Professional Documents
Culture Documents
E Business
E Business
Introduction
The term e-commerce was coined back in the 1960s, with the rise of electronic commerce – the buying
and selling of goods through the transmission of data – which was made possible by the introduction of
the electronic data interchange. Fast forward fifty years and e-commerce has changed the way in which
society sells goods and services.
E-commerce has become one of the most popular methods of making money online and an attractive
opportunity for investors. For those interested in buying an e-commerce business,
In 1997, IBM marketing, with its agency Ogilvy & Mather began to use its foundation in IT solutions and
expertise to market itself as a leader of conducting business on the Internet through the term "e-
business." Then CEO Louis V. Gerstner, Jr. was prepared to invest $1 billion to market this new brand.
E-business includes E-Commerce, but also covers internal processes such as production, inventory
management, product development, risk management, finance, knowledge management and human
resources. E-business strategy is more complex, more focused on internal processes, and aimed at cost
savings and improvements in efficiency, productivity and cost savings.
What is e commerce
E-Commerce or Electronics Commerce is a methodology of modern business, which addresses the need
of business organizations, vendors and customers to reduce cost and improve the quality of goods and
services while increasing the speed of delivery. Ecommerce refers to the paperless exchange of business
information using the following ways −
Electronic Data Exchange (EDI)
Electronic Mail (e-mail)
Electronic Bulletin Boards
Electronic Fund Transfer (EFT)
Other Network-based technologies
Traditional Commerce began at the time of the barter system which was introduced in the early millions
of years ago. The barter system defines the exchange of goods with other goods instead of money where
money was not available during those days. This is where Traditional Commerce began and has been
continuing till today in the form of exchanging money rather than with only goods. Nowadays Traditional
Commerce lost its popularity and got reduced due to the E-commerce introduction in the early
20th century
Traditional commerce is a branch of business which focuses on the exchange of products and services,
and includes all those activities which encourages exchange, in some way or the other. e-
Commerce means carryng out commercial transactions or exchange of information, electronically on the
internet
Traditional commerce refers to the practice of selling products and services within a single
industry and in some cases, within a specific geographical area. Traditional commerce relies on
operating business hours during a specific period of time and requires housing inventory or occupying a
retail store.
Traditional commerce often relies on face to face interaction with consumers and thrives based on word
of mouth, networking and customer referrals for new and repeat business. Personal interaction is a key
component of businesses experience success with traditional commerce
Differences between e-commerce and traditional commerce
1. Cost effective
E-commerce is very cost effective when compared to traditional commerce. In traditional commerce, cost
has to be incurred for the role of middlemen to sell the company’s product The total overhead
cost required to run e-business is comparatively less, compared to traditional business.
2. Time saving
It takes a lot of time to complete a transaction in traditional commerce. E-commerce saves a lot of
valuable time for both the consumers and business. A product can be ordered and the transaction can be
completed in few minutes through internet
3. Convenience
E-commerce provides convenience to both the customers and the business.
Customers can browse through a whole directories of catalogues, compare prices between products and
choose a desired product any time and anywhere in the world
4. Geographical accessibility
In traditional commerce, it may be easy to expand the size of the market from regional to national level.
Business organizations have to incur a lot of expenses on investment to enter international market. In e-
commerce it is easy to expand the size of the market from regional to international level
6 It helps the organization to enjoy greater profits by increasing sales, cutting cost and streamlining
operating processes. The cost incurred on the middlemen, overhead, inventory and limited sales pulls
down the profit of the organization in traditional commerce
7. Physical inspection
E-commerce does not allow physical inspection of goods. In purchasing goods in e-commerce, whereas in
traditional commerce, it is possible to physically inspect the goods before the purchase.
8 Human resource
To operate in electronic environment, an organization requires technically qualified staff with an
aptitude to update
Traditional commerce does not have such problems associated with human resource in non electronic
environment.
9 Customer interaction
In traditional commerce, the interaction between the business and the consumer is a “face-to-face” In
electronic commerce, the interaction between the business and the consumer is “screen-to-face”
10 Process
There is an automated processing of business transactions in electronic commerce. It helps to minimize
the clerical errors. There is manual processing of business transactions in traditional commerce
11. Business relationship
The business relationship in traditional commerce is vertical or linear, whereas in electronic commerce
the business relationship is characterized by end-to-end.
12 Fraud in traditional commerce is comparatively less as there is personal interaction between the
buyer and the seller.
Lot of cyber frauds take place in electronic commerce transactions. People generally fear to give credit
card information.
THE SCENARIO OF E COMMERCE
According to Internet and Mobile Association of India (IAMAI) & market research firm IMRB, the number
of mobile internet users in India is estimated to reach around 420 million
Create your own product
If you are retail startup, then you need to think about to bring the new & exclusive products to the
marketplace. For ex: With the help of special deals with top brands like Nike, Clavin
Registration
Basket
Payment
Product management
Orders management
VAT and shipping costs
Registration
In order to make a purchase, users must register with the site, providing all the information needed for
shipping and billing.
The data will be stored on a database and will be available from the back office.
Basket
The basket is a tool that, like a shopping basket, allows users to select the products they want and then go
to the checkout for payment. Managing the basket means:summarising user requests within the
possibilities offered by the catalogue
checking the basket and possibly cancel/modify the items placed in it starting the payment process for
the selected products
Payment
The payment system is a mechanism that facilitates dialogue between the parties involved in financial
transactions: the bank, the store and you with your credit card.
cancelled.
Product management
This is the main part of the e-commerce system and provides all the features required for product
placement, order fulfilment, etc.., key to the management of online sales.
Use of the G2G in practice: G2G concept is used as an abbreviation for expressing the relationship
between two government entities. The relationship may refer to the information and data exchange,
business relationship or it can describe the ICT solution that helps in communication between two
federal organizations (e.g. document exchange, sharing public administration registers, cadastral
system, etc.)
The aim of G2G is to enable governments and organizations related to them to more easily work
together and to better serve citizens within key lines of business.
B2G
Business-to-government (B2G) is a business model that refers to businesses selling products, services or
information to governments or government agencies.
B2G networks or models provide a way for businesses to bid on government projects or products that
governments might purchase or need for their organizations. This can encompass public sector
organizations that propose the bids. B2G activities are increasingly being conducted via the Internet
through real-time bidding.
