Lecture Notes On E-Commerce
Lecture Notes On E-Commerce
Lecture Notes On E-Commerce
• Communicated from one computer to another without the need for printed
Example: EDI is used in the large market chains for transactions with their
suppliers
3. Internet Commerce
• It is use to advertise & make sales of wide range of goods & services.
commerce
Privacy of e-transactions is not guaranteed
E-commerce de-personalises shopping
Ubiquity
Internet/Web technology is The marketplace is extended beyond traditional
available everywhere: at work, at home, and boundaries and is removed from
a temporal and elsewhere via mobile devices, anytime. geographic location.
―Marketspace‖ is created; shopping can take place anywhere. Customer
convenience is enhanced, and shopping costs are reduced.
Global reach
The technology reaches Commerce is enabled across cultural and across
national boundaries, around the earth. national boundaries seamlessly and
without modification.
―Marketspace‖ includes potentially billions of consumers and millions of
businesses worldwide.
Universal standards
There is one set of There is one set of technical media standards technology
standards, namely Internet across the globe.
Richness
Video, audio, and text messages Video, audio, and text marketing messages
are are possible. integrated into a single marketing message and consuming
experience.
Interactivity
The technology works Consumers are engaged in a dialog that through
interaction with the user. dynamically adjusts the experience to the
individual, and makes the consumer a coparticipant in the process of
delivering goods to the market.
Information density
The technology Information processing, storage, and reduces information
costs and raises quality. communication costs drop dramatically, while
currency, accuracy, and timeliness improve greatly. Information becomes
plentiful, cheap, and accurate.
Personalization/Customization
The Personalization of marketing messages and technology allows
personalized messages to customization of products and services are be
delivered to individuals as well as groups.
based on individual characteristics.
Business models of e-commerce:
There are mainly 4 types of business models based on transaction party.
Business-to-Consumer (B2C)
Business-to-Business (B2B)
Consumer-to-Business (C2B)
Consumer-to-Consumer (C2C)
B2G model is a variant of B2B model. Such websites are used by government to
trade and exchange information with various business organizations. Such
websites are accredited by the government and provide a medium to businesses
to submit application forms to the government.
Government - to - Business (G2B)
The Internet was created by the Advanced Research Projects Agency (ARPA) of the
U.S. government in 1960's and was first known as the ARPANet. At this stage the
Internet's first computers were at academic and government institutions and were
mainly used for accessing files and to send emails. From 1983 onwards the Internet
as we know it today started to form with the introduction of the communication
protocol TCP/IP to ARPANet. Since 1983 the Internet has accommodated a lot of
changes and continues to keep developing.
The last two decades has seen the Internet accommodate such things as network
LANs and ATM and frame switched services. The Internet continues to evolve with
it becoming available on mobile phones and pagers and possibly on televisions in
the future.
Advantages of internet:
There many advantages to using the internet such as:
E-mail
Email is now an essential communication tool in business. It is also excellent for
keeping in touch with family and friends. The advantage to email is that it is free (
no charge per use) when compared to telephone, fax and postal services.
Information
There is a huge amount of information available on the internet for just about
every subject known to man, ranging from government law and services, trade
fairs and conferences, market information, new ideas and technical support.
Services
Many services are now provided on the internet such as online banking, job
seeking and applications, and hotel reservations. Often these services are not
available off-line or cost more.
Buy or sell products.
The internet is a very effective way to buy and sell products all over the world.
Communities communities of all types have sprung up on the internet. It’s a great
way to meet up with people of similar interest and discuss common issues.
A Leading-Edge Image
Presenting your company or organization as leading-edge shows your customers
and prospective customers that you are financially strong, technologically savvy,
and ready for the 21st century. And that you care enough about your customers
to take advantage of new technologies for their benefit. And finally that you have
the resources to support your clients in the most beneficial manner possible.
More and more advertisers on television, radio, magazines, and newspapers are
including a Web address. Now is the time to avoid playing catch-up later.
Improved Customer Service
The companies are available to their customers 24 hours a day, 7 days a week.
The Internet never sleeps. Whenever customer needs information about any
company, products or services, they can access the company’s Web Page.
Market Expansion
The Internet is a global system. Latest estimates are that there are about 40 million
people with access to the Internet, and this number is growing every day. By simply
posting a Web Page you are also addressing International markets.
Low Cost Marketing
Imagine developing a full color brochure without having to incur the costs of
proofs, printers, wasted paper, long lead times between revisions, and more. Then
imagine a full color product or services brochure that is interactive and which
incorporates text, graphics, audio, and/or video. One that can be immediately
updated without incurring the usual costs of product material updates.
