Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 27

Electronic & Mobile Commerce

Advancement in Technology

E-commerce: An Introduction

E-commerce provides global reach which is its greatest advantage. There is no restriction by geographical boundaries what so ever. Time restrictions too can be overcome with the help of e-commerce. Hence it gives people an opportunity to look for the best deals around the globe at their convenience. E Commerce reduces the costs of a business by reducing the costs associated with marketing, customer care and inventory management.This Reduction in cost means more profit and better customer care.

How Ecommerce Websites Work

Most ecommerce websites consist of two halves the public side and the admin side. The public side is what your customers see and where they can view and purchase your products. The admin side is only seen by you, the store owner. This is where you check your orders, add or remove products, change prices etc. A user name and password is required to access the admin side of your ecommerce shop and only you know what these are, so only you can make any changes or see customer and order information.

How Ecommerce Works For the Customers

The customers will go to the website by either typing in the website address or searching for products on Google and other search engines. Once on the website they are able to browse through the products by viewing pictures ,details etc. When the Customers see a product they want to purchase they add it to their basket usually done by clicking a button next to the product and once they have chosen everything they want, they pay for their products by using a credit or debit card. Some of the main benefits of ecommerce for your customers are: The customers can shop from the comfort of their own home 24 hours a day. The customers can view all the products, pictures and details in their own time

Threats to E-Commerce

Threats to e-commerce systems can be either malicious or accidental. The procedures and controls must be put in place to protect website from both.

Threats

Malicious

Accidental

Money Theft

Identity Theft

Threats to the System

Human Errors

Lack of Proper Knowledge

Lack of Proper Infrastructure

Malicious Threats

Types of Threats

Hackers attempting to penetrate a system to read or alter sensitive data. Burglars stealing a server or laptop that has unprotected sensitive data on its disk Imposters posing as legitimate users and even creating a website similar to yours Authorised users downloading a webpage or receiving an email with hidden active content that attacks your systems or sends sensitive information to unauthorised people Human Errors Lack of knowledge Lack of proper infrastructure

Accidental Threats

Solutions to threats
From A Wireless Perspective: Authentication-The Use of Secure Sockets Layer Encryption-The Use of Secure Shell Tunneling-The Use of Virtual Private Networks From A Hard Wired Perspective: The Use of Network Intrusion Devices The Use of Firewalls The Use of Routers

Mobile Commerce: Overview


Mobile commerce (M-commerce) is a type of ecommerce conducted through mobile devices such as mobile phones, personal digital assistants (PDAs,Tablets) and other devices with a wireless connection. It is quite different from traditional of Ecommerce.

Mobile commerce from the Customers point of view

The customer wants to access information, goods and services any time and in any place on his mobile device. He can use his mobile device to purchase tickets for events or public transport, pay for parking, download content and even order books and CDs. He should be offered appropriate payment methods. They can range from secure mobile micropayment to service subscriptions.

Mobile commerce from the Providers point of view

The future development of the mobile telecommunication sector is heading more and more towards value-added services. Analysts forecast that soon half of mobile operators revenue will be earned through mobile commerce.

Consequently operators as well as third party providers will focus on value-added-services. To enable mobile services, providers with expertise on different sectors will have to cooperate.
Innovative service scenarios will be needed that meet the customers expectations and business models that satisfy all partners involved.

M-Commerce Terminology

Generations 1G: 1979-1992 wireless technology 2G: current wireless technology; mainly accommodates text 2.5G: interim technology accommodates graphics 3G: 3rd generation technology (2001-2005) supports rich media (video clips) 4G: will provide faster multimedia display (2006-2010)

Terminology and Standards

GPS: Satellite-based Global Positioning System PDA: Personal Digital Assistanthandheld wireless computer SMS: Short Message Service EMS: Enhanced Messaging Service MMS: Multimedia Messaging Service WAP: Wireless Application Protocol SmartphonesInternet-enabled cell phones with attached applications

Attributes of M-Commerce and Its Economic Advantages


Mobilityusers carry cell phones or other mobile devices Broad reachpeople can be reached at any time Ubiquityeasier information access in real-time Conveniencedevices that store data and have Internet, intranet, extranet connections Instant connectivityeasy and quick connection to Internet, intranets, other mobile devices, databases Personalizationpreparation of information for individual consumers Localization of products and servicesknowing where the user is located at any given time and match service to them

Mobile Service Applications


Financial Services. Entertainment. Shopping.

