Professional Documents
Culture Documents
INSPIRED BY LIFE
Manipal
Board of Studies
Dean Pankaj Khanna
SMU DDE Director
HR, Fidelity Mutual Fund
Chairman
HOD Management Studies Shankar Jagannathan
SMU DDE Former Group Treasurer
Wipro Technologies Limited
Additional Registrar
SMU DDE Abraham Mathew
Chief Financial Officer
Assistant Registrar Infosys BPO
Student Evaluation Examinations Branch
SMU DDE Sadhna Dash
Senior HR Consultant
Dr T.V. Narasimha Rao Bangalore
Adjunct Faculty and Advisor
SMU DDE
Prof. K. V. Varambally
Director
Manipal Institute of Management, Manipal
All rights reserved. No part of this publication which is material protected by this copyright notice may
be reproduced or transmitted or utilized or stored in any form or by any means now known or hereinafter
Authors Profile
Pushpa Singh is an M.Tech. (C.S.E) from G.B. Technical University, Lucknow and an
M.C.A. from G.L.A.I.T.M. (Mathura). She is presently working with Accurate Institute of
Management & Technology, Greater Noida, as an Assistant Professor in the IT Department.
Previously she has been associated with IEC College of Engineering and Technology,
Greater Noida, as a Sr. Lecturer in the MCA department and has worked in BIT (Bhagwant
Institute of Technology), Muzzfarnagar, as a lecturer in the IT department. She has various
international and national journals to her name. She has co-authored books on Modeling
and Simulation, E-business Applications and Computer Application in Management for
various publishing houses.
Narendra Singh is an M.Tech. (C.S.) from Rajasthan Vidhyapeeth University, and an MBA
from Baran Institute of Management, Mahamaya Technical University. He has taught subjects
like Computer Application in Management/Computer Fundamental, Management Information
System, E-Commerce and Computer Network & Internet Technology. He has worked as
Sr. Lecturer with SRIRAM Institute of Management & Technology, Greater Noida and with
United College of Engineering & Research, Greater Noida, as Lecturer. He has co-authored
books on Modeling and Simulation, E-business Applications and Computer Application in
Management for various publishing houses. He has presented research papers on titles
like Green IT: A solution of emerging IT problem, Regular User Priority Scheme for
Performance Improvement in 4G Network, Weightage Factor Based Scheme for
Performance Improvement in Ad Hoc Networks etc.
Peer Reviewers Profile
Dr Jai Raj Nair holds a Bachelors degree in Architecture from Bengal Engineering College
(University of Calcutta), PGDBM from IIM, Calcutta and Ph.D from Symbiosis International
University, Pune. He has also successfully completed a Cisco-certified course titled Building
the Internet Corporation. Dr Nair worked for 8.5 years in the corporate world in the domain
of Engineering Consultancy, Software Development, and Business Development in reputed
organizations like Development Consultants Ltd. (Delhi & Calcutta), Data-Core (India) Ltd.
(Calcutta) and Kirloskar Computer Services Ltd.(Bangalore) before moving over to the
academic world.
Dr Nair has been associated with reputed Institutions like SIT, Tumkur, M P Birla Institute
of Management, Bangalore and Symbiosis Institute of Business Management, Bangalore
as faculty, handling Systems and Marketing Courses. Besides, he has been a visiting
faculty at several B-Schools over the past eleven years. He was also successfully delivered
MDP programs at top IT/ITES companies.
Dr Nair is a voracious reader and an avid writer. He has presented papers at National
and Regional Conferences. Three of his papers were selected for International Conferences
conducted by universities in Thailand, Italy, and Greece. He has also published research
papers, articles et al in management journals of repute. Furthermore, Dr Nair has also
written a chapter in a textbook on Retail Management. His research interests include
software engineering, e-retailing, supply chain management and retro-logistics, business
process reengineering, technology-enabled retailing, to name a few.
In House Content Review Team
BBA 401
E-Commerce
Contents
Unit 1
E-Commerce Framework 119
Unit 2
Network Infrastructure for E-Commerce - I 2136
Unit 3
Network Infrastructure for E-Commerce - II 3758
Unit 4
E-Commerce: Requirements and Architecture 5975
Unit 5
E-commerce Infrastructure 7798
Unit 6
Business Models 99112
Unit 7
Security in Electronic Business 113132
Unit 8
Encryption 133147
Unit 9
E-Payment Systems 149170
E-Commerce Contents
Sikkim Manipal University Page No. (vi)
Unit 10
Enabling Technology of World Wide Web 171192
Unit 11
E-Marketing 193211
Unit 12
Policy and Implementation 213230
Unit 13
Mobile Commerce 231250
Unit 14
EDI, E-CRM and E-SCM 251266
BBA 401
E-Commerce
Course Description
Course Objectives
E-commerce is the use of the Internet and the Web to conduct business
transactions. It involves digitally enabled commercial transactions between
organizations and individuals. The terms e-commerce and e-business are used
interchangeably. E-business is the digital enablement of transactions and
processes within a firm and therefore does not include any exchange in value.
E-business turns into e-commerce when an exchange of value occurs across
firm boundaries. Therefore, e-commerce and e-business intersect at the business
firm boundary at the point where internal business systems link up with suppliers.
The course E-Commerce of BBA 4th Semester helps students to gain the
required knowledge of E-Commerce.
After studying this subject, you should be able to:
Explain the working of e-commerce
Explain the working of the TCP/IP reference model
Explain e-commerce infrastructure
Identify the evolution of Internet business models
Unit 14 EDI, E-CRM and E-SCM: Analyses the importance of EDI, E-CRM
and E-SCM in m-commerce.
1.1 Introduction
Today, if you suddenly wish to own a copy of your favourite novel, you need not
plan a trip to the nearest book store and be disappointed if a copy is not available.
Nor do you have to make repeated trips to check whether the store has been
able to obtain one for you. All you need to do is, switch on your computer, log on
to the Web and visit one of the numerous online bookstores such as
Amazon.com, SimplyBooks.in, uRead.com, eBay India and Flipkart.com. You
can select the books you want and have them delivered at your doorstep without
moving out of your house. That is how easy electronic business or e-commerce
has made shopping for you today. It is not just books that can be bought in this
manner. Everything is bought, sold, hired, exchanged or traded online today
from books, toys, garments and electronic appliances to cakes, flowers and
gifts.
E-Commerce Unit 1
Sikkim Manipal University Page No. 2
Amazon.com, Inc. is a multinational electronic commerce company headquartered
in Seattle, Washington, United States. It is the world's largest online retailer. Amazon
has separate websites for the following countries: United States, Canada, United
Kingdom, Germany, France, Italy, Spain, Japan, and China. It may also launch
websites in Netherlands, Sweden, and India. It also provides international shipping
to certain countries for some of its products.
Objectives
After studying this unit, you should be able to:
Identify the origin and history of e-commerce
Categorize the e-commerce opportunities for businesses
Demonstrate the working of e-commerce
Differentiate between e-commerce and the traditional system of business
Classify the advantages and disadvantages of e-commerce
Summarize the goals and requirements of e-commerce
1.2 Definition of E-Commerce
E-commerce is an advanced technology related to commerce and the electronic
media, the computer in particular. It is first important to understand the term
business, which refers to the exchange of goods, items or commodities and
services or applications for money.
A popular definition of business is as follows:
Business is the exchange or the buying and selling of entities (goods or
commodities) on a very large scale involving transportation from one place to
another.
In e-commerce, there is a need for computers and Internet applications
to manage and organize products and services. This concept of using the Internet
to connect with customers, business partners and distributors for business
purposesas in the case of e-mailis known as e-commerce or electronic
business.
The terms e-commerce and e-business are often used interchangeably.
E-commerce deals with the buying and selling of information, products
and services through the computer network.
E-commerce is defined as a business activity which uses an electronic
medium. It also refers to the buying or selling of goods and services without
visiting a store.
E-commerce involves activities, such as the delivery of information,
products, services and payment through the electronic medium.
E-Commerce Unit 1
Sikkim Manipal University Page No. 4
Only large trading partners could afford to participate in the benefits of these
paper-free exchanges, because the translation programmes that one trading
partner wrote generally would not work for other trading partners.
Several freight and shipping companies, in 1968, joined hands to form
the Transportation Data Coordinating Committee (TDCC), which was charged
with exploring paths to minimize the load that shippers and carriers faced. The
shipper could electronically transmit the computer file to any freight company
that had adopted the TDCC format. Therefore, they were saved from the printing
and handling of forms, and also from entering the data twice and having to
worry about error-correction procedures.
During the 1970s, the introduction of Electronic Data Interchange (EDI)
between banks over a secured private network changed the financial market.
In 1973, the ANSI (American National Standards Institute) committee developed
a uniform EDI standard. This committee and its subcommittees included experts
from the information technology background from over 800 organizations. During
the late 1970s and early 1980s, e-commerce became widespread within
companies in the form of electronic messaging technologies, i.e., EDI and email.
Combining a range of processes, such as EDI, electronic mail (e-mail),
WWW and Internet applications, e-commerce provides ways to exchange
information between individuals, companies and customers and most important
of them all, between computers. The core media of e-commerce remains the
Internet and the WWW.
E-commerce is the paperless exchange of information in a business with
the use of EDI, electronic bulletin board, e-mail and other technologies. Ecommerce
helps to automate processes and transactions that are manually
done on paper. It assists companies to change the way they operate and become
completely e-environment friendly.
Electronic commerce has become very popular in the past few years.
Table 1.1 Total E-Commerce Transaction in India
Year Total e-commerce transaction
1998-1999 ` 131 crore
1999-2000 ` 450 crore
2000-2002 ` 1400 crore
2006 (Expected) ` 2300 crore
E-Commerce Unit 1
Sikkim Manipal University Page No. 6
Self-Assessment Questions
1. State whether the following statements are true or false.
(a) The term e-commerce was coined by IBM.
(b) The first e-commerce transaction was executed between the US
and the European Union in 1993.
(c) A uniform EDI standard was developed in 1973 by IBM.
2. Fill in the blanks with appropriate words.
1995 : There were a total of 6.6 million hosts or computers on the Internet.
July 1997 : 1.3 million domain names were registered.
Dec. 1997 : 22 million servers, 40 million users on the WWW.
2000 : 110 million users and 72 million domain names.
2003 : 802.2 million users and 233 hosts.
Table 1.2 Growth of the Internet in India
Years Internet Subscribers Internet Users
1997 25 45,000
1998 250 2,00,000
1999 359 100000
2000 650 2000000
2001 1130 6668000
2002 1763 10684000
2003 3661 29000000
2004 4403 31723000
2005 6674 52875000
Internet usage in India
10000
20000
30000
40000
50000
60000
1999 2000 2001 2002 2003 2004 2005
Subscribers
Users
E-Commerce Unit 1
Sikkim Manipal University Page No. 8
Table 1.3 Growth in the Number of Hosts over the years
Year Number of hosts advertised in the DNS (in ` crore)
1993 1313000
1994 2217000
1995 4852000
1996 9472000
1997 16146000
1998 29670000
1999 43230000
2000 72398092
2001 109574429
2002 147344723
2003 171638297
2004 233101481
Activity 1
Make a list of businesses (other than those mentioned in the unit) that
depend on e-commerce services to thrive in the market.
Self-Assessment Questions
3. Fill in the blanks with the appropriate word.
(a) E-commerce is defined as a business activity that uses ____ medium.
(b) Domain Name service was introduced in______.
(c) In e-commerce there is reduction of data error as it does not involve
data at_____.
E-Commerce Unit 1
Sikkim Manipal University Page No. 11
Self-Assessment Questions
E-commerce primarily ensures that costs are reduced, product cycle time
is reduced, customer response is speeded up and service quality is improved.
Therefore, it will not be wrong to say that the main goals of e-commerce (Figure
1.3) are:
To identify and fulfil the rapidly changing needs of consumers,
merchants, organizations, etc.
To constantly improve the quality of goods and services with the
feedback from all stakeholders
To increase the turnover by widening the market and the speed of
services
To bring down costs through speed and accuracy of information
All these goals can be achieved only if the website is user-friendly with a
simple design. Visitors should be able to navigate through it properly. In addition,
the business needs to be promoted well establishing a good connect with the
customers.
It is important to understand what the companys e-commerce expectations
are before plunging into implementing e-commerce solutions. Once the
expectations are known, the company can begin to plan its e-commerce strategy.
A company may benefit by conducting an e-commerce strategy project to plan
its e-commerce future. E-commerce is a way to facilitate improvements in a
E-Commerce Unit 1
Sikkim Manipal University Page No. 16
Self-Assessment Questions
7. Fill in the blanks with appropriate words.
1.11 Summary
Let us recapitulate the important concepts discussed in this unit:
E-commerce deals with the selling and buying of products and services
using the computer network.
IBM introduced the term e-commerce in 1972 and the first transaction
was conducted between the US and the European Union in 1993.
E-commerce enables exchange of information between two or more parties
through the use of a range of processes such as EDI, e-mail, WWW and
the Internet.
Tourism and travel sector, banking sector, health care sector and financial
sector derive many benefits through e-commerce.
E-commerce differs from traditional business practices in terms of
reduction of error, reduction of cost, reduction of paperwork and reduction
of process cycle time.
Some of the advantages of e-commerce are that the customers can make
transactions at any time of the day or night, better service, absence of
mediators and time saving.
E-commerce also suffers from disadvantages. This is because it is not
suitable for all businesses, especially small businesses and also it is
necessary to fulfil many legal formalities at the time of implementation.
1.12 Glossary
Business: The exchange of goods or services for money
E-commerce: Business activity that uses an electronic medium
ANSI: American National Standards Institute, that developed a uniform
EDI standard
Client: A person who uses the services or advice of a professional person
or organization
Time-saving: A device or service that reduces the amount of time it takes
to do something
E-Commerce Unit 1
Sikkim Manipal University Page No. 18
1.14 Answers
Answers to Self-Assessment Questions
1. (a) True; (b) True; (c) False
2. (a) Electronic; (b) Intranet; Web
3. (a) an electronic; (b)1984; (c) multipoints
4. (a) True; (b) False
5. (a) Authentication; (b) integrity
6. (a) True; (b) False
7. (a) Speed; (b) Expectation
8. (a) False; (b) True
E-Commerce Unit 1
Sikkim Manipal University Page No. 19
References
1. Turban, Efraim, Jae Kuy Lee and Michael Chung. Electronic Commerce:
A Managerial Perspective. Prentice-Hall, 1999.
