Professional Documents
Culture Documents
Ecommerce Module Mañabo With Answer Key
Ecommerce Module Mañabo With Answer Key
Module
Mañabo, R.D.
1
COURSE TITLE: E-COMMERCE
PRE-REQUISITE/CO-REQUISITE: CCS101
COURSE OBJECTIVES:
After the course, you are expected to:
describe E-Commerce legal, ethical and social impact
identify and apply relevant problem-solving methodologies
understand the processes of developing and implementing information systems
COURSE CONTENTS:
Module 1: The Uprising is on the Move
Module 2: Infrastructure for E-Commerce Applications
Module 3: Concepts of Business and the Social Issues
MODULE 1
Overview
Module Objectives
2
understand why studying e-commerce is so significant.;
defines e-commerce, explains how e-commerce differs from e-business,
describes the key technical building blocks underlying e-commerce and
recognizes significant current trends in e-commerce;
identify and explain the specific features of e-commerce technology and address
the importance of its market; and
recognize how e-commerce developed from its early years to today.
Coverage:
A. Topic 1: Introduction to E-Commerce
B. Topic 2: Elements of Business Models
A. Topic 1
Introduction:
Topic Objectives
3
defines e-commerce, explains how e-commerce differs from e-business,
describes the key technical building blocks underlying e-commerce and
recognizes significant current trends in e-commerce; and
identify and explain the specific features of e-commerce technology and address
the importance of its market.
Topic 1 Pre-test
--------------------------------------------------------------------------------------------------------------------
- Module 1: Topic 1 Pre-test
Name:__________________________________________ Score:_______________
Section:___________ Instructor: ____________________ Date:________________
1. ________________________________________________
2. ________________________________________________
3. ________________________________________________
4. ________________________________________________
5. ________________________________________________
1. ________________________________________________
2. ________________________________________________
3. ________________________________________________
4. ________________________________________________
5. ________________________________________________
--------------------------------------------------------------------------------------------------------------------
4
Topic Contents
What is E-commerce?
E-Commerce plays a major role in nation's economic growth and development. It
is a purposeful operation that involves the planning, managing, promotion and
distribution of different goods and services as well. It makes the use of the Internet, the
world wide web (www), and software applications and apps operating on mobile devices
for business transactions. It is the use of electronic communications and digital
information processing systems to create, transform and redefine value-creating
relationships with, or between, organizations and individuals in business transactions.
It already affects large sectors like communications, service, finance, retail, and
holds promises in areas like education, health, transportation, and government. Not all
of the most sensitive but less visible impacts on everyday business practices can be
associated with the greatest effects.
The five primary revenue models used by e-commerce firms are:
The advertising revenue model. Is a business approach which
emphasizes advertisement sales as a major source of income. In
mainstream television and print media as well as web media this
system is most common.
The subscription revenue model. These are based on the concept of
selling a good or service to earn recurring subscription income monthly
or yearly
The transaction fee revenue model. The organization earns fees for
approving or conducting transactions depending on the amount. The
revenue is created by the customer paying a fee for a transaction to a
platform operator through transaction fees.
The sale revenue model. It is the profits a business earns from its
selling of products or service provision
The affiliate revenue model. It supports both the original seller (by
broadening their scope and creating new sales) and the affiliate
(through commissions) by providing a continuous revenue stream. This
form of framework can be applied successfully to a recurring,
subscription company.
What is E-business?
E-business is the operation of electronic business processes. It involves
electronic business processes such as the procurement and selling of goods,
equipment and services, customer support, payment processing, controlling quality
management, business partners partnership, exchanging knowledge and running
automated employee services, recruiting and more.
Major benefits:
global reach
5
reduced cost
convenience
higher productivity and efficiency
E-commerce Models
Building an e-commerce solution mainly requires designing and launching an e-
commerce platform. Identifying the e-commerce model is the first step in establishing an
e-commerce platform [2].
6
Business-to-business (B2B)
The B2B model is expected to become the industry's largest value field
within a couple of years. The B2B model involves electronic transfers for
payments, sales, as well as other administrative tasks between houses. It
includes trading products such as subscriptions to companies, professional
services, manufacturing, and wholesale transactions.
Business-to-Consumer (B2C)
The B2C model involves transactions between business organizations and
consumers. It refers to any business entity that markets its goods or services
over the Internet to customers. These sites display information about the product
in an online catalog and store it in a database. The B2C model also includes
online banking, travel, and health information services
Consumer-to-Consumer (C2C)
The C2C model involves transaction between consumers. Here a
customer directly sells to another customer. Online auction Web sites that offer
advertisement and online sale of their goods to another customer. It is important,
however, that both seller and buyer have to register with the auction site.
Consumer-to-Business (C2B)
The C2B model includes a transaction between a customer and a
corporate organization. It is similar to the B2C model but the difference is that in
this case the seller is the customer and the buyer is the business organization.
Every person who has something to give either a service or a good can be
a customer in the C2B business model. The employee is compensated for the
work provided to the enterprises. The consumer can be:
A webmaster/ blogger offering advertising service (through Google
Adsense program for example or amazon.com affiliation program)
A photographer or a designer offering stock images to companies
by selling his artwork through Fotolia or istockphoto for example
Any individual answering a poll through a survey site
Any individual with connections offering job hiring service by
referring someone through referral hiring sites like jobster.com or
h3.com
Company in the C2B business model includes any organization that
purchases products or services from individual intermediaries. Here are some
examples of possible companies that might be such clients:
Any company which wants to fill a job (through referral hiring sites
like H3.com founded by an ex Monster CEO, Josbster.com,
Jobmeeters.com, karmaone.org, JobThread.com, Forumjobs.com
and Yorz)
Any company needing to advertise online (through Google Adwords
program for example)
Any advertising agency which needs to buy a stock photo (through
microstock sites)
7
The intermediary is the key factor as it provides the link between a
company that requires a service or a good person and a mass of people.
Intermediary typically acts as a platform for both buyers (businesses) and sellers
(individuals).
Social e-commerce
It refers to an internet commerce that use networking websites like
Facebook, Instagram, and Twitter as platforms for product and service
advertising and sales. The degree to which customers engage with the
company's content by retweets, comments, and shares is measured by the
effectiveness of a social media campaign.
Benefits of social e-commerce [3]
1. Community Business metrics. The social media marketplace
promotes success assessment and evaluation. On Twitter, the
Facebook profiles, Instagram company accounts and tweets
have built-in metrics for views, contributions and scope.
Additionally, most social media posts allow you to calculate
traffic to your website through counts of website clicks. Other
simple metrics to assess a positive ROI that include your total
fan or follower numbers, likes, and overall feel of interactions.
2. Customer Engagement and Longevity. You're trying to sell
and promote your goods or services by using social commerce
for your business, but you're also trying to create good ties with
people. A business will create and sustain relationships that
strengthen trust and loyalty by taking this opportunity to connect
with prospects.
3. More Traffic and Sincere Contribution. Working actively to
build your social media audience is a great first step towards
eventually making conversions. One of the most important
social trade advantages is the dedication and scope that
8
companies can get if they exchange material. By consistently
showing up in the updates of a follower list, you are taking part
in a important branding tool.
4. Superior rating of search engines. Social media e-commerce
has been shown to increase traffic to your website which will
ultimately affect your ranking on search engine results. Using
social media to share links to content on your website is an
effective way to drive traffic from social media users.
5. Consistent increase in audience. Across the world thousands
of new people enter social media sites every day. Millions are
involved on that already. Facebook has more than a billion
active users every month and several new users enter every
hour, according to statistics. For every company one of the most
critical considerations is how to attract and sell to its target
consumer market.
Local e-commerce
Local e-commerce is a type of e-commerce that aims to engage
consumers based on their current geographical location. A variety of online
marketing tactics are used by local retailers to attract shoppers to their shops.
Additional definitions and terminology include: knowledge asymmetry, menu
costs, marketplaces and market areas, transaction costs, cognitive resources,
business entry costs, search costs, price discovery, network externalities.
Understanding E-commerce
Digital computing and communications technology growth and mastery are at the
core of the newly evolving global digital economy that we call e-commerce. To grasp the
possible future of e-commerce, you need to have a clear understanding of the
information technology it relies on. This is a technologically induced phenomenon that
relies on a host of IT. These innovations underpin a host of complementary
technologies such as cloud computing, desktop computers, smartphones, tablet
computers, local area networks, relational and non-relational databases, client / server
computing, data mining, and fiber optic switches.
Although technology provides the infrastructure, it is the business application
which creates interest and excitement in e-commerce as the potential for extraordinary
return on investment. New technologies offer new ways for companies and
entrepreneurs to coordinate development and business transactions. New innovations
change current market strategies and plans. To better understand e-commerce, you
will need to familiarize yourself with some of the main business principles, such as the
essence of digital markets, digital products, business models, corporate and company
value chains, value networks, company structure, digital disruption and customer
behavior in digital markets, as well as basic financial analysis principles.
With billions of people now making worldwide use of the Internet, the effect of
Internet and e-commerce on society is important and global. E-commerce is
increasingly subject to the laws of nations and globalized organizations. To be effective,
9
you'll need to consider the strains that global e-commerce brings on contemporary
society.
10
home, at work or even from your car. This refers to “marketspace” or extended
marketplace that is beyond traditional frontiers and removed from temporal and
geographical locations
Global reach. E-commerce technology makes it much more efficient and cost-
effective for commercial transactions to cross ethnic, regional, and national
boundaries than is true in conventional trade. The total number of users or
customers an e-commerce business can obtain is a measure of its reach.
Universal standards. E-commerce technology are shared by all nations around
the world.
Richness. Large markets, regional selling forces and small retail stores have
great resources that they can provide customized, face-to-face service with audio
and visual indicators when making a sale or complexity and content of a
message.
Interactivity. E-commerce technology that allows for two-way communication
between merchant and consumer.
Information Density. E-commerce technologies vastly increase and quality of
information available to all market participants, consumers, and merchants alike.
Costs for information processing, storage, and communication drop significantly
while currency, accuracy, and timeliness greatly increase. Knowledge is getting
plentiful, cheap and reliable.
Customization. E-commerce platforms allow for personalization: retailers may
tailor their marketing messages to particular individuals by adapting the message
to the name, preferences and past transactions of a person.
Social technology. New Internet social and business models enable user
content creation and distribution, and support social networks.
11
--------------------------------------------------------------------------------------------------------------------
-
Name:_________________________________________ Score:_______________
Section:___________ Instructor: _______________ Date:________________
Identification: Read each statement below carefully and fill in the blank(s) with the correct
answer.
M-Ecommerce 1. It refers to personal digital assistants (PDAs) are used for buying
and selling of goods and services
Digital computing 2. It is the market application that creates curiosity and enthusiasm in
e-commerce as the potential for exceptional return on investment
E-business 3. E-business is the conduct of business process on the Internet.
Consumer-to- 4. Those are web-services which offer consumers the opportunity to
Business (C2B) set prices for the products they wish to purchase.
Business-to- 5. It is a business that is conducted between companies, rather than
business (B2B) between a company and individual consumer.
Affiliate revenue 6. A revenue-earning technique to market the goods of other
businesses and to charge commissions on any sale you make.
Social-ecommerce 7. The degree to which users use retweets, comments and shares to
interact with the contents of the business is determined by a social
media campaign's performance.
E-commerce 8. A type of business model that focuses on doing business
transactions via electronic networks like the Internet.
Subscription 9. It is one in which consumers pay a monthly fee to get continuing
model access to a specific product or service.
Local e-commerce 10. Local retailers use a range of online marketing strategies to draw
customers into their shops.
Questions:
1. Compare the original business model established by Pandora with its current business
model. What's the difference between the revenue models "free" and "freemium"?
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
2. In the end, why did MailChimp succeed with a freemium model, but Baremetrics didn't?
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
12
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
B. Topic 2
Introduction:
A business plan outlines the logic behind how a company captures, generates,
and produces profit. Such a model must be practical and cover all matters of concern,
i.e. provide the appropriate and sufficient requirements for the operation of a business.
The definition should be clear, detailed and appropriate, without oversimplifying the
complexities of how companies actually work.
Topic Objectives
13
Topic 2 Pre-test
--------------------------------------------------------------------------------------------------------------------
- Module 1: Topic 2 Pre-test
Name:__________________________________________ Score:_______________
Section:___________ Instructor: ____________________ Date:________________
Twitter was created by Jack Dorsey, Biz Stone, Noah Glass and Evan Williams in
2006. Currently, Twitter has more than 328 million monthly active users, making it the
ninth-largest social network in the world. Twitter has proven to be the largest source of
breaking news time and again. A social network’s valuation is dependent on the number
of users and the engagement of users. Unfortunately, Twitter’s user engagement is
decreasing and other social networks like WhatsApp and Instagram have left it far
behind in terms of the number of total users. Though it was being touted as a serious
competitor to Facebook in its early days, Facebook is currently the most popular social
network in the world.
Twitter business model is similar to the business model of other social networks. It
requires users to create a profile and then those users can post short status updates or
“tweets” under 280 characters. Registered users can post tweets, but those who are
unregistered can only read them. Users can post using the website, app or even SMS. It
is also called “SMS of the Internet”.
The users can follow other user accounts and then they can view the tweets of the
accounts they chose to follow. The users can share videos, images, and links through
their tweets. The users can also directly message each other.
Of late, Twitter has been shifting its focus to video content and content creators, as
video has far higher engagement than text or banner advertisements. To incentivize
video makers, Twitter shares revenue with them, where the creators get 70% of the cut
and the rest is kept by Twitter. This is better than the 55% cut offered by YouTube to
content creators.
In terms of value proposition, Twitter offers its various stakeholders the following
benefits:
User Benefits. Users share content with the world, get real-time and relevant
content in return and also get to participate in conversations with people through
tweets or messages.
Advertiser Benefits. Viral global reach, unique ad formats, real-time connect with
the audience.
