Professional Documents
Culture Documents
Key 1
Key 1
Part B
11 a)Robust B2B eCommerce Platform,Real-Time Integration With Enterprise Resource
Planning (ERP) Software,Omnichannel Personalization,Third-Party Logistics
Integration,eCommerce Syndication,Dealer Locator or Dealer Portal,Sales Reps
Dashboard and Punchout Catalogs.
Architectural model are Supplier Oriented Marketplace,Buyer Oriented Marketplace and
Intermediary Oriented Marketplace
b)Functional requirements are product features or functions that developers must
implement to enable users to accomplish their tasks. So, it’s important to make them
clear both for the development team and the stakeholders. Generally, functional
requirements describe system behavior under specific conditions.A search feature
allows a user to hunt among various invoices if they want to credit an issued invoice.
12 a) The web browser is an application program that displays a
www document. It usually uses other internet services to access the document. Web
server is a program or a computer that can provide services to other programs called
clients.The message that goes from the web browser to the web server is known as
HTTP request.Websites are cross platform as they require tweaking to operate on
different browsers,operating systems etc.
b)It defines the interaction between the consumer and the merchant for online
commerce. This is necessary because to buy and sell goods a buyer, a seller and other
parties must interact in ways that represent standard business process. A well
established standard process for processing credit card purchasers has contributed to
the wide spread dissemination of credit cards. The establishment of common mercantile
process model is expected to increase the convenience for consumers
13a)The server authenticates the customers and verifies with the bank that funds
are adequate before purchase. Ex: postpaid mechanisms are credit/debit cards and
electronic checks
i. Larger memory.
ii. High levels of security
iii. Reduced fraud
iv. Organized information
v. Reliability
vi. Upper management information
vii. Information Security
viii. Ease of use without need for connections online or via telephone
ix. User comfort
x. Represent liquidity
15b)
Part C
16a)Sharing business information, maintaining business relationships and conducting
business transactions using computers connected to a telecommunication network is
called E-Commerce A more general definition of e-commerce is given by Wigand
(1997) as: The seamless application of information and communication technology
from its point of origin to its endpoint along the entire value chain of business
processes conducted electronically and designed to unable the accomplishment of a
business goal. These procedures may be partial or complete or may encompass
business to business as well as business to consumer and consumer to business
transactions. E-commerce can be viewed as online business .It can mean selling
data directly from the website or offering applications for download after they are
purchased online. E-commerce is a technology or a system; it also can be viewed as
different kind of business. It is a business of computer and communication network
which is depending upon the business transactions. E-commerce includes both
business to business (B2B) and Business to customer (B2C) transactions
Electronic commerce can be classified into four main categories. The basis for this
simple classification is the parties that are involved in the transactions. So the four basic
electronic commerce models are as follows,
1. Business to Business
This is Business to Business transactions. Here the companies are doing business with
each other. The final consumer is not involved. So the online transactions only involve
the manufacturers, wholesalers, retailers etc.
2. Business to Consumer
Business to Consumer. Here the company will sell their goods and/or services directly
to the consumer. The consumer can browse their websites and look at products,
pictures, read reviews. Then they place their order and the company ships the goods
directly to them. Popular examples are Amazon, Flipkart, Jabong etc.
3. Consumer to Consumer
Consumer to consumer, where the consumers are in direct contact with each other. No
company is involved. It helps people sell their personal goods and assets directly to an
interested party. Usually, goods traded are cars, bikes, electronics etc. OLX, Quikr etc
follow this model.
4. Consumer to Business
A two-tier application generally includes a Java client that connects directly to the
database through TopLink. The two-tier architecture is most common in complex
user interfaces with limited deployment. The database session provides TopLink
support for two-tier applications.
Although the two-tier architecture is the simplest TopLink application pattern, it is also
the most restrictive, because each client application requires its own session. As a
result, two-tier applications do not scale as easily as other architectures. Two-tier
applications are often implemented as user interfaces that directly access the
database They can also be non-interface processing engines. In either case, the two-
tier model is not as common as the three-tier model.
Client Server
User Interface (Business Rules)
(Business Rules) Data Access
17 b) It defines the interaction between the consumer and the merchant for online
commerce. This is necessary because to buy and sell goods a buyer, a seller and
other parties must interact in ways that represent standard business process. A well
established standard process for processing credit card purchasers has contributed
to the wide spread dissemination of credit cards. The establishment of common
mercantile process model is expected to increase the convenience for consumers.