Low Cost Selling
Without the cost of direct selling potential customers can get detailed information
about your products or services at any time. And they can easily order your
products over the Internet, or request additional information be sent to them via
a request form on your Web page.
Lower Communication Costs
Your time, and your employees time, is valuable. Most businesses and
organizations spend time answering the same questions over and over again. With
a Web page you can make the answers available to everyone immediately. You
can also update your Wed page with new information quickly and easily.
Intranet:
Uses of Intranet:
Increasingly, intranets are being used to deliver tools, e.g. collaboration (to
facilitate working in groups and teleconferencing) or sophisticated corporate
directories, sales and customer relationship management tools, project
management etc., to advance productivity.
Intranets are also being used as corporate culture-change platforms. For
example, large numbers of employees discussing key issues in an intranet
forum application could lead to new ideas in management, productivity,
quality, and other corporate issues.
In large intranets, website traffic is often similar to public website traffic and
can be better understood by using web metrics software to track overall
activity. User surveys also improve intranet website effectiveness. Larger
businesses allow users within their intranet to access public internet through
firewall servers. They have the ability to screen messages coming and going
keeping security intact.
When part of an intranet is made accessible to customers and others outside
the business, that part becomes part of an extranet. Businesses can send
private messages through the public network, using special
encryption/decryption and other security safeguards to connect one part of
their intranet to another.
Intranet user-experience, editorial, and technology teams work together to
produce in-house sites. Most commonly, intranets are managed by the
communications, HR or CIO departments of large organizations, or some
combination of these.
Because of the scope and variety of content and the number of system
interfaces, intranets of many organizations are much more complex than their
respective public websites. Intranets and their use are growing rapidly.
Advantages:
Idea of the value chain is based on the process view of organisations, the idea of
seeing a manufacturing (or service) organisation as a system, made up of
subsystems each with inputs, transformation processes and outputs. Inputs,
transformation processes, and outputs involve the acquisition and consumption
of resources - money, labour, materials, equipment, buildings, land,
administration and management. How value chain activities are carried out
determines costs and affects profits.
1. Inbound Logistics - involve relationships with suppliers and include all the
activities required to receive, store, and disseminate inputs.
2. Operations - are all the activities required to transform inputs into outputs
(products and services).
3. Outbound Logistics - include all the activities required to collect, store, and
distribute the output.
4. Marketing and Sales - activities inform buyers about products and services,
induce buyers to purchase them, and facilitate their purchase.
5. Service - includes all the activities required to keep the product or service
working effectively for the buyer after it is sold and delivered.
Plan:
This is the strategic portion of SCM. You need a strategy for managing all
the resources that go toward meeting customer demand for your product
or service. A big piece of planning is developing a set of metrics to monitor
the supply chain so that it is efficient, costs less and delivers high quality and
value to customers.
Source:
Choose the suppliers that will deliver the goods and services you need to
create your product. Develop a set of pricing, delivery and payment
processes with suppliers and create metrics for monitoring and improving
the relationships. And put together processes for managing the inventory of
goods and services you receive from suppliers, including receiving
shipments, verifying them, transferring them to your manufacturing
facilities and authorizing supplier payments.
Make:
Deliver:
This is the part that many insiders refer to as logistics. Coordinate the receipt
of orders from customers, develop a network of warehouses, pick carriers
to get products to customers and set up an invoicing system to receive
payments.
Return:
The problem part of the supply chain. Create a network for receiving
defective and excess products back from customers and supporting
customers who have problems with delivered products.
sales that comes with a faster, more flexible supply chain. A responsive firm
is proficient in an uncertain market environment, because it can quickly
adjust production to meet demand.
Effectiveness of the supply chain relates to the degree to which the supply
To examine the effect of the Internet and electronic commerce on the supply chain
is to examine the impact the Internet has on the efficiency, responsiveness,
effectiveness, and overall performance of the supply chain.
Cost decrease:
Internet-based electronic procurement helps reduce costs by decreasing the
use of paper and labor, reducing errors, providing better tracking of purchase
orders and goods delivery, streamlining ordering processes, and cutting
acquisition cycle times.
Flexibility:
The Internet allows for custom interfaces between a company and its
different clients, helping to cost-effectively establish mass customization. A
manufacturer can easily create a custom template or Web site for a fellow
supply chain member with pre-negotiated prices for various products listed
on the site, making re-ordering only a mouse click away. The information
regarding this transaction can be sent via the Internet to the selling firm‘s
production floor and the purchasing firm‘s purchasing and accounting
departments. The accuracy and reliability of the information is greater than
the traditional paper and pencil transaction, personnel time and expense is
reduced, and the real-time dissemination of the relevant information to
interested parties improves responsiveness. These advantages can benefit
both firms involved in the transaction.