Data Partner Benefits. Access, search and analyze data and generate insights to
monetize.
14
Twitter has always tried to strengthen its business model through acquisitions
and partnerships instead of internal user or revenue growth
Photos and video previews are displayed in the posts alongside the text thus
enabling the advertisers to present their content to the target audience better. Before
2013, users had to click on the links posted to view the content.
Twitter charges the advertisers based on the amount of interaction that the tweets
generate. While the budget is set at the beginning of the campaign itself, the advertisers
pay on per-click or per-retweet basis. Advertisers can also participate in bidding to place
their content in a particular space. More than 65% of Twitter’s advertising revenue
comes from mobile devices.
Source: https://www.feedough.com/how-does-twitter-make-money/
15
______________________________________________________________________
______________________________________________________________________
--------------------------------------------------------------------------------------------------------------------
16
Topic Contents
Business model at its heart is a picture of how the company is making money. It's
an overview of how to offer value to clients at a suitable rate. It is a strategy for an
organization to produce income and revenues. It includes company elements and roles
like expenses. Owing to the pace of technological progress information technology is
still a completely different field. Business model can be considered as a combination
of three streams, the value stream, the logistical stream and the revenue stream [4].
A value stream is the set of activities (the how) that create a value flow or
understand the value of product or service that the customer gets. Value streams are
established productive way to look at the organization's business processes, or rather to
look at the value flow without being confused by existing business process boundaries.
A value stream map is also generated to avoid confusion in the planning and execution
of a project, which shows operations, time, expense, and quality are given or consumed
in [5].
LEAN. In LEAN, Value Stream Mapping is a tool for evaluating the current state
and planning a future state for a series of events that carry a product or service to the
customer from the start.
17
The logistical stream
The logistical stream is raising transaction costs from both the viewpoint of the
seller and the buyer. E-commerce has a variety of ways to streamline the procurement
process. First, it removes inefficiencies in paperwork and coordination that arise in
ordering processes. Second, by using procurement strategies such as online bidding, it
reduces the degree of information asymmetry. Finally, this monopolistic tendency
process (the spread of power away from the center to local branches or government)
has allowed companies to shorten the supply chain.
Revenue streams are the building block reflecting cash (not income, which is
revenue minus costs) from each consumer segment that a business produces. It can
have several pricing structures, such as fixed list prices, negotiating, auctioning,
dependent on the demand, dependent on volume or dependent on yield [6].
1. Value proposition
2. Revenue model
3. Market opportunity
4. Competitive environment
5. Competitive advantage
6. Market strategy
7. Organizational development
8. Management team
Value proposition
“Why should the customer buy from you?” It's the primary reason someone
would buy a prospect from you. Explains how the company solves or enhances
consumer issues, provides unique advantages, tells the perfect consumer why they
should buy from you and not from the competition.
18
Facilitation of transactions by managing product delivery
Revenue model
“How will you earn money?” A revenue model is a financial profit generating
system. This determines which source of revenue to seek, the value to give, how to
price the value and who is paying for the value. This is a central component of a
business model for an organization.
Market opportunity
“What marketspace do you intend to serve and what is its size?” It defines what
market room the organization plans to fill and the size of that room. It essentially refers
to the expected market space of the enterprise and the total future financial resources
available to the enterprise in that market room.
Competitive environment
“Who else occupies your intended marketspace?” It identifies the direct and
indirect rivals in the same market room that do similar business. The additional details,
for example, includes how big they are, their net income, their market room share and
the price of their product.
Influenced by:
Number and size of active competitors
Each competitor’s market share
Competitors’ profitability
Competitors’ pricing
Competitive advantage
“What special advantages does your firm bring to the marketspace?” It identifies
the factors that differentiate the business from its competition, and that that motivate
consumers to purchase the product or service of the company. For instance, the
company's product or service may be cheaper or of better quality than its competitors.
It's a skill or role that helps you to perform better than competitors. In a
competitive market, this is considered the basis for productivity. In other words,
businesses that do not have any advantages can only compete on costs.
Market strategy
19
“How do you plan to promote your products or services to attract your target
audience?” This defines how the company aims to reach the market to retain clients to
potential customers to retain a target audience such as marketing the goods and
services.
Marketing strategy is a portion of your marketing plan that details the overall
game plan on how the company can locate and retain buyers or clients. ... For your
sales and marketing activities, your marketing plan depends on what you want to
accomplish.
Organizational development
“What types of organizational structures within the firm are necessary to carry out
the business plan?” This illustrates what types of organizational processes need to be in
place within the company to ensure that it is running smoothly and that all the required
work is done. It is a mechanism that helps companies improve through strategy,
influence, leadership, control, or job redesign changes. For example, the process of
identifying all the roles within a company and the skills required to accomplish each job,
as well as the process of recruiting and hiring productive staff
Describes how firms will organize work
Typically, divided into functional departments
As company grows, hiring moves from generalists to specialists
Management team
20
Figure 3. The Eight Key Elements of Business Model [8]
E-commerce Enabler
21
Exchanges. It is an independent digital electronic marketplace where suppliers
and business buyers can exchange.
Industry consortia. Industry consortia are vertical marketplaces owned
by industry which serve specific industries such as the automotive,
aerospace, chemical, floral or logging industries. Horizontal marketplaces,
by comparison, offer similar goods and services to a wide variety of
businesses. Vertical marketplaces supply a limited number of companies
with goods and services of specific interest to their businesses, whereas
horizontal marketplaces supply companies in different industries with a
similar form of product and service, such as marketing, financial, or
computing.
Private Industrial Network. It is a digital network designed to organize
the flow of information between companies engaged together in business.
A single, large buying firm owns the network. By invitation, participation is
only for reliable, long-term direct input suppliers. Usually such networks
grow from an enterprise resource planning (ERP) system.
22
Community provider (social network). It provides an online community (social
network) in which people with common interests can transact, share content. The
revenue model is typically hybrid, combining advertising, subscriptions, sales,
transaction fees, and so on.
Content provider. A supplier of information presents data for external
applications as one or more tables similar to those found in a relational database.
It employs a number of models, including advertisement, subscription; digital
products sales. It distributes quality of information such as digital news, music,
images, video, and artwork.
Portal. It is a website or web page providing access or links to other sites. The
revenue models are advertising, referral fees, transaction fees, subscriptions for
premium services.
Market creator. They use Internet technology to build markets which bring
together buyers and sellers. Sources of this include eBay, Inc. and
Liquidation.com. Providers of resources. By offering a service, service providers
make profits. The revenue model come from transaction fees, fees to merchants
for access. Examples are Uber, Airbnb, Priceline and eBay.
23
Table2. B2C Business Models [2]
24
Module 1: Topic 2 Post-test
Name:_________________________________________ Score:_______________
Section:___________ Instructor: _______________ Date:________________
Identification: Read each statement below carefully and fill in the blank(s) with the correct
answer.
Six Sigma 1. This is a method that helps to increase efficiency and decrease
process variability contribute to reduction of defects and improvement
of income, productivity of employees and product or service quality.
Organization 2. The mechanism that helps companies improve through strategy,
development influence, leadership, control, or job redesign changes.
Content provider 3. It virtualizes access to shared data services, such as databases locally
or remotely.
E-tailer 4. It is a retailer that primarily uses the Internet as a medium for
customers to shop
Market 5. The expected market space of the enterprise and the total future
opportunity financial resources available to the enterprise in that market room.
Value stream 6. Developed a constructive way of looking at the business processes of
the enterprise, or rather, of looking at the value flow without being
confused by established business process boundaries.
Portal 7. A page on the internet that allows people to get useful information.
Service provider 8. A company that provides its subscribers access to the Internet.
Logistical stream 9. It removes inefficiencies in paperwork and coordination that arise in
ordering processes
Competitive 10. Identifies factors which distinct the business from its competition and
advantage which encourage customers to buy the company's product or service.
Essay.
Question (5 points each):
1. How is it usually better for a Community Provider to target a business opportunity than to
target a broad market segment?
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
2. What are some of the different ways in which a firm can achieve a competitive
advantage?
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
25
B. Topic 3
Introduction:
Topic Objectives
26
Topic 3 Pre-test
--------------------------------------------------------------------------------------------------------------------
- Module 1: Topic 3 Pre-test
Name:__________________________________________ Score:_______________
Section:___________ Instructor: ____________________ Date:________________
a. Create a list of possible technology problems that an online retailer's clients face.
1. __________________________________________________
2. __________________________________________________
3. __________________________________________________
4. __________________________________________________
5. __________________________________________________
b. List the problems facing consumers of e-business software that are either
internal or external to the organization.
1. __________________________________________________
2. __________________________________________________
3. __________________________________________________
4. __________________________________________________
5. __________________________________________________
27
Topic Contents
The Internet
The Internet is a network of thousands of networks and millions of computers
linking companies, educational institutions, government agencies and individuals. Such
devices are running network applications that communicate through copper or fiber
optic cables, radio, or satellite. Internet access is made accessible by Internet Service
Providers (ISP). These organizations devote machines to operate as servers-that is,
they make information accessible to Internet users. Any internet machine is known by
a distinct IP address. IP Address is a specific set of numbers that specifies a location for
the device. A special Domain Name Server (DNS) device is used to assign the IP
Address its name, so the user can find a device by name [2] [9].
Social networking sites like Facebook, Twitter, Yahoo, Google+, Flickr and Orkut
are the numerous applications which use the Internet as a communication tool.
Including contact and information source, internet also acts as a platform for
entertainment. Internet facilitates the use of other resources such as e-mail, Internet
banking, marital resources, online shopping, online booking of flights, electronic
payment of bills, data sharing.
Components of Internet
1. Packet switching.
Packet switching is a way of transmitting the data in packet form to a
network. The data is divided into small pieces of variable length, called
Packet, in order to transmit the file quickly and efficiently over the network
and reduce the transmission latency.
2. Client/server computing
When client/server computing, the clients request a resource, and that
resource is supported by the server. A server can serve multiple clients
simultaneously while a client has only one server in touch. Typically, both the
client and the server communicate via a computer network but they can often
reside on the same device. Its functions include storing of files, software
applications, access to printers and other peripherals.
28
3. TCP/IP communications protocol
The Transmission Control Protocol (TCP) establishes links between Web
computers that send and receive. It manages packet assembly at the
transmitting point and reassembles at the receiving end.
Layers:
Network Interface Layer. It is responsible for placing packets on
and receiving them from the network medium.
Internet Layer. responsible for addressing, packaging, and routing
messages on the Internet.
Transport Layer. responsible for providing communication with the
application by acknowledging and sequencing the packets to and
from the application.
Application Layer. provides a wide variety of applications with the
ability to access the services of the lower layers.
29
Limitations of Current Internet
1. Bandwidth limitations - The internet today is slow and unable to easily transfer
and view large files, such as video and voice files. (slow peak-hour service)
2. Quality of service limitations - Not all data packets arrive in the right order at the
same time, which creates delay called latency.
3. Network architecture limitations - identical requests are processed individually
(i.e.. Downloading a music track). Future upgrades to the Internet infrastructure
would improve the way in which servers process information requests and thus
increase overall efficiency.
4. Wired Internet - copper and expensive fiber-optic cables. The Internet is primarily
based on physical cables which limit user mobility.
5. Language development limitations. The nature of HTML restricts the quality of
“rich” information that can be shared online. Future languages will enable
improved display and viewing of video and graphics.
Wireless internet enables wireless internet access through radio waves instead
of cables on a person's computer, laptop, smartphone or similar mobile device.
Although most wireless Internet solutions lack the high speed of landline broadband
Internet services such as cable and DSL, the gap is narrowed by emerging wireless
technologies such as EV-DO and WiMAX, with theoretical speeds of up to 100 Mbps
per 20 MHz.
Internet Protocols
HyperText Transfer Protocol (HTTP) is the Internet protocol used to transfer Web
pages
30
Simple Mail Transfer Protocol (SMTP) is the Internet protocol used to send e-
mail to a server.
Post Office Protocol 3 (POP3) is a protocol used by the client to retrieve mail
from an Internet server.
Internet Message Access Protocol (IMAP) a more current e-mail protocol that
allows users to search, organize, and filter their mail prior to downloading it from
the server
File Transfer Protocol (FTP) is one of the original Internet services. It runs in
TCP/IP’s Application Layer and permits users to transfer files from a server to
their client computer, and vice versa.
Telnet is a network protocol that also runs in TCP/IP’s Application Layer and is
used to allow remote login on another computer.
Secure Sockets Layer (SSL)/Transport Layer Security (TLS) are protocols that
operate between the Transport and Application Layers of TCP/IP and secure
communications between the client and the server. SSL/TLS helps secure e-
commerce communications and payments through a variety of techniques, such
as message encryption and digital signatures
31
which is a largely academic group that sets HTML and other programming
standards for the Web
Internet Network Operators Groups (NOGs)
which are informal groups that discuss and attempt to influence matters
related to Internet operations and regulation
The Internet and the Web produced a variety of powerful software applications
on which the e-commerce foundations are designed [2].
Online chat enables users to communicate via computer in real time, that
is, simultaneously
Streaming media enables live Internet video, music, photos, and other
large-bandwidth files to be transmitted to users in a number of ways
enabling the user to play back the files.
32
pages. The blog may include a blogroll (a compilation of links to other
blogs) and trackbacks (a list of entries in other blogs that lead to a first
blog post).
Wiki is a Web application that allows a user to easily add and edit content
on a Web page.
33
-------End of Topic 3-------
--------------------------------------------------------------------------------------------------------------------
-
Name:_________________________________________ Score:_______________
Section:___________ Instructor: _______________ Date:________________
Identification: Read each statement below carefully and fill in the blank(s) with the correct
answer.
TCP 1. It establishes links between Web computers that send and receive.
Top Level 2. These are generic domain extensions that are listed at the highest
Domain level in the domain name system.