2. Whitley, David. E-Commerce: Strategy, Technologies and Applications.
Tata McGraw-Hill, 1998.
2.1 Introduction
In the previous unit, you learnt about the definition and origin of e-commerce,
the history of the Internet, and the difference between e-commerce and traditional
business, among other topics. In this unit, you will be learning about the network
infrastructure for e-commerce, including topics such as Local Area Network
(LAN), Ethernet, Wide Area Network (WAN), the Internet, TCP/IP Reference
Model, Domain Names, and Hyper Text Markup Language (HTML).
You may know by now that that all the services of e-commerce work on
the Internet which is known as the network of networks. Computer network is
a collection of more than two computers, which are connected together to share
information and computer peripherals. The key word in the definition is sharing,
the main function of computer networking. The ability to share information
efficiently is what gives computer networking its power and appeal. Through
the efforts of all major factors involvedthe sharing of time, talent, and
resourcethe primary goal of computer networking is to reduce resources.
E-Commerce Unit 2
Sikkim Manipal University Page No. 22
Objectives
After studying this unit, you should be able to:
Give examples of the importance of Local Area Network (LAN)
Generalize the workings of Ethernet (IEEE 802.3)
Demonstrate the working of Wide Area Network (WAN)
Summarize the importance of the Internet
Evaluate the TCP/IP Reference Model
Discuss the functioning of domain names
Summarize the highlights of Hyper Text Markup Language (HTML)
2.2 Local Area Network (LAN)
A LAN (refer to Figure 2.1) covers only a limited geographically area ranging
from 0 to 2 Km, such as organizations, home, buildings. In a local area network,
nodes are connected in a network and operating systems are installed on them.
In this type of networking, generally, Cat 5 cable (8 wires) is used, meaning the
connection is done through wire. However, there is another option of connecting
LAN, which is WLAN, where connection is possible without wires. LAN stores
the system and application software that can be shared by the computers to
other computers and peripherals. Most LANs connect nodes and computers.
They have their own CPU for executing programs. The importance of LAN in an
organization is very high because users can easily communicate to each other
through LAN and they can share resources such as printers, memories, database
and other peripherals of network.
Network
E-Commerce Unit 2
Sikkim Manipal University Page No. 23
SOHO
Customer
Self-Assessment Questions
1. Fill in the blanks with appropriate words.
(a) With ______ it is possible for the connections to take place without
wires.
(b) Metropolitan Area Network connects the computer system, other
resources and some times local area network to a range from 5 to
______ km.
E-Commerce Unit 2
Sikkim Manipal University Page No. 24
Self-Assessment Questions
2. State whether the following statements are true or false.
(a) IEEE 802.3 is covered by small area (Local Area Network).
(b) The main disadvantages of the half-duplex are effectiveness and
space limitation.
Uses moderately
expensive
equipment
Uses most expensive
equipment
Self-Assessment Questions
3. State whether the following statements are true or false.
(a) With MAN, the error rates are highest.
(b) LAN has low transmission speed.
Self-Assessment Questions
4. Fill in the blanks with appropriate words.
(a) When two computers are connected over the ________, they can
exchange all types of information.
(b) The high-speed, fibre-optic cables (called backbones) through which
the bulk of the Internet data travels are owned by __________
companies.
to help describe its components and functions. This model goes by different
names, including the TCP/IP model, the DARPA model (after the agency that
was largely responsible for developing TCP/IP) and the DOD model (after the
United States Department of Defense, the D in DARPA).
In spite of the model you use to represent the function of a networkand
regardless of what you call that modelthe functions that the model represents
E-Commerce Unit 2
Sikkim Manipal University Page No. 27
are pretty much the same. This means that the TCP/IP and the OSI models are
relatively same in nature even if they do not carve up the network functionality
pie in precisely the same way. There is a fairly natural correspondence between
the TCP/IP and OSI layers; it just isnt always a one-to-one relationship. Since
the OSI model is used so widely, it is common to explain the TCP/IP architecture
both in terms of the TCP/IP layers and the corresponding OSI layers.
Client Gateway/(Internet) Host
Application layer
Presentation layer
Session layer
Transport layer
Network layer
Data link layer
Physical layer
Application layer
Presentation layer
Session layer
Transport layer
Network layer
Data link layer
Physical layer
Figure
Gateway routers are used to connect dissimilar LANs and perform all the
functions of bridges and routers. It operates as all seven layers of the
OSI Reference Model.
Gateways provide full protocol conversion from one proprietary LAN
technology to another.
Gateway uses higher layers of the OSI model, perhaps through layer 7,
the application layer.
1. Application
2. Transport
3. Internet
Represents data to the user plus encoding
and dialog control.
Support communication between diverse
devices across diverse networks (using
TCP/IP).
Determines the best path through the
Network ( using gateway).
Controls the hardware devices and media
4. Network Layer that make up the network .
Figure
2.5 TCP/IP Reference Model for Communication
E-Commerce Unit 2
Sikkim Manipal University Page No. 28
The TCP/IP model (refer to Figure 2.5) has four layers that match six of
the seven layers in the OSI Reference Model. The TCP/IP model does not
address the physical layer, which is where network component and hardware
devices reside. The next three layersnetwork interface, the Internet and (hosttohost) transportcorrespond to layers 2, 3 and 4 of the OSI model. The TCP/
IP application layer conceptually blurs the top three OSI layers. It is important
to note that some people consider certain aspects of the OSI session layer to
be possibly part of the TCP/IP host-to-host transport layer.
Self-Assessment Questions
5. State whether the following statements are true or false.
(a) The builder of the TCP/IP protocol group created their own
architectural model to help describe its components and functions.
(b) The TCP/IP model has two layers that match six of the seven layers
in the OSI Reference Model.
Self-Assessment Questions
</body>
</html>
< HTML>:This tag defines the top most elements, identifying it as an HTML
document.
<Head>:This tag contains information about your HTML file.
<Title>:This tag is nested within the head tag. It identifies your page to the
rest of the world. Output of tag is displayed on your browsers title bar but does
not appear as part of the page.
<body>:This is a body part of your HTML web page. Within this tag all the
various tag is used. Every tag has prespecified attributes and there possible
values.
E-Commerce Unit 2
Sikkim Manipal University Page No. 30
This tag offers some movement from up, down, left, right of given text:
<marquee direction=up bgColor=red behavior=scroll> MY Moving Text
is displayed here </marquee>
E-Commerce Unit 2
Sikkim Manipal University Page No. 31
Table tag:
Page layout on the web has to be set by using tables because HTML has no
method to set margin or columns.
Example:
<tableborder=1"cellspacing=6"cellpadding=6"
width=80%>
<tr><th>Rollno</th>
<th>Name</th>
</tr>
<tr><td>34</td>
<td>Pooja</td>
</tr>
<tr><td>35</td>
<td>Priya</td>
</tr>
</table>
Form tag:
Form tag is an important element for doing online business. Forms are necessary
for gathering user information, conducting surveys, or even providing interactive
services. Forms are supported by both client and server for successful
implementation. A number of features are available for building forms, including
text boxes, check boxes, radio buttons, submit buttons and text area. A user
can enter text, selects items from a list, check boxes, and then submit the
information to the server. A program on the server then interprets the data acts
on it appropriately, either by returning information in hypertext form, downloading
a file, or electronically notifying the company of your order.
Item Name:
Item ID:
Number of Quantity:
(Submit)
E-Commerce Unit 2
Sikkim Manipal University Page No. 32
Self-Assessment Questions
7. State whether the following statements are true or false.
(a) HTML is a method where ordinary text can be converted into
hypertext.
(b) The important aspect of web server development is application
gateway, more specifically, CGI.
E-Commerce Unit 2
Sikkim Manipal University Page No. 33
<!printamessage>
Itisgoodtobehome.
</body>
</html>
On screen: It is good to be home.
HTML Text exercise
3. Prints the name Vijay in Tahoma font.
Solution:
<html>
<body>
<fontface=Tahoma>Vijay</font>
E-Commerce Unit 2
Sikkim Manipal University Page No. 34
</body>
</html>
On screen: Vijay
Would the World Wide Web function without HTML? Research the Internet
and give reasons to support your answer.
2.10 Summary
Let us recapitulate the important concepts discussed in this unit:
Computer network is a collection of more than two computers, which are
connected together to share information and computer peripherals.
A LAN covers only a limited geographically area ranging from 0 to 2 Km,
such as organizations, home, buildings.
MAN occupies a larger area compared to LAN, such as a town or a
university/organization premises (which is spread between 05 km to 20
km) is termed as Metropolitan Area Network or MAN.
IEEE 802.3 is covered by small area (Local Area Network). It refers to the
family of Ethernet Protocols. We have two methods of process in Ethernet
standard: first is half-duplex and second is a full-duplex mode.
A Wide Area Network (WAN) crosses almost whole geographic areas,
such as nations. Communication medium of this networks are telephone
line, satellite links, microwaves, etc.
The Internet is the network of networks and a means of connecting a
computer or network to any other computer or network in world through
specific network components and servers.
The builder of the TCP/IP protocol group created their own architectural
model to help describe its components and functions. This model goes
by different names, including the TCP/IP model, the DARPA model (after
the agency that was largely responsible for developing TCP/IP) and the
DOD model (after the United States Department of Defense, the D in
DARPA).
HTML is a method where ordinary text can be converted into hypertext. It
2.11 Glossary
Computer network: Collection of more than two computers, which are
connected together to share information and computer peripherals
LAN: Supplies networking capability to a group of computers in close
proximity to each other such as in an office building, a school, or a home
MAN: Metropolitan Area Network; covers a wider area than LAN
WAN: Network that crosses almost whole geographic area, such as nation
and all over world; WANs often connect n number of smaller networks
The Internet: Network of networks and a means of connecting a computer
or network to any other computer or network in the world through specific
network components and servers
HTML: Method where ordinary text can be converted into hypertext; it is
a set of special codes included to control the layout and appearance of
the text
Protocol: A set of rules that control the way data is sent between
computers
Architecture: The design and structure of a computer system
2.13 Answers
Answers to Self-Assessment Questions
1. (a) WLAN; (b) 50
2. (a) True; (b) True
3. (a) False; (b) False
4. (a) Internet; (b) Telephone
5. (a) True; (b) False
6. (a) Two; (b) Edu
7. (a) True; (b) True
References
1. Turban, Efraim, Jae Kuy Lee and Michael Chung. 1999. Electronic
Commerce: A Managerial Perspective. Prentice Hall.
2. Whitley, David. 1998. E-commerce: Strategy, Technologies and
Applications. Tata McGraw-Hill.
3.1 Introduction
In the previous unit, you learnt about the network infrastructure for e-commerce,
including topics such as Local Area Network (LAN), Ethernet, Wide Area Network
(WAN), the Internet, TCP/IP Reference Model, Domain Names, and Hyper Text
Markup Language (HTML).
In this unit, you will learn about Common Gateway Interface (CGI), which
is a process used to share the data between the web server and the web browser.
CGI is a set of standards where a program can send data back to the web
server where it can be processed. Also discussed at length is broadband
telecommunication, which makes use of a digital or analogue signal to relay
voice and data. In most applications, the term is associated with systems offering
fast transmission of data, either using latest digital technology or an analogue
system with a wider bandwidth. There are numerous types of broadband
Objectives
After studying this unit, you should be able to:
Evaluate the importance of common gateway interface
Define and give examples of multimedia objects
Demonstrate the working of network access equipment
Summarize the functioning of network cables
Discuss the importance of broadband telecommunication
3.2 Common Gateway Interface
As you traverse the vast frontier of the WWW, you could come across documents
that make you wonder, How did they do this? These documents could consist
of, among other things, forms that put for advice or registration information,
image maps that allow you to click on different parts of the image, counters that
present the number of users that accessed the document, and utilities that
allow you to search databases for specific information. In most cases, youll find
that these properties were done using the Common Gateway Interface,
commonly known as CGI.
One of the Internets worst-kept secrets is that CGI is astoundingly simple.
That is, its trivial in design, and anyone with an iota of programming experience
can write rudimentary scripts that work. Its only when your requirements are
more demanding that you have to master the more complex workings of the
Web.
CGI is the part of the Web server that can communicate with other different
programs running on the server. With CGI, the Web server can call up a program,
while passing user-specific data to the program (such as what host the user is
connecting from, or input the user has supplied using HTML form syntax). The
program then processes that data and the server passes the programs response
back to the Web browser.
CGI is not an enchantment; its just programming with some particular
types of input and a few strict rules on program output. Everything in between is
just programming. Of course, there are special techniques that are particular to
CGI. But underlying it all is the simple model as shown in Figure 3.1
E-Commerce Unit 3
Sikkim Manipal University Page No. 39
Web
Browser
Information
HTTP
Server
3. Gateway
Script of
Program
1. Form/Query 2. CGI
4. HTML 4. HTML
Self-Assessment Questions
1. State whether the following statements are true or false.
(a) CGI is a set of standards where a program can send data back to
the web server where it can be processed.
(b) One of the Internets worst-kept secrets is that CGI is astoundingly
complex.
Multimedia objects are files that hold images, audio recordings, video
clips and scanned documents, etc., which relate to some fact within our
genealogical data. A multimedia object can be linked with several entities
(animals, person, family, source ) and vice versa.
In other words multimedia is media and content that uses a combination
of different content forms. The term can be used as a noun (a medium
E-Commerce Unit 3
Sikkim Manipal University Page No. 40
Self-Assessment Questions
2. Fill in the blanks with appropriate words.
(a) Multimedia is media and content that uses a combination of different
______forms.
(b) Online multimedia is increasingly becoming _________ and
_________.
Hubs: All networks (except those using coaxial cable) require a central location
to bring media segments together. These central locations are called Hubs.
