppliers and vendors,
iv. Retail players uses EDI to streamline their procurement processes, and
v. Manufacturing firms use EDI for product purchases and interaction with resellers.
Examples of EPS:
Credit/Debit/Smart Cards: Credit card is the most popular way of performing online transactions. The
cards are identified by 16-digit number and have a maximum limit on spending. Buyers needs to enter card
information such as number, CVV (Card Verification Value) code, and expiry date etc. to authenticate the
transaction.
Unlike credit cards, debit cards are linked to user’s bank accounts and they can use their debit cards as their
debit cards as one of the channels to use their account. Often online banking or net banking rules apply
while using debit cards.
Smart cards have built-in integrated circuits and act as electronic wallet for the users. They can be pre-
loaded with tokens or funds and they can be used to make electronic and physical payments similar to debit
cards.
E-Credit Accounts: E-credit account allows an online business transaction to happen. Typically, B2B
business transactions use e-credit accounts. Companies offering e-credit facilities offer a higher end credit
limit and a fixed repayment time period. E-credit account is mainly used for large financial transactions
without any physical presence.
Companies like http://www.alibaba.com permit e-credit for overseas buyers to boost trade.
E-Money: E-money or digital cash is the financial instrument stored in computer systems and can be
example used for online transactions. They are electronic counter parts or representatives of physical cash.
For example, bit coins or EFT is referred to as e-money. Various cryptographic methods such as public-
private key encryption, digital signatures are used to authenticate and authorize the usage of e-money.
The following are some of the scenarios where e-money is currently being used:
- Facilitate travel in public transport system using wireless payment, and
- Electronic pre-paid cards for various online transactions.
12 | P a g e
[BCS-062 E-COMMERCE]
Supplier
Consumer Portal
13 | P a g e
[BCS-062 E-COMMERCE]
Portal
Consumer Consumer
Portal
Supplier Consumer
14 | P a g e
[BCS-062 E-COMMERCE]
15 | P a g e
[BCS-062 E-COMMERCE]
BLOCK-2
CHAPTER-5: E-BUSINESS
1. What is Internet Bookshops? Explain the shopping procedure of Internet Bookshops. What are the
advantages and disadvantages of Internet Bookshops?
Answer:
Internet base bookshops are the online bookshops that provide an opportunity to users to scroll through various
books so as to pick and choose any book of their liking on a click of a button while sitting in comfort of their homes
or lounges.
Shopping Procedure:
i. How to order
ii. How to become a member
iii. How to check out
iv. Shopping cart facility
v. Help desk
vi. Discount/special packages
vii. Payment procedure and options, and
viii. Delivery options.
Advantages:
i. These books act as databases of a vast amount of information about books currently available in the market.
All Internet users can use these databases and have knowledge of the same.
ii. Online bookshops are open 24X7. The access is available to anyone, at anytime, from anywhere.
iii. User can take time in searching and selecting books.
iv. These bookshops are extremely useful to people looking for specific books.
v. Most of the instances, there will be a discount on the price of the book.
Disadvantages:
i. Any delay in updating of database in detail such as edition, cost, etc. will create problems in identifying the
correct book and payment thereof.
ii. Security issues are another concern while making payment online especially through credit cards.
iii. Some users may not have access to credit card facility, hence will not be able to transact and purchase
books online.
iv. There may be abnormal delays in shipping.
v. A book that is different from what is ordered may be shipped.
2. What is Grocery Suppliers? Explain the shopping procedure of Grocery Suppliers. What are the
advantages and disadvantages of Grocery Suppliers?
Answer:
Purchasing of groceries is one of the basic shopping requirements. http://www.eazygrocery.com,
http://www.bigbasket.com are some of the online grocery suppliers.
Advantages:
i. E-grocery suppliers provide a wide range of products and payment options.
ii. It is a big welcome to an easy and relaxed way of browsing and shopping for groceries at customers’
comfort.
iii. The customer can discover new products and get everything right at the doorstep.
iv. The e-grocer guarantees timely delivery and best quality.
v. From the user prospective, free home delivery, time saving and various payment options are the advantages
of online grocery shopping.