Information Services.
Payment. Advertising. And more ...

Early content and applications have all been geared around information delivery but as time moves on the accent will be on revenue generation.
Entertainment Music Games Graphics Video Communications Short Messaging Multimedia Messaging Unified Messaging e-mail Chatrooms Video - conferencing

M- commerce
Transactions Banking Broking Shopping Auctions Betting Booking & reservations Mobile wallet Mobile purse Information News City guides Directory Services Maps Traffic and weather Corporate information Market data

Classes of M-Commerce Applications

Mobile Payment for M-Commerce


Mobile Payment can be offered as a stand-alone service.

Mobile Payment could also be an important enabling service for other m-commerce services (e.g. mobile ticketing, shopping, gambling) : It could improve user acceptance by making the services more secure and user-friendly. In many cases offering mobile payment methods is the only chance the service providers have to gain revenue from an m-commerce service.

Mobile Payment
Customer requirements: a larger selection of merchants with whom they can trade a more consistent payment interface when making the purchase with multiple payment schemes, like: Credit Card payment Bank Account/Debit Card Payment Merchant benefits: brands to offer a wider variety of payment Easy-to-use payment interface development Bank and financial institution benefits to offer a consistent payment interface to consumer and merchants

Payment via Internet Payment Provider


WAP GW/Proxy
Browsing (negotiation)
Merchant

MeP
User
GSM Security SMSC
SSL tunnel

IPP

Mobile Wallet CC/Bank

Payment via integrated Payment Server


WAP GW/Proxy
Browsing (negotiation)

Mobile Commerce Server


User
GSM Security
SMSC
SSL tunnel ISO8583 Based

Merchant

CP
CC/Bank

VPP IF Mobile Wallet

Voice PrePaid

Usability Problem small size of mobile devices (screens, keyboards, etc) limited storage capacity of devices hard to browse sites Technical Limitations lack of a standardized security protocol insufficient bandwidth 3G liscensesTechnical Limitations transmission and power consumption limitations poor reception in tunnels and certain buildings multipath interference, weather, and terrain problems and distance-limited connections WAP Limitations Speed Cost Accessibility

Limitations of M-Commerce

Platform Risks

Without a secure OS, achieving security on mobile devices is almost impossible Learned lessons:

Memory protection of processes Protected kernel rings File access control Authentication of principles to resources Differentiated user and process privileges Sandboxes for untrusted code Biometric authentication

New Security Risks in M-Commerce


Abuse of cooperative nature of ad-hoc networks
An adversary that compromises one node can disseminate false routing information.

Malicious domains
A single malicious domain can compromise devices by downloading malicious code

Roaming
Users roam among non-trustworthy domains

New Security Risks


Launching attacks from mobile devices
With mobility, it is difficult to identify attackers

Loss or theft of device


More private information than desktop computers Security keys might have been saved on the device Access to corporate systems

Bluetooth provides security at the lower layers only: a stolen device can still be trusted

New Privacy Risks


Monitoring users private information
Offline telemarketing Who is going to read the legal jargon Value added services based on location awareness (LocationBased Services)

Concluion

Mobile commerce (m-commerce) is a natural extension of electronic commerce (e-Commerce) and represents a new channel through which users can interact wirelessly with other people or businesses. This provides m-Consumers with significant convenience and flexibility through an anytime/anywhere mode of interaction. Businesses hoping to take advantage of this potentially lucrative market must strive to fully understand the concerns of the m-Consumer regarding privacy and security, so as not to repeat the same mistakes that led to the slow down in e-Commerce success. Privacy, security, and legislation combined with education can facilitate strong privacy protection practices, maintaining the consumers interest in mind while benefiting all m-Commerce market players.

You might also like