B2G is not an insignificant chunk of business. The federal government alone spends about $8.5 billion a
day. Notably, a portion of its business is supposed to be spent on small business suppliers.
B2A
Business to administration and reverse of it Administration to business looks they are same in
ebusiness models, so that we will try to compare these models of e-business here.
The B2A category covers all transactions that are carried out between businesses and government
bodies using the Internet as a medium. This category has steadily evolved over the last few years.
Example of B2A
An example of a B2A model, is that of Accela.com, a software company that provides round the clock
public access to government services for asset management, emergency response, permitting, planning,
licensing, public health, and public works.
B2P
By B2P meaning is a set of methods for achieving optimal feedback between the business and the end
user. If B2B strategy uses in its arsenal detailed analytical reports about demand, competitive offers and
the amount of investment, then B2P-concept is aimed at the emotional component of advertising and
establishing personal contact with the consumer.
For example, Amazon.com examines preferences of visitors in order to offer another product. Dell
Computers reveals a creative potential of individuals by allowing them to “build their own gadgets”
based on corporation’s components. Companies with pages in social networks could cooperate with fans
through mailings and congratulations on memorable holidays. I.e., firms of all sizes are required to have
several ways for communicating with customers, such as a chat or forum
C2A
UNIT 2
The Internet is our digital information superhighway which we use so ubiquitously today. The term
“online” has become synonymous with the Internet. We are actually almost always online and
sometimes we are not aware of it. This is because of the transparency in service that Internet Service
Providers (ISP) and cellular phone providers have given us. Our Internet plan and Smartphone service
provide data access to the Internet 24/7/365
It all started with ARPANET in October 29, 1969 when the first successful message was sent from a
computer in UCLA to another computer (also called node) at the Stanford Research Institute (SRI).
These computers were called Interface Message Processors (IMP)
TCP/IP — Transmission Control Protocol/Internet Protocol are the standard set of data communications
protocols used on the Internet. It was developed under the DARPA (DoD Advanced Research Projects
Agency) by Robert Kahn and Vint Cerf. It is now a de facto standard for the Internet and is maintained
by the IETF. These protocols are what gave the Internet e-mail, file transfer, newsgroups, web pages,
instant messaging, voice over IP just to name some. This is like a common language that computers use
to communicate with one another on the network.
World Wide Web and HTML — This is credited to Tim Berners-Lee who developed a system that would
allow documents to be linked to other nodes. This was the beginning of hypertext, which are links to
information stored on other computers in the network. Users would no longer need to know the actual
location or computer name to access resources through the use of HTML (Hypertext Markup Language)
hyperlinks. Thus a resource called a website can be accessed that provides these links which can be
clicked with the mouse. This whole linked system became called the World Wide Web and to access
resources on it one must type “www” followed by the domain name “servername.com”.
Browser — The World Wide Web would be useless if not for a software program called a browser. Early
development of the web browser started with Mosaic in 1993. Prior to browsers, there was a software
called Gopher that provided access to websites, but it was tedious and not user friendly. Eventually
more robust features evolved with a new generation of browsers like Mozilla and then Netscape. It was
actually Microsoft’s introduction of Internet Explorer (IE) in 1995 that led to wider adoption of the
World Wide Web and use of the Internet.
Search Engines — In order to get information and content from the Internet, a search engine software
was needed. The early days of searching began with Gopher. It became less popular when browser
based search engines emerged. Other web based systems evolved like Lycos, Yahoo and Webcrawler.
Then Google appeared toward the late 1990’s and became the most popular search engine. It was simple
and fast, offering the best way for users to get information on the Internet. The term “google” now
became synonymous with searching on the Internet and is also the most well known search engine.
Internet Service Providers — The early days of the Internet required a dial-up modem connected to a
telephone line with data speeds of 14.4–28.8 kbps. That was sufficient to meet the data demands during
the late 80’s and early 90’s since most Internet was text based. As the Internet grew more popular and
businesses began to adopt it, more content required faster data speeds. This led to Internet Service
Providers (ISP) beginning with the likes of AOL bundling service by mailing free CD software to
encourage users to sign up. The catch was getting an e-mail address and free hour of Internet use. ISP’s
continued to improve service by offering faster DSL and ADSL service as alternatives to dial-up. DSL
service bumped speeds up to 128 kbps. Cable companies then provided even faster Internet speed using
cable modems that became known as broadband service. The infrastructure was built by
telecommunications companies and cable TV giants to offer even faster speeds that would allow users to
stream video, chat, browse active content on the web, video conference and faster data downloads.
Cable modem speeds, based on DOCSIS (Data Over Cable Service Interface Specification) offer speeds
between 20 to 100 Mbps and even greater (depends on how many users are connected on the
subscriber circuit).
Basic Network architecture
Computer Network Architecture is defined as the physical and logical design of the software, hardware,
protocols, and media of the transmission of data. Simply we can say that how computers are organized
and how tasks are allocated to the computer.
o Peer-To-Peer network
o Client/Server network
Peer-To-Peer network
o Peer-To-Peer network is a network in which all the computers are linked together with equal
privilege and responsibilities for processing the data.
o Peer-To-Peer network is useful for small environments, usually up to 10 computers.
o Peer-To-Peer network has no dedicated server.
Advantages of a peer-to-peer network
Does not require a dedicated server which means its less costly.
If one computer stops working, the other computers connected to the network will continue
working.
Installation and setup is quite painless because of the built-in support in modern operating
systems.
Disadvantages of a peer-to-peer network
Security and data backups are to be done to each individual computer.
As the numbers of computers increases on a P2P network... performance, security, and access
becomes a major headache.
Client/Server Network
o Client/Server network is a network model designed for the end users called clients, to access the
resources such as songs, video, etc. from a central computer known as Server.
o The central controller is known as a server while all other computers in the network are
called clients.
o A server performs all the major operations such as security and network management.
o A server is responsible for managing all the resources such as files, directories, printer, etc.
o All the clients communicate with each other through a server.
Advantages of a client/server network
Resources and data security are controlled through the server.
Not restricted to a small number of computers.
Server can be accessed anywhere and across multiple platforms.
Disadvantages of a client/server network
Can become very costly due to the need of a server as well as networking devices such as hubs,
routers, and switches.