Disadvantages:
i. Online grocer caters to a specific city or certain areas.
ii. Online grocer caters Internet savvy customers only.
iii. Handling perishable products is a big challenge.
iv. Late delivery of goods due to various reasons like traffic etc. can create problems.
v. Buyers still relate groceries with local store and malls.
16 | P a g e
[BCS-062 E-COMMERCE]
Shopping Procedure:
Open website of vendors and registers if placing order for the first time
Server takes order and forwards it to the nearest retail outlet for fulfillment
3. What is Software Supplies and Support? Explain the shopping procedure of Software Supplies and
Support. What are the advantages and disadvantages of Software Supplies and Support?
Answer:
With the phenomenal growth of Internet, selling software and providing related support through Internet allows the
seller to reach a large computer savvy global market easily, economically and efficiently.
Shopping Procedure: With online software suppliers and support, the entire sale/purchase including delivery of the
product is completed with an online transaction. The following is the shopping procedure normally followed:
i. Customer logs on to the website.
ii. Places an order through a secure order from.
iii. Submits payment information.
iv. Proceeds to download the purchased software.
Advantages:
i. It is a great market channel for IT companies to market their products.
ii. By selling through the Internet, software sellers get an easy and cheap distributing channel.
iii. Software buyers get a quick and efficient way of getting software.
iv. It eliminates the need to manufacture and store large inventories of shrink-wrapped goods, costly
courier/shipping charges.
Disadvantages:
i. There may be portability issues as it may not be easy to port it to machine that is different from the
machine to where it is downloaded.
ii. Chances of online threats such as viruses, malware, etc. increases manifold.
iii. Not all software products are available for download.
17 | P a g e
[BCS-062 E-COMMERCE]
iv. Bandwidth may become a major constraint as memory size of the software product to be downloaded may
be large.
4. What is e-newspaper (Electronic Newspaper)? What are its advantages and disadvantages?
Answer:
Electronic newspaper is the newspaper which exists on the Internet either separately or as online version of a printed
periodical.
Examples of e-newspaper:
http://thehindu.com
http://timesofindia.com
Advantages:
i. It is accessible 24X7. Online newspapers can be read anywhere, anytime.
ii. Content can be updated any number of times in a day by the online newspaper.
iii. The reader can select the news of interest and leave the rest.
iv. Some e-paper are free.
v. It is environmental friendly than getting a printed newspaper.
vi. Archives are easily available.
vii. It is reliable source of news information as it is updated at regular intervals.
Disadvantages:
i. A newspaper company should be prepared for reduced revenues if it provides e-paper free of cost.
5. What is Online Auction? Explain the procedures for Online Auction. What are the advantages and
disadvantages of Online Auction?
Answer:
In the online auction, the seller sells the product or service to the person who bids the highest price. These auctions
facilitate online sale and purchase between the sellers and buyers in different locations or geographical areas.
Examples of such websites:
http://www.ebay.com
http://www.ubid.com
Advantages:
i. May get goods cheaply
ii. Includes a large number of sellers and bidders which encourages a high volume of online business.
Disadvantages:
i. There are chances of the product being a stolen or pirated one.
ii. Sellers will not always accept all forms of payment.
iii. There is always a risk of item not being of the value for which it is brought.
Bidders registered at that online auction website get opportunity to search and browse all active auctions
The buyer pays the price and the seller dispatches the item
18 | P a g e
[BCS-062 E-COMMERCE]
6. What is Online Trading System? Explain the procedures for Online Trading. What are the advantages
and disadvantages of Online Trading System?
Answer:
Online trading in securities refers to the opportunity to an investor to place orders using Internet as trading platform
offered by the trading member (broker). The transactions of buying and selling are made through Internet. The
investor/trader gets updated information online.