Mercantile models from the Consume rs Perspective: The online consumer expects
quality and convenience, value, low price etc. to meet their expectations and
understand the behaviour of online shopper there is a need for the business process
models that provides the standard product / service purchasing process. The process
model for a consumer point of view consists of seven activities that can be grouped
into three phases. They are 1. Pre phase 2. purchase consumption 3. post purchase
interaction phase. Steps taken by customer in purchasing:
1. Pre purchase Determination: this phase includes search and discovery for a set of
products in the larger information space applicable of meeting customers
requirements and product selection from the smaller set of products based on
attribute comparision.
2. Purchase Consumption: this phase includes mercantile protocols that specify the
flow of information and documents associated with purchasing and negotation with
merchants for suitable terms such as price availability and delivery dates. 3. Post
Purchase interaction: this phase includes customer service and support to addresses
customers complaints, product returns & product defects
3. Pre Purchase Preparation: From the consumer point of view any major purchase
can be assumed to involve some amount of pre purchase deliberation. Pre purchase
deliberation is defined as elapsed time between the consumer’s first thinking about
buying and actual purchase itself. Information search should constitute the major part
of duration but comparison of alternatives and price negotiations would be included in
continuously evolving information search and deliver process. To deliberate,
consumers have to be watchful for the new or existing information which are
essential for purchase decision process. Information on consumer characteristics
with reduced purchase deliberation time can be quite valuable when attempting to
target, selective communications to desired audience properly. Thus not much
attention have been paid to this important research area which may dictate success
or failure of online shopping. Consumers can be categorized into three types
1. Impulsive buyers
2. Patient buyers
3. Analytical buyers
1. Impulsive buyers: these buyers purchase the product quickly.
2. Patient buyers: who purchase products after making some analysis or
comparision.
3. Analytical buyers: who do substantial research before making the decision to
purchase product or services.
Marketing researchers have isolated several types of purchasing.
1. Specifically planned purchase: the need was recognized on entering the store and
the shopper brought the exact item planned.
2. Generally planned purchases: the need was recognized, but the shopper decided
instore on the actual manufacture of the item to satisfy the need. 3. reminder
purchases: the shopper was reminded of the need by some store influence. This
shopper is influenced by in-store advertisements and can substitute products readily.
3. Entirely unplanned purchases: the need was not recognized entering the store.
Purchase Consumption: After identifying the product to be purchased by the buyer
and the seller must interact in some way ( e-mail, on-line) to carry out the mercantile
transactions. The mercantile transaction is defined as the exchange of information
between the buyer and seller followed by necessary payment depending upon the
payment model mutually agreed on, they may interact by exchanging currently i.e.
backed by the third party such as the central bank, master card, visa card etc. A
single mercantile model will not be sufficient to meet the needs of everyone. In very
general terms a simple mercantile protocol would require the following transaction
where the basic flow remains the same .
The following are the two types of mercantile protocols where the payment is in the
form of electronic cash and credit cards.
1. Mercantile process using digital cash: a bank mints ( prints ) electronic currency or
e cash. Such a currency is simply a series of bits that the issuing bank can be
verified to be valid. This currency is kept secured by the use of cryptographic
techniques. After being issued some e-cash a buyer can transfer to a seller in
exchange for goods upon receiving a e-cash the sellers can verify authenticity by
sending it to the issuing bank for verification. E-cash issuing banks make money by
charging either buyer or seller or both. A transaction fee for the use of their E-cash.
E-cash is similar to paper currency and has the benefits of being anonymous
( hidden ) and easily transmitted electronically. It still entails the risk of theft or loss.
However, and so requires significant security by the buyer when storing e-cash.
2. Mercantile Transaction Using Credit Cards: two major components of credit card
transaction in the mercantile process are
· Electronic Authorization
· Settlement In the authorization process in the retail transaction, the 3 rd party
processor (tpp) captures the information at the point of sale and transmit the
information to the credit card issue for authorization, communicated a response to
the merchant and electronically stores the information for the settlement and
reporting. Once the information leaves the merchants premises the entire process
takes few seconds. The benefits of electronic processing include a reduction of credit
card losses, lower merchant transaction costs, faster consumer checkout.