NOGs 3. The informal groups that discuss and attempt to influence matters
related to Internet operations and regulation
Transport Layer 4. responsible for providing communication with the application by
acknowledging and sequencing the packets to and from the
application.
ICANN 5. A non-profit company that establishes and implements the domain
names policies.
Cookie 6. It is a tool used by a Web site to store information about a user.
Victor Hayes 7. He is the father of Wi-Fi.
IP address 8. This is a unique set of numbers representing a particular device on the
34
internet.
sTLD 9. It is a category of TLDs which has a sponsor representing a particular
group served by the extension of the domain.
URL 10. The address used by Web browser to identify location of content on
the Web.
Essay.
Question (5 points):
35
Module 1 Project
1. Choose a company active in e-commerce. Find details about the management
team and organizational structure of the company. Visit their website and explain
their business model based on the details that you can find there. Identify its
consumer value proposition, its business model, the marketplace in which it
operates, who its key rivals are, any competitive advantages that you think the
organization has, and what it seems to be its market strategy. Create a
PowerPoint or a Video presentation.
2. Select an e-commerce company that has participated in an incubator program
such as OmetVs, TwinSlash, Get Me Rank,Y-Combinator, Asper Brothers,
TechStars, DreamIt Ventures, SoftLoft or any of your options and write a brief
report on its business model and the sum and funding sources it has raised to
date. Include your views about potential prospects for success for the company.
3. Prepare a research report on the present and possible future impacts of e-
commerce technologies on the food industry (3 to 5 pages).
36
MODULE 2
Overview
This module will cover e-commerce growth and will continue to change the retail
industry and influence the behaviors of customers. Topic1 describes the emergence of
e-commerce, systems development life cycle or SDLC methodology, e-commerce
software and hardware, and functionality of the e-commerce business application
program. Topic 2 outlines the e-commerce security systems, e-commerce security
environment, social network, mobile platform, and cloud security issues, and protecting
internet communications. Topic 3 focuses on e-commerce payment systems.
Module Objectives
Coverage:
A. Topic 1: The Emergence of E-commerce
B. Topic 2: E-commerce Security Systems
A. Topic 1
37
Topic Title: The Emergence of e-commerce
Introduction:
Planning and actually creating a website involve vision. It includes not only a
mission statement but also target customer recognition, market space, strategic
analysis, an Internet marketing map, and a timeline for growth. Company in general
concept earns income on ads, subscriptions, transaction fees, sales, and affiliate
income. The market structure is defined in terms of your direct competitors, suppliers
and substitute products. Content is what search engines index as they browse through
all the latest and updated Internet sites. It is the most important basis for sales and
overall success for the company. [1].
Topic Objectives
38
Topic 1 Pre-test
--------------------------------------------------------------------------------------------------------------------
- Module 2: Topic 1 Pre-test
Name:__________________________________________ Score:_______________
Section:___________ Instructor: ____________________ Date:________________
1. ________________________________________________
2. ________________________________________________
3. ________________________________________________
4. ________________________________________________
5. ________________________________________________
1. ________________________________________________
2. ________________________________________________
3. ________________________________________________
4. ________________________________________________
5. ________________________________________________
--------------------------------------------------------------------------------------------------------------------
39
Topic Contents
Figure 4.
The E-commerce Site Building Puzzle [2]
A team of individuals who possess the skill sets required to develop and operate
a productive e-commerce website would have to come together on the organizational
and human resources fronts. This team will make important decisions on company
priorities and strategy, technology, website design, and social media policy. To prevent
the failures that have occurred at some businesses, the entire development plan needs
to be handled carefully. Decisions must be taken on hardware, software and
telecommunications infrastructure.
40
The systems development life cycle or SDLC is a methodology for understanding
the business objectives of any system and designing an appropriate solution [2]. For an
e-commerce platform, the five main phases involve are system analysis and planning,
system design, system construction, testing, implementation and maintenance.
System Analysis and planning. Ensure the technology platform aligns with
the company. Identified a corporate plan and selected a business model for
strategic objectives, then a list of system functionalities and information
requirements. Business objectives are simply capabilities want for a site to
have. System functionalities are categories of functionality in the information
systems used to meet business goals. The information requirements for a
system are the elements of knowledge that the system must generate in order
to meet the business goals. Such listings need to be given to system
developers and programmers to meet the standards of managers.
41
to be performed, and the databases to be used. It also provides
a summary of the security and emergency backup protocols to
be placed in place and the controls to be included in the
program.
2. Physical Design. The conceptual architecture is converted into
physical components. For example, the physical design details
the actual server model to purchase, the software to use, the
size of the telecommunications connection that will be needed,
how the device will be backed up and secured from outsiders,
etc.
42
Implementation and Maintenance. E-commerce sites are still experiencing
a phase of transition, enhancement and rectification. The annual cost of
device maintenance would typically be approximately parallel to the cost of
growth. A $40,000 e-commerce platform would likely require annual spending
of $40,000 to maintain. Very large e-commerce sites are experiencing several
economies of scale, such that, for example, a $1 million site would possibly
need $500,000 to $700,000 in maintenance budget [2].
43
Functionality of the e-commerce business application program
E-commerce merchant server software offers the basic features needed for
online transactions, including an online store, online shopping cart ordering and online
credit card processing.
A typical user-initiated web session is stateless, meaning that the server does not
need to maintain a constant, dedicated connection with the client. It usually begins with
a request for a link, then a server responds, and the session is terminated. The
sessions through last from one tenth of a second per user to one minute. However,
system efficiency is deteriorating as more and more users are demanding service at the
same time.
44
Scalability is an important factor when choosing to host a Web site. Scalability
refers to a site's ability to rise in size as demand needs. There are three steps you can
take to satisfy the site's service demands: scale vertically the hardware, scale
horizontally the hardware and/or enhance the site's processing architecture. Vertical
scaling ensures the computing power of individual components is increased. Horizontal
scaling requires the use of several machines for sharing the workload.
45
Table 4. Systems Analysis for Building a Mobile Presence [2]
Name:_________________________________________ Score:_______________
Section:___________ Instructor: _______________ Date:________________
Identification: Read each statement below carefully and fill in the blank(s) with the correct
answer.
two-tier 1. It is the direct contact between the client and the server.
architecture
Systems design 2. It establishes an organizational strategy and selected a business
and planning model for strategic objectives, then a list of software features and
information needs.
Physical design 3. These are descriptions of the actual server model to purchase, the
software to use, the size of the telecommunications link to be required,
how to back up and protect the system from outsiders, etc.
Acceptance 4. This requires the main staff and managers in the company's
testing marketing, manufacturing, distribution and general management to
use the software as installed on an internet search or intranet server in
person.
Co-location 5. It refers to a license arrangement between and by the tenant and the
agreement client of the placement.
CMS 6. It is a software that makes content easier to develop, edit, organize,
and publish.
Logical design 7. It also outlines the security and emergency backup procedures to be
placed in place and the checks to be included in the system.
Demand side 8. The hardware architecture refers to all the underlying computing
equipment which the device uses to perform its e-commerce functions.
stateless 9. It means that the server does not need to maintain a constant,
dedicated connection with the client
Unit testing 10. Testing that includes one-on-one monitoring of the site's software
modules.
47
B. Topic 2
Introduction:
Topic Objectives
Topic 2 Pre-test
--------------------------------------------------------------------------------------------------------------------
- Module 2: Topic 2 Pre-test
Name:__________________________________________ Score:_______________
Section:___________ Instructor: ____________________ Date:________________
1. ________________________________________________
2. ________________________________________________
3. ________________________________________________
49
4. ________________________________________________
5. ________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
___________________________________________________________________________
--------------------------------------------------------------------------------------------------------------------
Topic Contents
50
can include ensuring information systems are restored by integrating capabilities for
security, identification, and reaction.
Integrity refers to the ability to ensure that an unauthorized party has not in any
way altered the information being displayed on a website or distributed or received over
the Internet. For example, if an unauthorized party intercepts and alters the content of
an electronic communication, for instance by redirecting a bank wire transfer to another
account, the credibility of the message has been compromised, because the
correspondence no longer reflects what the original sender intended [2].
Confidentiality refers to the right to ensure communications and data are only
available to those allowed to display them. Confidentiality is often confused with
privacy, which refers to an e-commerce seller being able to monitor the use of
information that a customer receives about himself or herself [2]. None other than the
online seller a customer has selected will access their personal information and account
data [13].
52
Bots (short for robots) are a kind of malicious code that can be installed
covertly on your device while linked to the Internet. Botnets contain about 90
percent of the world's email, and 80 percent of the world's malware.
Botnets are clusters of captured computers used for malicious activities
such as sending spam, engaging in a DDoS attack, stealing computer
information and storing later analyzing network traffic.
Adware is typically used to call for pop-up ads to display when the user
visits certain sites. On the other hand, spyware can be used to obtain
information such as keystrokes of a user, copies of emails and instant messages
and even take screenshots.
A browser parasite is a program that can track and modify the browser
settings of a user, for example, by modifying the home page of the browser, or by
submitting information about the sites visited on a remote device.
Phishing is any complicated, online third-party attempt to obtain
confidential information for financial gain. Phishing attacks usually involve no
malicious code but rely instead on straightforward misrepresentation and fraud
53
cyber criminals creating and sending malware that disables
something from a co-worker
Damaging computer hardware. It happens when a disk drive is
removed to try to deactivate a computer device. This can happen
internally from a disgruntled employee or externally through a
hacker attempting to steal data or intellectual property from the
company. In this respect, the organization is not only experiencing
the loss of equipment that damages a computer system or network,
but also the loss of valuable information that can cause financial
harm
Defacing websites. Any time a cybercriminal updates or appears on
a website, it is considered as defacing a website.
Hacktivism is a politically motivated cybervandalism and data theft. Corporate
security departments often use groupings of hackers called tiger teams to check
their own safety measures.
white hats “good” hackers who help organizations locate and fix security
flaws
black hats are hackers who engage in the same kinds of activities but
without pay or any buy-in from the targeted organization, and with the
intention of causing harm. They break into Web sites and reveal the
confidential or proprietary information they find.
grey hats, hackers who believe they are pursuing some greater good by
breaking in and revealing system flaws. Grey hats discover weaknesses in
a system’s security, and then publish the weakness without disrupting the
site or attempting to profit from their finds.
Data breach occurs whenever organizations lose control over corporate
information to outsiders. It is an event where sensitive or safe information is
exposed. It includes Social Security System number loss or theft, bank account,
debit or credit card numbers, personal health information, passwords, or email. It
can be accidental or intentional.
Cyberespionage refers to the use of a computer network for illegal surveillance.
Espionage means having secrets without the knowledge holder's permission
54
Social Network, Mobile Platform, and Cloud Security Issues
Social networking can be the Internet's most important area, but being
transparent and social raises legitimate issues about privacy and protection.
Notwithstanding these justifiable security concerns over the Web, some of the reasons
that compromise a person's social media account are self-induced. Increase security of
social media account by logging out at all times when you step away from your
computer or laptop. It's best to go one step further and shut down the tab used to
access the account. Viruses and malware sometimes find their way through those
distracting but at times tempting advertisements on your computer. Nevertheless, if an
offer looks good to be true on the Web, then it is actually real don't click. It can be risky
to communicate and exchange details with people who you don't know. Do not allow
duplicate requests, but check with the 'true' person to see if the request is valid. All the
various games and devices are a part of the appeal of social media sites. Even though
a significant number of them are free, you give the app some degree of permission
regarding your details. Before agreeing to the terms, ensure that you know what the app
is viewing and sharing [15].
Security risks to mobile devices are on the rise. Kaspersky has detected nearly
3.5 million pieces of malware on more than 1 million user devices in 2014. By 2017,
Kaspersky's processing of in-lab detection technologies exceeded 360,000 malicious
files a day. And 78 percent of those files were malware programs, meaning that more
than 280,000 files of malware were detected per day many of which are targeting
mobile devices. Mobile applications are also the source of unintended data leakage.
"Riskware" apps, for example, present a real problem for mobile users who grant them
broad permissions but don't always check protection. Usually, these are free apps found
in official app stores that work as advertised, send personal and potentially corporate
data to a remote server, where advertisers and cybercriminals manipulate it. If wireless
hot spots are available nobody wants to burn through their cellular data, but free Wi-Fi
networks are typically unsecured. To be secure, make sparing use of free Wi-Fi on your
mobile device. And never use it to access private or confidential resources, such as
banking or credit card information. Network spoofing is when hackers set up fake
access points connections that look like Wi-Fi networks but are in fact traps in high-
traffic public places like coffee shops, libraries, and airports. In certain cases, attackers
allow users to build a "wallet" complete with a password to access certain free services.
Since mobile devices are still powered-on, most phishing attacks are front lines. A
broken cryptography can occur when developing apps use weak encryption algorithms,
or fail to implement strong encryption properly. In the first example, developers may use
common encryption algorithms to speed up the process of app creation, given their
known vulnerabilities. Any motivated attacker can then exploit the vulnerabilities to
break passwords and gain access [16].
Cloud computing includes an Internet network of remote servers. It provides
computer-based tools and frameworks for outsourcing that allow for specific services to
different customers, such as application-based systems. Employee negligence and
unauthorized access through abuse of employee credentials are two of cloud
computing's main security threats. The lack of visibility increases the security risk of the
public cloud which the result in unauthorized access to data, improper handling which
replication of data contributing to the removal of sensitive data from infrastructure.
55
Application programming interfaces (APIs) help clients customize their experience in the
cloud. However, due to their nature, APIs can present a threat to cloud security. They
not only give businesses the opportunity to customize the functionality of their cloud
services to fit business needs; they also provide data identification, access, and efficient
data encryption. Because of complex networks and various third-party applications, the
cloud infrastructure is often vulnerable to device vulnerabilities. Once hackers –
exposed by an automated third-party program – are aware of the weakness, they can
easily use the loophole to penetrate the infrastructure [17].