Shortening the supply chain:
Dell computers has become a classic example of the power the Internet can
have on a supply chain. Dell helped create one of the first fully Internet-
enabled supply chains and revolutionized the personal-computer industry by
selling directly to businesses and consumers, rather than through retailers
and middlemen. In mid-1996, Dell began allowing consumers to configure and
order computers online. By 1998, the company recorded roughly $1 billion in
―pure‖ Internet orders. By reducing sales costs and attracting customers
who spend more per transaction, Dell estimates that it yields 30 percent
greater profit margins on Internet sales compared to telephone sales.
Increased interdependence:
Increased commoditization, increased competition, and shrinking profit
margins are forcing companies to increase outsourcing and subcontracting to
minimize cost. By focusing on its core competencies, a firm should be able to
maximize its economies of scale and its competitiveness. However, such a
strategy requires increased reliance and information sharing between
members of the supply chain. Increased dependency on various members of
the supply chain can have disastrous consequences if these supply chain
members are unable to handle the functions assigned to them.
E-Payment System:
Electronic payment systems are central to on-line business process as companies
look for ways to serve customers faster and at lower cost. Emerging innovations
in the payment for goods and services in electronic commerce promise to offer a
wide range of new business opportunities.
Electronic payment systems and e-commerce are highly linked given that on-line
consumers must pay for products and services. Clearly, payment is an integral part
of the mercantile process and prompt payment is crucial. If the claims and debits
of the various participants (consumers, companies and banks) are not balanced
because of payment delay, then the entire business chain is disrupted. Hence an
important aspect of e-commerce is prompt and secure payment, clearing, and
settlement of credit or debit claims.
Electronic payment systems are proliferating in banking, retail, health care, on-line
markets, and even government—in fact, anywhere money needs to change hands.
E-Cash:
There are many ways that exist for implementing an e-cash system, all must
incorporate a few common features.
Electronic Cash is based on cryptographic systems called ―digital
signatures‖.
This method involves a pair of numeric keys: one for locking (encoding) and
the other for unlocking (decoding).
E-cash must have the following four properties.
Monetary value
Interoperability
Retrievability
Security
• Electronic cash is a general term that describes the attempts of several
– Privacy
– Security
– Independence
– Portability
• Two methods
– On-line
• Trusted third party, e.g. e-banking, bank holds customers cash accounts
– Off-line
Once the tokens are purchased, the e-cash software on the customers PC
stores digital money undersigned by a bank.
The users can spend the digital money at any shop accepting e-cash, without
having to open an account there or having to transmit credit card numbers.
As soon as the customer wants to make a payment, the software collects
the necessary amount from the stored tokens
– Convenience
Electronic Checks:
It is another form of electronic tokens.
Buyers must register with third-party account server before they are able to
write electronic checks.
The account server acts as a billing service.
Advantages of Electronic Checks:
1. They work in the same way as traditional checks.
4. Financial
risk is assumed by the accounting server & may result in easier
acceptance.
Disadvantages:
Payment card service companies charge merchants per-transaction fees and
monthly processing fees.
Risks in Electronic Payment systems:
Customer's risks
– Dishonest merchant
Merchant‘s risk
purchased items
Why EDI?
• Reduction in transaction costs
Commerce
• Electronic commerce includes EDI & much more
• EDI forges boundary less relationships by improving interchange of
• Procurement example
– Price quotes
– Purchase orders
– Acknowledgments
– Invoices
Standards translation:
• Specifies business form structure so that information can be exchanged
– Emphasis on automation
Applications of EDI:
1. Role of EDI in international trade: Reduced transaction expenditures
Quicker movement of imported & exported goods
Improved customer service through ―track & trace‖ programs
Faster customs clearance & reduced opportunities for corruption, a
huge problem in trade
• EFTS is credit transfers between banks where funds flow directly from the
payer‘s bank to the payee‘s bank.
• The two biggest funds transfer services in the United States are the
Federal Reserve‘s system, Fed wire, & the Clearing House Interbank Payments
System (CHIPS) of the New York clearing house
3. Health care EDI for insurance EDI
• EDI is becoming a permanent fixture in both insurance & health care industries
• The company then edits sorts & distributes forms to the payer. If necessary,
additional Information
4. Manufacturing & retail procurement using EDI
Advantages:
Disadvantages:
Authentication:
This is the ability to say that an electronic communication (whether via email or
web) does genuinely come from who it purports to. Without face-to-face contact,
passing oneself off as someone else is not difficult on the internet.
In online commerce the best defence against being misled by an imposter is
provided by unforgeable digital certificates from a trusted authority (such as
VeriSign). Although anyone can generate digital certificates for themselves, a
trusted authority demands real-world proof of identity and checks its validity
before issuing a digital certificate. Only certificates from trusted authorities will be
automatically recognized and trusted by the major web browser and email client
software.