Hubs are special repeaters that overcome the electromechanical limitations of
a media signal path.
There are three types of Hubs:
1. Passive Hub: A passive hub simply combines the signals of network
segments. There is no signal regeneration.
2. Active Hub: Active hub is that which regenerates of amplifies the
signals.
3. Intelligent Hub: Intelligent hub regenerates the signal and performs
some network management and intelligent path selection.
Switches: It supports transmitting receiving and controlling traffic with other
Network Interface Card (NIC): The primary function of NIC is to allow the
computer to communicate on the network. It supports transmitting, receiving
and controlling traffic with other computer on the network. NIC operates at
physical layer of OSI model. MAC address is hard coded onto the card by
manufacturer. This MAC address is globally unique and is of 48 bits. The MAC
address provides a way to distinguish one NIC from other NIC. These MAC
addresses are also called physical address.
Bridge: A bridge (refer to Figure 3.3) is a device that is attached to two or more
LANs to create an extended LAN. The LANs to be interconnected may be similar
or dissimilar. As each type of LAN has different MAC frame structure, the bridge
takes care of these differences by reformatting the frames.
Manufacturing Database Server
Bridge
Corporate LAN Segment Manufacturing Segment
Figure 3.3 Bridge
E-Commerce Unit 3
Sikkim Manipal University Page No. 43
Router: A router (refer to Figure 3.4) operates at the third network layer of ISOOSI
model. It connects more than two different types of network. Router
determines the short path between source and destination for data transmission.
Windows
Small Business
Server
Client computers
Internet
Router device
with an assigned
IP address
Switch
or hub
Figure 3.4 Router
Table 3.1 shows the similarities and differences between a router and a
bridge.
Table 3.1 Similarities and Differences between a Router and a Bridge
Router Bridge
1 Router operates network layer of
OSI model.
Bridge operates the data link layer
of OSI model.
2 Routers are relatively expensive. Bridges are relatively inexpensive.
3 Routers are difficult to set up and
configure.
Bridges are relatively easy to
configure.
4 Routers can accommodate multiple
paths.
Bridges can accommodate single
path.
5 Routers can join two different
networks.
Bridges extend the existing
networks.
6 Routers can be both hardware and
software device.
Bridges can be both hardware and
software device.
Activity 1
How much better are todays web servers compared to what was available
ten years back? Refer the Internet and give a detailed answer.
E-Commerce Unit 3
Sikkim Manipal University Page No. 44
Self-Assessment Questions
3. State whether the following statements are true or false.
(a) Switch is broadcasting device while hub is point-to-point
communication device.
(b) Routers are very cheap.
the cables and prevent breakage. The outer insulating jacket is made of teflon
or PVC.
Figure 3.5 Fibre Optic Cable
There are two common types of fibre cables single mode and multimode.
Multimode cable has a larger diameter; however, both cables provide high
bandwidth at high speeds. Single mode can provide more distance, but it is
more expensive.
Specification Cable Type
10BaseT Unshielded Twisted Pair
10Base2 Thin Coaxial
10Base5 Thick Coaxial
100BaseT Unshielded Twisted Pair
100BaseFX Fibre Optic
100BaseBX Single mode Fibre
100BaseSX Multimode Fibre
1000BaseT Unshielded Twisted Pair
1000BaseFX Fibre Optic
1000BaseBX Single mode Fibre
1000BaseSX Multimode Fibre
Test every part of a network as you install it. Even if it is brand new, it may
have problems that will be difficult to isolate later.
Stay at least 3 feet away from fluorescent light boxes and other sources
of electrical interference.
Wireless LANs
Figure 3.6 Wireless LANs
Wireless LANs use high frequency radio signals, infrared light beams, or
lasers to communicate between the workstations, servers, or hubs. Each
workstation and file server on a wireless network has some sort of transceiver/
antenna to send and receive the data. Information is relayed between
transceivers as if they were physically connected. For longer distances, wireless
communications can also take place through microwave transmission, cellular
telephone technology or by satellite.
Wireless networks are great for allowing laptop, desktop, portable devices,
or remote computers to connect to the LAN. Wireless networks are also beneficial
The quality of UTP (refer to Figure 3.7) may range from telephone-grade
wire to extremely high-speed cable. This cable has four pairs of wires inside the
jacket. Each pair is twisted with a different number of twists per inch that helps
to eliminate interference from adjoining pairs and other electrical devices. The
Electronic Industry Association/Telecommunication Industry Association
(EIA/TIA) has set standards of UTP and rated six categories of wire, which are
as follows.
Category Speed Use
1 1 Mbps Voice Only (Telephone Wire)
2 4 Mbps Local Talk & Telephone (Rarely used)
3 16 Mbps 10BaseT Ethernet
4 20 Mbps Token Ring (Rarely used)
100 Mbps (2 pair) 100BaseT 5 Ethernet
1000 Mbps (4 pair) Gigabit Ethernet
6 1,000 Mbps Gigabit Ethernet
7 10,000 Mbps Gigabit Ethernet
Coaxial cabling is not easy to install, but it comes with the advantage of
being highly resistant to signal interference. Also, it can support greater cable
lengths between network devices than twisted pair cable. The two types of
coaxial cabling are thick coaxial and thin coaxial.
Thin coaxial cable is known as thinnet. 10Base2 refers to the specifications
for thin coaxial cable moving Ethernet signals. The 2 refers to the approximate
maximum segment length being 200 metres. The maximum division length is
actually 185 metres. Thin coaxial cable has been popular in school networks,
particularly linear bus networks.
Thick coaxial cable is known as thicknet. 10Base5 refers to the
specifications for thick coaxial cable carrying Ethernet signals. The 5 refers to
the maximum division length being 500 metres. Thick coaxial cable has an
extra protective plastic cover that helps keep moisture away from the centre
E-Commerce Unit 3
Sikkim Manipal University Page No. 50
conductor. This creates thick coaxial a great choice when running longer lengths
in a linear bus network. One disadvantage of thick coaxial is that it is not easily
bendable and quite difficult to install.
Coaxial cable connectors
A most common type of connector used with coaxial cables is the Bayone-NeillConcelman (BNC) connector (refer to Figure 3.10). There are different types of
adapters for BNC connectors, including a T-connector, barrel connector, and
terminator. Connectors are the most vulnerable points in any network. To help
avoid problems, always use the BNC connectors that screw onto the cable.
Figure 3.10 BNC Connector
Self-Assessment Questions
4. State whether the following statements are true or false.
(a) Coaxial cabling is extremely easy to install.
(b) One of the rarest forms of connectors is the Bayone-Neill-Concelman
(BNC) connector.
connection it is being replaced by faster and cheaper services that the broadband
companies are providing. Regardless, broadband high-speed Internet service
is still compared with ISDN today, since they both represent the benchmark of
their times.
ISDN Internet service is basically a telephone-based network system that
operates by a circuit switch, or dedicated line, and is capable of transmitting
data and phone conversations digitally over normal telephone wires. This makes
it both faster and of higher quality than dial-up Internet service. During the 1990s
this revolutionized the way people did business. No longer would you have to
miss a call in order to access your Internet, or shut down the Internet to make a
telephone call. As such, ISDN Internet service made video teleconferencing not
only possible, but very popular as well.
There are two different types, or lines, of ISDN Internet service.
The first is a basic rate ISDN line. Called a Basic Rate Interface
(BRI), this line has two data, or bearer, channels that operate at 64
kbit/sec. Two or more ISDN-BRI lines can be combined as well,
yielding speeds of 256 kbit/sec. It is common to combine these lines
for video conferencing use or for transmitting data at higher speeds.
The second type of ISDN line is called a primary rate line, or Primary
Rate Interface (PRI). This line had 23 bearer channels and has a
total speed of 1,544 kbit/sec. It is used mostly for telephone
communication rather than data transmission, particularly within
companies that have large, private telephone exchange systems
operating inside their business.
The advantages of having ISDN Internet service definitely lies in the data
lines themselves. Not only do you have constant data speed via these lines,
each bearer channel runs at 64 kbit/sec with the ability to be combined to reach
greater speeds. ISDN Internet serviced also facilitates multiple data transmission,
so telephone calls and data downloading are no longer mutually exclusive. The
disadvantages, however, is that the digital clarity of ISDN voice communication
and its speedy data transmission come at an extra cost. ISDN is billed like a
phone line, but with an extra cost for service. Although its operational distance
from the ISDN central office is greater than that for DSL, its terminal adaptor
(similar to a modem) costs more than DSL or cable modems. While this
equipment and service continue to remain exorbitant, it is leaving the way open
for other Internet services to share the marketplace.
E-Commerce Unit 3
Sikkim Manipal University Page No. 53
Frame Relay
Frame Relay is a digital connection-oriented data service that sends packets of
data, called frames, over the network. This frame of data is transmitted through
the network and checked for errors. Frame Relay is designed for cost-efficient
data transmission for intermittent traffic between local area networks (LAN-toLAN) and between end-points in a wide area network (WAN). It is a data network
service bundled with leased line access for transmitting data between remote
networks. Frame Relay is a digital packet network service that provides all the
features and benefits of a dedicated network service without the expense of
multiple dedicated circuits. This data is carried in the form of packets and given
an ID on a per packet basis. It is then sent across the network in a very efficient
way. In a Frame Relay network, circuits are connected to a packet switch within
the network that ensures that packets are routed to the correct location. Frame
Relay is a digital dedicated service that is leased from a carrier. It is a switched
service.
Application-level security
Web applications can be protected from SQL Injection Attacks where
the attacker enters SQL commands into Web form input fields or URL
query strings to try to manipulate the SQL statement being sent to and
from the database. To avoid SQL injection attacks, the following methods
should be used:
o Use of queries or stored procedures to access a database as opposed
to using string concatenation
o Limitation the amount of characters in Web form input fields and
URL query strings to a proper amount
o Validate text input and URL query strings for improper characters
(e.g. apostrophe, dash)
o Do not display errors to the user that contain information about the
database or actual source code
ASP.Net Web applications must be secured from Cross Site Scripting
(XSS) attacks. To accomplish this, developers must ascertain that the
ASP.Net validateRequest Page directive is set to True (the default setting)
so that users of the application are prevented from entering HTML or
JavaScript code into Web forms.
E-Commerce Unit 3
Self-Assessment Questions
6. Fill in the blanks with appropriate words.
(a) _________ refers to telecommunication where a wide band of
frequencies is available to transmit information.
(b) __________ is a digital connection-oriented data service that sends
packets of data, called frames, over the network.
(c) Passwords must be at least _____ characters in length.
3.7 Summary
between the web server and the web browser. CGI is a set of standards
where a program can send data back to the web server where it can be
processed.
CGI is the part of the Web server that can communicate with other different
programs running on the server. With CGI, the Web server can call up a
program, while passing user-specific data to the program (such as what
host the user is connecting from, or input the user has supplied using
HTML form syntax).
The primary function of NIC is to allow the computer to communicate on
the network. It supports transmitting, receiving and controlling traffic with
other computer on the network. NIC operates at physical layer of OSI
model.
Network cables are the medium through which information generally travels
from one node/network device to another. There are many types of cables
which are used for computer network. In some cases, a network will utilize
only one type of cable, while other networks will use a variety of cable
types.
Fibre optic cabling consists of a centre glass core surrounded by several
layers of protective materials. It transmits light rather than electronic signals
eliminating the problem of electrical interference. This makes it ideal for
certain environments that contain a large amount of electrical interference.
It is also the standard for connecting networks between buildings, due to
its immunity to the effects of moisture and lighting.
E-Commerce Unit 3
Sikkim Manipal University Page No. 56
Wireless LANs use high frequency radio signals, infrared light beams, or
lasers to communicate between the workstations, servers, or hubs. Each
workstation and file server on a wireless network has some sort of
transceiver/antenna to send and receive the data. Information is relayed
between transceivers as if they were physically connected.
In general, broadband refers to telecommunication where a wide band of
frequencies is available to transmit information. There is wide range of
frequencies available, and information can be multiplexed and sent on
many different frequencies or channels within the band simultaneously.
This way, more information can be transmitted in a shorter duration of
time than what is achievable with older methods of transmission.
Integrated Service Digital Network (ISDN), is the original high-speed
Internet service. It sparked the high-speed Internet development between
service providers during the 1990s and, of course, revolutionized Internet
use.
3.8 Glossary
3.10 Answers
Answers to Self-Assessment Questions
1. (a) True; (b) False
2. (a) Content; (b) Object-oriented, Data-driven
3. (a) False; (b) False
4. (a) False; (b) True
5. (a) Glass; (b) RJ-45
6. (a) Broadband; (b) Frame Relay; (c) Eight
E-Commerce Unit 3
Sikkim Manipal University Page No. 58
References
1. Laudon, Kenneth C. and Carol Guercio Traver. 2004. E-Commerce:
Business, Technology, Society. N.J: Prentice Hall.
2. Turban, Efraim, Jae Kuy Lee and Michael Chung. 1999. Electronic
Commerce: A Managerial Perspective. Prentice Hall.
3. Whitley, David. 1998. E-commerce: Strategy, Technologies and
Applications. Tata McGraw-Hill.
4.1 Introduction
In the previous units, you have learned about the origin and evolution of
e-commerce. You now know that e-commerce which began in the early 1970s,
grew rapidly alongside the advances in telecommunication and information
technology. Thus, today we find that there is hardly any form of business that
has not adopted e-commerce. Having made this statement, let us now look into
the various requirements that one should possess to venture into e-commerce.
This unit gives you the details of the essential components that are required
for setting up an e-commerce. The unit also highlights the various components
of the Information Highway or the I-Way that routes information and services
between the business and its clients.
Objectives
After studying this unit, you should be able to:
Describe the various requirements of e-commerce
State the various prerequisites of e-commerce
Product cost saving: Despite the fact that you can reduce the cost of a
product by the use of e-commerce services, it also reduces the errors
and the cost of sending the information to partners.