56
Table 5. A Simple Case of Public Key Cryptography [2]
The sender encrypts a message using the recipient's public key, and then sends
it over the internet, in the simplest use of public key cryptography. The receiver is the
only person who can decrypt this letter, using his / her private key. This simple case,
however, does not provide for honesty or an objective message [2].
A hash function is an algorithm that produces a number with a fixed length called
a hash or a digest message. A hash function can be simple, and count the number of
digital 1s in a message, or it can be more complex, and produce a 128-bit number
reflecting 0s and 1s, 00s and 11s, and so on [2].
The sender encrypts the entire block of cipher text once more using the private
key of the sender to ensure the authenticity of the message, and to ensure non-
repudiation. This creates a digital signature (also known as an e-signature) or cipher
text that can be sent over the Internet [2].
57
Table 6. Public Key Cryptography with Digital Signature [2]
A more practical use of public key cryptography uses hash functions and digital
signatures both to ensure the message is secure and to authenticate the sender. The
only person who might have sent the above message using his / her private key is the
owner or the sender. This gets the message authenticated. The hash function ensures
the message in transit has not been altered. As before, the receiver, using his / her
private key, is the only one who can decode the message [2].
Name:_________________________________________ Score:_______________
Section:___________ Instructor: _______________ Date:________________
58
True 7. A malicious hacker who may represent a serious problem for a
corporation best describes a cracker.
True 8. Risk is best defined by the likelihood that vulnerability will be known
and used.
False 9. A detection system for intrusion uses the public Internet to carry
information, but remains private with the use of encryption,
authentication, and access control to verify the identity of someone
using the Internet.
False 10. Detection mechanisms are acts that would lead offenders to abandon
the concept of targeting a specific device.
Identification: Read each statement below carefully and fill in the blank(s) with the correct
answer.
Adware 1. Usually, when the user visits other pages, it is used to call for pop-up
advertising to turn up.
Black hats 2. They are hackers engaged in the same kinds of activities but without
pay or any buy-in from the targeted company, with the intention of
causing harm.
Phishing 3. These are attacks that normally require no malicious code but rather
rely on clear misrepresentation and fraud.
denial of service 4. A service has been disrupted due to some kind of digital vandalism
(DDoS) from a business created by cyber criminals developing and sending
malware that disables a coworker
Ransomware 5. It is a kind of malware which locks computers or files to stop accessing
(scareware) them.
Encryption 6. It is the method of converting plain text or data into cipher text which
cannot be read by anyone other than the sender and the receiver.
Cloud computing 7. It provides computer-based tools and outsourcing frameworks that
allow for specific services for various customers, such as application-
based systems,
Data breach 8. It is an occurrence for the disclosure of confidential or secure
information.
Spam/Junk 9. These are sites that appear to have some product or service but are in
mails reality only a series of advertisements for other pages, some of which
contain malicious code.
Digital Signature 10. It is an electronic, authenticated verification stamp on digital
information such as e-mail addresses, macros or electronic documents
originating from the signer and has not been changed.
Essay.
Question (5 points):
1. Give an example of security breaches, as they apply to each of the six e-commerce
security dimensions. For example, what would be an incident relating to privacy?
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
59
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
C. Topic 3
Introduction:
The concept for e-commerce has changed the way business is conducted in a
digital world. It is not all electronic online payment. There are many application areas
such as banking, advertising, including electronic distribution, sales, marketing,
production, management, and distribution portals.
60
now deposit money directly into the bank account of its workers. Those transfers are
made via Automated Transfer Houses.
Topic Objectives
Topic 3 Pre-test
--------------------------------------------------------------------------------------------------------------------
- Module 2: Topic 3 Pre-test
Name:__________________________________________ Score:_______________
Section:___________ Instructor: ____________________ Date:________________
1. ________________________________________________
2. ________________________________________________
3. ________________________________________________
4. ________________________________________________
61
5. ________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
___________________________________________________________________________
--------------------------------------------------------------------------------------------------------------------
Topic Contents
Payment Systems
There are five main forms of payment systems: cash, transfer checks, credit
cards, stored value and balance accumulation [2].
Cash. In terms of number of transactions, it is legal tender specified by a
national authority to reflect interest, is the most common form of payment. The
main characteristic of cash is that it is immediately convertible into other types of
money without any other entity being intermediated. Cash is portable, doesn't
require verification, and gives instant buying power to those who own it. It lets
you make micropayments. Cash use is "free" because neither retailers nor
customers pay a transaction charge to use it. It needs no supplementary
properties, such as special hardware or account life, and it imposes very low
cognitive demands on the user. It does not have a float (the time between the
transaction and the final payment for the transaction); is gone when it is spent.
62
Checking transfer. It represents funds transferred directly to a merchant or
other person via a signed draft or checking from a consumer's checking account.
Checks may be used for both large and small transactions, but they are not
commonly used for micropayments. Checks have some float, and interest can be
gained on unspent balances. It also poses security risks for merchants: They can
be stolen more easily than cash, so it requires authentication.
Since electronic payment is the dominant type of credit and debit cards, it
is important to understand how they function and to identify the strengths and
limitations of this payment system. Digital credit card transactions are handled in
almost the same manner as in-store payments are, with the only variations being
that online retailers never see the actual card being used, no card image is taken
and there is no signature. Digital purchases by credit card most closely mimic
purchases via Mail Order-Telephone Order (MOTO). Such types of purchases
are often referred to as Cardholder Not Present (CNP) transactions, and are the
main reason why customers can later challenge charges. Because the merchant
never sees the credit card or receives a hand-signed payment document from
the client, the merchant faces the possibility that the transaction will be
disallowed and reversed, even if the merchant has already delivered the products
or downloaded a digital product from the consumer. A merchant account is
essentially a bank account that allows businesses to accept payments by credit
card and collect funds from those transactions. [2].
63
just one step in a two-part process. Today, providers of Internet payment
services or payment gateways provide both a merchant account and the
technological resources required to process online transactions of credit cards.
64
Infrastructure providers, which support the biller-direct and consolidator business
models.
65
Reliability. Even online payment forms, as in any other company operation, the
user expects a system which is reliable and efficient. Any payment through online
despite its advanced technological features, system would fail if it fails allow users, and
pass usability checks. There are many reasons that could render the system unreliable
to users. Some of these are threats to safety, poor maintenance and unexpected
breakdowns.
Scalability. As users are increasingly accepting online payment methods,
demand for online payment infrastructure will also rise rapidly. Payment systems can
manage user add-on without any deterioration in performance. The payment systems
need a good number of central servers to provide the necessary level of service without
any deterioration of the performance. The central servers are essential for processing or
verifying the payment transactions. The rising demand for central servers limits on-line
payment systems' scalability.
Security. Security is one of the key concerns of online payment methods and it
is one of the critical issues that decides on the general acceptance of any form of
payment online. The Internet is an open network without any centralized control and
online payment systems should be protected from any security risks in order to ensure a
safe and reliable service for users. They want to be sure that their money transaction is
safe and secure when users pay online. On the other hand, banks and payment firms
and other financial institutions want their money, financial information and user
information to be kept safe in order to protect it against potential misuse.
Usability. Usability is an important feature of an interactive product as payments
made on-line. The online payment systems should be easy to use and user friendly.
Any online payment system with complicated procedures, complex payment processes
and other related payment environment complications cannot be accepted by users.
Poor usability of web shopping or payment methods might also discourage shopping
online. Some of the online payment systems allow users to make payments with
minimum authorization and inputs of information to make online payments simple and
user-friendly.
Broader market/Interoperability. Different users prefer different Online payment
technologies payment schemes. The various payment systems use different currencies
and the payment systems should promote interoperability between them. If there is an
interoperable payment system, it is open and allows other systems interested parties
must join without limiting themselves to a given currency. There should be some form of
shared agreement between different online payment systems to provide the
interoperability in the real-life situation. Interoperability can be accomplished by open
standards for the protocols and networks for data transmission. An interoperability
program will gain more popularity and a high degree of applicability compared to the
payment systems run individually. It's not always easy to get interoperability between
different payment systems because of the rapid technological changes.
67
credit card payments, all parties are required to create and verify digital
signatures.
C. Account Transfer Payment Systems. In this form of payment, the payer
authorizes the transfer of funds from one account to another, much of the
time at the same network banks. These payment systems not only support
customer-company payments but also customer-customer payments. The
password should be reasonably strong enough to protect against any
potential attacks. Some of the commercial applications of account transfer
payment systems are PayPal, Yahoo Pay Direct and Prepay.
In the online world, merchants are held liable for fraudulent transactions.
Managing online frauds continues to be a significant problem for online merchants. The
list of anti-fraud tools are as follows:
Address Verification: compare the entered shipping address with the card
address; possible false positives
Manual review: staff to manually review some orders
Automatic decision models: rules to determine if a transaction is fraudulent
Card verification number: ask for the number on the back of the card
Card association additional verification services: Verified by Visa,
SecureCode, etc.
Negative lists: maintain a negative list of IPs, names, addresses, etc.
E-Banking
68
have started internet websites and many are planning to offer banking services over the
internet.
The online banking transactions provided checks for orders, interrupted check
payments or registered a change in email.
Credit card payment services currently provide the most realistic and common
forms of payment for on-line purchases using counter-electronic payment methods.
Credit card purchases reduce the risks and costs of managing cash and checks. Online
payment credit cards have a large user base and benefit from familiarity and user-
friendliness, and also allow international payments. Another benefit of the safe credit
card model is that the user does not need to be registered with the payment provider, so
only transportation of the credit card number is required in encrypted form, for example.
One of the main advantages of the credit-debit model is the audit capability of the
transactions that is certainly a desired feature from the merchants and banks' point of
view. Another important benefit to note is that the credit card organizations already have
business experience in managing similar systems and many of them already have very
large customer bases. On-line credit-card payments can be risky. Some customers may
find that many entries were made without their consent or even their knowledge at all
when the credit card statement arrives. There's an understanding about fraud and other
security concerns about credit card e-payments. During transmission the information
can be intercepted or changed. The information may be stored on vendor servers, and
hackers who may later sell the information or use the information to make illegal
transactions may fall victim to it. Dishonest vendors may sell the information.
Cardholders are normally asked to provide additional information, such as its name and
address which can be used to verify its identity. If things like that require physical
delivery, they must be shipped to the address attached to card. This allows for limited
protection from bogus orders to do so. This obviously increases the risk borne by
merchants. There are some security risks associated with using credit cards to make
payments across computer networks Network traffic attackers may intercept messages
and capture credit card details, as well as any related verification information (name,
address, etc.).
Advantages:
70
Secure with the use of encryption.
Reduced fraud.
Reduced check inventory security risks, reduced risk of theft, loss or damage to
checks in the postal system.
An advantage of the electronic currency model is that the payments offer
(possibly full) anonymity to the user, which may encourage some potential users
to start using the payment mechanism.
Eliminates the third party
Electronic cash offers the greatest possibilities for electronic trading.
Allows micro-merchant payments which are perfect for low value transactions.
Once received, it has value immediately.
Reduced cash handling, check handling, or credit card processing.
Faster value into the bank and elimination of collection risks, checks
and credit cards can be rejected or “bounced.”
Reduced debt-collection efforts, check-processing costs, and postage fees,
postage-paid and return envelopes.
Reduced efforts to replace lost or destroyed payments, transfers to unclaimed
property.
Software solution. No extra hardware required
Drawbacks:
Costs are too high for low value transactions.
Does not allow micro- merchants.
Only sender’s bank can issue value for the check.
Slow method, no immediate transfer of funds.
No immediate confirmation.
No guarantee of payment upon receiving a check.
No anonymity.
Not portable
--------------------------------------------------------------------------------------------------------------------
-
Assignment
71
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
Name:_________________________________________ Score:_______________
Section:___________ Instructor: _______________ Date:________________
72
True 1. An online management firm aggregates, bundles and resells content
or software from various outlets to third-party websites
True 2. Although Internet-enabled cell phones can access the Web at any time
and from anywhere, there is a very limited amount of information they
can actually handle at one time.
False 3. Accumulated digital balance payment systems enable consumers to
make instant, online payments in a digital account to merchants and
other individuals based stored value.
False 4. Peer-to-peer payment systems are the principal electronic commerce
payment systems.
True 5. Complex e-commerce software has Web-based capabilities to process
credit card transactions.
False 6. The electronic payment system in which users make online
micropayments and transactions, accumulating on their credit card or
telephone bill a debit balance is called digital cash.
False 7. Digital wallet payment systems allow consumers to make instant
online payments to merchants and other individuals based on the
digital account value stored.
True 8. Internet content providers create revenue by providing digital content
over the Web.
True 9. Smart card is an electronic payment system that uses a plastic credit
card size card that stores digital information and that can be used
instead of cash for online payments.
False 10. Stored value system extends the functionality of existing checking
accounts so they can be used for online shopping payment.
Identification: Read each statement below carefully and fill in the blank(s) with the correct
answer.
73
Module 2 Project
1. Watch the video “What Is a Smart City?” at youtube.com/watch?v=Br5aJa6MkBc
(3:28 min), and discuss the issues of smart cities.
74
2. Researching the state of the art of false posting and fraudulent comments on
famous blogs. Study the steps of defense. Write a summary report.
3. Have a search on Google for "Institutional Identity Theft." Compare theft of
institutional identity with theft of personal identity. How does an organization
secure itself from identity theft? Write a report.
4. Enter ftc.gov and identify some of the typical types of fraud and scams on the
Internet. Listen of them.
MODULE 3
Overview
75
This module will cover. Topic1 describes e-commerce marketing and advertising
concepts. Topic 2 outlines Digital Commerce Marketing and Advertising Strategies and
Tools. Topic 3 focuses on ethical, social, and political issues in e-commerce.