If and when the server goes down, the entire network will be affected.
Technical staff needed to maintain and ensure network functions efficiently.
NIC
NIC stands for network interface card.
NIC is a hardware component used to connect a computer with another computer onto a
network
It can support a transfer rate of 10,100 to 1000 Mb/s.
Hub
A Hub is a hardware device that divides the network connection among multiple devices. When
computer requests for some information from a network, it first sends the request to the Hub through
cable. Hub will broadcast this request to the entire network. All the devices will check whether the
request belongs to them or not. If not, the request will be dropped.
Switch
A switch is a hardware device that connects multiple devices on a computer network. A Switch contains
more advanced features than Hub. The Switch contains the updated table that decides where the data is
transmitted or not. Switch delivers the message to the correct destination based on the physical address
present in the incoming message. A Switch does not broadcast the message to the entire network like
the Hub. It determines the device to whom the message is to be transmitted. Therefore, we can say that
switch provides a direct connection between the source and destination. It increases the speed of the
network
Router
A router is a hardware device which is used to connect a LAN with an internet connection. It is
used to receive, analyze and forward the incoming packets to another network.
A router works in a Layer 3 (Network layer) of the OSI Reference model.
A router forwards the packet based on the information available in the routing table.
It determines the best path from the available paths for the transmission of the packet.
Modem
A modem is a hardware device that allows the computer to connect to the internet over the
existing telephone line.
A modem is not integrated with the motherboard rather than it is installed on the PCI slot found
on the motherboard.
It stands for Modulator/Demodulator. It converts the digital data into an analog signal over the
telephone lines.
A user browses for a specific URL, which the browser locates and requests.
Over the network, data is sent from the server to the browser, then executed by the browser so
that it is able to display the requested page.
It is the most simple as well as the least reliable web app component model. Such a model uses a single
server as well as a single database. A web app builds on such a model will go down as soon as the server
goes down. Hence, it isn’t much reliable.
2. Multiple Web Servers, One Database (At a Machine Rather than the Web server)
The idea with this type of web application component model is that the webserver doesn’t store any
data. When the webserver gets information from a client, it processes the same and then writes it to the
database, which is managed outside of the server. This is sometimes also referred to as a stateless
architecture.
It is the most efficient web application component model because neither the webservers nor the
databases have a single point of failure. There are two options for this type of model. Either to store
identical data in all the employed databases or distribute it evenly among them
HTTP - Overview
The Hypertext Transfer Protocol (HTTP) is an application-level protocol for distributed, collaborative,
hypermedia information systems. This is the foundation for data communication for the World Wide
Web (i.e. internet) since 1990. HTTP is a generic and stateless protocol which can be used for other
purposes as well using extensions of its request methods, error codes, and headers.
Basic Features
HTTP is connectionless: The HTTP client, i.e., a browser initiates an HTTP request and after a request is
made, the client waits for the response. The server processes the request and sends a response back
after which client disconnect the connection
HTTP is media independent: It means, any type of data can be sent by HTTP as long as both the client
and the server know how to handle the data content.
HTTP is stateless: As mentioned above, HTTP is connectionless and it is a direct result of HTTP being a
stateless protocol. The server and client are aware of each other only during a current request.
Afterwards, both of them forget about each other. Due to this nature of the protocol, neither the client
nor the browser can retain information between different requests across the web pages.
Basic Architecture
The following diagram shows a very basic architecture of a web application and depicts where HTTP
sits:
The HTTP protocol is a request/response protocol based on the client/server based architecture where
web browsers, robots and search engines, etc. act like HTTP clients, and the Web server acts as a
server.
Client
The HTTP client sends a request to the server in the form of a request method, URI, and protocol
version, followed by a MIME-like message containing request modifiers, client information, and
possible body content over a TCP/IP connection.
Server
The HTTP server responds with a status line, including the message's protocol version and a success or
error code, followed by a MIME-like message containing server information, entity meta information,
and possible entity-body content
HTTP is an extensible protocol that is easy to use. The client-server structure, combined with the ability
to simply add headers, allows HTTP to advance along with the extended capabilities of the Web.
URL
A uniform resource locator (URL) is the address of a resource on the Internet. A URL indicates the
location of a resource as well as the protocol used to access it.
Parts of a URL
The protocol or scheme. Used to access a resource on the internet. Protocols include http, https,
ftps, mailto and file. The resource is reached through the domain name system (DNS) name. In this
example, the protocol is https.
Host name or domain name. The unique reference the represents a webpage. For this example,
whatis.techtarget.com.
Port name. Usually not visible in URLs, but necessary. Always following a colon, port 80 is the
default port for web servers, but there are other options. For example, :port80.
Path. A path refers to a file or location on the web server. For this example, search/query.
Query. Found in the URL. The query consists of a question mark, followed by parameters. For this
example, ?.
Parameters. Pieces of information in a query string of a URL. Multiple parameters can be separated
by ampersands (&). For this example, q=URL.
Fragment. This is an internal page reference, which refers to a section within the webpage. It
appears at the end of a URL and begins with a hashtag (#). Although not in the example above, an
example could be #history in the URL https://en.wikipedia.org/wiki/Internet#History.
Unit 3
A website following the B2B business model sells its products to an intermediate buyer who then sells
the products to the final customer. As an example, a wholesaler places an order from a company's
website and after receiving the consignment, it sells the endproduct to the final customer who comes to
buy the product at the wholesaler's retail outlet.
B2B identifies both the seller as well as the buyer as business entities. B2B covers a large number of
applications, which enables business to form relationships with their distributors, re-sellers, suppliers,
etc. Following are the leading items in B2B eCommerce.
Electronics
Shipping and Warehousing
Motor Vehicles
Petrochemicals
Paper
Office products
Food
Agriculture
Key Technologies
Following are the key technologies used in B2B e-commerce −
Electronic Data Interchange (EDI) − EDI is an inter-organizational exchange of business
documents in a structured and machine processable format.
Internet − Internet represents the World Wide Web or the network of networks connecting
computers across the world.
Intranet − Intranet represents a dedicated network of computers within a single organization.
Extranet − Extranet represents a network where the outside business partners, suppliers, or
customers can have a limited access to a portion of enterprise intranet/network.
Back-End Information System Integration − Back-end information systems are database
management systems used to manage the business data.