4.2.1 Prerequisites of E-Commerce Procedure
More and more people are getting into e-commerce. This is natural because
there are hardly any barriers to entry. Online businesses can be run from home.
You do not really need degrees and certificates to get started. However, you do
need to give the venture some serious thought. A lot of work would be required,
at least initially.
In order to conduct e-commerce, the main things you will require include
the following:
1. A commercial website like www.futurebazaar.com
2. A product or service you want to sell through the respective websites
3. Shopping carts or purchase order forms
4. Current credit card account that will be accepted on e-payment
5. An online payment gateway, if you plan to process credit cards in real
time, over the Internet
6. A secure socket layer (SSL) to secure the gateway
Self-Assessment Questions
1. State whether the statements are true or false.
(a) E-commerce services offer a means of communication between the
consumer and the company.
(b) The usage of e-commerce services can reduce errors.
2. Fill in the blanks with the appropriate word.
(a) Besides reducing the number of human errors, e-commerce can
also lead to _______.
(b) While beginning an e-commerce activity a_____is required to secure
the gateway.
E-Commerce Unit 4
Sikkim Manipal University Page No. 62
Activity 1
Search on the Net for a model e-catalogue and prepare a list of the
information it carries. Suggest some other information you think it should
carry to be more effective.
Self-Assessment Questions
3. State whether the following statements are true or false.
(a) E-advertising is currently the largest commercial activity on the Web.
(b) Online banking is also referred to as cyber banking.
4. Fill in the blanks with the appropriate words.
(a) Web pages that offer information on products or services that a
company offers are available on an ________.
(b) Key information systems include information management software
and________.
E-Commerce Unit 4
Sikkim Manipal University Page No. 65
Technical Standard for
E-Documents, Multimedia and
Network Protocols
Public Policy Legal and
Privacy Issues
(Cyber Law, IT Act 2000)
Common business services infrastructure/security/
authentication/electronic payment
The messaging and information distribution
infrastructure (EDI, e-mail)
Multimedia content and network publishing
infrastructure
The information superhighway infrastructure
(Telecommunication, cable TV, wireless network,
the internet)
as:
Finance
HRM
Customer relationship management or CRM
Supply chain management or SCM
Product life cycle or PLC management
Enterprise commerce management
Enterprise resource planning or ERP
All these processes, such as SCM, CRM and ERP need to be integrated
properly for e-commerce to be successful. The IT infrastructure required for the
same may include the following:
Application servers
Web services
Wireless technology
Database software
XML
Storage systems
Server platform
Business intelligence would also be required for Web analysis, for
managing knowledge and content and for mining data, if required, depending
on the nature of e-commerce.
For todays growing e-commercees, it is very important to consider the
issues of security of information and the reliability and scalability of the systems
as well. This is taken care of by integration.
E-Commerce Unit 4
Sikkim Manipal University Page No. 67
Self-Assessment Questions
5. State whether the following statements are true or false.
(a) Enterprise application software can serve only one or two enterprises
simultaneously.
(b) All enterprises, irrespective of their size or volume of business can
support enterprise software.
6. Fill in the blanks with the appropriate word.
(a) The clientserver model lets the client work with the server with the
help of a requestreply sequence by______.
(b) _____provides solutions to problems that concern the enterprise as
a whole and not individual departments.
entertainment and information are not absolute. For example, video is a part of
information, entertainment and communication (via videoconferencing).
Television sets and PCs are now able to interact or exchange any sort of data.
2. Strategic Alliances and I-Way Infrastructure
The success of I-Way is based on market strategies. These strategies are built
according to needs that are based on market structure, i.e., communication,
entertainment and information.
E-Commerce Unit 4
Sikkim Manipal University Page No. 69
(ii) Subsidies
Subsidies include tax breaks, government, business or other forms of
encouragement. These raise an open question. What will these tax subsidies
actually subsidize?
Who will pay to extend the networks to non-profit institutions such as
schools, hospitals and the police and fire departments?
(iii) Regulation
Some enterprises argue that if a highway is built with private funds, there should
be no government regulation. The only regulation that should exist should be to
provide public access, privacy and reasonable tools.
Yet, there are still many issues that remain undecided:
(i) The computer can speak a variety of languages other than TCP/IP. These
include:
(a) ISO/OSI x.25- based packet switching networks
(b) SNA-based BITNET
(c) Other languages for networks run by commercials
(ii) The business Internet consists of online services, value-added networks
and other e-mail only services.
The academic and business networks can talk to each other through
language (protocols) transitions called gateways, stationed at the network border.
More recently, business Internet providers have begun to adopt TCP/IP
as the standard protocol on their own networks, thus allowing smooth linkage
with the academic Internet.
I-Way includes both the academic and business Internet categories and
extends the boundaries further to encapsulate non-IP based networks such as
telecom carriers network, cable TV, mobile and cellular networks.
E-Commerce Unit 4
Sikkim Manipal University Page No. 73
Internet
Academic Business
Figure 4.4 Part of the Internet
Activity 2
Research on the Internet and write about the role of the Government of
India in enabling academic Internet.
Self-Assessment Questions
7. State whether the statements are true or false.
(a) I-way is a non-interactive one-way method of transporting information
and services.
(b) I-way is based on the behaviour of the consumer and the producer
because they have multiple roles.
8. Fill in the blanks with the appropriate word.
(a) _____is a network of interconnected data highways of several types.
(b) The three major components of I-Way are the network access
equipment, local access equipment and_____.
4.6 Summary
4.7 Glossary
E-advertising: Advertising information on the Web
E-banking: Enables users to make online purchases and make payments
using an online banking facility
Enterprise application software: Refers to software that facilitates the
performance of business functions such as scheduling, accounting,
management of customer databases and so on
I-Way: A network of interconnected data highways of various types
Network access equipment: Specific equipment required at the
customers end that enables access to a network
Software: The Program, etc. used to operate a computer
Browsing/Browse: To look for information on computer, especially on
the Internet
4.9 Answers
Answers to Self-Assessment Questions
1. (a) True; (b) True
2. (a) innovative business; (b) socket layer
3. (a) True; (b) True;
4. (a) e-catalogue; (b) structural databases
5. (a) False; (b) False
6. (a) message passing; (b) Enterprise software
7. (a) False; (b) True
8. (a) I-Way; (b) global information distribution
References
1. Turban, Efraim, Jae Kuy Lee and Michael Chung. Electronic Commerce:
A Managerial Perspective. Prentice-Hall, 1999.
2. Whitley, David. E-Commerce: Strategy, Technologies and Applications.
Tata McGraw-Hill, 1998.
5.1 Introduction
In the previous unit, you read about the requirements of e-commerce and the
significance and components of I-Way. The fact remains that for any e-commerce
to be successfull, the website should be very user-friendly and attractive.
Therefore, web design is very important for company status and e-marketing
because a website works as a representative of its respective company. An
attractive website motivates the consumer to explore it further. One should keep
the following points in mind when assessing a website:
Website
Context
The sites layout and design
Commerce
The sites capability to enable
commercial transactions
Connection
Degree to which one site is
linked
Content
Community
How the site enables user-touser
communication
Figure 5.1 Basics of a Commercial Website
Objectives
After studying this unit, you should be able to:
Summarize what constitutes a good website design
Formulate a procedure for creating an intelligent website
Calculate the manpower required for e-commerce
Identify and list the basic Web languages that can be used for Web
designing
Recommend the corporate strategic infrastructure required for ecommerce
5.2 Need for an Intelligent Website
One cannot build an intelligent website that optimally has all sources of
information for an online company, overnight. Actually, it is a long process that
requires significant investment in technology, and an accumulation of knowledge
E-Commerce Unit 5
Sikkim Manipal University Page No. 80
that can come only with experimentation and trial and error. Website intelligence
leverages four types of information.
(i) Demographics: This explains such basic elements of the customers as:
Who they are
What their income is
Their marital status
(ii) Expressed Preferences: This explains what topics customers have
expressed an interest in; for example, types of music, choice of books,
and the stocks they track. The preferences are generally stored through
form-based questionnaires provided when the customer registers for a
site or a service.
(iii) Past Transactions: These are records of past transactions that the
consumers have had with a company. They are recorded when a customer
actually makes a purchase.
(iv) Observed Behaviour: This type of information is derived by observing the
manner in which the customer navigates when using the website. It also
tracks the sites he visited previous to and after visiting the said site.
Consider the following steps that e-commerce companies typically follow
in leveraging their information.
Step 1: Basic Web traffic analysis
Before starting any Web activity, one first needs to analyse the Web traffic. This
type of data provides a record of the entry and exit points into a website, pages
that were visited, links that were followed, the duration for which a person viewed
a particular page, the precise day and time of visit, the browser type, visitors IP
address and other information.
Step 2: Customer interaction analysis
This step is used to collect more information about the customers interactions
with the website. The registered users are people who have had to register for
site usage, generally by filling out a survey form. As you know, in any site (even
a free site) the user has to fill a registration form in which there are various
types of questions related to profession, education, age, gender, leisure activities,
merchandise purchasing, etc. Through this registration process, the site is able
to get information related to both the demographics and preference. This type
of data is used to help inform personalization engines to serve the contents
according to the visitors interests.
E-Commerce Unit 5
Sikkim Manipal University Page No. 81
You can start with products that are at hands reach through coarse segmentation,
and then continue to fine-grained segmentation. This step also uses artificial
intelligence to conduct knowledge discovery. That is, it can look for patterns in
large data sets and identify common elements.
Step 5: Going through the streams of clicks
The click-stream data contains details on customer behaviour that are richer
than what can be achieved in traditional channels. Click-stream information is
the recording of every page request from every visitor by the website owners.
This information is stored into massive log files.
E-Commerce Unit 5
Sikkim Manipal University Page No. 82
the site. The simplicity or complexity of the act of designing a website largely
depends on your imagination and/or budget constraints.
5.2.2 Design vs Development
Often, the terms Web designing and Web development are used
interchangeably. This, however, is not an accurate usage. Designing a website
and developing one are two very different activities. Designing a website has
two components, the front end and the back end. While these have been
used interchangeably, usually design means the front-end whereas development
means the back-end.
Front-end design
When a customer visits a site, what he sees is the front end. These are the
pages that display the graphics, images, and text on your site. Those that
design a website focus on this end. They select appropriate images and fonts
and even decide text and image arrangement. Appreciation of aesthetics is a
Web designers strength. He need not be tech savvy. Nonetheless, apart from
understanding what will be visually appealing on screen, designers need to
know the technical limitations while designing for the Web. An experienced
Web designer should also be able to collaborate with a Web developer.
Back-end development
Web developers help you build your website. They work on the back end, the
side not visible to the surfer, to make a site work. Although not seen by visitors,
this site is required to enhance the visitors experience.
Back-end functions are all about making provisions so that visitors can
view different pages and even enter data, execute sales transactions, and allow
images to alter or move. It is important for the Web developer to be adept at
various/languages such as Javascript.
Thus, it is important to ensure that the resumes of potential employees
reflect the following skills:
HTML (is used to create text and the layout framework of the page)
Web imaging (it creates and compresses images)
Javascript (it writes programs which run as part of web pages)
ASP (customizes web pages for users)
Java/C++ (writes programs that are embedded in a web page)
E-Commerce Unit 5
Sikkim Manipal University Page No. 84
This is a typical E-commerce website. Look at the various applications and services
offered at this webpage. Designing an E-commerce website is becoming difficult
due to various services offered as the same website, which involves going through
intricate designing methods.
Web hosting company. Most people feel that designing a website is an expensive
project. This, however, is not true. All that you need to do is to find the right Web
host. The benefits of a website will certainly override the costs.
Whether for personal use, or to aid a business venture, the advantages
of a website are tremendous. Many who have their own websites use them to
further a hobby or an interest since a personal website too can be an excellent
avenue for the exchange of knowledge with others. On the other hand, firms
use websites such that their goods and services are marketed and promoted.
For them, the attractive advantage is that they are able to cut costs involving
postage, couriers and advertising, etc. For them, cutting back on such expenses
as postage, couriers and advertising, etc., becomes the attractive advantage.
The following are the key benefits of having a website.
Increased awareness of products and services
The Internet allows a business to expand its markets tremendously. Businesses
no longer need to limit their focus only to the local scene. Through the use of the
Internet, businesses can effortlessly explore international and regional markets.
This introduces dynamic changes in participating businesses. This is because,
their nature and marketing activities alter and many find encouragement to enter
new markets by diversifying their products and services. Trading hours too find
extension since numerous items can be viewed on a website round the clock.
Freedom
The Internet provides great freedom to its users. Therefore, not only do those
that are otherwise introverts, frequent the Net, but even the smallest of
businesses are tempted to join. In fact, such is its growth rate that users are
alarmingly increasing at a rate of approximately 50,000 per day. Since information
can be freely posted on the website, and hence the Net, businesses profit in a
huge way. Not only has the Net become a huge customer marketplace, but
businesses have found a medium that enables them to compete with the largest
of organizations, on an even field.
Cost advantage
Web businesses are keenly aware of their profit potential simply by being on
the Internet. The advantages are very obvious. They can advertise their products
and services and yet avoid the costs and delays caused by such activities as
printing, publishing and distribution. Since the Internet offers a global
marketplace, greater value is added to the costs outlaid for promotion and
marketing. Thus, compared to the offline market, the benefits are many more.
Websites incorporate e-commerce facilities that transform 2D screen visuals
E-Commerce Unit 5
Sikkim Manipal University Page No. 86
into user-reactive models. For instance, consumers can place online orders for
products and services. This greatly reduces their administration costs. Some of
the ways to reduce costs arefollow-ups through e-mails thereby reducing
costs incurred by making phone calls, electronically generated and distributed
newsletters that reduce printing and distribution costs, and most importantly,
extended trading hours.
It is now felt that if any business does not exist on the Internet, then it is
not only losing out on the benefits of a dynamic industry, but is also increasing
its chances of being forgotten.
Activity 1
Imagine and make a list of how many activities/tasks can be carried out on
an E-commerce website.