Module Objectives
Coverage:
A. E-commerce Marketing and Advertising Concepts
B. Digital Commerce Marketing and Advertising Strategies and Tools
C. Ethical, Social, and Political Issues in E-commerce
A. Topic 1
Introduction:
In the field of industry, e-commerce has brought in a new idea and this concept is
growing quite rapidly and is almost putting an end to the conventional business
techniques. It is used to identify businesses that are run over the Internet. It explains
how Web technologies such as shopping carts, e-mails, online sites, electronic data
interchange (EDI), and instant messaging are used by businesses. In addition to
offering an easy way to exchange goods and services, e-commerce has also provided
the most secure and convenient way to carry out the transactions involved in that trade.
Once a company wants to move into e-commerce, it must first define and
establish factors that will help it sell its goods and services effectively through the
internet. The approaches would decide how the business will build its e-market
structure, priorities and resources in relation to demand.
Topic Objectives
76
identifies and describes the main technologies that support online marketing; and
understand the cost and benefits of online marketing communications.
Topic 1 Pre-test
--------------------------------------------------------------------------------------------------------------------
- Module 3: Topic 1 Pre-test
77
Name:__________________________________________ Score:_______________
Section:___________ Instructor: ____________________ Date:________________
1. ________________________________________________
2. ________________________________________________
3. ________________________________________________
4. ________________________________________________
5. ________________________________________________
b. List down five (5) reasons why people don’t buy online
1. ________________________________________________
2. ________________________________________________
3. ________________________________________________
4. ________________________________________________
5. ________________________________________________
--------------------------------------------------------------------------------------------------------------------
Topic Contents
Understanding Google Analytics. Google Analytics tests the ROI of ads and
tracks the Flash, video and social networking sites and apps. The data from Google
Analytics is derived from the metrics for the link and page. In 2005, Google acquired
Urchin and created the freemium web analytics package, Life changed for digital
marketers. This changed the way we worked, because we no longer expended
resources simply attempting to increase our visitors; instead we could begin to
understand them – the sites they looked at and how long they expended on the web. If
your company is B2B or B2C, it is a must to use conversion monitoring. Tracking
ecommerce allows data on product prices, purchase date, and billing locations to be
obtained. And goals will provide useful insight into the path the users take to the desired
location if set up with the optional funnels – this may be an inquiry form or a landing
page for some value added content [20]
Heat mapping and scroll mapping. Comprising more about in-page activity,
however, can put an all-new perspective on what is valuable content. Through heat
mapping tools we can gain that insight. There are many on the market-Crazy Egg is our
favorite because it shows where everyone clicked, whether or not it was on a
connection. We may compare web and mobile versions of a web with Crazy Egg.
Menus and site architectures usually can differ, so it's useful to understand how
audiences respond to both. In addition, we can drill and see how users from different
channels, browsers-including new and returning visitors-interact with the site [20].
User testing. Just being close to a digital project and the process of
development can judge how usable a website is. Using a remote platform for usability
testing like What Users Do is a highly effective way to get normal people to test a
website. What users do can match the users with your chosen demographic – how old
they are, their gender, and even their profession – by vetting the people who subscribe
to test websites. The company boasts you just need five tests to fully understand user
behavior [20].
User surveys. Online surveys are often used to collect feedback about a user
experience. A standard survey may consist of a series of questions designed to
determine the interest of a participant-in this case, how they perceive their online
experience. The benefits of online survey include: (1) To meet a much wider audience
than consumer testing – you should obtain a wider sample size. (2) To have an
appreciation of the experience of end users and to be able to change the online
experience accordingly. It is crucial that you know exactly what you want from the
survey. User surveys help measure the conclusions you made from the information
gathered in steps one to three, so you should balance the questions in order to get a
finite answer [20].
A/B Testing. The final step is to bring what you have learned from your research
on user behavior into action. That doesn't mean you 're trying to interpret your website
and building a whole new experience, significant changes can be difficult to track, so
79
you're in a worse position than you began. Using tools such as Google Analytics and
Crazy Egg, it is easy to assess the impact on the design of what, say, a change to a
button, introduction of a new color, or a new menu item may have.
In the search stage, they may be looking for product reviews or customer
comments according to Figure 5. They'll find out which brand or company is best suited
to their expectations. Well-organized website structure and attractive design during this
stage are important things to persuade consumers to be interested in buying a product
or service.
Stage 1. The most useful characteristic of internet is that it supports the pre-purchase
stage as it helps customers compare different options.
Stage 2. During the purchasing stage, product assortment, sale services and
information quality seem to be the most important point to help consumers decide what
product they should select, or what seller they should buy from.
Stage 3. Post-purchase behavior will become more important after their online
purchase. Consumers sometimes have a difficulty or concern about the product, or they
80
might want to change or return the product that they have bought. Thus, return and
exchange services become more important at this stage.
The first elements to identify are factors that motivate customers to buy products
or services online. They are divided into two categories − external factors and internal
factors.
The External Factors are the ones beyond the control of the customers. They
can divide into five sectors namely demographic, socio-economic, technology
and public policy; culture; sub- culture; reference groups; and marketing.
Internal Factors are the personal traits or behaviors which include attitudes,
learning, perception, motivation, self-image.
The Functional Motives is related to the consumer needs and include things
like time, convenience of shopping online, price, the environment of shopping
place, selection of products etc.
The Non-Functional Motives related to the culture or social values like the
brand of the store or product.
Filtering Elements
Using these three factors, customers filter their buying choices and decide on the
final selection of stores they are willing to buy from. They use the knowledge to filter
their buying options through three factors such as security, privacy, and trust and
trustworthiness [20].
81
Table 8. What’s New in Online Marketing and Advertising [2]
82
Demographics and Access [2]
The slowing growth rate in the US Internet population is compensated for in part
by an increasing intensity and scope of use. Overall, over 80% of adult Internet users in
the US report logging on in a typical day. They also spend more time online –over 2
hours per day. In 2013, mobile smartphones and tablets are major access points to the
Internet and online commerce. About 143 million people, almost 60% of US Internet
users, access the Internet using a mobile device. The demographic profile of the
Internet –and e-commerce –has changed greatly since 1995. Up until 2000, single,
white, young, college-educated males with high incomes dominated the Internet. This
inequality in access and usage led to concerns about a possible “digital divide”.
Demographic similarities and differences can be assessed by looking at: gender, age,
ethnicity, community type, income level, and education.
Gender. Fairly equal percentage of men and women users (85%).
Age. Young adults (18-29) make up the age group with the highest Internet
usage rate (98 per cent). Also, teens (12-17) have a very high online percentage of their
age group (97 per cent). Adults are also well represented in the 30-49 category (92 per
cent). Another fast-growing online community is the 65 and over class, of which 56
percent are now using the Internet.
Ethnicity. Variations across ethnic groups are not as broad as those between age
groups. There were significant differences between ethnic groups in 2004 but this has
fallen back.
Income level. Around 96% of households with income rates above $75,000 have
access to the Internet, compared to just 76% of households earning less than $30,000;
Education. Of those individuals with or less high school education, 59 percent
were online in 2013, compared with 96 percent of those with a college degree or more.
In summary, the "digital divide" has also moderated, but it still exists alongside the
dimensions of employment, education, age and ethnicity.
In 2013, some 85 million US households had broadband access in their homes,
among many internet problems. There is a more educated and affluent broadband
public. Internet-based consumer purchases are influenced by "neighborhoods" where
others buy online. Social network membership has a major impact on the development
of new independent music, but less impact on already well-known items.
83
Figure 6. General Model for Consumer Behavior (SOURCE: Adapted from Kotler and
Armstrong, 2009.) [2]
84
similar interests among the members. Consumer social characteristics or social
norms are also recognized as a determinant, which has a prominent influence on
consumer behavior. Reference groups, family, position, and status are important social
factors. Reference groups refer to a group of people that affects a person as an
individual is a member of that group or wants to become a member of that group. The
different reference groups are family members, friends, co-workers of the neighbor,
religious groups, professional groups, aspiration group etc. Psychological factors
affecting consumer behavior include
'motivation,' 'perception,' 'learning' and 'attitude' can be explained as a desire generated
by an unsatisfied need. When the need intensity is very high it becomes motive. The
decision as to the quantity of information to be searched for and the size of the
expenditure to be made on the commodity, brand, store of consumer goods is affected
by buyer motives. Perception of a commodity leads to thinking, and analysis leads to
practice. Thus, perception plays an important role in communicating a specific action
towards a commodity being purchased. Consumer learning is a continuum mechanism
whereby a customer is learning something new on a regular basis. What a customer
has observed from the world or previous experience is a contributing factor to a
product's purchasing behavior. Attitude determines everybody's life and it affects how
everybody responds to certain people, things or events and reacts to them. By
analyzing its attitude, a marketer gets great help in knowing consumer reaction. As a
consumer's attitude puts its effect on use pattern, consumption frequency, customer
preference [21].
Website features in the online model, along with consumer skills, product
characteristics, attitudes towards online purchasing, and perceptions about web
environment control come to the fore. The characteristics of websites include latency
(delay in downloads), navigability, and trust in the security of a website. It is well
85
known, for example, that consumer behavior can be influenced by store design, and
that understanding consumers' precise movements through a physical store can boost
sales if goods and promotions are arranged along the most likely consumer tracks.
Consumer skills refers to the knowledge consumers have about (which increases
with experience) how to conduct online transactions. Product characteristics refers to
the idea that certain goods can be easy to use. Described, packaged and shipped over
the Internet while others are unable to. These factors, combined with traditional factors
such as brand, advertising, and firm capabilities, lead to specific attitudes about buying
on a website (trust in the website and favorable customer experience) and a sense that
the consumer can control his or her website environment. Clickstream behavior refers
to the transaction log as defined by consumers. They travel across the Web, from a
search engine to a range of pages, then to a single site, then to a single page and finally
to a purchasing decision.
87
Module 3: Topic 1 Post-test
Name:_________________________________________ Score:_______________
Section:___________ Instructor: _______________ Date:________________
True 1. Sellers can create trust among online customers by creating strong reputations
for integrity, fairness and the provision of quality goods as the core elements of a
brand.
True 2. Consumer behavior online parallels consumer behavior offline.
False 3. Consumer skill is the idea that certain goods can be easy to use.
False 4. Perception is a continuum mechanism whereby a customer is learning something
new on a regular basis.
True 5. The Internet has a positive impact on the foreign marketing practices of the
companies.
False 6. E-commerce monitoring does not require data to be collected on product prices,
the date of purchase and the billing locations.
False 7. Well-organized website layout and attractive design are essential items at this
stage to deter customers from being involved in buying a product or service.
True 8. Social class can be defined as a division of society with similar interests among
the members.
True 9. Consumer faith in platforms like the Internet and institution-based trust in third-
party structures like escrow services make e-commerce smooth.
False 10. Culture defines the life of everyone and it influences how everyone responds to,
and reacts to, other individuals, objects, or events.
Identification: Read each statement below carefully and fill in the blank(s) with the correct
answer.
User survey 1. A standard survey may consist of a series of questions designed to
determine the interest of a participant-in this case, how they perceive their
online experience
Internet traffic 2. It is used to characterize the web traffic, the amount of data sent and
received from a single user to the website.
Filtering elements 3. They use the knowledge to filter their buying options through three factors
such as security, privacy, and trust and trustworthiness.
Internet intensity 4. It is described as the incorporation of the Internet into the company's
international marketing activities and business processes, such as
marketing and advertising, online sales, and after-sales services.
Clickstream behavior 5. It refers to the transaction log as defined by consumers.
Web features 6. The characteristics of websites include delay in downloads, navigability,
and trust in the security of a website
Internal Factors 7. These are the personal traits or behaviors which include attitudes,
learning, perception, motivation, self-image.
Reference groups 8. It refers to a group of people who affect a person as an individual is a
member of that group or who would like to become a member of that
group.
Consumer behavior 9. It is a branch of the social sciences that seeks to model and understand
analysis human behavior in a marketplace.
Internet usage 10. It refers to the use of Internet technology by companies such as e-mail,
88
websites, intranets and extranets customers and suppliers.
B. Topic 2
Topic Title: Digital Commerce Marketing and Advertising Strategies and Tools
Introduction:
The digital commerce marketing principle is based on the various existing search
engines. Digital marketing uses these search engines to reach directly prospective
consumers who are likely to purchase the goods of the business which are sold online.
The search engines also help companies identify other organizations who are willing
and capable of doing business with them by using the internet.
Digital marketing and e-commerce are not mutually exclusive. E-commerce
websites may use all of the digital platforms to promote a product and develop its
business. E-commerce marketing is the act of driving knowledge and action against a
company that electronically sells its product or service. To draw customers and
promote online transactions, e-commerce marketers may use social media, digital
content, search engines and e-mail campaigns.
Topic Objectives
89
Topic 2 Pre-test
--------------------------------------------------------------------------------------------------------------------
- Module 3: Topic 2 Pre-test
Name:__________________________________________ Score:_______________
Section:___________ Instructor: ____________________ Date:________________
1. ________________________________________________
2. ________________________________________________
3. ________________________________________________
4. ________________________________________________
5. ________________________________________________
1. ________________________________________________
2. ________________________________________________
3. ________________________________________________
4. ________________________________________________
5. ________________________________________________
--------------------------------------------------------------------------------------------------------------------
90
Topic Contents
Table 10 shows these five main platforms, key elements within each type, some
91
examples, and the primary marketing function in each situation. Here are some
common marketing channels and how you would use them to build an online store to
give you a sense of what an ecommerce marketing strategy looks like.
Email Marketing. Email marketing is one of the oldest forms of digital marketing
and it has special importance in the ecommerce marketing field, believe it or not. It can
be automated the best aspect about email marketing. Automation means you can set
up an effective drip campaign for subscribers who are segmented in the purchaser's
journey by interest or stage and let your email campaign do its magic [23]. One of the
first and most successful forms of online marketing messaging was direct e-mail
marketing (e-mail marketing messages sent directly to interested users). Direct e-mail
marketing messages are sent to an opt-in audience of Internet users who have
expressed an interest in receiving messages from the advertiser at one time or another.