Architectural Models
Following are the architectural models in B2B e-commerce −
Supplier Oriented marketplace − In this type of model, a common marketplace provided by
supplier is used by both individual customers as well as business users. A supplier offers an e-
stores for sales promotion.
Buyer Oriented marketplace − In this type of model, buyer has his/her own market place or e-
market. He invites suppliers to bid on product's catalog. A Buyer company opens a bidding site.
Intermediary Oriented marketplace − In this type of model, an intermediary company runs a
market place where business buyers and sellers can transact with each other.
SUPPLIER-ORIENTED MARKETPLACE
The most common model is the supplier-oriented marketplace. Most of the manufacturerdriven
electronic stores belong to this category. In this model, both individual consumers and business buyers
use the same supplier-provided marketplace as depicted in Figure below.
Characteristics of the Supplier-Oriented Marketplace Supplier-Oriented Marketplaces offer a group of
customers a wide spectrum of products and services and also support them in their own business.
Furthermore, there are large potentials through customer communities, individualized products and
direct customer-relationships. By using Supplier-Oriented Marketplaces, suppliers are offered new
types of market channels in marketing and distribution. Products can be sold directly to the customer
without using intermediaries.
Example of the Supplier-Oriented Marketplace: Cisco Connection Online Case11 Cisco uses the Supplier-
Oriented Marketplace successfully. The market is operated by Cisco Connection Online. In 1997 Cisco
sold more than US$ 1 billion online (total: US$ 6.4 billion) of routers, switches and other network
interconnect devices.
Online Ordering
Cisco builds virtually all its products to order, so there are very few off-the-shelf products. Before the
Cisco Web site, ordering a product could have been lengthy and complicated. Cisco began deploying
Web-based commerce tools in July 1995, and as of July 1996, the Internet Product Center allowed users
to purchase any Cisco product over the Web. In 1999, the same customer's engineer could sit down at a
PC, configure a product online, know immediately if there are any errors, and route the order to its
procurement department.
Finding Order Status Each month in 1998 Cisco's Web site received about 150,000 order status
inquiries such as: "When will the order be ready? How should it be classified for customs? Is it eligible
for NAFTA? What export control issues apply?" Cisco gives customers the tools on its Web site to find
the answers by themselves. In addition, Cisco records a shipping date, the method of shipment, and the
current location of each product. The company's primary domestic and international freight forwarders
regularly update Cisco's database electronically with the status of each shipment, typically by EDI. The
new information in the database automatically updates Cisco's Web site, keeping the customer current
on the movement of each order. As soon as an order ships, Cisco sends the customer a notification
message by e-mail or fax.
Benefits
• Reduced operating cost: Cisco estimates that putting its applications online in 1998 saved the
company $363 million per year, or approximately 17.5 percent of the total operating costs.
• Enhanced technical support and customer service: With 70 percent of its technical support and
customer service calls handled online, Cisco's technical support productivity has increased by 200
percent to 300 percent peryear.
• Reduced technical support staff cost: The online technical support reduced technical support staff
costs by roughly $125 million.
• Reduced software distribution cost: Customers download new software releases directly from Cisco's
site, saving the company $180 million in distribution, packaging, and duplicating costs. Having product
and pricing information on the Web and Webbased CD-ROMs saves Cisco an additional $50 million in
printing and distributing catalogs and marketing materials to customers.
BUYER-ORIENTEDMARKETPLACE Under the platform of supplier-oriented marketplace, the buyer's
acquisition department has to manually enter the order information into its own corporate information
system. Searching estores and e-mails to find and compare suppliers and products can be very costly to
companies like GE, who purchase thousands of items on the Internet. Therefore, such big buyers would
prefer to open their own marketplace, which we call the buyer-oriented marketplace, as depicted in
Figure below. Under this model, a buyer opens an electronic market on its own server and invites
potential suppliers to bid on the announced RFQs, as the GE case illustrates. This model offers a greater
opportunity to committed suppliers.
By supporting transactions and procurement processes, these marketplaces offer great potentials in
cost savings. Buyer-Oriented Marketplaces are found in industrial sectors with few and dominant
buyers.
guidelines for transactions 12 Turban
Internet-based product and supplier catalogue
- availability check - informational support of negotiations
- invitation to bid in auctions and submissions
- catalogue ordering
- support of transactions
- delivery inspection
- quality management
BENEFITS TO BUYERS
The GE TPN Post system can improve the productivity of the buyer's sourcing process and allow buyers
to access quality goods and services from around the world. This larger pool of suppliers fosters
competition and enables the buyers to spend more time negotiating the best deals and less time on
administrative procedures. The benefits of joining GE TPN Post as buyers are:
• Identifying and building partnerships with new suppliers worldwide
• Strengthening relationships and streamlining sourcing processes with cur rent business partners
• Rapidly distributing information and specifications to business partners
• Transmitting electronic drawings to multiple suppliers simultaneously
• Cutting sourcing cycle times and reduce costs for sourced goods
• Quickly receiving and comparing bids from large numbers of suppliers to negotiate better prices •
Since GE has opened TPN to other buyers, this benefit can be shared with other companies; but GE can
earn fees from them. BENEFITS TO SELLERS
Sellers in the GE TPN Post system can gain instant access to global buyers with over $1 billion in
purchasing power. Sellers may dramatically improve the productivity of bidding and sales activities.
The benefits of joining GE TPN Post as sellers are:
• Boosted sales
• Expanded market reach
• Lowered costs for sales and marketing activities
• Shortened selling cycle
• Improved sales productivity
• Streamlined bidding process
Intermediary-Oriented Marketplace
Just in Time (JIT)
The just-in-time (JIT) inventory system is a management strategy that aligns raw-material orders from
suppliers directly with production schedules. Companies employ this inventory strategy to increase
efficiency and decrease waste by receiving goods only as they need them for the production process,
which reduces inventory costs. This method requires producers to forecast demand accurately.
The JIT inventory system contrasts with just-in-case strategies, wherein producers hold sufficient
inventories to have enough product to absorb maximum market demand.
One example of a JIT inventory system is a car manufacturer that operates with low inventory levels but
heavily relies on its supply chain to deliver the parts it requires to build cars, on an as-needed basis.