Examples:
http://www.icicidirect.com
http://www.sharekhan.com
Once the Demat Account and Online Trading Account are opened, bank account is to be linked with the
trading account. Credential to operate and received from online brokerage house.
Go to the trading page of your brokerage account. Alternatively, you can look for a stock of interest in
trading and select to trade in that security.
Buying and selling stock is done by placing “Orders.” You can place a “Buy Order” to buy the stocks at a
price. Similarly, to sell a stock at a price, you have to place a “Sell Order.”
Provide the following basic options when placing an order:
- Option to choose whether you wish to buy or sell a particular stock.
- The name/symbol of the particular stock which you want to either buy or sell.
- The number of shares (quantity) that you want to either buy or sell.
- The price at which you would like to either buy or sell this stock.
After you have confirmed the order, it is placed in the stock exchange through the online trading system.
Confirmation of placement order is received.
Stocks are actually brought or sold once this order gets executed in the exchange.
Confirmation of execution of order is received.
Online trading is complete
Advantages:
i. It leads to paperless transactions. That is, shares are held electronic form in the demat account.
ii. It helps in market transparency.
iii. All the records of transactions are available online.
iv. Investor can manage his own stock portfolios.
v. There is free access to high quality research reports generated by financial players.
19 | P a g e
[BCS-062 E-COMMERCE]
Disadvantages:
i. There are chances of losing the trade if online trading system fails.
ii. The scope of manipulation, speculation and malpractice is more due to the security issues associated with
Internet.
iii. Due to the policy of online brokerage house, some stocks may not be available for trading online for whom
the customer needs to contact other brokerage houses.
20 | P a g e
[BCS-062 E-COMMERCE]
Masquerading: Masquerading occurs when one person uses the identity of another to gain access
to computer. This may be done in person or remotely.
ii. Security concern of communication channel: Another major concern in any e-commerce application is
the security of the communication channel. That is, the security of the message when it passes through the
Internet. The data/message being transferred through the network must be secured from any unauthorized
disclosure and alteration.
Replying older messages, tapping of communications, unauthorized changes to messages, misuse of remote
maintenance accesses are the dangers to the communication channel.
iii. Security concern of server: Another major concern in any e-commerce application is the security of the
web server, commerce server and databases. Any loss or manipulation of stored data can create irreparable
damaged. The server is required to be protected from break-ins, site vandalism, and denial od service
attacks.
3. What is Secure Socket Layer (SSL)? Write the characteristics of SSL. Explain SSL Handshake with a
suitable diagram.
Answer:
Secure Socket Layer (SSL): SSL allows the client and server to communicate with each other in a way that
prevents the tampering of data that is being transmitted. SSL requires all information sent between a client and a
server be encrypted (by the server) when sent and decrypted (by the client) when received. SSL also has the ability
to detect any tampering of data.
It will be developed by Netscape. It operates between the application and transport layers. It is commonly used to
manage the security of message transmission on the Internet.
21 | P a g e
[BCS-062 E-COMMERCE]
Request to connect
Characteristics of SSL:
i. It operates at TCP/IP transport layer.
ii. It uses a dedicated TCP/IP socket.
iii. It encrypts the communications between the server and client when connection is established,
iv. It requires a server certificate.
5
SSL
Client 6 Web
Server
7
10
11
22 | P a g e
[BCS-062 E-COMMERCE]
4. What is Digital Signature? What are the steps in the working of a Digital Signature?
Answer:
Digital Certificates: Digital certificates are electronic files that are used to uniquely identify people and resources
over the internet. They enable secure, confidential communications between two parties. Digital certificates are
issued by CA (Certifying Authorities), such as VeriSign or Entrust Technologies.
As per Information Technology Act, 2000, Digital Signature may be defined as authentication of any electronic
record by a subscriber by means of an electronic method or procedures in accordance with the provision of
concerned section of the Act.