By sending e-mail to an opt-in audience, advertisers were targeting interested
consumers [2].
Even though email can still be an effective marketing and advertising tool, it
faces three main challenges: spam, software tools used to control spam that eliminate a
great deal of email from user inboxes, and poorly targeted email lists purchased. Spam
is unsolicited commercial e-mail (sometimes called "junk" e-mail) and spammers are
people who send unsolicited e-mail to a mass audience that doesn't have it. In most
civilized societies, spammers tend to market pornography, fraudulent deals and
services, scams and other products not widely approved. Legitimate direct email
marketing opt-in doesn't grow as fast as behaviorally targeted banners, pop-ups, and
search engine advertising because of the explosion in spam. [2].
Search Engine Marketing. Search engine marketing (SEM) refers to the use of
search engines to build and sustain brands. Search engine advertising refers to the use
of search engines to support direct sales to online consumers [2]. SEM includes both
search engine optimization (SEO) and paid advertising. While SEO relies on your
knowledge of Google's ranking algorithm to optimize content, SEM may include pay-per
- click (PPC) campaigns, display campaigns, or product-specific ad campaigns (think
Google Shopping), allowing you to pay for top spots on the search engine results
pages. PPC campaigns on Google ensure that potential buyers can see a link to your
page when they enter search terms which suit your campaign terms. But because every
time a person clicks on your result, you are paying Google, the payoff to you should be
high. That's why ecommerce marketers often register with Google AdWords and use
PPC campaigns to promote their product pages. The campaign places searchers right
in front of the product of the company when they click on a paying outcome, thus raising
the probability that the searcher will make a purchase before leaving the website [23].
Video Marketing. YouTube has more than one billion active users and is likely
to have your target audience somewhere in there. It's also the second-biggest search
engine on Google. If you're looking for a massive, captive audience, YouTube is where
you'll find that. Use widely searched keyword words to decide your subjects, then share
videos that apply to your product and are helpful to your audience [23].
Smartphone sites, tablet sites and apps. With around 6 billion mobile
subscribers, or 87 per cent of the world, is the mobile market substantially penetrated
globally? Population of s. There are 325 million smartphone subscribers in the United
States, a penetration rate of 103 per cent. Rapid smartphone adoption continues,
accounting for more than 50 percent of mobile phones in the U.S. currently with
anticipated further gains in penetration. The smartphone is effectively a powerful mobile
computer, and its adoption and evolving use, together with tablets and e-readers, leads
to new consumer behavior and information consumption expectations. There are
currently 600 million users use Facebook on cell phones, and Facebook expects even
more cell use and greater interaction as smartphones expand further. Consumer
services, including Facebook, Pandora and YouTube, among many others, are racing
to monetize their mobile user base, which is very significant and fast growing. Mobile
apps continue to expand and the mobile advertising market has finally started off as
advertisers, brands, marketers and publishers are rushing to deliver targeted messages
to mobile users. Likewise, retailers adapt to shopping for smartphone and tablet
research and mobile usage in-store while mobilizing their websites to maximize the
experience of mobile customers and industry. The mobile industry is dynamic,
competitive and growing and rapidly changing. We are in the early stages of a
technological revolution brought on globally by more affordable mobile devices and
Internet access [24].
95
not overtly commercial way. Companies will spend around $1.9 billion on marketing
sponsorships in 2013. Targeted advertising (or advertisements) is a popular type of
sponsorship, in which editorial advertising is paired with an ad message to make the
message more relevant and appealing to its intended audience [2].
Ad exchanges take the online advertising market a step further by aggregating the
supply side of advertising slots available at publishers across several ad networks, and
establishing a real-time bidding process (RTB) where marketers can bid for slots
based on their marketing criteria [2].
Viral Marketing. It is a form of social marketing that involves getting clients to pass on
the marketing message from a company to friends, family and colleagues. It's the online
version of word-of - mouth advertising, which is spreading even faster and more than in
the real world. In the offline world, word of mouth is next to television, the second most
important means by which consumers find out about new products. And the most critical
factor in the buying decision is the face-to - face suggestions made by parents, friends
and colleagues.
Display Ad Marketing
96
use banner ads to advertise their product on websites, apps or social media along with
other visual ad formats. Display ads are a profitable promotional tool for advertisers
searching for ways to attract and retain clients. They make liberal use of visual media to
capture people's attention in the form of messages, pictures, or even videos. Typically,
you can spot advertisements in specified corners of web pages and social media sites,
and they are generally shown as a banner ad (graphic or text). All campaigns ranging
from simple-text to attractive-video campaigns can be grouped under display
advertising. The most popular advertisement campaigns on display use a creative mix
of photos, text, gifts and videos to stand out on the internet and deliver their message to
the target audience. Marketers can play around to create engaging display ads with
language, design, shapes and banner sizes [25].
Some of the most important aspects of display advertising is its ability to reach
different audience parts that suit criteria based on the requirement of the advertiser. The
targeting feature of display advertising ensures that your ad reaches the right audience
and ad spending is not wasted on a demographic that is not interested in your product
or service. The variety of options available when showing ad targeting can be
overwhelming; it is important to have clarity about the type of audience that you want to
cater for, and select from available targeting options accordingly. Here are some of the
steps you can take to optimize this feature:
1. Define your demographic: You can segment the audience based on their
basic demographic details like age, gender, interests, etc.
2. Identify target keywords: This allows you to reach the target demographic
based on selected keywords as per your product or service. The display ad
network will match your keywords with words/phrases present in the
publisher’s site where your ad will be displayed.
3. Zero-in on the topic: This feature lets you choose a group of websites that fit
a specific topic/category within which your business operates.
4. Formulate the ideal placement: You can choose the website you want your
display ads to run on. For example, if you’re targeting customers of a specific
car variant, you can display the ads on articles related to that model, or even
97
on a product review page.
5. Show ads based on interest: Google collects data on its users’ behavior, and
depending on what users are searching for, you run display ads that resonate
with specific interest areas. For example, a car enthusiast may be
researching tires, car stereo systems, etc. Interest-based display ad targeting
will place your ad on all relevant webpages.
6. Retarget based on past behavior: Also known as retargeting, this display ad
targeting feature lets you target users who have already visited your website,
thereby reinforcing the brand’s impact and recall.
Rich media. Given that approximately 30 per cent of Internet users find traditional
banner advertising distracting, advertisers are exploring more innovative ways of
displaying their ads. The use of rich media is one such new tactic involving the use of
interactive elements such as video, audio and clickable elements to make the ad more
engaging [25]. These are ads that use animation, sound, and interactivity, using
JavaScript, Flash, HTML5, and Java. Rich media advertisements are expected to
account for about $2 billion in online advertising spending in 2013 (about 5 per cent of
total online advertising). They are much more effective than plain banner advertising.
For example, one research report analyzing 24,000 different rich media ads with over
12 billion impressions served in North America between July and December 2011 found
that exposure to rich media ads boosted advertiser site visits by almost 300 per cent
compared to standard banner ads. Through either direct clicking on the ad, typing the
advertiser's URL, or searching, viewers of rich media ads that included video were six
times more likely to visit the advertiser's web site [2].
Interstitial ads. These are advertisements that appear as a separate website until you
go to the original page you wanted to visit on the internet. They are effective at catching
the attention of the user as they fill the entire screen [25]. An interstitial ad (interstitial
means "in between") is a way to put a full-page message about a user's current pages
and destination pages. Usually interstitials are inserted into a single website and
displayed as the user moves from one page to the next. Typically, the interstitial is
contained in its own browser window and will automatically move to the page requested
by the user after allowing sufficient time to read the ad. It is also possible to deploy
interstitials over an advertising network and appear as users move between websites
[2].
99
As the Web is such a busy place, people need to find ways to deal with over-
stimulation. One means of coping is called filtering of sensory inputs. That means
people are learning to filter out the vast majority of the messages that come to them.
Internet users quickly learn to identify banner advertising or something that looks like a
banner ad at any point, and filter out most of the advertising that are not especially
relevant. Interstitial advertisements, like tv commercials, seek to make audiences slave
to the ad. Typical interstitials last 10 seconds or less and compel the user to view the ad
for that period of time [2].
Video Ads are slightly more expensive but worth it, when it comes to displaying
advertising costs. Platforms such as YouTube and Instagram have made it easy for
advertisers to run video advertisements, gaining significant interest and dedication [25].
Video ads are TV-like ads that appear as in-page video advertisements, or before,
during, or after a variety of content [2].
There are four features of social marketing and advertising that are driving its
growth [2]:
100
Social sign-on: Signing in to various Web sites through social network pages like
Facebook. This allows Web sites to receive valuable social profile information
from Facebook and use it in their own marketing efforts.
Collaborative shopping: Creating an environment where consumers can share
their shopping experiences with one another by viewing products, chatting, or
texting. Instead of talking about the weather, friends can chat online about
brands, products, and services.
Network notification: Creating an environment where consumers can share their
approval (or disapproval) of products, services, or content, or share their
geolocation, perhaps a restaurant or club, with friends. Facebook’s ubiquitous
“Like” button is an example. Twitter tweets and followers are another example.
Social search (recommendation): Enabling an environment where consumers
can ask their friends for advice on purchases of products, services, and content.
While Google can help you find things, social search can help you evaluate the
quality of things by listening to the evaluations of your friends or their friends. For
instance, Amazon’s social recommender system can use your Facebook social
profile to recommend products.
Facebook networks that specialize in blogs have some flexibility in placing ads, as
do blog networks that are collections of a small number of popular blogs, managed by a
central management team, and that can provide marketers with a wider audience. The
online gaming marketplace is expanding rapidly as users can play games on
smartphones and laptops, as well as PCs and laptops. The aim of game advertising is
both to brand and to drive customers to buy moments at restaurants and retail stores
[2].
101
Customer Retention Strategies
Personalization, One-to-One Marketing, and Behavioral Targeting (Behavioral
Advertising) No Internet-based marketing technique has been more popular and
academic than "one-to-one" or "personalized marketing" comments. One-to-one
marketing (personalization) segments the market based on individuals (not groups),
based on a precise and timely understanding of their needs, targeting specific marketing
messages to these individuals, and then positioning the product to competitors as being
truly unique. One-to-one marketing is the ultimate form of market segmentation,
targeting, and positioning – where individuals are the segments. Since the development
of systematic market research and mass media in the 1930s the movement toward
market segmentation has continued. E-commerce and the Internet, however, differ in
that they enable personalized one-to-one marketing to take place on a mass scale [2].
Behavioral targeting of ads involves the use of consumers' online and offline
behavior to adjust the advertising message delivered online, often in real time
(milliseconds from the first URL entered by the consumer). The aim is to increase
marketing and advertisement efficiency, and to increase the revenue streams of
companies that are in a position to target visitors behaviorally. The online advertising
industry, led by Google, has introduced a new name for behavioral targeting because
"behavioral targeting" as a label has somewhat unfavorable connotations. They call it
interest based advertising. Ad exchanges make it possible for advertisers to retarget
ads at individuals as they roam across the Internet. Retargeting ads involves showing
the same or similar ads to individuals across multiple Web sites. Retargeted ads are
nearly as effective as the original ad [2].
There are four methods used by online advertisers to conduct target ads: search
engine queries, data collection on individual browsing history online (clickstream
monitoring), data collection from social network sites, and increasing integration of
these online data with offline data such as income , education, address, buying
patterns, credit records, driving records, and hundreds of other personal descriptors tied
to specific, identifiable persons. Google, Microsoft, Yahoo, Facebook, and legions of
small and medium-sized marketing firms that use their data, or collect data from
thousands of websites using web beacons and cookies, routinely engage in this level of
integration of both "anonymous" and identifiable information [2].
Customization changing the product, not just the marketing message, according
to user preferences. Customer co-production in the Web environment, takes
customization one step further by allowing the customer to interactively create the
product. Frequently asked questions (FAQs), a text-based listing of common
questions and answers, provide an inexpensive way to anticipate and address customer
concerns. Adding an FAQ page on a Web site linked to a search engine helps users
track down needed information more quickly, enabling them to help themselves resolve
questions and concerns. Real-time customer service chat systems (in which a
company’s customer service representatives interactively exchange text-based
messages with one or more customers on a real-time basis) are an increasingly popular
way for companies to assist online shoppers during a purchase. Automated response
systems send e-mail order confirmations and acknowledgments of e-mailed inquiries,
in some cases letting the customer know that it may take a day or two to actually
102
research an answer to their question. Automating shipping confirmations and order
status reports are also common. [2].
Pricing Strategies
In this world, newly empowered consumers will shop around the scenario (and
around the clock) with minimal effort, using intelligent shopping agents and the almost
limitless product and price details available on the Internet, driving prices down to their
marginal costs and pushing intermediaries out of the market as customers started
negotiating directly with producers. The result was supposed to be an instance of the
"Law of One Price": one world price for each product would emerge with complete
price transparency in a perfect information market place. Of course, "Frictionless
Commerce" will mean the end of brand-based marketing. Pricing (making goods and
services a value) is an integral part of marketing strategy. Price and quality together
define value for the consumer. E-commerce product pricing has proven very difficult for
both entrepreneurs and investors to grasp. In traditional firms, traditional goods prices
such as books, drugs, and automobiles are usually based on their fixed and variable
costs, as well as on the demand curve of the market (the quantity of goods that can be
sold at different prices). The costs of building the production facility are fixed costs.
The costs involved in running the production facility are variable costs – mostly labor.
In a competitive market with indistinct goods, prices tend towards their marginal costs
(the incremental cost of producing the next unit) once the manufacturers have paid the
fixed costs for entering the business. Price discrimination is the selling products to
different people and groups based on their willingness to pay. If some people really
want the product, sell it to them at a high price. Versioning is one solution to the
problem of free information goods is versioning creating multiple versions of the goods
and selling essentially the same product to different market segments at different prices.