Self-Assessment Questions
1. State whether the statements are true or false.
(a) A good website should have subsections.
(b) The user returns and enters the requisite information through the
login registration.
2. Fill in the blanks with the appropriate words.
(a) Website intelligence leverages________types of information.
(b) The first step in leveraging information by e-commerce companies
is_______.
that tend to add unnecessary codes which may not support the latest technology.
As a potential Web developer, whether you write your own HTML or use an
editor, learning HTML is very essential. Its knowledge not only provides
independence, but it also enables one to add special effects a feature that not
many HTML editors support.
Text Editor
A text editor is a software program used to edit text which does not involve any
special formatting. Those who write their own HTML code, need an adequate
text editor. Although using a text editor can be a time-consuming activity, its use
ensures that the code is clean, free from errors and that the file size is not very
large. Moreover, a text editor is also useful in writing articles and in editing
scripts. Those who have a Windows operating system use the Note Pad as
their preferred text editor.
FTP
File Transfer Protocol, or FTP, is a system that is used to upload files to a Web
server and download files from a Web server. It provides you a way to control files
on the server. This makes it an important tool. An FTP program enables operators
upload scripts, set file permissions, create folders and transfer files to and from a
server. To use FTP, a software program that supports it has to be downloaded
and installed in the computer; the most popularly used being WS FTP Pro.
Graphics Editor
A graphics editor is a software program used to edit as well as to design graphics.
Most Internet entrepreneurs find graphic designing intimidating. However,
since hiring a professional graphics designer can be expensive, most
entrepreneurs learn some basic design techniques. The program that Internet
marketers use the most is Paint Shop Pro. It is a powerful program and alone
can design graphics professionally.
Zip/Unzip Software
A Zip file is an archive of one or more files compressed into one file for easy
distribution. These are used to compress and transport file archives over the
Internet. Since downloading one Zip file is more convenient than downloading
several different files ZIP file is the popular method for distributing files
electronically. Moreover, the files in the Zip archive are compressed. Therefore,
download time gets minimized.
You can effortlessly extract or unzip a Zip file using a Zip/Unzip software
program. WinZip is the most popular Zip program because it makes the use of
file archives easy and uncomplicated. WINZIP has certain easy features that
E-Commerce Unit 5
Sikkim Manipal University Page No. 88
Eudora are the most popular e-mail clients. Outlook and Eudora enable you to
download e-mails from a server. In addition, it offers such features as sorting and
filtering. You can easily organize e-mail messages. The most important feature is
that your e-mail address remains your own domain and not anothers. Therefore,
a webmaster toolbox always has a significant role in your success.
Activity 2
Which E-mail do you use? What are its advantages over the other E-mail
services? What changes do you suggest in the E-mail that you use to
make it better.
Self-Assessment Questions
3. State whether the following statements are true or false.
(a) An HTML editor is a software program used to edit and create HTML
documents.
(b) FTP is a system that is used to upload and download files to and
from a Web server.
4. Fill in the blanks with the appropriate words.
(a) ______ is a software program used to edit text.
(b) ______ is a software program used to create HTML documents.
HTML
HTML is a method which converts ordinary text into hypertext. Technically
speaking, HTML is not a programming language, but a set of special codes that
E-Commerce Unit 5
Sikkim Manipal University Page No. 89
controls a texts layout and appearance. The instructions are within a data. This
data informs the browser, which is a display program, how to render the data
that is contained in the document.
The Hello World program which is a common computer program employed for
comparing programming languages, scripting languages, and markup languages
is made of 8 lines of the HTML code. However, the line breaks and the
<!DOCTYPE> tag, or the document type declaration, are optional:
<!DOCTYPEhtml>
<html>
<head>
<title>HelloHTML</title>
</head>
<body>
<p>HelloWorld!!</p>
</body>
</html
JavaScript
Originally called LiveScript, JavaScript was developed by Netscape. An
agreement with Sun Microsystems changed the original name. The intention
was to benefit from the growing popularity of Java Programming language.
JavaScript is a language that can be executed on the web browser. Java script
programs do not require any software and can run on Internet Explorer or
Netscape Navigator. It is a client side scripting language, and is basically used
to validate and edit an image, text colours and other things. JavaScript is casesensitive.
Example:
<html>
<head><title></title></head>
<body>
<scriptlanguage=JavaScripttype=text/javascript>
<!document.write(Myfirstjavascriptprogramme);
>
</script>
</body>
</html>
E-Commerce Unit 5
Sikkim Manipal University Page No. 90
language used in Microsoft Office suite. Just like the JavaScript, VBScript is
also a client-based language. Again, like Java, VBScript is also run on Internet
Explorer and Mozilla Firefox. The most pertinent difference between them is
that while VB can be compiled, a VBScript cannot be compiled. VBScript is the
default ASP scripting language.
Perl Script
Perl is a powerful text processing language. Prior to the development of Active
Server Page (ASP), it was extensively used in Common Gateway Interface
(CGI) scripting. Perl Script is a subset of Perl and retains most of its functionality.
Microsoft does not ship Perl Script with ASP, but it can be downloaded from the
Internet.
Active Server Page
Active Server Page (ASP) allows users to be treated as unique entities. This, in
spite of the fact that all the users may be running the same program on the
same machine, i.e.,your Web server. Needless to say, running a complex
program for multiple users on one computer requires many resources.
Fortunately, Microsoft makes sure that those resources are at the userss
disposal. ASP provides:
E-Commerce Unit 5
Sikkim Manipal University Page No. 91
Self-Assessment Questions
5. Match the following:
(a) HTML (i) The default ASP scripting language
(b) VBScript (ii) A set of special codes that controls a texts
layout and appearance
(c) ASP (iii) Used in Common Gateway Interface
(d) Perl Script (iv) Allows users to be treated as unique entities
6. State whether the statements are true or false.
(a) HTML is a method that converts ordinary text into hypertext.
(b) HTML is a programming language.
(c) JavaScript is not case sensitive.
(d) JavaScript programs do not require any software.
E-Commerce Unit 5
Sikkim Manipal University Page No. 92
Late Outsourcing: This type of outsourcing works in the reverse pattern. The
initial site design and development is done by the professionals of the concerned
company. They even implement the system and operate it so that it becomes a
stable and integral part of the company. After the company gains the competitive
edge that the system was meant to provide, its maintenance is outsourced. In
this way, professionals can channelize their energies to further develop new
technologies. This mechanism is known as late outsourcing.
Partial Outsourcing: In this type of outsourcing, only specific functions of a
project are outsourced. A company that specializes in designing, developing,
implementing and operating a website is hired for this purpose. The electronic
payment system is a case in point. Most vendors willingly provide complete
customer payment processing. These vendors provide a site that takesover
when customers are ready to pay, and returns the customers to the original site
after processing the payment transaction. Handling the e-mail and response
function of numerous small websites is another example of partial outsourcing.
Many companies also like to send an automatic order confirmation via e-mail
as soon as the order or credit card payment is accepted.
Self-Assessment Questions
Keep it Simple
The type of website one chooses to create depends on the market one wishes
to target. Unless the market that you are trying to reach consists of teenager or
such groups that appreciate a dressy website, it is recommended to keep the
E-Commerce Unit 5
Sikkim Manipal University Page No. 94
Not all surfers have a DSL cable modem connection. There are many who
browse with 14.4K modems. The need for speed is the key factor on the Internet.
Whether users are on high-speed connection or dial-up modem, speed is of
great value. Recent studies have shown that if your page does not load in the
first 8 seconds, the user is likely to move away from the page. People are
switching to high speed internet connections, more so in the case of mobile
users who are on the move. The web page should load rapidly. The size should
be about 50kb including images, content and other media elements.
Screen Resolution
There are three major screen resolutions: 640 480, 800 600 and 1024
768. Since mobile devices have different width, you have to provide for pages
working well on smart phones and iPad as well. You should use device emulators
to test the site on as many devices as possible. Also, since today, most users
have a screen resolution higher than 1024 760 pixels. The smart phone screen
also has to be taken into consideration, and the use of emulator will be most
helpful. It is erroneous to assume that all monitors are set for the same resolution.
The difference in dimension and proportion can cause unexpected issues
when zooming in mobile browsers. The close up view of the product is essential
on an e-commerce site, for e.g. Apple doubled the pixel density of its display in
iPhone 4, essentially to circumvent the zoom-in issues.
E-Commerce Unit 5
Sikkim Manipal University Page No. 95
In Windows XP/Vista/Windows 7
Right click on your desktop
Click on properties
Click on the settings tab
You can change your monitors resolution by sliding the bar for Screen Area.
On a MAC
Apple Menu > Control Panels > Monitors > Choose Setting
Frames
Why is it that frames do not work? This is because they increase the load time.
Loading two pages simultaneously is a problem for people with a slow connection.
Moreover, frames also take up space, more so if there are more than two frames.
If the screens resolution is 640x480, it can have a bad effect. Of course, you
can add a scroll but again screen resolution will pose a problem. Creating the
perfect layout can be difficult especially if it has to be created using frames that
work at all resolutions.
Animation
Animation should be kept at a minimum unless the site is meant either for
children or for teenagers. It takes away from the main focus of the site which
ideally should be its content.
Links
Links should be created that direct the visitor out of the site. This allows flexibility
to the visitor who can then browse new links while staying on your site.
Banner Exchange
Banners should never be on the front page because the visitor might get
dissuaded before he has even explored the site. Banners should be located in
the inner pages of the site. Even then these should be limited to the bottom of
the page.
Top of Page
When pages are long, links to the top of the page should be provided at the
bottom. Giving text links at the bottom is another alternative. This way, the
visitor will not have to scroll to the top for the menu.
Table Tricks
Playing around with tables can yield good results. You can place tables inside of
each other, and can differentiate by using different colours for each.
E-Commerce Unit 5
Sikkim Manipal University Page No. 96
Website Image
Also ensure that your website projects the image you want it to. This image can
be projected with a simple manipulation of colours, layout and design. Fonts
too can be experimented with. A judicious use of all such elements can go a
long way to create the desired look.
Self-Assessment Questions
5.7 Summary
Let us recapitulate some of the important concepts discussed in this unit:
A good website explains how and what its organization offers by pointing
out how it differs from its competitors and how it can make a difference to
the customers life.
Building an intelligent website for a company is a tedious task as it requires
significant investment in technology and vast knowledge of the various
associated processes.
Web designers should be knowledgeable about the demographics,
expressed preferences of customers, the nature of past transactions and
the observed behaviour of customers.
Based on the requirements of the company, its website can be designed
by a single Web designer or by separate contractors to look into different
5.8 Glossary
5.10 Answers
References
1. Turban, Efraim, Jae Kuy Lee and Michael Chung. Electronic Commerce:
A Managerial Perspective. Prentice-Hall, 1999.
2. Whitley, David. E-Commerce: Strategy, Technologies and Applications.
Tata McGraw-Hill, 1998.
6.1 Introduction
In the previous units, you have learned that e-commerce is a business transaction
that is performed using an electronic medium. This unit discusses the types of
transactions in an e-commerce. A transaction in an electronic market describes
the number of interactions between parties, for example, ordering, making
Manufacturer
Distributor
Retailer
Consumer
Business-toBusiness-toBusiness
Business
Thus, in this unit, you will learn about the evolution of the Internet business
models and the business models that are currently in vogue. The latter is of
three types, namely business-to-business (B2B), business-to-consumer (B2C)
and consumer-to-consumer (C2C). It will also familiarize you with the six
components of a business model. This will help you to differentiate between a
business model and a revenue model. This unit will also elaborate on the role of
business models. To get value from a new product, a firm needs a proper
business model. You will learn how business models differ from business strategy,
and about entrepreneurial advantage.
Objectives
After studying this unit, you should be able to:
Discuss the evolution of Internet-based business models
Evaluate the business models in practice
Identify the components of business models
Summarize the functioning of business models vis--vis revenue models
State the role of a business model
Differentiate between business model and business strategy
Classify the advantages of entrepreneurship
E-Commerce Unit 6
Sikkim Manipal University Page No. 101
regular banking. Today, people have embraced the automated teller machine
(ATM) that has made banking easy. Today, millions of people rely on the Internet
banking services for their banking needs.
The fast expansion and general acceptance of online business has people
wondering as to why this e-commerce did not happen earlier. The answer is
quite simple; the technology and infrastructure needed were not there to support
e-commerce. Consider, the example of computersmany business enterprises
used large mainframe computers with private data formats. These were not
easy to share with home or office users. The ubiquitous personal computers
(PCs) were not generally available. Thus, only a few computers outside the
business circle could get that information. Even when PCs became popular,
both in offices and at homes, the ability to process business was restricted.
This was because the infrastructure needed was not available.
At the same time, to set up an online or e-commerce earlier, it required
the individual company to develop the whole technology infrastructure. It was
required to develop its own business and marketing planning. However, these
days this is not the case. Now the only problem of an e-commerce is how to
integrate its business, because now many companies have resolved the complex
work of (i) developing individual Internet-based products and (ii) services that
take care of the problems of customer and supply interactions. Nevertheless,
the real challenge is the ability to combine these technologies and services
based on solid business and marketing plans, working on a real-time basis.
Today, the growth of e-commerce is at a fast pace as both organizations
and consumers have access to the Internet, either from their homes or offices.
Thus, there is excitement and the potential for success has also grown. At the
same time, the tremendous growth of the Internet has led to challenges of
increased integration of e-commerce of all capability and capacity.
The growth of e-commerce can be studied at two phases. Companies in
the first phase set up e-commerce, when e-commerce technology was new to
the market.
The trend of companies that set up e-commerce in the first phase are as
follows:
Business organizations rushed to get an e-commerce website up.
Little or no regard was given to check how scalable or reliable the site
needed to be.
It was a matter of beating competition.