TCS, Safescrypt and MTNL are some of the digital signature certifying authorities in India licensed by the
Controller of Certifying Authorities, Government of India.
the following are the various steps in the working of a digital signature:
i. sender creates the message (electronic record).
ii. Electronic record is converted into message digest by using a mathematical function known as hash
function (which freezes the message).
iii. The message digest is encrypted with the sender’s private key.
iv. Sender sends the message.
v. Receiver receives the message.
vi. Receiver decrypts the message by the sender’s public key.
vii. Receiver verifies the message.
5. What is Firewall? What are the mechanism of firewall? Explain each mechanism in details.
Answer:
Firewall: Firewall is a hardware or software based security that filters the packets and prevents some packets from
entering the network based on a security policy.
Hardware firewalls can be found in broadband routers and is an important part of network setup. It protects
Computer on the local network. Software firewalls are installed on the computer and can be customized to
incorporate protection features.
23 | P a g e
[BCS-062 E-COMMERCE]
Effective and
transparent to users.
Disadvantages Does not support More complex than Incompatible with Time taken for
advanced user other firewalls, and all network evaluating each
authentication. incompatible with protocols, and packet slows
some protocols. configuring these network traffic, and
proxies is difficult. limited support for
new network
applications is
provided.
Table: Mechanism used by Firewall
6. What is IT Act 2000? Write the objectives of IT Act. What are the issues dealt by IT Act? Explain.
Answer:
Information Technology generates information by processing data. It gives rise to a variety of legal problems. For
dealing with legal problems, some countries have enacted specific legislation.
In India, the IT Act was passed on 17th October 2000. it was amended on 27th October 2009.
Legal Recognition of Digital Signatures: As per IP Act, whenever any law requires that information or
any other matter shall be authenticated by affixing the signature of any person, then such requirement shall
be satisfied if it is authenticated by means of digital signatures affixed in such manner as may be prescribed
by the Central Government.
Use of Electronic records in Government and Its agencies: As per IT Act, whenever any law provides
for filing of any form, supplication, issue of any license permit, etc. or receipt or payment of money, then,
notwithstanding anything in that law, the information provided in electronic form shall be deemed to be
lawful.
24 | P a g e
[BCS-062 E-COMMERCE]
Retention of electronic Records: As per IT Act, records can be retained in electronic form so as it remains
accessible for subsequent use, in the format which it was originally generated and provide for the
identification origin, destination, date and time of dispatch or receipt of that record.
25 | P a g e
[BCS-062 E-COMMERCE]
Subsequent conviction:
Imprisonment up-to five
years and with fine up-to
ten lakh rupees.
j. Publishing or transmitting Section 67A First conviction:
of material containing Imprisonment up-to five
sexually explicit act, etc. years and with fine up-to
in electronic form ten lakh rupees.
Subsequent conviction:
Imprisonment up-to seven
years and with fine up-to
ten lakh rupees.
ii. The Indian Evidence Act, 1872: Another legislation amended by the IT Act was Indian Evidence Act.
Prior to IT Act, all evidences in the courts were in physical form only. Now, evidence can be presented in
electronic form also.
iii. The Bankers’ Books Evidence (BBE) Act, 1891: With the passing of IT Act, the provisions of Banker’s
Books Evidence Act were also amended to include printout from a computer system or disc as a valid
document and evidence, provided, it is accompanied by a certificate stating that it is a true extract from the
official records of the bank and that such entries or records are from a computerised with data integration.
iv. The Reserve Bank of India Act, 1934: The Reserve Bank of India Act, 1934 was amended to insert a
clause relating to the regulation of funds transfer through electronic means between banks (i.e. transactions
like RTGS and NEFT and other fund transfers) to facilitate EFT and ensure legal admissibility of
documents and records therein.
26 | P a g e
[BCS-062 E-COMMERCE]
CHAPTER-7: M-COMMERCE
Benefits of M-Commerce:
i. Enables purchase of products any time anywhere.
ii. Availability of location based promotions and sales offers.
iii. Opportunity to use mobile device for instant payments.
iv. Mobile technology covers wider distance and enhances the reach of potential customers.
v. Reduces overall transaction cost through streamlined business processes and offers competitive price to
customers.