Bundling offers consumers two or more goods for a reduced price.
Databases, data centers, data mining, and the array of marketing decision-
103
making methods that are loosely called profiling are at the root of the Internet marketing
revolution. Profiling uses a number of tools to give each user a digital image. This
image may be quite inaccurate, even primitive, but can be as detailed as a character in
a novel as well. The quality of a consumer profile depends on the amount of data used
to create it, and the software and hardware analytical power of the firm. A database is a
software application that stores records and attributes. A database management
system (DBMS) is a software application used by organizations to create, maintain,
and access databases. The most common DBMS are DB2 from IBM and a variety of
SQL databases from Oracle, Sybase, and other providers. Structured query language
(SQL) is an industry-standard database query and manipulation language used in
relational databases. Relational databases such as DB2 and SQL represent data as
two-dimensional tables with records organized in rows, and attributes in columns, much
like a spreadsheet. The tables and all the data in them can be flexibly related to one
another as long as the tables share a common data element. A data warehouse is a
database that collects a firm’s transactional and customer data in a single location for
offline analysis by marketers and site managers. Data mining is a set of analytical
techniques that look for patterns in the data of a database or data warehouse, or seek
to model the behavior of customers. Web site data can be “mined” to develop profiles of
visitors and customers. A customer profile is simply a set of rules that describe the
typical behavior of a customer or a group of customers at a Web site. Customer profiles
help to identify the patterns in group and individual behavior that occur online as
millions of visitors use a firm’s Web site. The simplest type is query-driven data
mining, which is based on specific queries. For instance, based on hunches of
marketers who suspect a relationship in the database or who need to answer a specific
question, such as “What is the relationship between time of day and purchases of
various products at the Web site?”, marketers can easily query the data warehouse and
produce a database table that rank-orders the top 10 products sold at a Web site by
each hour of the day. Model-driven data mining involves the use of a model that
analyzes the key variables of interest to decision makers. For example, marketers may
want to reduce the inventory carried on the Web site by removing unprofitable items
that do not sell well. A financial model can be built showing the profitability of each
product on the site so that an informed decision can be made. Big data usually refers to
data in the petabyte and exabyte range in other words, billions to trillions of records, all
from different sources. Big data are produced in much larger quantities and much more
rapidly than traditional data. Hadoop is an open source software framework managed
by the Apache Software Foundation that enables distributed parallel processing of huge
amounts of data across inexpensive computers.
104
Impressions number of times an ad is served
click-through rate (CTR) the percentage of people exposed to an online
advertisement who actually click on the banner
view-through rate (VTR) measures the 30-day response rate to an ad
hits number of http requests received by a firm’s server
page views number of pages requested by visitors
stickiness (duration) average length of time visitors remain at a site
unique visitors the number of distinct, unique visitors to a site
reach percentage of the total number of consumers in a market who will visit a
site
loyalty percentage of purchasers who return in a year
recency average number of days elapsed between visits
acquisition rate percentage of visitors who register or visit product pages
conversion rate percentage of visitors who purchase something
browse-to-buy ratio is the ratio of items purchased to product views
view-to-cart ratio is the ratio of “Add to cart” clicks to product views
cart conversion rate ratio of actual orders to “Add to cart” clicks
checkout conversion rate ratio of actual orders to checkouts started
abandonment rate % of shoppers who begin a shopping cart, but then fail to
complete it
retention rate % of existing customers who continue to buy
attrition rate % of customers who purchase once, but do not return within a year
conversation ratio number of comments produced per post
applause ratio number of Likes or Shares per post
amplification number of re-tweets or re-shares per post
sentiment ratio is the ratio of positive comments to total comments
open rate % of customers who open e-mail
delivery rate % of e-mail recipients who received e-mail
click-through rate (e-mail) % of e-mail recipients who clicked through to the offer
bounce-back rate percentage of e-mails that could not be delivered
cost per thousand (CPM) advertiser pays for impressions in 1,000 unit lots
cost per click (CPC) advertiser pays pre-negotiated fee for each click an ad
receives
cost per action (CPA) advertiser pays only for those users who perform a specific
action
105
--------- End of Topic 2 ----------
Name:_________________________________________ Score:_______________
Section:___________ Instructor: _______________ Date:________________
True 1. Profiling uses a number of tools to give each user a digital image
False 2. Content farms occurs when a competitor clicks on results and ads on the
search engine, forcing the advertiser to pay for the click even if the click is
not legitimate.
True 3. Banner ads are the most common format for displaying advertisements,
as they clearly stand out on any webpage.
False 4. Paid inclusion and ranking of sites depend on a more or less unbiased
application of a set of rules imposed by the search engine.
True 5. Lead Generation Marketing provides consulting services and software
tools for businesses to collect and manage leads and convert them into
customers.
False 6. Search engine optimization refers to the use of search engines to support
direct sales to online consumers
False 7. Video marketing is a technique which is almost exclusively used by large
companies.
True 8. Advertisements is an editorial advertising is paired with an ad message to
make the message more relevant and appealing to its intended audience
True 9. Multiple distribution outlets should generally be interested in the full
customer experience.
False 10. Under display ads, all promotions ranging from plain text to glamorous
video promotions cannot be grouped.
Identification: Read each statement below carefully and fill in the blank(s) with the correct
answer.
106
in a single location for offline analysis by marketers and site
managers.
Price 6. The selling products to different people and groups based on their
discrimination willingness to pay.
Interstitial ads. 7. These are advertisements that appear as a separate website until you
go to the original page you wanted to visit on the internet.
Customization 8. The changing the product, not just the marketing message, according
to user preferences
Viral marketing 9. It's the online version of word-of - mouth advertising, which is
spreading even faster and more than in the real world.
acquisition rate 10. The percentage of visitors who register or visit product pages.
Assignment
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
107
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
Topic 3
Introduction:
Defining the rights of individuals to communicate their ideas and ownership rights
of copyrights owners are only two of the many legal, social and political problems posed
by the rapid growth of e-commerce. The ethical, social and political concerns posed in
e-commerce provide a structure for organizing the issues and making recommendations
to managers responsible for running e-commerce businesses within generally agreed
criteria of suitability. Understanding ethical, social, and political issues in the Internet of
e-commerce and its use in e-commerce has raised pervasive ethical, social, and
political issues on a massive scale for computing. We live in an "information society,"
where power and wealth are increasingly dependent on knowledge and information as
core assets. In fact, controversies over information are often disagreements over power,
wealth, influence, and other things that are thought to be worthwhile. Like other
technology such as steam, energy, telephones and television, it is possible to use the
Internet and ecommerce to gain social benefits. The same technologies can, however,
be used to commit crimes, rob the environment, and threaten cherished social values.
There was very little interstate crime before automobiles, and very little federal authority
over crime. Likewise, with the Internet: very little "cybercrime" existed before the
Internet. The commercial development of the Internet benefits many business firms and
individuals, but this development also demands a price from individuals, organizations
and societies. Those who seek to make ethical and socially responsible decisions in this
new environment must take careful consideration of these costs and benefits [26].
Topic Objectives
108
understand the various forms of intellectual property and the challenges involved
in protecting it.
Topic 3 Pre-test
--------------------------------------------------------------------------------------------------------------------
- Module 3: Topic 3 Pre-test
Name:__________________________________________ Score:_______________
Section:___________ Instructor: ____________________ Date:________________
a. Name five personal information collected by web sites about their visitors.
1. ________________________________________________
2. ________________________________________________
3. ________________________________________________
4. ________________________________________________
5. ________________________________________________
b. Briefly explain your position on this issue “YouTube does not violate the intellectual
property rights of copyright owners” (5 points).
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
109
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
--------------------------------------------------------------------------------------------------------------------
Topic Contents
Ethics is at the center of online social and political discussions. Ethics is the
analysis of values that can be used by individuals and organizations to assess the right
and wrong course of action. In ethics it is believed that people are free moral agents
who can make choices.
Responsibility means that the actions they take are the responsibility of the
individuals, organizations and societies as free moral agents. Accountability means
that people, organizations and societies should be held accountable for the
consequences of their actions to others. The third definition-responsibility-applies the
principles of transparency to the field of law. Liability is a characteristic of legal
processes in which a body of law is in effect that allows people to recover the harm that
certain entities, institutions or organizations have done to them. Due process is a
feature of law-governed societies and refers to a process in which laws are known and
understood, and the ability to appeal to higher authorities to ensure that the laws are
applied correctly.
Defines the conflict or dilemma and identifies the greater value of the order
involved. Higher values are always referenced in ethical, social and political questions.
Otherwise no discussion will take place. The parties to a dispute all claim to pursue
higher values (e.g., liberty, privacy, property protection, and the -enterprise system). For
111
instance, Double Click and its supporters argue that tracking consumer movements on
the Web increases market efficiency and the wealth of society as a whole. Opponents
argue that this alleged efficiency is at the expense of individual privacy, and Double
Click should discontinue or offer Web users the option of not taking part in such
tracking.
Identify interested parties. Each ethical, social, and political issue has
stakeholders: players in the game who are involved in the result, who are in control of
the situation, and who are generally outspoken. Find out these groups' identities, and
what they want. This will be useful later when designing a solution. Identification of the
choices you can fairly take. You can find that none of the options satisfy all of the
involved interests, but some options do a better job than others. Sometimes, reaching a
"good" or ethical solution may not always be a balance of implications for stakeholders.
The Internet and the Web provide an ideal setting for invading millions of users '
personal privacy on a scale unprecedented in history. Maybe no other recent problem
has posed as much widespread social and political concern as preserving the privacy of
more than 160 million US Web users alone. The main ethical concerns related to
ecommerce and privacy include: under what circumstances would we violate other
people's privacy? What legitimates the infiltration of unobtrusive monitoring, market
research or other means into other lives?
The major social issues relating to e-commerce and privacy relate to the
development of "privacy exception" or privacy standards, as well as public attitudes. In
what ways do we allow people as a community to believe that they are in "private
territory," as opposed to public view? The main political issues concerning e-commerce
and privacy concern the development of statutes governing the relationships between
record keepers and individuals.
112
personal of whatever information is collected about them. The concept of privacy lies at
the core of individual control over personal information. Due process also plays a key
role in the concept of privacy [26].
Legal Protections
Privacy privileges in the United States, Canada, and Germany are expressly
provided in, or can be extracted from, founding documents such as constitutions, as
well as unique laws. There is also common law protection of the privacy in England and
the United States, a body of court decisions involving torture or personal injury.
Throughout the United States , for example, four tortures related to privacy have been
described throughout court decisions involving allegations of injury to individuals caused
by other private parties intrusion into solitude, public exposure of private information,
publicity putting a person in a false light, and use of a person's name or likeness (mostly
concerning celebrities) for a commercial purpose. In the United States, the right to
privacy against government interference is specifically secured by the First Amendment
protections of freedom of expression and association and the Fourth: the first protects
against arbitrary search and seizure of personal or home records, and the Fourteenth
Amendment's guarantee of due process. In addition to common law and the
Constitution, there are both federal laws and state laws that shield people from
government interference and in some cases establish privacy rights vis-à - vis private
entities such as financial institutions, education, and media [26].
113
Table 12. Unique Features of E-Commerce Technology and Their Potential
Ethical, Social, and/or Political Implications [2]
114
In the business context, privacy is a sensitive problem. It is easier to capture the
data using digital systems and new data mining computational techniques. E-
commerce sites collect the huge amount of data pertaining to consumer tastes, their
purchasing habits and the high-volume items they scan [27].
Many e-commerce sites are doing foolish things with their personal data
from the customer's side. According to a survey, 92 percent of respondents
said that while e-commerce site is responsible for keeping personal data
private, they disclose personal things in practice [27].
The user’s data is reuse for finding sales to existing customers and to
know their interest patterns.
This data is used for aggregation and resale
115
Buyer’ stricking. Social engineering strategies are used to tricking the
shopper to get the full value from the device under attack. The
attackers collect the credential information and use them against the
victim's online activities, such as asking about the user's favorite book
is a common challenge query used by various websites for
authentication and account login.
Snooping the buyer’s computer. One of the easiest ways to get
control of customer credentials is to get control of the online e-
commerce user's computer. As millions of computers are linked every
minute to the Internet, many of the users are unaware of the
vulnerabilities of the security function and the network. In addition,
software and hardware vendors do not pay adequate attention to direct
devices and system security issues, they are using. In this environment
snooping the e-commerce client's machine is very simple.
Sniffing the network. Network sniffing is a thorough control of data
between the shopper 's device and the hosting company's server. The
attacker collects buyer data or steals personal information including
credit card numbers, personal interest, pattern of purchase and so on.
Passwords guess. In general practice the assumption about the
password of the customer. The password assumption results in
successful performance via manual and automated mechanisms.
Manual approach is harder and has less success rate, and only
successful outcomes if the attacker has clear knowledge of the victim
such as what they want, basic information about his / her family name,
or the particular pattern that the victim uses commonly.
For the protection of data privacy, following steps are important [27].
Alter password quickly. There are many chances to use some tactics
to cheat online users. To protect user data privacy, online users need
to follow the practice of swiftly changing the password.
Avoid the same password at multiple sites. Never use already-used
password. The same password is used by many e-commerce site
users for multiple e-commerce sites. If someone gets their account
credentials from any other site, this gives them a chance to access
their account.
Use the service of FAQs. Before beginning the online phase an
attentive analysis of FAQs is helpful. Before placing the order at least,
one should read FAQs for a lot of information that the user may not be
aware of.
Check site authenticity. Get the support from the search engine
(Google, Bing, Query, Yahoo) to ensure the site 's authority. This will
help to authenticate the site for the users’ reliability.
Check site URL. Check the website address before the transaction
commences. If the users don't check the URL properly and place the
order at any similar e-commerce site that looks like original, after a
116
while it can cause users problems. The user will double check the URL
address of the pages, and then proceed to purchase.