Consequently, the manufacturer orders the parts required to assemble the cars, only after an order is
received.
Just-in-Time (JIT) Inventory System Advantages
JIT inventory systems have several advantages over traditional models. Production runs are short,
which means that manufacturers can quickly move from one product to another. Furthermore, this
method reduces costs by minimizing warehouse needs. Companies also spend less money on raw
materials because they buy just enough resources to make the ordered products and no more.
Disadvantages of the Just-in-Time System
The disadvantages of JIT inventory systems involve potential disruptions in the supply chain. If a raw
materials supplier has a breakdown and cannot deliver the goods in a timely manner, this could
conceivably stall the entire production process. A sudden unexpected order for goods may delay the
delivery of finished products to end clients
Example of Just-in-Time
Famous for its JIT inventory system, Toyota Motor Corporation orders parts only when it receives new
car orders. Although the company installed this method in the 1970s, it took 15 years to perfect it.
Intermediary-Oriented Marketplace
Characteristics of the Intermediary-Oriented Marketplace This business model is established by an
intermediary company which runs a marketplace where business buyers and sellers can meet. There
are two types of Intermediary-Oriented Marketplaces: horizontal and vertical marketplaces. Vertical
marketplaces concentrate on one industrial sector whereas horizontal marketplaces offer services to all
industrial sectors.
Intermediary-Oriented Marketplace is a neutral business platform and offers the classical economic
functions of a usual market. The difference is that the participants do not have to be physically present.
There are thousands of Intermediary-Orientated Marketplaces and many of them are very different in
the services they offer. These marketplaces can contain a “virtual catalogue of the industrial sector”.
Companies have the possibility to present themselves in this virtual catalogue. On an Internet based
“notice board” single offers or requests of companies can be found.
Example of the Intermediary-Oriented Marketplace: Buzzsaw25
There are varied business relationships between all participants. The complex structure leads to
inefficient processes of planing and communication. Buzzsaw offers software to improve planning and
communication between the parties. This helps reducing the usual overspending of the project’s budget
and schedule. The heart of Buzzsaw’s services is a software, which administrates the construction
project (administrator). This software can be used to carry out the entire construction plan of many
participants involved in the process. Functions like e.g. the design, the planning of the project and the
supervision of the building’s progress can be supported. Buzzsaw also offers detailed information about
the building industry (e.g. news affecting the sector, a classified directory and a local weather forecast).
The marketplace also provides the option to do business. All products relevant for the building industry
can be traded
Auction and Service
in real-time auctions online. Simply referred to as Internet or B2B auctions, these websites and
software packages operate across a range of industries and instantly connect buyers and vendors on an
international scale in real-time. One of the most prominent examples of this technology is the nationally
renowned Exchange and Mart website, which sells a wide range of vehicles online to both private and
commercial clients. The most simplistic and effective type of auction site, vendors can sell to the highest
bidder without incurring significant marketing costs
While this type of website is more synonymous with private or residential users, there are more
advanced and complex systems available for commercial transactions. The advantages remain largely
unchanged, however, except for the fact that business owners can benefit even further through reduced
marketing, sale and distribution costs. In addition to accessing a global target audience in real-time,
companies can also shift products in volume and maximise their bottom line profitability. This has
resulted in the widespread adaptation and development of B2B auction software, with statistics
suggesting that an estimated 25% of all e-commerce transactions occur though associated platforms.
The role software agent in b2b e commerce
oftware agents provide security to the information. ... Business needs lots of communication skills
which is provided by software agents. Software agents are responsible for customer satisfaction in
terms of B2B E-commerce. Software agents can be thus proved as an important entity with respect to E-
Commerce
Software agents furnish protection to the information. Since E-commerce administers with business
online, protection plays the heart of the business. Software agents are accountable for consumer relief
in expressions of B2B E-commerce. Software representatives can be thus proved as an essential entity
with regard to E-Commerce. Some of the important roles of a software agent in b2b e-commerce are as
follows;Software representatives can do their duty without any outsource interference.Social
communication with other software agents and human.Software representatives are explicit in their
purposes.The good software instrument is the one which has the position to accept and adopt changes.
The agent must be programmed in a strong language so as to display the rules.
Software Agents (SAs) to e-commerce systems (it is assumed that providers are already associated with
SAs). We studied why, how, and when users could entrust a part of the e-commerce operations they
undertake to SAs [1]. Usually, most of these operations are complex and though repetitive with a large
segment suitable for computer aids and automation. In addition, users are already overwhelmed with
information that needs to be filtered and sorted out before this information could be used efficiently
and effectively. To assist users in their daily e-commerce operations, we suggest first, associating users
with software agents and second, decomposing an e-commerce scenario into three phases:
investigation, negotiation, and settlement. This is illustrated in Figure 1 where texts in italic summarize
the operations that occur and their outcome. Currently, several implementations of agent-based e-
commerce systems are available on the Internet
In an e-commerce scenario, agents are in charge of multiple operations that can be summarized as
follows: ? Investigation phase:
o Build users’ profile based on their interests and needs;
o Map users’ needs into requests;
o Suggest modifications to users’ requests;
o Recommend products/services based on users’ requests and agents’ experiences;
o Be aware of the market trends for notification purposes;
o Recommend alternate products/services in case of the investigation phase fails;
o And, compare products/services. ?
Negotiation phase:
o Keep track of changing negotiation conditions;
o Recommend negotiation strategies based on users’ requests;
o Suggest to users to relax/not-relax certain constraints in case of the negotiation phase fails.
o Switch from one provider to another during negotiations while retaining negotiation contexts;
o Compare negotiations’ results;
o And, recommend to users the decisions to make. ? Settlement phase: o Pay for the agreed upon
products/services; o Enforce the clauses of the signed contracts;
o Ensure that the agreed upon products/services are delivered; o Notify users in case of delays and
assess the consequences of these delays;
o And, suggest corrective action
Managerial issue in B2B marketing
The need for customer-specific pricing. ...
Promote multiple product lines or brands under one parent company. ...