Media (Books,
Movies, Games
Collaboration
(Email, chat,
messaging)
27 | P a g e
[BCS-062 E-COMMERCE]
ii. Wireless bandwidth advancements: Mobile devices can now leverage enhanced bandwidths offered by
3G and 4G networks in addition to WiFi and Wi-Max.
iii. Local based services: M-Commerce also offers unique ability to get the offers and promotions based on
the current location of the subscriber.
iv. Convenience and affordability: Convenience and affordability of mobile devices.
3. What are the main technologies help to perform commerce transactions using mobile devices?
Answer:
The following are the main technology components which help perform the commerce transactions using mobile
devices:
i. GPRS (General Packet Radio Service): GRPS offers bandwidth between 9.6 kbps and 115 kbps via GSM
network and enables simultaneous receiving and transmission. It is essentially a packet switching wireless
protocol which enables continuous connectivity for mobile devices.
ii. WAP (Wireless Application Protocol): WAP is a protocol that involves Wireless Markup Language
(WML). Like HTML, it provides support for text and image presentation, etc. for mobile devices.
iii. W-CDMA (Wideband Code Division Multiple Access): W-CDMA offers 2 Mbps bandwidth
approximately.
iv. UMTS (Universal Mobile Telecommunications System): UTMS also knowns as 3G network which
offers 2 Mbps approximately for both up-linking and down-linking.
v. Satellite based communication: Satellite based communication provides wide coverage over various geo
locations.
ii. Mobile network coverage and bandwidth: Wireless networks offering high bandwidths are not available
in all areas posing challenges to commerce transactions.
iii. Mobile experience: Due to the wide variety of mobile devices, operating systems and device form factors,
it requires a design that leads to robust user experience that caters to consumers of all these devices.
28 | P a g e
[BCS-062 E-COMMERCE]
v. Interoperability: Interoperability across multiple networks, protocols and devices also pose challenges.
vi. Web page performance: Web page performance is not optimized for mobile devices resulting in slower
page loads on mobile platforms.
Mobile Infrastructure
Mobile infrastructure: It includes sufficient cell towers to provide wide coverage and sufficient network
bandwidth for users to have smooth e-commerce transaction.
Content creation and aggregation: This layer is responsible for generating the content used for m-
commerce transactions.
Mobile middleware: Lot of enterprises vendors such as SAP, Microsoft provide middleware software for
m-commerce. This layer consists of various tools and technologies to perform following functions:
29 | P a g e
[BCS-062 E-COMMERCE]
Service providers: These operators are responsible for maintaining the quality of mobile service such as
bandwidth, coverage, availability, reliability and scalability. Some of the popular service providers include
Vodaphone, Idea, Airtel, Jio etc.
M-Commerce applications: These are the applications running on mobile devices. The applications can
be of two types: Native applications for targeted mobile platforms or browser based applications.
Legal and industry regulation and governance process; This layer consists of various processes to
comply with regulations at both national and international levels.
Wireless Device
Network repository &
Provider Policies Database
HTTP/SSL
Mobile
devices
Middle E-
ware Commerce
Firewall
Firewall
Stores
Product
HTTP/SSL Catalog
Certificate ERP
handling (Pricing/
Inventory)
Payment Bank/Credit
Gateway cards
30 | P a g e
[BCS-062 E-COMMERCE]
iii. Mobile coupons: Mobile coupons are expected to become popular at retail stores.
iv. Mobile shopping: Mobile shopping is going to play a major role in the shopping space.
v. In-store personalization: In-store personalization based on mobile app which indicates the available sales
and act as a smart store guide.
vi. Social commerce: Social commerce enablement though mobile devices.
vii. Mobile inventory management: Mobile inventory management using RFID on products and track the
inventory in real time.
31 | P a g e