Credit card authorization is processed at the point of sale terminal using dial-up
phone access into the TPP networks. The credit card no is checked against the
database and the transaction is either approved typically in a few seconds. A similar
procedure is used for debit cards and check verification once the electronic
authorization function is completed. The information is processed within the system
for client reporting. The data are then transmitted for settlement to the appropriate
institution processor.
Post Purchase Interaction: As long as there is payment for services there will be
references, disputes, other customer service issues that need to be considered.
Returns and claims are an important part of purchasing process that impact the
administrative costs, scrap and transportation expenses and customers relations. To
overcome these problems many companies design their mercantile process for one
way i.e., returns and claims must flow upstream. The following are the complex
customer service challenges that arise in the customized retaining which have not
fully understood or resolved.
1. Inventory Issues: to serve a customer properly a company should inform a
customer right from when an item is ordered to it is sold out, otherwise the company
will have a disappointed customer.
2. database Access and Compatibility Issues: unless the customer can instantly
access all the computers of all the direct response vendors likely to advertise on the
information super highway on a real time basis, with compatible software to have an
instant access to the merchants inventory and database.
3. Customer service issues: Customers often have questions about the product such
as colour, size, shipment etc. and other things in mind can resolved only by talking to
an order entry operator.
18 a)EDI – Electronic Data Interchange, Contact between companies exchanging
orders via intra- or internet. (EDI) is the computer-to-computer exchange of
structured information, by agreed message standards, from one computer application
to another by electronic means and with a minimum of human intervention. In
common usage, EDI is understood to mean specific interchange methods agreed
upon by national or international standards bodies for the transfer of business
transaction data, with one typical application being the automated purchase of goods
and services.
EDI documents contain the same data that would normally be found in a paper
document used for the same organisational function. However, EDI is not confined to
just business data related to trade but encompasses all fields such as medicine
(patient records, laboratory results..), transport (container and modal information…),
engineering and construction, etc.- (Electronic Data Interchange) The exchange of
information between two or more companies with mutual interests over a network.
Email:
(i) E-mail is an acronym of electronic mail
(ii) E-mail system is basically used for sending message electronically to individuals
or group of individuals in an inter and intra office environment. It requires network to
connect them.
(iv) One of the advantages of E-mail is that if gives users ability to review, respond
message quickly.
EDI
(i) EDI is an acronym of Electronic Data interchange
(iii) EDI provides communication between trading partners that agree to exchange
EDI transactions.
(iv) EDI eliminates the paper documents associated with common business
transactions.
(v) EDI message can be immediately processed by receiving computer without any
human intervention or interpretation or re-keying
(vi) One other advantage of EDI is that it generates the functional acknowledgment
whenever an EDI message is received, and is electronically transmitted to the
sender.
NIC (Network Interface Card): It is the means by which the workstations are
connected functionally and physically to the network. It is microprocessor bases
device. Comes with software/driver which is to be installed. Software supplies the
intelligence to control access to and communications across the network and to
perform all communication processing.
18 b) Legal Issues
Where are the headlines about consumers defrauding merchants? What about fraud
e-commerce websites? Internet fraud and its sophistication have grown even faster
than the Internet itself. There is a chance of a crime over the internet when buyers
and sellers do not know each other and cannot even see each other. During the first
few years of e-commerce, the public witnessed many frauds committed over the
internet. Let’s discuss the legal issues specific to e-commerce.
Fraud on the Internet
E-commerce fraud popped out with the rapid increase in popularity of websites. It is a
hot issue for both cyber and click-and-mortar merchants. The swindlers are active
mainly in the area of stocks. The small investors are lured by the promise of false
profits by the stock promoters. Auctions are also conductive to fraud, by both sellers
and buyers. The availability of e-mails and pop up ads has paved the way for
financial criminals to have access to many people. Other areas of potential fraud
include phantom business opportunities and bogus investments.
Copyright
The copyright laws protect Intellectual property in its various forms, and cannot be
used freely. It is very difficult to protect Intellectual property in E-Commerce. For
example, if you buy software you have the right to use it and not the right to distribute
it. The distribution rights are with the copyright holder. Also, copying contents from
the website also violates copy right laws.