Other management issues which arise are primarily related to managing change so as to ensure system
acceptance. This issue has often been associated with education and training and was recognised as a
partly controllable factor
While there was an initial reluctance to participate in such mandated initiatives, in the more recent
developments, the case appreciated the benefits of such systems and the initiatives have successfully
obtained participation from business
Regardless of the high expectations concerning the use of Internet-based B2B eCommerce in Australia,
we found that the over-riding issue was its relatively slow adoption by almost all our case study
participants. This “slow adoption” further confirms recent studies undertaken overseas
Unit 4
E-Commerce - Payment Systems
E-commerce sites use electronic payment, where electronic payment refers to paperless monetary
transactions. Electronic payment has revolutionized the business processing by reducing the
paperwork, transaction costs, and labor cost. Being user friendly and less time-consuming than manual
processing, it helps business organization to expand its market reach/expansion. Listed below are some
of the modes of electronic payments −
Credit Card
Debit Card
Smart Card
E-Money
Electronic Fund Transfer (EFT)
Credit Card
Payment using credit card is one of most common mode of electronic payment. Credit card is small
plastic card with a unique number attached with an account. It has also a magnetic strip embedded in it
which is used to read credit card via card readers. When a customer purchases a product via credit card,
credit card issuer bank pays on behalf of the customer and customer has a certain time period after
which he/she can pay the credit card bill. It is usually credit card monthly payment cycle. Following are
the actors in the credit card system.
The card holder − Customer
The merchant − seller of product who can accept credit card payments.
The card issuer bank − card holder's bank
The acquirer bank − the merchant's bank
The card brand − for example , visa or Mastercard.
Credit Card Payment Proces
Step Description
Step 1 Bank issues and activates a credit card to the customer on his/her request.
Step 2 The customer presents the credit card information to the merchant site or to the
merchant from whom he/she wants to purchase a product/service.
Step 3 Merchant validates the customer's identity by asking for approval from the card brand
company.
Step 4 Card brand company authenticates the credit card and pays the transaction by credit.
Merchant keeps the sales slip.
Step 5 Merchant submits the sales slip to acquirer banks and gets the service charges paid to
him/her.
Step 6 Acquirer bank requests the card brand company to clear the credit amount and gets the
payment.
Step 6 Now the card brand company asks to clear the amount from the issuer bank and the
amount gets transferred to the card brand company.
Debit Card
Debit card, like credit card, is a small plastic card with a unique number mapped with the bank account
number. It is required to have a bank account before getting a debit card from the bank. The major
difference between a debit card and a credit card is that in case of payment through debit card, the
amount gets deducted from the card's bank account immediately and there should be sufficient balance
in the bank account for the transaction to get completed; whereas in case of a credit card transaction,
there is no such compulsion.
Debit cards free the customer to carry cash and cheques. Even merchants accept a debit card readily.
Having a restriction on the amount that can be withdrawn in a day using a debit card helps the customer
to keep a check on his/her spending.
Smart Card
Smart card is again similar to a credit card or a debit card in appearance, but it has a small
microprocessor chip embedded in it. It has the capacity to store a customer’s work-related and/or
personal information. Smart cards are also used to store money and the amount gets deducted after
every transaction.
Smart cards can only be accessed using a PIN that every customer is assigned with. Smart cards are
secure, as they store information in encrypted format and are less expensive/provides faster processing.
Mondex and Visa Cash cards are examples of smart cards.
E-Money
E-Money transactions refer to situation where payment is done over the network and the amount gets
transferred from one financial body to another financial body without any involvement of a middleman.
E-money transactions are faster, convenient, and saves a lot of time.
Authentication
Encryption
Integrity
Non-reputability
"https://" is to be used for HTTP urls with SSL, where as "http:/" is to be used for HTTP urls without
SSL.
This protocol using a combination of public - private key cryptography and digital certificate [13] so it
provides communications privacy over the Internet. SSL provides a private between the server and the
client. A handshake between the cardholder’s browser and the merchant server has a role in the
encryption process of the information transmitted by the cardholder [7] [8]. International Journal of
Computer Science & Information Technology (IJCSIT) Vol 9, No 2, April 2017 119 Figure 3 shows
transferring sensitive data over the internet via SSL connection in order to,only the server is
authenticated using a digital certificate. Figure 3. SSL Secured Connection Steps [25] 5.2.1 SSL Protocol
for Securing Data We need to force the web pages with sensitive data to be accessed through SSL as it’s
important to use it for securing the data that passes between the server and the client’s browser. In
case for example, if customer tried to access the next link http://localhost/mobileshop/credit-card-
details/ , the customer should be redirected to https://localhost/mobileshop/credit-card-details/ At
the same time, enforcing SSL protocol will not needed in all places of the site, and because that makes
web pages invisible to search engines and reduces performance. We want to make sure that the,
customer logout, customer registration, and modification pages detail of customer are accessible only
via SSL.
Secure Electronic Transaction
It is a secure protocol developed by MasterCard and Visa in collaboration. Theoretically, it is the best
security protocol. It has the following components −
Card Holder's Digital Wallet Software − Digital Wallet allows the card holder to make secure
purchases online via point and click interface.
Merchant Software − This software helps merchants to communicate with potential customers
and financial institutions in a secure manner.
Payment Gateway Server Software − Payment gateway provides automatic and standard
payment process. It supports the process for merchant's certificate request.
Certificate Authority Software − This software is used by financial institutions to issue digital
certificates to card holders and merchants, and to enable them to register their account
agreements for secure electronic commerce.
SET is a very
comprehensive protocol.It
SSL is basically an encryption provides Privacy, integrate
mechanism for order taking, and authenticity.It is not
queries and other applications used frequently due to its
and available on customer’s complexity and the need
browser. It does not protect for a special card reader by
against all security hazards and the user. it may be
is natural simple and widely abandons if it is not
used. simplified.
SSL is a protocol for general SET is tailored to the credit
purpose secure message card payment to the
exchange. merchant.
SSL protocol may use a SET protocols hides the
certificate, but the payment customer’s credit card
gateway is not available .so, the information from merchant
merchant need to receive both and also hides the order
the ordering information and information to banks to
credit card information because protect privacy called dual
the capturing process should be signature.
generated by merchant. SET protocol is a complex
SSl protocol has been the and more secure protocol.
industry standard for securing SET protocol was jointly
internet communication. developed by MasterCard
SSL protocol was developed by and visa with the goal of
Netscape for securing online securing web browsers for
transaction. bank card transaction.