Authentication can be provided in some situations by physical tokens (such as a
driver’s license), by a piece of information known only to the person involved (eg.
a PIN), or by a physical property of a person (fingerprints or retina scans). Strong
authentication requires at least two or more of these. A digital certificate provides
strong authentication as it is a unique token and requires a password for its usage.
Privacy:
In online commerce, privacy is the ability to ensure that information is accessed
and changed only by authorized parties. Typically, this is achieved via encryption.
Sensitive data (such as credit card details, health records, sales figures etc.) are
encrypted before being transmitted across the open internet – via email or the
web. Data which has been protected with strong 128bit encryption may be
intercepted by hackers, but cannot be decrypted by them within a short time.
Again, digital certificates are used here to encrypt email or establish a secure
HTTPS connection with a web-server. For extra security, data can also be stored
long-term in an encrypted format.
Authorization:
Authorization allows a person or computer system to determine if someone has
the authority to request or approve an action or information. In the physical
world, authentication is usually achieved by forms requiring signatures, or locks
where only authorized individuals hold the keys.
Authorization is tied with authentication. If a system can securely verify that a
request for information (such as a web page) or a service (such as a purchase
requisition) has come from a known individual, the system can then check against
its internal rules to see if that person has sufficient authority for the request to
proceed.
In the online world, authorization can be achieved by a manager sending a digitally
signed email. Such an email, once checked and verified by the recipient, is a legally
binding request for a service. Similarly, if a web-server has a restricted access area,
the server can request a digital certificate from the user‘s browser to identify the
user and then determine if they should be given access to the information
according to the server‘s permission rules.
Integrity:
Integrity of information means ensuring that a communication received has not
been altered or tampered with. Traditionally, this problem has been dealt with by
having tight control over access to paper documents and requiring authorized
officers to initial all changes made – a system with obvious drawbacks and
limitations. If someone is receiving sensitive information online, he not only wants
to ensure that it is coming from who he expects it to (authentication), but also that
it hasn ‘t been intercepted by a hacker while in transit and its contents altered.
The speed and distances involved in online communications requires a very
different approach to this problem from traditional methods.
One solution is afforded by using digital certificates to digitally ―sign‖ messages.
A travelling employee can send production orders with integrity to the central
office by using their digital certificate to sign their email. The signature includes a
hash of the original message – a brief numerical representation of the message
content. When the recipient opens the message, his email software will
automatically create a new hash of the message and compare it against the one
included in the digital signature. If even a single character has been altered in the
message, the two hashes will differ and the software will alert the recipient that
the email has been tampered with during transit.
Non-repudiation:
Non-repudiation is the ability to guarantee that once someone has requested a
service or approved an action. Non-repudiation allows one to legally prove that a
person has sent a specific email or made a purchase approval from a website.
Traditionally non-repudiation has been achieved by having parties sign contracts
and then have the contracts notarized by trusted third parties. Sending documents
involved the use of registered mail, and postmarks and signatures to date-stamp
and record the process of transmission and acceptance. In the realm of e-
commerce, non-repudiation is achieved by using digital signatures. Digital
signatures which have been issued by a trusted authority (such as VeriSign) cannot
be forged and their validity can be checked with any major email or web browser
software. A digital signature is only installed in the personal computer of its owner,
who is usually required to provide a password to make use of the digital signature
to encrypt or digitally sign their communications. If a company receives a purchase
order via email which has been digitally signed, it has the same legal assurances as
on receipt of a physical signed contract.
The security policy should also consider physical aspects of network security. For
example, Who has access to the corporate server?
Is it in a locked environment or kept in an open office?
What is the procedure for determining who should be given access? The
security policy regulates the activities of employees just as much as it
defines how IT infrastructure will be configured. The policy should include
details on how it is to be enforced How individual responsibilities are
determined?
For it to be effective, the policy needs regular testing and review to judge the
security measures. The review process needs to take into account any changes in
technology or business practices which may have an influence upon security.
Lastly, the policy itself needs to be regarded as a living document which will be
updated at set intervals to reflect the evolving ways in which the business,
customers and technology interact. Security Standards:
There are various standards pertaining to the security aspects of enterprises. Some
of them are
ISO 17799 (Information technology – Code of practice for information
security management).
(ISO/IEC 2000).
(SSE-CMM 2003).
(COBIT 2000).
The main objective of the COBIT is the development of clear policies and good
practices for security and control in IT for worldwide endorsement by commercial,
governmental and professional organizations. The SSE-CMM is a process reference
model. It is focused upon the requirements for implementing security in a system
or series of related systems that are in the Information Technology Security
domain.