E-Commerce Unit 6
Sikkim Manipal University Page No. 102
was no or little integration with the production side of the business. The production
part of the business tried to establish its own online-based relationship with
suppliers. Thus, the lack of integration proved to be a major obstacle for many
business organizations. This was due to:
Growth of customer base
Request for real-time order status
Return of products
Today, in the second phase of establishing an e-commerce, owning a
website is not considered to be a way to distinguish a business. The expectations
of customers and suppliers have increased manifold. Organizations are forced
to start planning about integrating the back-end and real-time transaction
processing. Business organizations should maintain a complete customer
supplier relationship with the help of Internet-based technologies and join those
systems to the interpersonal aspects of the business transaction when needed.
Many businesses have realized the prospects of e-commerce and are addressing
the whole business cycle and controlling the Internet technologies.
It can be concluded that these days, online business has the power to
change the business scene. Previously, the business model of a company was
considered to be the basic determination of its value. Nowadays, the value of a
company is based on its strategy, business model and its ability to sell.
Technology has started a new competition. Businesses using Internet
technologies and integrating their systems and processes more efficiently now
break the barriers and make it to the Fortune 500 stalwart. These start-ups are
able to vastly reduce the obstacle to entry while significantly increasing their
own market reach. This has been possible due to the following:
(i) Capitalizing on a continuous business proposal
(ii) Rightly applying technology.
In e-commerce, the motto is first to market equals first to success.
Nevertheless, a sound foundation has to be made. Using Internet technologies
is important to be successful in this business.
E-Commerce Unit 6
Sikkim Manipal University Page No. 103
Self-Assessment Questions
1. State whether the following statements are true or false.
(a) Today, both people and institutions use Internet technologies to
increase production and enhance communications worldwide.
(b) Companies in the first phase set up e-commerce when e-commerce
technology was in its infancy.
2. Fill in the blanks with the appropriate words.
(a) One of the drawbacks of the first-to-market consumer sites was that
there was no integration with the _________of the business.
1. Business-to-Business Model
The business-to-business (B2B) model needs two or more business
organizations that do business with each other. It entails commercial activity
Activity 1
Research on the Net and prepare a table showing the evolution of business
models and the contributions of important personalities towards the same.
Self-Assessment Questions
It also looks for other effects in the business network that might be used
to give more value to the customer.
(vi) Competitive strategy: It refers to the ways in which a business
organization tries to expand a permanent competitive benefit and utilize it
to advance the competitive situation of the company in the market.
6.4.1 Business Model vs Revenue Model
The term business model is a broad term that explains things, such as the
place of a business organization in the value chain, the choice of the customers,
products and the cost of doing business. The business model plans the course
through which the company would in fact make profit. It states clearly the price
it would charge the customers.
The old model corporations have been discredited as overmanaged,
overcontrolled and overstructured but underlet. Thus, todays top managers
should focus on their real managerial skills that would bring success to the firm
in the future. Today, a brand latest business model has come up. Here many of
the important tasks of the company are delegated to the different individual
parts, but synergy results from the vigour of the employees and unrestricted
flow of information.
6.4.2 Role of a Business Model
To profit from an innovation in a product or a service, a new firm or a start-up
needs an appropriate business model so that it is able to exploit its innovation
and be the market leader. Business models are needed to bring in new
technology that will yield an economic value. As the old and familiar business
models cannot be used for all new firms, new business models are planned.
The importance of the business model cannot be denied, because in many
cases the profitability of the innovation rests more on the business model itself
than on the product or service provided by the innovation. In their paper, The
Role of the Business Model in Capturing Value from Innovation, Henry
Chesbrough and Richard S. Rosenbloom provide a crucial structure explaining
the basics of a business model. As there is a complex inter-play of markets,
products and the environment in which a business organization runs, it is very
difficult to understand the organizations responsibility in its totality. While
business experts are acquainted in their area, technical experts understand
theirs. Figure 6.1 makes it clear how the business model serves to connect
these two domains.
E-Commerce Unit 6
Sikkim Manipal University Page No. 108
Economic
Outputs
Technical
Inputs
Business
Model
Figure 6.1 Role of a Business Model
Self-Assessment Questions
6.5 Summary
6.6 Glossary
6.8 Answers
Answers to Self-Assessment Questions
1. (a) True; (b) True
E-Commerce Unit 6
Sikkim Manipal University Page No. 112
References
1. Turban, Efraim, Jae Kuy Lee and Michael Chung. Electronic Commerce:
A Managerial Perspective. Prentice-Hall, 1999.
2. Whitley, David. E-Commerce: Strategy, Technologies and Applications.
Tata McGraw-Hill, 1998.
7.1 Introduction
In the earlier units, you learnt that a considerable volume of business today is
conducted over public networks. There is exchange of large volumes of
confidential data such as credit card details, financial records and other important
information. So, security and confidentiality should be ensured before businesses
can conduct financial transactions over the Internet.
At a time when e-commerce is growing at a fast pace, the lack of data
security on the Internet has become a complex issue. Hence, e-security has
become a major concern. In this unit, you will learn about security threats, client
server security, messagedata security, network security and Web security.
Objectives
After studying this unit, you should be able to:
Asses the security concerns of intranet and extranet
Differentiate between various security problems in a clientserver
environment
Compare the two broad categories of clientserver security threats
Evaluate the various protection methods adopted by organizations
State how data and message security is ensured over the Net
Summarize the components, types and limitations of firewalls
E-Commerce Unit 7
Sikkim Manipal University Page No. 114
large file to a message box every few minutes. The message box
rapidly grows in size, soon occupying all the space on the disk. The
repeated receiving process on the recipients machine can cause
the disk to crash.
(c) Packet modification
This is an integrity threat that involves modifying or destroying a message packet.
IP Spoofing: Internet Protocol is the elementary protocol which sends data
over the internet and other computer networks. The header of each packet that
is to be transmitted contains the source and destination addresses called IP
addresses. An IP address would look like this: 192.30.233.0
The creation of an IP packet with a copied IP source is called IP address
spoofing. In such a case, the intention is to disguise the senders identity or to
impersonate another computing system. It is one among the many common
forms of online disguises. How it works is that an attacker spoofs the IP address
of a senders machine and then sends a malicious message. Since this appears
to have come from a trusted machine, an attacker thereby gains unauthorized
access to a computer or a network.
E-Commerce Unit 7
Sikkim Manipal University Page No. 119
Table 7.1 Average Losses from Various Types of Attacks
solutions and the causes that led to the development of each type.
Self-Assessment Questions
E-Commerce Unit 7
Sikkim Manipal University Page No. 121
Self-Assessment Questions
3. State whether the following statements true or false.
(a) In a trust-based security, all users working in a network can share
information.
(b) Biometric systems are cheap.
4. Fill in the blanks with the appropriate word.
(a) The simplest method adopted by password hackers is..
(b) Biometric systems involve some identification aspects related to the.
Data security
Data security generally suffers from packet sniffing. A sniffing attack begins
when a computer is compromised to share some data or program. A cracker
starts by installing a packet sniffer into the network. The sniffer program attacks
the network traffic, telnet or FTP session that a legitimate user initiates to gain
access to another system. The session contains the login ID, password and
E-Commerce Unit 7
Sikkim Manipal University Page No. 122
user number of the person logging into other machines. This is the information
a sniffer needs to log in to a machine.
Message security
Threats to message security fall into three categories:
Confidentiality
Integrity
Authentication
(a) Message confidentiality
7.5 Firewalls
One of the most common security measures in use today is the firewall. A
firewall is meant to act as a defence mechanism. It prevents unauthorized people
E-Commerce Unit 7
Sikkim Manipal University Page No. 123
Importance of a firewall
A firewall can monitor incoming and outgoing security alerts and record
and track down an intrusion attempt depending on the severity.
Some firewalls, but not all, can delete viruses, worms, Trojan horses or
data collectors.
A firewall can also be used to prevent employees from accessing selected
sites on WWW.
E-Commerce Unit 7
Sikkim Manipal University Page No. 124
E-Commerce Unit 7
Sikkim Manipal University Page No. 125
in the TCP/IP packet header. The filters can be configured to accept or discard
a packet on the basis of the following information given in the packet header:
Source address
Destination address
Application or protocol
Source port number
Destination port number
This router stores a table containing rules specified for security purposes.
While examining a packet header, the firewall compares the information in it
with the rules stored in the access control table (these rules are the parameters
for blocking a packet or allowing it to pass through the router). If the information
in the packet header does not match with any of the specified rules, the firewall
applies the default rule.
Now, what is a default rule? The default rule generally follows the allow
all or deny all model. For strict security; the firewall default rule should be the
deny all model which most packet filters actually follow. (See Figure 4.8.)
Sample Screening Rules:
Protocols (TCP, UDP)
Source IP address (Domain.edu)
Target TCP port 80 (WWW only)
Public Internet
Disadvantages
Packet filters cannot support user authentication and blocking based on
contents at the application level.
For complex protocols that specify return data ports dynamically, the
filtering protocol becomes difficult and complex.
The creation of packet-filtering rules can become tedious when used for
filtering all the permutations and combinations of packet attributes.
E-Commerce Unit 7
Sikkim Manipal University Page No. 126
Self-Assessment Questions
5. State whether the following statements are true or false.
(a) A sniffer program attacks the network traffic, telnet or FTP session
that a legitimate user initiates to gain access to another system.
E-Commerce Unit 7
Sikkim Manipal University Page No. 129
Those that use Internet Connection Sharing (ICS) through Windows XP, a firewall
that blocks the user from identifying an IP address or from making use of an
internet connection can be a botheration. However, it is definitely not advisable
E-Commerce Unit 7
Sikkim Manipal University Page No. 130
to frequent the Net without the assistance of a firewall. You will probably have to
do a trial and error before you find the firewall best suited to your needs.
Self-Assessment Questions
7.6 Summary
7.7 Glossary
Security threat: A circumstance, condition, or an event that causes
economic loss to data or network resources in the form of destruction,
disclosure, and modification of data, denial of services, fraud and waste
7.9 Answers
Answers to Self-Assessment Questions
1. (a) True; (b) False; (c) False
2. (a) authorized; (b) virus; (c) worm
3. (a) True; (b) False
4. (a) dictionary comparison; (b) human body
5. (a) True; (b) True
6. (a) packet sniffing; (b) Sequence numbers
7. (a) True; (b) False; (c) True
8. (a) hardware; (b) do not pass through it; (c) viruses
References
Unit 8 Encryption
Structure
8.1 Introduction
Objectives
8.2 Cryptography
8.3 Encryption
8.4 Digital Signature
8.5 Virtual Private Network
8.6 Summary
8.7 Glossary
8.8 Terminal Questions
8.9 Answers
References
8.1 Introduction
In the previous unit you learnt about security in electronic unit. In this unit, you
will learn about encryption. Encryption is an important cryptography technology
used to transform information using an algorithm to make it unreadable to anyone
except those possessing special knowledge (usually referred to as a key).
Cryptography is the science of writing in a secret code is called cryptography.
Since long, encryption is being used by militaries and governments to facilitate
secret communication as there are several instances of data in transit being
intercepted in recent years. Encryption is also used to protect data in transit,
i.e., data being transferred via networks (such as the Internet and e-commerce),
mobile telephones, wireless microphones, wireless intercom systems, Bluetooth
devices and bank automatic teller machines. Encrypting data in transit also
helps to secure it as it is often difficult to physically secure all access to networks.
Objectives
After studying this unit, you should be able to:
Define cryptography and describe the purposes of cryptography
Summarize the role of encryption in message security
Discuss the various methods of encryption
Identify the various features of digital signature
Discuss the role of virtual private network (VPN) in encryption
E-Commerce Unit 8
8.2 Cryptography
Cryptography is derived from the Greek words kryptos (hidden, secret) and
grph (I write). It is the practice and study of hiding information. Cryptography
is today considered a branch of both mathematics and computer science, and
is used extensively in information theory, computer security and engineering.
Cryptography is used in applications which require security of data, such as in
the case of ATM cards, computer passwords and electronic commerce.
8.2.1 Purpose of Cryptography
The science of writing in a secret code is called cryto. It is supposed to have
been first used as far back as 1900 BC by an Egyptian scribe. Cryptography is
believed to have appeared soon after writing was invented and used in diplomatic
exchanges and battle plans. With the development of computer communication,
the need for security of communication media also rose. Quite understandably,
then, cryptography began to be used to provide this security while communicating
over any untrusted medium, particularly the Internet.
These security requirements include:
Authentication: That is, giving proof of ones identity.
Privacy/confidentiality: Making sure that no one other than the intended
reader reads the message.
Integrity: Providing assurance to the receiver that the message received
by him is no different from the original one.
Non-repudiation: A mechanism which will prove that the message was
actually sent by the sender and no one else.
Thus, it is seen that cryptography serves a dual purpose: data is protected
from being stolen or altered and users are authenticated. This is done in three
ways: (a) Secret key (or symmetric) cryptography, (b) Public-key (or asymmetric)
cryptography and (c) hash functions. The unencrypted data is referred to as
plaintext. It is encrypted into ciphertext, and then decrypted into usable plaintext.
8.2.2 Encryption as the Basis for Data and Messaging Security
Encryption is a cryptography technology to scramble (encrypt) the data with a
key so that no one can make sense of it while it is being transmitted. When the
data reaches its destination, the information is unscrambled (decrypted) using
the same or a different key.
E-Commerce Unit 8
Sikkim Manipal University Page No. 135
Self-Assessment Questions
1. Fill in the blanks with appropriate words.
(a) The science of writing in a secret code is called_____________.
(b) _____ is a cryptography technology to scramble (encrypt) the data
with a key so that no one can make sense of it while it is being
transmitted.
(c) _______ is an intelligible message that needs to be converted into
an unreadable message or encrypted message.
8.3 Encryption
8.3.1 Methods of Encryption
Internet
2. Triple Encryption
As discussed, the DES is a block cipher and employs shared secret encryption.
But, nowadays DES is considered unsafe for various applications primarily due
to the 56-bit key size which is too small. Triple DES is considered as an improved
version to overcome many of the shortcomings of DES. The triple encryption
technology is based on DES and is sometimes referred as Triple DES or 3DES.