A digital certificate is an electronic identification card that establishes a user’s authenticity in the
electronic world. The digital certificate (conceptually similar to credit card) contains information, such
as name, e-mail address, a serial number, expiration dates, a copy of certificate holder’s public key and
the digital signature of the certificate- issuing authority so that a recipient can verify that the certificate
is real.
Firewalls: the most commonly accepted network protection is a barrier-a firewall "-between the
corporate network and the outside (untrusted) world (Kalakota and Whinston, 2004),0°. A firewall
protects networked computers from intentional hostile intrusion that could compromise confidentiality
or result in data corruption or denial
There are two access denial methodologies used by firewalls. A firewall may allow or deny all traffic
unless it meets certain criteria. The types of criteria used to determine whether traffic should be
allowed through varies from one type of firewall to another. Firewall may be concerned with the type of
traffic, or with source of destination addresses and ports.
Non-technoiogical Measures for Securing Electronic Payment
• Never send credit card details by e-mail. Pay attention to credit card billing J * ,1AO^ cycles, and follow
up the creditors if bill do not arrive on time (Sumanjeet) . This could be a sign that someone has changed
the address or other information from the consumer file to hide illegal changes from consumer.
• Make a print out of all the web pages or e-mail directly related to the purchase, so that the consumer
will have complete records on the event of any problem.
• When making payment online, check the lock or icons on the screen to make sure that the site is
secure. A broken icon indicates that the site is not secure.
Sign on the signature panel ofthe debit card immediately upon the receipt. And protect the magnetic
strip from the exposure to direct sunlight, magnets and scratches.
• Never keep a copy of PIN (Personal Identification Number) in wallet and never write PIN number on
the card.
• Keep a photocopy offront and back of card.
• In case the card is stolen/misplaced110 call bank help line to inform about the same.
• Keep the charge slips safe, to tally them against the billing statement.
• Never have PIN or passwords, which are easily identifiable by the others like your name, date of birth
and your car number etc
Implementation plan because of the complexity and multifaceted nature of EC .it makes sense to
prepare an implementation plan.such a plan should include goals.budgets.timetable and
contingency plans
Choosing the companys strategy toward e commerce-generally speaking there are three majo
options
1 lead conduct large-scale innovative e-commerce activities
2 watch and wait do nothing but carefully watch what is going on on the field in order to
determine when EC is mature enough to enter it.
3 Experiment start some e-commerce experimental projects
Managing resistance to change EC can result in a fundamental change in how business is
done.Resistance to change from employement ,vendors and customers may develop education
training and publicity over an extended time period offer possible solution to the problem
n
Unit 4
E-Commerce - Payment Systems
E-commerce sites use electronic payment, where electronic payment refers to paperless monetary
transactions. Electronic payment has revolutionized the business processing by reducing the paperwork,
transaction costs, and labor cost. Being user friendly and less time-consuming than manual processing, it
helps business organization to expand its market reach/expansion. Listed below are some of the modes
of electronic payments −
Credit Card
Debit Card
Smart Card
E-Money
Electronic Fund Transfer (EFT)
Credit Card
Payment using credit card is one of most common mode of electronic payment. Credit card is small
plastic card with a unique number attached with an account. It has also a magnetic strip embedded in it
which is used to read credit card via card readers. When a customer purchases a product via credit card,
credit card issuer bank pays on behalf of the customer and customer has a certain time period after
which he/she can pay the credit card bill. It is usually credit card monthly payment cycle. Following are
the actors in the credit card system.
The card holder − Customer
The merchant − seller of product who can accept credit card payments.
The card issuer bank − card holder's bank
The acquirer bank − the merchant's bank
The card brand − for example , visa or Mastercard.
Credit Card Payment Proces
Step Description
Step 1 Bank issues and activates a credit card to the customer on his/her request.
Step 2 The customer presents the credit card information to the merchant site or to the merchant
from whom he/she wants to purchase a product/service.
Step 3 Merchant validates the customer's identity by asking for approval from the card brand
company.
Step 4 Card brand company authenticates the credit card and pays the transaction by credit.
Merchant keeps the sales slip.
Step 5 Merchant submits the sales slip to acquirer banks and gets the service charges paid to
him/her.
Step 6 Acquirer bank requests the card brand company to clear the credit amount and gets the
payment.
Step 6 Now the card brand company asks to clear the amount from the issuer bank and the
amount gets transferred to the card brand company.
Debit Card
Debit card, like credit card, is a small plastic card with a unique number mapped with the bank account
number. It is required to have a bank account before getting a debit card from the bank. The major
difference between a debit card and a credit card is that in case of payment through debit card, the
amount gets deducted from the card's bank account immediately and there should be sufficient balance
in the bank account for the transaction to get completed; whereas in case of a credit card transaction,
there is no such compulsion.
Debit cards free the customer to carry cash and cheques. Even merchants accept a debit card readily.
Having a restriction on the amount that can be withdrawn in a day using a debit card helps the customer
to keep a check on his/her spending.
Smart Card
Smart card is again similar to a credit card or a debit card in appearance, but it has a small
microprocessor chip embedded in it. It has the capacity to store a customer’s work-related and/or
personal information. Smart cards are also used to store money and the amount gets deducted after
every transaction.
Smart cards can only be accessed using a PIN that every customer is assigned with. Smart cards are
secure, as they store information in encrypted format and are less expensive/provides faster processing.
Mondex and Visa Cash cards are examples of smart cards.
E-Money
E-Money transactions refer to situation where payment is done over the network and the amount gets
transferred from one financial body to another financial body without any involvement of a middleman.
E-money transactions are faster, convenient, and saves a lot of time.
Authentication
Encryption
Integrity
Non-reputability
"https://" is to be used for HTTP urls with SSL, where as "http:/" is to be used for HTTP urls without SSL.