Domain Names
The competition over domain names is another legal issue. Internet addresses are
known as domain names and they appear in levels. A top level name
is qburst.com or microsoft.com. A second level name will be qburst.com/blog. Top
level domain names are assigned by a central non-profit organization which also
checks for conflicts or possible infringement of trademarks. Problems arise when
several companies having similar names competing over the same domain name.
The problem of domain names was alleviated somewhat in 2001 after several upper
level names were added to com.
Another issue to look out for is Cybersquatting, which refers to the practice of
registering domain names with the desire of selling it at higher prices.
Security features such as authentication, non-repudiation and escrow services can
protect the sellers in e-commerce.
One needs to be careful while doing e-commerce activities. The need to educate the
public about the ethical and legal issues related to e-commerce is highly important
from a buyer as well as seller perspective.
19 a) Internet Technology
Advantages:
Disadvantages:
1) There is a lot of wrong information on the internet. Anyone can post anything, and
much of it is garbage.
2) There are predators that hang out on the internet waiting to get unsuspecting
people in dangerous situations.
3) Some people are getting addicted to the internet and thus causing problems with
their interactions of friends and loved ones.
4) Pornography that can get in the hands of young children too easily.
5) Easy to waste a lot of time on the internet. You can start surfing, and then realize
far more time has passed than you realized. Internet and television together of added
to the more sedentary lifestyles of people which further exacerbates the obesity
problem.
6) Internet has a lot of “cheater” sites. People can buy essays and pass them off as
their own far more easily than they used to be able to do.
7) There are a lot of unscrupulous businesses that have sprung up on the internet to
take advantage of people.
8) Hackers can create viruses that can get into your personal computer and ruin
valuable data.
9) Hackers can use the internet for identity theft.
10) It can be quite depressing to be on the internet and realize just how uneducated
so many people have become in today’s society.
Disadvantages of web technology
Matters involving web technology can be very complicated, and it would be difficult
for someone without relevant experience to sort a network problem out. This means it
is necessary to employ someone with the specific skills to solve network issues,
which costs money.
Additionally, the existence of a network provides the opportunity for an attack on the
computer system. Weaknesses in a network could be exploited; important
information could be stolen or destroyed and malware could infect the various
network systems. For this reason, network security is another issue that must be
considered when using web technology.
The main advantage of web technology is that it offers convenience and a high
speed of communication in the computer world. Whether in the office or the home,
processes using a computer are more swift and straightforward with the use of a
network.
19 b)Digital Libraries
Digital libraries represent a powerful new set of tools for preserving, disseminating,
and reusing technology on a large scale within distributed corporate organizations.
Drawing from disciplines including information retrieval, the Web and library science,
digital libraries provide a means for capturing and preserving design, manufacturing
and quality information for complex products and systems during their lifecycles.
Data/Information Warehouses
Multidimensional databases
• Digital document is the means by which members in the organization interact with
each other and customers
• Ability to automate and streamline document-based processes –
Authoring –
Approving –
Distribution
– Searching –Retrieving
–-Storing
– Viewing
Part D
20 a)Customer retention is the collection of activities a business uses to increase the
number of repeat customers and to increase the profitability of each existing
customer.
Customer retention strategies enable you to both provide and extract more value
from your existing customer base. You want to ensure the customers you worked so
hard to acquire stay with you, have a great customer experience, and continue to get
value from your products.
1. Just starting: When you’ve just started your store there is one thing you should
be focused on: getting customers. At this point your acquisition efforts should
completely trump retention. Focus on strategies and tactics that will help you grow
your customer base.
2. Gaining traction: You now have customers and you are getting sporadic sales. At
this stage you can begin to introduce retention elements to encourage each customer
to buy more. My recommendation would be to start with retention email
campaigns that focus on encouraging a past customer to purchase from you again.
5. Well-established: At this stage your store has made it past the initial gauntlet.
They ’ve achieved many early successes and you have a lot of processes and
automations in place. Now is the time to focus heavily on retention.
For example, in the graph below, each store has 100 customers buying a $10 item
each month. The light purple store is retaining 5% of those customers each month,
and the dark purple is retaining 10%. As you can see the 5% increase can lead to
rapid growth that is difficult to match with straight acquisition.
20 b)The analysis of existing web sites related to agriculture shows that all of them
can be divided into four categories :