The event follows an Encrypt-Decrypt-Encrypt (EDE) sequence. Decrypt
sequence is just the same encrypting operation with the keys reversed. It is
based on the DES algorithm and can easily modify the existing software to use
Triple DES. It has a longer key length that helps in eliminating many of the
shortcut attacks used to reduce the amount of time it takes to break DES. Thus,
Figure
Encrypted
Message
Original
Message
Original
Message
Encrypted
Message
Internet
(Cipher Text)
(Cipher Text)
Public Key Encrypt
Private Key Decrypt
(e) Using a private key, the entire message is encrypted by the receiver.
(f) The receiver calculates the message digest using the hash function.
The receiver uses the same hash function that the sender uses, and which
has been agreed upon in advance. The main advantage of using the hash
function for encryption is that even if an unauthorized person accesses Xs
public key, he will not be able to get to the hash function-generated key; thus
making the digital signature authentic and secure.
Activity 1
Search on the Internet for public key cryptography and find out the
disadvantages of using it.
Self-Assessment Questions
signature can be authenticated even after expiry of the key. If every party on the
contract keeps a copy of the timestamp, all of them can prove that the contract
was signed using valid keys. Actually, the timestamp can prove the validity of
the contract even if one signatorys key gets compromised at any instant after
the contract is signed.
A digital time stamping (DTS) service issues timestamps which associate
a date and time with a digital document in a cryptographically strong way. The
digital timestamp can be used at a later date to prove that an electronic document
existed at the time stated on its timestamp.
Because keys are intended to be public and are widely distributed, anyone
can easily create a private/public key pair and distribute the public key, claiming
it belonged to someone else. One solution to this problem is a public-key
certificate. A public-key certificate is a data structure, digitally signed by a
Certifying Authority (CA).
E-Commerce Unit 8
Sikkim Manipal University Page No. 141
Certificates authority
Certificates authority is an organization or institution that issues digital certificate
to companies and organizations that are accessible via the Internet. These
certificates are issued for a certain period of time and are used as an assurance
of the security of a website. It is also known as trusted third party. CAs form
characteristics of many public key infrastructure (PKI) schemes. There are many
commercial CAs that charge for their services. There are also several providers
issuing digital certificates to the public without any cost. Generally, institutions
and governments have their own CAs.
Certificates authority issues digital certificates that consist of the
identification details of the owner and his public key. The corresponding private
key is in a similar manner not made available publicly, but kept as a secret by
the end-user, who generates a key pair. The certificate also acts as evidence by
the CA such that the public key contained in the certificate is related to the
person, organization, server or other entities noted in the certificate. If the user
believes in the Certificate Authority (CA) and is able to validate the CAs signature,
then he can also validate the requirement of a certain public key that belongs to
whoever is identified in the certificate.
Digital certificate
A digital certificate serves as an electronic identity card that establishes the
users credentials when business deals are transacted across the Web. A digital
certificate is defined as a method to electronically verify for authenticity. The
digital certificate is just like an identity card, such as a drivers license. Digital
certificate is issued by a number of certificate authorities; it is used to prove that
a website, or a visitor to a website, is the entity or person they claim to be; An
A digital certificate contains a public key that is used for encrypting messages
and digital signatures. It also has the digital signature of the certificate authority.
By this signature a recipient can verify that the certificate is genuine. Sometimedigital
certificates conform to a standard, X.509. It can be kept in registries so
that authenticating users can look up other users public keys.
8.4.2 Non-Repudiation and Message Integrity
Digital identity is based on message integrity, non-repudiation and confidentiality.
Integrity ensures that a message or transaction has not been tampered with.
Non-repudiation ensures that the contents of the message sent are intact and
provides evidence for the existence of a message or transaction. The user and
the recipient cannot dispute the contents, once sent. The contents are protected
as confidential which means that only authorized individuals or groups can access
the contents of a message or transaction. In certain cases, these features are
not necessary and hence are considered as luxury. However, there are scenarios
where these features are most critical. For managing digital identity strategy,
clarity of these features is very important.
Integrity
Integrity is the basic requirement of a highly dependable identity infrastructure.
Identity systems serve the purpose of exchanging credentials as well as
messages and transactions pertaining to attributes, provisioning of information
and other data. Integrity builds a trust that the contents have not been tampered,
which is important in this environment. To understand this better, let us take an
example of a document that represents identity credentials. It is important to
validate the authenticity of the credentials to be sure of their originality.
Non-repudiation
Non-repudiation is the activity of presenting of tamper-proof evidence proving
that a message was sent or received. Critical identity-related acts should be
protected even though the messages or transactions can be disputed. For
understanding this better, let us take the instance of two people, Nadia and Joe,
who are exchanging messages. In one case, Nadia denies sending a message
to Joe that he claims to have received. The ability to counter Nadias denial is
called Non-repudiation of Origin (NRO). In the second scenario, Nadia claims
to have sent Joe a message that he denies having received. Provision of evidence
to counter Bobs claim is called Non-Repudiation of Receipt (NRR).
E-Commerce Unit 8
Sikkim Manipal University Page No. 143
Activity 2
Search on the Internet for the term digital signature and find out how it
ensures non-repudiation of data.
Self-Assessment Questions
VPN was not the first technology to make remote connections. Leased
lines, such as ISDN (integrated services digital network, 128 Kbps), are private
Self-Assessment Questions
4. State whether the following statements are true or false:
(a) A virtual private network (VPN) is a network that uses a private
communication infrastructure.
(b) The goal of a VPN is to provide the organization with the same
capabilities, but at a much lower cost.
8.6 Summary
8.7 Glossary
8.9 Answers
Answers to Self-Assessment Questions
1. (a) Cryptography; (b) Encryption; (c) Plaintext
2. (a) False; (b) False; (c) True; (d) True
3. (a) Digital signatures; (b) Digital time stamping; (c) Digital certificate
4. (a) False; (b) True
E-Commerce Unit 8
Sikkim Manipal University Page No. 147
References
1. Turban, Efraim, Jae Kuy Lee and Michael Chung. Electronic Commerce:
A Managerial Perspective. Prentice-Hall, 1999.
2. Whitley, David. E-Commerce: Strategy, Technologies and Applications.
Tata McGraw-Hill, 1998.
9.1 Introduction
The previous unit discussed encryption and its significance in providing
messaging security. Security is an issue that is extremely important when it
comes to making online payments. An Electronic Payment System (EPS) is an
online business process used for fund transfer through an electronic medium,
like personal computers, mobile phones, servers and hand-held devices.
Therefore, electronic payment system can be defined as: The transfer of
electronic money between financial institutions over a secure private network.
Making payments on the Internet is essentially the electronic version of
any traditional payment system. However, in the electronic payment system,
everything is digital and it is designed to be handled electronically; no change
and/or old currency problems are faced. EPS is a faster payment system which
provides its service to customers at low cost.
EPS is not bound by regional boundaries and therefore funds can be
transferred anywhere. It is a secure method of fund transfer and provides faster
services as compared to a conventional payment system. It provides services
not only to big organizations, banks and business transactions, but also to users
and consumers for online shopping and marketing at very low cost. There are
various ways by which a customer can make payments, such as by using credit
cards, digital cash, debit cards, and so on.
The issues involved in EPS are:
E-Commerce Unit 9
Sikkim Manipal University Page No. 150
When the user has the e-cash made available to him, he signs the ecash
by using his key (and can also provide it to anyone if he wants)
The original number is masked or the note is blinded when the ecash
software prepares a note.
A database of spent notes is maintained by the central bank.
7. Credit
Merchant a/c
6. Return
e-Cash
3. Send
e-Cash
Currency
Server
Consumers
Bank
Merchants
Bank
Consumer
Merchant
1. Request
to obtain
2. Transfer
Money
4. Send e -Cash
5. Delivery Goods
Figure 9.1 Working of e-Cash
Advantages of e-cash
E-cash is best suited for small transactions.
Authentication is not an issue. Who pays is not important as long as the
merchant gets his payment.
E-cash can be issued in very small denominations that can be used to
pay for small transactions.
The low cost of e-transactions makes it feasible for merchants to charge
small amounts without losing profit.
2. Electronic Cheques
Electronic cheque (e-cheque) is a form of e-token. E-cheque is planned to accept
individuals or a group who prefers to pay on credit or through some method, but
not through cash. An electronic cheque has all the same features as a paper
cheque. It functions as a message to the senders bank to transfer funds, the
message is given to the receiver, who in turn, endorses the cheque and presents
it to the bank to obtain funds.
E-Commerce Unit 9
Sikkim Manipal University Page No. 155
Working of e-cheques
Figure 9.2 shows the working of e-cheques.
7. Forward
Cheque
6. Forward
Cheque
5. Forward
to bank
3. Validate
Cheques
1. Accesses Server and Presents Goods
Consumers Bank Merchants Bank
Consumer
Browser
Clearing House
Merchant
System
4. Closes Transaction
2. Selects goods and pays e-Cheque
8. Account
Update
Figure 9.2 Working of E-Cheques
Cyber cash is an extension of a wallet for credit cards. Unlike the cyber cash
credit card system, cyber cash will not serve as an intermediate party for
processing cheques. Instead, these functions will be handled directly by banks.
The cyber cash electronic cheque system does not provide multiple payment
options.
E-Commerce Unit 9
Sikkim Manipal University Page No. 157
3. Smart Cards
Smart cards, containing microprocessors, are able to hold more information
than cards based on the traditional magnetic strips. They help the cardholder to
perform operations, especially of financial nature. Most of these methods are
known as stored value cards or electronic purse system. Units of prepayment
or currency value are electronically stored on an IC (integrated circuit) chip
embedded in these cards.
There are two types of smart cards, (a) relationship-based smart credit
card and (b) electronic purses.
(a) Relationship-based smart credit card
As you must be aware, smart credit card is based on some kind of relationship
between a cardholder and an organization, such as between Delhi Metro and
its commuters or between the users of toll bridges or highways, and the company
that has built them. Financial institutions also give enhancement on existing
card services or provide new services to their customers through the smart
card. Relationship-based smart credit card offers consumers the following
options:
On a smart credit card a customer can access many accounts, such as
credit, debit, investments or stored value for e-cash.
There are multifarious uses of smart credit card, such as payment of bills,
access to cash, or funds transfer for selected accounts, etc.
Smart credit cards provide access to ATMs, a screen phone, a PC, or
interactive TVs anywhere and at all times.
(b) Electronic purse and debit cards
E-purse is a wallet-size smart card with programmable microchips that store
monetary value in the form of money. The electronic purse works in the following
manner:
After the purse is loaded with money at an ATM or through the use of an
inexpensive special telephone, it can be used to pay for candy, for instance, in
a vending machine equipped with a card reader. The vending machine is
authentic and there is enough money available for a chocolate bar. The value of
the purchase is deducted from the balance on the card and added to an e-cash
box in the vending machine or ATM machine. When the balance in the electronic
purse is empty, then the purse can be recharged with more money.
E-Commerce Unit 9
Sikkim Manipal University Page No. 158
Activity 1
Research on the Net and prepare a list of early credit cards that were in the
market. Also, make a note of the conditions that were to be fulfilled for
availing credit card services at that time.
Authorize
E-Commerce Unit 9
Sikkim Manipal University Page No. 160
Self-Assessment Questions
1. State whether the following statements are true or false.
(a) EPS is bound by regional boundaries.
(b) E-cash is an example of online currency exchange.
(c) Cyber cash electronic cheque system does not provide multiple
payment options.
2. Fill in the blanks with the appropriate words.
(a) The transfer of electronic money between financial institutions over
a secure private network is called________.
(b) The safety of e-cash is scrutinized by _______.
(c) _______is a consortium of banks and clearing houses that has
designed the electronic cheque.
(i) The customer has to fill a registration form to get an OTPP account number.
This gives the OTPP a profile of the customer, backed by a financial
instrumentthe credit card.
(ii) If a customer wants to purchase anything online, the customer requests
the item from the merchant by giving him the OTPP account number.
(iii) Either the customer types in the information about his/her account or he/
she can also as a routine authorize the merchant via browser settings to
access his/her OTPP account and bill him.
(iv) The merchant contacts the OTPP payment server with the customers
account number.
(v) The OTPP payment server authenticates the customers account number
for the vendor and checks for adequate cash.
(vi) The OTPP payment server sends an automatic WWW from the electronic
message or a simple e-mail to the buyer. The buyer responds to the form
or e-mail in one of the three ways: a) Yes, I agree to pay b) No, I dont
want to pay c) Fraud, I never asked for this.
(vii) If the customer sends a Yes to the OTPP payment server, the merchant
is given information and the customer is permitted to download the item
or material.
(viii) Until it gets authentication of purchase close, the OTPP does not debit
the buyers account. It is done so that the buyer cannot deny the payment.
To use this system, both the parties customers and merchants must be
registered with the OTPP. All the information that is transferred over the public
Merchant
Consumer
Client
Browser
Mercha
Server
nts
Payment
Server
Online third-party
processor with links
to multiple payment
systems
Figure 9.4 Third-Party Payment Processing
Certificates Authority
The Certificates Authority (CA) issues a digital certificate to companies and
organizations that are accessible via the Internet. They are issued for a certain
period of time and are used as a guarantee of the security of a website. It is also
referred to as a reliable third party.
CAs are features of numerous public key infrastructure (PKI) plans. There
are several profitable CAs that take payments for their services. There are also
quite a few providers providing free digital certificates to the public. Usually,
governments and institutions have their own CAs.
CAs issue digital certificates that consist of the characteristics of the owner
and the public key. The corresponding private key is not made accessible publicly,
but kept covert by the end-user who made the key pair. The CA also confirms
E-Commerce Unit 9
Sikkim Manipal University Page No. 163
the certificate that the public key enclosed in the certificate is connected to the
person, organization, server or other body noted in the certificate. If the user
has faith on the CA and can confirm the CAs signature, then he can also confirm
that a certain public key does in fact belong to whoever is acknowledged in the
certificate.
Digital Certificate
A digital certificate is called an electronic identity card and is used for establishing
the users credentials when conducting transactions over the Web. The digital
certificate is defined as a method of verifying authenticity electronically. The
digital certificate is equivalent to real identification, such as a drivers license.