This protocol using a combination of public - private key cryptography and digital certificate [13] so it
provides communications privacy over the Internet. SSL provides a private between the server and the
client. A handshake between the cardholder’s browser and the merchant server has a role in the
encryption process of the information transmitted by the cardholder [7] [8]. International Journal of
Computer Science & Information Technology (IJCSIT) Vol 9, No 2, April 2017 119 Figure 3 shows
transferring sensitive data over the internet via SSL connection in order to,only the server is
authenticated using a digital certificate. Figure 3. SSL Secured Connection Steps [25] 5.2.1 SSL Protocol
for Securing Data We need to force the web pages with sensitive data to be accessed through SSL as it’s
important to use it for securing the data that passes between the server and the client’s browser. In case
for example, if customer tried to access the next link http://localhost/mobileshop/credit-card-details/ ,
the customer should be redirected to https://localhost/mobileshop/credit-card-details/ At the same
time, enforcing SSL protocol will not needed in all places of the site, and because that makes web pages
invisible to search engines and reduces performance. We want to make sure that the, customer logout,
customer registration, and modification pages detail of customer are accessible only via SSL.
Secure Electronic Transaction
It is a secure protocol developed by MasterCard and Visa in collaboration. Theoretically, it is the best
security protocol. It has the following components −
Card Holder's Digital Wallet Software − Digital Wallet allows the card holder to make secure
purchases online via point and click interface.
Merchant Software − This software helps merchants to communicate with potential customers
and financial institutions in a secure manner.
Payment Gateway Server Software − Payment gateway provides automatic and standard
payment process. It supports the process for merchant's certificate request.
Certificate Authority Software − This software is used by financial institutions to issue digital
certificates to card holders and merchants, and to enable them to register their account
agreements for secure electronic commerce.
SSL is basically an encryption SET is a very
mechanism for order taking, comprehensive protocol.It
queries and other applications provides Privacy, integrate
and available on customer’s and authenticity.It is not
browser. It does not protect used frequently due to its
against all security hazards and complexity and the need
is natural simple and widely for a special card reader by
used. the user. it may be
SSL is a protocol for general abandons if it is not
purpose secure message simplified.
exchange. SET is tailored to the credit
SSL protocol may use a card payment to the
certificate, but the payment merchant.
gateway is not available .so, the SET protocols hides the
merchant need to receive both customer’s credit card
the ordering information and information from merchant
credit card information because and also hides the order
the capturing process should be information to banks to
generated by merchant. protect privacy called dual
SSl protocol has been the signature.
industry standard for securing SET protocol is a complex
internet communication. and more secure protocol.
SSL protocol was developed by SET protocol was jointly
Netscape for securing online developed by MasterCard
and visa with the goal of
securing web browsers for
transaction. bank card transaction.
A digital certificate is an electronic identification card that establishes a user’s authenticity in the
electronic world. The digital certificate (conceptually similar to credit card) contains information, such as
name, e-mail address, a serial number, expiration dates, a copy of certificate holder’s public key and the
digital signature of the certificate- issuing authority so that a recipient can verify that the certificate is
real.
Firewalls: the most commonly accepted network protection is a barrier-a firewall "-between the
corporate network and the outside (untrusted) world (Kalakota and Whinston, 2004),0°. A firewall
protects networked computers from intentional hostile intrusion that could compromise confidentiality
or result in data corruption or denial
There are two access denial methodologies used by firewalls. A firewall may allow or deny all traffic
unless it meets certain criteria. The types of criteria used to determine whether traffic should be allowed
through varies from one type of firewall to another. Firewall may be concerned with the type of traffic, or
with source of destination addresses and ports.
Non-technoiogical Measures for Securing Electronic Payment
• Never send credit card details by e-mail. Pay attention to credit card billing J * ,1AO^ cycles, and follow
up the creditors if bill do not arrive on time (Sumanjeet) . This could be a sign that someone has changed
the address or other information from the consumer file to hide illegal changes from consumer.
• Make a print out of all the web pages or e-mail directly related to the purchase, so that the consumer
will have complete records on the event of any problem.
• When making payment online, check the lock or icons on the screen to make sure that the site is secure.
A broken icon indicates that the site is not secure.
Sign on the signature panel ofthe debit card immediately upon the receipt. And protect the magnetic strip
from the exposure to direct sunlight, magnets and scratches.
• Never keep a copy of PIN (Personal Identification Number) in wallet and never write PIN number on
the card.
• Keep a photocopy offront and back of card.
• In case the card is stolen/misplaced110 call bank help line to inform about the same.
• Keep the charge slips safe, to tally them against the billing statement.
• Never have PIN or passwords, which are easily identifiable by the others like your name, date of birth
and your car number etc
Implementation plan because of the complexity and multifaceted nature of EC .it makes sense to
prepare an implementation plan.such a plan should include goals.budgets.timetable and
contingency plans
Choosing the companys strategy toward e commerce-generally speaking there are three majo
options
4 lead conduct large-scale innovative e-commerce activities
5 watch and wait do nothing but carefully watch what is going on on the field in order to
determine when EC is mature enough to enter it.
6 Experiment start some e-commerce experimental projects
Managing resistance to change EC can result in a fundamental change in how business is
done.Resistance to change from employement ,vendors and customers may develop education
training and publicity over an extended time period offer possible solution to the problem
Unit 5
With international ecommerce, things get complicated as the need to provide consistent customer
experiences increases. When a prospect comes from China or Germany,
Worse, different people groups have different cultural standards and customs. What can be considered
funny or casual in one culture may be nonsensical or downright offensive to those from different
backgrounds.
Infrastructure within most developed countries is more or less uniform, and — unless you opt for a cheap
solution — your visitors will enjoy solid uptimes and loading speeds
Depending on your products, customer support can be a critical consideration. For example, if you sell
electronic equipment or anything with that requires assembly, you may need to provide both static
instructions and live support in native languages.
Software Agents:
Although the theory of agents stated that agent is given a very famous with the growth of internet.
Software agents are a piece of software which works for the user. However software agent is not just a
program. An agent is a system situated within and a part of an environment that senses that environment
and acts on it. Over time in pursuit of its own agenda and so as to effect what it senses in the future [4]?
Important use of agent concept is, as the tool for analysis not as dosage. As the system changes on can
understand it.
Characteristics of Software agents: Software agents are like guards and locomotives of most E-Commerce.
The following are very few characteristics: Software agents can do their task without any outsource
intervention. Social interaction with other software agents and human. Software agents are specific in
their goals. Good software agent is the one which has the attitude to receive and adopt changes [9]. The
agent must be programmed in a powerful language so as to express the rules. Safety of the information
must be promised by the agent. Effective usage of the existing resources. Agent must be a good sailor
Agents must be very careful in handling unauthorized users. The same information must be accessed by
the user to which they have right.