Avoid private data disclosure. The managers of the E-commerce site
must avoid disclosing private data to the other business information
site. Many users willingly upload to the e-commerce site and share
their private data. This provides an incentive for the E-Commerce
platform to use the private data for any other purposes without
notifying its original customer.
Fair data collection. A fair data-gathering mechanism is important.
Cookies are generally used by the Internet for data mining. This
collection is not fair and is suited to any user's data privacy. The data
user must be aware of what personal data is being collected, and what
is the intention of using it.
Lawful collection of private data. A lawful mechanism for data
collection needs to be followed. All the data collected should be used
for the purpose of substance.
Personal data utilization. The use of personal data is of considerable
importance and should only be used for the purpose it is collected. It
should be erased once the motive for which data was collected has
been completed.
Data disclosure. Personal data shall never be revealed to the individual
and shall in effect be obtained without the main purpose.
Personal data accuracy. The data owner is responsible for taking all
possible measures to ensure accuracy and reliability of the data,
ensuring it is up to date.
Time for personal data retention. Personal data shall never be retained
for a long period of time without significant intention.
Duties of a data user. A registered user of data is a person who
controls, maintains and processes personal data.' Nobody else but
data user has the right to access personal information.
Rights of the users. The data originator has the right to access and
prevent the person who causes the damage from collecting the data.
Nondisclosure of data must be strictly prohibited.
117
Smartphones and apps. Used to track location and share photos,
addresses, phone numbers, search, and other behavior to marketers.
Advertising networks. Used to track individuals as they move among
thousands of Web sites.
Social networks. Used to gather information on user-provided content
such as books, music, friends, and other interests, preferences, and
lifestyles.
Cookies and Super Cookies. Used to track individuals at a single site.
Super Cookies are nearly impossible to identify or remove.
Third-party cookies. Cookies placed by third-party advertising networks.
Used to monitor and track online behavior, searches, and sites visited
across thousands of sites that belong to the advertising network for the
purpose of displaying “relevant” advertising.
Spyware. Can be used to record all the keyboard activity of a user,
including
Web sites visited and security codes used; also used to display
advertisements to users based on their searches or other behavior.
Search engine behavioral targeting (Google and other search engines).
Uses prior search history, demographics, expressed interests, geographic,
or other user-entered data to target advertising.
Deep packet inspection. Uses software installed at the ISP level to track
all user clickstream behavior.
Shopping carts. Can be used to collect detailed payment and purchase
information.
Forms. Online forms that users voluntarily fill out in return for a promised
benefit or reward that are linked with clickstream or other behavioral data
to create a personal profile.
Site transaction logs. Can be used to collect and analyze detailed
information on page content viewed by users.
Search engines. Can be used to trace user statements and views on
newsgroups, chat groups, and other public forums on the Web, and profile
users’ social and political views. Google returns name, address, and links
to a map with directions to the address when a phone number is entered.
Digital wallets (single sign-on services). Client-side wallets and software
that reveal personal information to Web sites verifying the identity of the
consumer.
Digital Rights Management (DRM). Software (Windows Media Player) that
requires users of online media to identify themselves before viewing
copyrighted content.
Trusted Computing Environments. Hardware and software that controls
the viewing of copyrighted content and requires user’s identification, e.g.,
Amazon Kindle.
118
Profiling is the creation of digital images that characterize individual
behavior online and in groups. Anonymous profiles identify individuals as
belonging to highly specific and targeted groups, such as 20- to 30-year-old
males, with college degrees and income greater than $30,000 a year, and
interested in high-fashion clothing (based on recent use of the search engine).
Personal profiles add a personal e-mail address, postal address, and/or phone
number to behavioral data. Deep packet inspection is another technology
where every keystroke is recorded Each Internet user's ISP level, and then use
that information to make suggestions, and target ads. While advertising networks
are limited, and even Google is not the universe of search, deep ISP-level packet
inspection actually captures the universe of all Internet users [2].
Intellectual Property Rights
119
Industrial Design Protection can be given to screen displays, graphic user
interfaces, web pages, and computer-generated graphic symbols.
Any mark that reflects the name and character of the business can be
registered as a trademark.
Online business methods can be filed for Patent Protection.
The Digital Millennium Copyright Act (DMCA) of 1998 was the first major
effort to adjust the copyright laws to the Internet age. A cyberlocker is an online
file storage service dedicated to sharing copyrighted material (often movies)
illegally [2].
Patent grants the owner an exclusive monopoly on the ideas behind an
invention for 20 years. Trademark a mark used to identify and distinguish goods
and indicate their source [2].
120
Keywording - Placing trademarked keywords on Web pages, either
visible or invisible. The permissibility of using trademarks as keywords on
search engines is also subtle and depends (1) on the extent to which such
use is considered to be a “use in commerce” and causes “initial customer
confusion” and (2) on the content of the search results.
Linking - Linking to content pages on other sites, bypassing the home
page. Linking refers to building hypertext links from one site to another
site. This is obviously a major design feature and benefit of the Web. Deep
linking involves bypassing the target site’s home page and going directly
to a content page.
Framing - Placing the content of other sites in a frame on the infringer’s
site. Framing involves displaying the content of another Web site inside
your own Web site within a frame or window. The user never leaves the
framer’s site and can be exposed to advertising while the target site’s
advertising is distorted or eliminated. Framers may or may not
acknowledge the source of the content.
Governance [2]
Governance has to do with social control: who will control e-commerce, that
elements will be controlled, and how will the controls be implemented. There are
three basic ways to achieve a rationing of bandwidth using the pricing
mechanism: cap plans (also known as “tiered plans”), usage metering, and
“highway” or “toll” pricing. Each of these plans have historical precedents in
highway, electrical, and telephone pricing.
cap pricing - Putting caps on bandwidth usage, charging more for
additional usage in tiers of prices
speed tiers - charging more for higher speed Internet service
usage-based billing - charging on the basis of metered units of Internet
service
congestion pricing - charging more for peak hour Internet service
highway (toll) pricing charging service providers like Netflix for their use of
the Internet based on their bandwidth use
121
---------End of Topic 3----------
Name:_________________________________________ Score:_______________
Section:___________ Instructor: _______________ Date:________________
122
place that allows people to seek damages that certain entities,
processes, or organizations do to them.
False 10. Downloading a music track owned by a record company without
paying for it is an example of trademark law.
Identification: Read each statement below carefully and fill in the blank(s) with the correct
answer.
Essay
Name some of the drawbacks to the five techniques used in the data mining Internet marketing.
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
123
Module 3 Project
1. Visit your Facebook page and take a look at the advertisements seen on the
right. What is being advertised, and how do you think it is relevant to your
interests or to your behavior online? Create a list of advertisements in your news
feed. Are these advertisements suitably targeted at you with regard to your
demographics, preferences and past purchases? Go to at least two websites,
and Like a product or like it. Do you see marketing messages relating to your
Likes on Facebook within the next 24 hours?
2. Create a social media marketing video of your school indicating program
offerings.
3. Create a social media marketing video of your school under the “new normal”.
4. Go to http://www.strategicbusinessinsights.com/vals/presurvey.shtml. Take the
survey to find out which category of lifestyle you fit into. Then write a one-page
paper describing how your e-commerce usage impacts your lifestyle and values.
How does your lifestyle affect your online consumer behavior?
REFERENCES:
Online Resources:
[1] R. Shahjee, "The Impact Of Electronic Commerce On Business Organization," Scholarly
Research Journal for Interdiciplinary Studies, pp. ISSN 2278-8808 Vol 4/27 p 3130,
2016.
[2] K. C. Laudon and C. G. Traver, "E-Commerce 2017 – Business, Technology, Society
(13th Edition)," [Online]. Available:
https://www.academia.edu/39286440/E_Commerce_2017_13th_Edition_by_Kenneth_C.
_Laudon_Carol_Guercio_Traver. [Accessed 1 May 2020].
[3] "5 Business Benefits of Social Commerce," Pixlee, [Online]. Available:
https://www.pixlee.com/blog/5-business-benefits-of-social-commerce/. [Accessed 2 May
2020].
[4] E. Vanhala and M. Saarikallio, "Business model elements in different types of
organization in software business," International Journal of Computer Information
Systems and Industrial Management Applications, Vols. Volume 7 ISSN 2150-7988 , no.
MIR Labs, www.mirlabs.net/ijcisim/index.html , 2016.
124
[5] C. C. Anonymous, "Dragon 1Controlled Change," [Online]. Available:
https://www.dragon1.com/terms/value-stream-definition. [Accessed 2 May 2020].
[6] "E-commerce Digest," Revenue Streams, [Online]. Available: http://www.ecommerce-
digest.com/revenue-streams.html. [Accessed 2 May 2020].
[7] "Business Says," What Are the 8 Key Elements of Business Model, [Online]. Available:
https://businessays.net/what-are-the-8-key-elements-of-business-model/. [Accessed 2
May 2020].
[8] S. Gambar, "The Eight Key Elements of a Business Model," Binus University, 29 April
2017. [Online]. Available: http://student-activity.binus.ac.id/himsisfo/2017/04/the-eight-
key-elements-of-a-business-models/. [Accessed 2 May 2020].
[9] "TutorialsPoint Simply Easy Learning," Internet Overview, [Online]. Available:
https://www.tutorialspoint.com/internet_technologies/internet_overview.htm. [Accessed 2
May 2020].
[10] "Beginner's Guide for Wordpress," wpbegginer, 23 August 2019. [Online]. Available:
https://www.wpbeginner.com/beginners-guide/beginners-guide-what-is-a-domain-name-
and-how-do-domains-work/.
[11] "TechoPedia," [Online]. Available: https://www.techopedia.com/definition/1540/mobile-e-
commerce-m-commerce. [Accessed 2 May 2020].
[12] N. M and D. Chahar, "The study of E-Commerce Security Issues and Solutions,"
International Journal of Advanced Research in Computer and Communication
Engineering, vol. Volume 2, no. Issue 7, pp. 1-12, 2013.
[13] J. Varghese, "Ecommerce Security: Importance, Issues & Protection Measures," Astra, 4
May 2020. [Online]. Available: https://www.getastra.com/blog/knowledge-
base/ecommerce-security/. [Accessed 09 May 2020].
[14] E. Turban, J. Turban, D. K. Outland, J. K. Lee, T.-P. Lian and g. C., "Electronic
Commerce 2018 A Managerial and Social Networks Perspective," Springer International
Publishing AG, 2018.
[15] C. R. Claywell, "Security Issues With Social Networking Sites," LoveToKnow, [Online].
Available:https://socialnetworking.lovetoknow.com/Security_Issues_With_Social_Networ
king_Sites. [Accessed 10 May 2020].
[16] "Kaspersky," Top 7 Mobile Security Threats in 2020, [Online]. Available:
https://www.kaspersky.com/resource-center/threats/top-seven-mobile-security-threats-
smart-phones-tablets-and-mobile-internet-devices-what-the-future-has-in-store.
[Accessed 10 May 2020].
[17] C. Evangelist, "Cloud Management Insider," Top 5 Cloud Computing Security Issues;
and How they are used by Hackers, 7 September 2019. [Online]. Available:
https://www.cloudmanagementinsider.com/top-5-cloud-computing-security-issues-and-
strategies-used-by-hackers/. [Accessed 10 May 2020].
[18] C. Serrao, "Researchgate," E-Commerce Payment Systems, [Online]. Available:
https://www.researchgate.net/publication/220709083_E-
Commerce_Payment_Systems_-_An_Overview. [Accessed 10 May 2020].
[19] "E-commerce Securities," UKY.edu, [Online]. Available:
http://www.uky.edu/~dsianita/390/390wk4.html#a1. [Accessed 07 May 2020].
125
[22] U. Matzat and C. Snijders, "Rebuilding Trust in Online Shops on Consumer Review
Sites: Sellers’ Responses to User-Generated Complaints," Journal of Computer-
Mediated Communication, vol. International Communication Association, p. 18, 2020.
[23] C. Perricone, "Everything You Need to Know About Ecommerce Marketing," [Online].
Available: https://blog.hubspot.com/marketing/ecommerce-marketing. [Accessed 5 June
2020].
[24] C. Knudsen, "Smartphones, tablets and the mobile revolution," Mobile Marketer,
[Online]. Available: https://www.mobilemarketer.com/ex/mobilemarketer/cms/opinion/
columns/14667.html. [Accessed 5 June 2020].
[25] C. BasuMallick, "What Is Display Advertising? Definition, Targeting Process,
Management, Network, Types, and Examples," 20 May 2020. [Online]. Available:
https://marketing.toolbox.com/articles/what-is-display-advertising-definition-targeting-
process-management-network-types-and-examples. [Accessed 5 June 2020].
[26] "Ethical, Social, and Political Issues in E-commerce," wisdomjobs.com, [Online].
Available: https://www.wisdomjobs.com/e-university/e-commerce-concepts-tutorial-7/
ethical-social-and-political-issues-in-ecommerce-11871.html. [Accessed 5 June 2020].
[27] A. Muneer, S. Razzaq and Z. Farooq, "Data Privacy Issues and Possible Solutions in E-
commerce," Journal of Accounting & Marketing , Vols. DOI: 10.4172/2168-
9601.1000294, pp. 1-3, 2018.
[28] "Intellectual Property Rights in E-Commerce," KIPG, [Online]. Available:
https://www.kashishworld.com/blog/intellectual-property-rights-in-e-commerce/.
[Accessed 5 June 2020].
[29] "E-commerce Securities," UKY.edu, [Online]. Available:
http://www.uky.edu/~dsianita/390/390wk4.html#a1. [Accessed 07 May 2020].
Wi-Max to LTE
https://www.youtube.com/watch?v=HyRPloseTUc
Suggested Readings:
126
MODULE 1
MODULE 2
MODULE 3
How Netflix uses Social Media to Dominate the Online Streaming Industry
https://www.8ways.ch/en/digital-news/how-netflix-uses-social-media-dominate-online-
streaming-industry
127