Different certifying authorities provide it. Digital certificates are used to confirm
that a website, or a visitor to a website, is the entity or person they declare to be.
They are like an electronic testimonial issued by a certification authority to
ascertain the identity of an organization when doing business dealings on the
Internet.
Contents of digital certificate
A digital certificate includes:
Holders name, organization, address
Name of the certificate authority
Public key of the holders for cryptographic use
Time limit (these certificates are issued for a period of six month to a
year)
Digital certificate identification number
Digital certificate contains a public key employed for encrypting
communication and digital signatures. It also contains the digital signature of
the certificate-issuing authority so that a receiver can confirm that the certificate
is authentic. Some digital certificates conform to a standard, X.509. Digital
certificates can be held in reserve in registries so that verifiers can look up other
users public keys.
Activity 2
Find out the online third-party processor in India and highlight its role.
E-Commerce Unit 9
Sikkim Manipal University Page No. 164
Self-Assessment Questions
3. State whether the statements are true or false.
(a) Companies that provide third party payment services are called online
third-party processors.
(b) Digital certificate contains a public key employed for encrypting
communication and digital signatures.
4. Fill in the blanks with the appropriate words.
(a) __________is an example of companies that provide third-party
services.
(b) ______issues a digital certificate to companies and organizations
that are accessible via the Internet.
information to all users using no security and https can provide only secure
information. As for instance, merchant catalogue can be insecure but the ordering
payment forms could be secure.
The advantage of SSL over secure HTTP is that SSL is not limited to
HTTP, but can also be used for making secure FTP and TELNET among other
Internet services. Moreover, as SSL encrypts everything, the display of complex
E-Commerce Unit 9
Sikkim Manipal University Page No. 166
pages can be slow, and, therefore, those sites that are protected often use
minimal graphics to minimize the performance impact.
2. Secure Electronic Transaction
MasterCard and Visa developed the secure electronic transaction (SET) standard
for the safe use of debit, credit, and corporate purchasing cards over the Internet.
Microsoft, GEE, IBM, RSA and VeriSign are the co-developers. The SET protocol
is a set of written standards that explain how banks, merchants, consumers
and Cybercash associations should execute the transactions of these cards
across the Internet and WWW. SET architecture includes a number of entities
such as:
Cardholder
Merchant
Acquirer
Issuer and payment gateway
Number of certificate authority
SET protocol provides the following services:
(i) Protection of the cardholders account details from both fraudulent
merchants and eavesdroppers
(ii) Non-repudiation for both the merchant and the cardholder on the
agreement of transaction
(iii) Assurance to the merchant that the payment will be sure
Suppose a consumer has a browser, such as Microsofts Internet Explorer that
is SET-enabled; and on the other hand, banks, merchants, etc. have a SETenabled
server. The following are the steps involved in the transaction:
1. The consumer would open his MasterCard or Visa bank account on his
SET-enabled browser.
2. The consumer has a digital certificate and private signing key. This
certificate is used for signing the credit card for online purchases or other
transactions.
3. The bank should have certificates from the third-party merchants. These
certificates comprise the public key of the merchant and the public key of
the bank.
E-Commerce Unit 9
Self-Assessment Questions
5. State whether the statements are true or false.
(a) Secure socket layer provides data encryption.
(b) Set protocol ensures protection of the cardholders account details
from eavesdroppers.
6. Fill in the blanks with the appropriate word.
(a) ___________is a protocol for giving data security layers between
high-level application protocols and TCP/IP.
(b) ________was developed by MasterCard and Visa for the safe use
of debit, credit and corporate purchasing cards over the Internet.
E-Commerce Unit 9
Sikkim Manipal University Page No. 168
9.5 Summary
Let us recapitulate the important concepts discussed in this unit:
An electronic payment system is an online business process that enables
fund transfer through an electronic medium such as personal computers
and mobile phones.
Nowadays, EPS is being used in banking, retail, health care, online markets
and in government transactions.
The three main categories of EPS are banking and financial payments,
retail payments and online business payments.
The tokens of yester years have been replaced by electronic tokens such
as e-cash and e-cheque. E-tokens are of three typescash or real-time,
9.6 Glossary
9.8 Answers
Answers to Self-Assessment Questions
E-Commerce Unit 9
Sikkim Manipal University Page No. 170
References
1. Laudon, Kenneth. C. Traver and Carol Guercio. 2002. E-Commerce:
Business, Technology, Society. MA: Addison Wesley Publishing Company.
2. Tan, Margaret. 2004. E-Payment: The Digital Exchange. Singapore:
Singapore University Press.
10.1 Introduction
The previous unit discussed e-payment systems, which is just another online
facility that makes payments convenient for online buyers. All these facilities
make the Web even more popular. In fact, it is impossible to think of life without
the Web. So, what is the Web? This unit will give you the answer.
The World Wide Web (www), popularly referred to as the Web, is a
network of millions of servers, hosts and users, and is one of the most popular
services on the Internet. It is based on online web pages, which can be defined
as a collection of texts, images, videos and sound. Web pages stored on the
World Wide Web are accessed through an interactive software called Web
browser. Mozilla Firefox, Internet Explorer and Google Chrome are some popular
Web browsers. These web pages are written in HTML or Hyper Text Markup
Language (HTML). HTML is a script-based language that is used extensively
for publishing information on the Web. Hypertext is similar to normal text, the
difference being that it is linked to some other text, page or information content.
Entire documents on the World Wide Web are accessed through a standard or
protocol. Hypertext Transfer Markup Language (HTTP) is a commonly known
transfer protocol used for transferring hypertext documents from a host to a
client computer. You can say that the World Wide Web is a distributed hypermedia
systema system where information resides on multiple websites or servers.
Therefore, while browsing the Internet, you can see the links from one document
to another and from one site to another.
E-Commerce Unit 10
Sikkim Manipal University Page No. 172
Almost all the protocols available on the Internet are accessible on the
Web. These protocols include e-mail, File Transfer Protocol (FTP), Gopher,
Telnet, and so on. The World Wide Web has its own protocolHTTP. The
World Wide Web provides several Internet-based client/server applications, such
as www, e-mail, File Transfer Protocol (FTP), Chat, UseNet, Telnet and
Newsgroups. Some popular services are explained in the following sections.
Objectives
After studying this unit, you should be able to:
List the services that are available on the Internet
Summarize the importance of the software that helps you to connect to
the Internet
Describe the concept of a search engine
Identify and list the popular and commonly used search engines
10.2.4 Telnet
Telnet (Telecommunication network) is a network protocol used on the Internet
or in local area network (LAN) connections. It was developed in 1969 and is one
of the first Internet standards. With Telnet, a user can get access to a commandline
interface on a remote machine.
Telnet is a software which implements the client part of the protocol. Telnet
clients are available for almost all platforms. However, because of security issues
with Telnet, its usage has gone down considerably.
(Source: Adapted from Wikipedia)
Example: Take the case of a person who works in the Mumbai office of a firm.
He is in Delhi on official work and wants to log into his computer in the Delhi
office. He can do this using the Telnet protocol, as shown in Figure 10.1.
Client Side Server Side
TCP/IP TCP/IP
Request to
Server
Request received
from client
The Telnet client computer must run a Telnet client application and the
Telnet server must run a Telnet server application. The users computer, which
E-Commerce Unit 10
Sikkim Manipal University Page No. 176
initiates the connection, is referred to as the host computer or telnet client, and
the machine being connected to, which accepts the connections, is referred to
as the remote login computer or Telnet server.
10.2.5 Web Chat
Web chat allows users to communicate with one another in real time through
Web interfaces. A Web browser is the only requirement to be able to chat on
the Web.
The history of Web chatting is closely linked to the evolution of Web
technology. Earlier, chat sites consisted of simple interfaces that were dynamically
generated HTML pages. The pages could feature a choice of fonts, colours,
images and links to give it a lively and vibrant look. But HTML pages came with
their disadvantages as well, the main one being their interactivity. Every HTML
message required a form to be submitted and a page to be loaded. As a result,
there was a waiting period before each message could be sent. There were
other problems too. There were delays in receiving messages and page flicker
because of frequent page reloads. As a result, the use of HTML chat sites
reduced.
These problems with HTML led to the development of other technologies
for Web chatting. Java applet technology was introduced in 1995. Java was
suitable as an interface for chatting because of its advanced network and
graphical capabilities. But Java too had its own problemslong initial page loading
time. However, despite this problem, this technology has worked well and scaled
well.
Newer technologies have been in use since 2005. These include Ajax
and Flash, and are used for the new chat systems such as Buzzen Chat. These
technologies are trendy and their strength is in their graphical and usability
features. Although these technologies are not error-free either, their strengths
are likely to see them being used extensively.
(Source: Adapted from Wikipedia)
available to subscribers. The charges for these services have also changed.
Many ISPs now offer flat-fee, unlimited access plans.
Prodigys (a leading ISP in the US) Chief Technical Officer had said in
1999, Eleven years ago, the Internet was just an intangible dream that Prodigy
brought to life. Now it is a force to be reckoned with.
Online service interfaces
The first online service utilized a simple text-based interface. The content that
the user could access was predominantly text and users entered their queries
and choices through a command prompt. So, any computer with a modem and
terminal communications program could access these online services. Gradually,
graphics user interfaces (GUI) began to be developed. The early GUI-based
interfaces offered only limited graphics on their sitesmainly simple icons and
buttons and text. But with improvement in modem speed, more complicated
graphics could be offered by the service providers. Today, images, music, text
just about anything one could wantis available and offered on the Net.
Common resources provided by online services
Resources and online services available include:
Airline reservations
Online games
Message boards
E-mail
Chat services
File download services
Online dictionary and encyclopaedia
Current news and weather
Online games
The mid 1990s saw the launch of new GUI-based messaging clients led
by PowWow (then ICQ). In 1997 came AOL Instant Messenger. A few years
later ICQ (then owned by AOL) was awarded two patents by the US Patent
Office for instant messaging services. During the same period, Yahoo Excite,
Ubique and MSN began to develop their own messaging applications which
used their own client and proprietary protocol. This posed a problem for the
usersif they wanted to use multiple networks they would have to run more
than one client applications.
Jabber, an open source application which was based on an open standards
protocol, was launched in 2000. This technology enabled Jabber servers to act
as gateways to other instant messaging protocols. The need for running multiple
clients was thus reduced. Multi-protocol clients can use any of the popular IM
The well-known Instant Messaging icons and symbols are shown here;
identify each one of them. Which one do you use?
E-Commerce Unit 10
Sikkim Manipal University Page No. 181
Activity 1
Prepare a chart showing how Internet services have changed the way people
communicate the world over.
Self-Assessment Questions
1. State whether the following are true or false.
(a) You can use a Web browser to view texts, images, video and
multimedia on web pages.
(b) FTP is a generic term for a cluster of programs used to transfer files
or data from one computer to another.
2. Fill in the blanks with the appropriate word.
(a) A majority of web pages are linked to other Web resources
through_______.
(b) _______ allows users to communicate with one another in real time
through Web interface.
(c) The first online service to offer Internet access was ______.
(d) ______ allows a user to save a conversation for later reference.
Service
The above figure gives a general outline of URL structure. This outline is
followed by most, but not all, URLs. The first part is the service specifier,
(here HTTP service) which specifies the access method. Specifically this
is the part before the colon. Some examples of services are: http:,
gopher:,wais:andftp:.
Address and Port Number
The second part is usually the Internet address of the server, indicated by
the double forward slash (//). This address can also contain the (optional)
port number the service listens at. The full name is then specified by a
string like //www.address.edu:1234/, where :1234refers to the port
number 1234. If you want to use the default port number you can leave
out both the colon and the number, i.e. //www.address.edu/.
E-Commerce Unit 10
Sikkim Manipal University Page No. 184
Resource Location
The forward slash after the host and port specifications indicates the end
of the address and the beginning of the specification for the file/resource
to be accessed. This field varies depending on the service being accessed.
(vi) Hypertext
Hypertext is a form of text on a computer that leads a user to related
information on demand. Web pages can be linked together using hypertext.
Unlike traditional text which is static, hypertext makes possible a dynamic
organization of information through hyperlinks. One can design hypertext
to perform various tasks. It can link different file formats, such as text,
audio, video, image, animation, and so on. When a user clicks on it or
hovers over it, a bubble with a word definition may appear.
(vii) HyperText Markup Language
HyperText Markup Language (HTML) is the Web programming language
used to create Web documents for WWW. HTML allows you to bring
together text, images, audio and video so that they can be viewed on the
Web.
HTML is a method where ordinary text can be converted into hypertext. It
is a set of special codes included to control the layout and appearance of
the text. Technically, HTML is not a programming language. It combines
instructions with data.
HTML is the character-based method for describing and expressing
content, which can be in the form of image, text, sound or video clips.
How can you start your own HTML codes?
1. Open any editor, say Notepad.
2. Write the HTML codes.
3. Save your file with .htm or html extension (like abc.htm or
abc.html).
4. Open this file in any browser (Internet Explorer or Google Chrome).
Document tags
All HTML files should include the following tags:
HTML Tag
Head Tag
E-Commerce Unit 10
Sikkim Manipal University Page No. 185
Title Tag
Body Tag
Example of HTML coding structure
<HTML>
<HEAD>
<TITLE>.</TITLE>
</HEAD>
<BODY>
.
.
.
.
</BODY>
</HTML>
(viii) Hyper Text Transfer Protocol
Hyper Text Transfer Protocol (HTTP) is the standard protocol used for
transferring web pages across the Internet. It also supports requesting
and responding. This means a client can make a request to a server for
any website, and the server will respond to the client using HTTP.
(ix) Internet Service Provider
An Internet Service Provider (ISP) is a firm that provides Internet access
to a consumer for a fee. Incidentally, MTNL was the first Internet service
provider in India.
(x) Web Server
The Internet Web server is a computer that is connected to the Internet
all the time (24 x 7). You can access a particular website through an
Internet Web server from anywhere. In other words, a web server is a
high-configuration computer that gives responses to users requests. It
also hosts multimedia content such as web pages, etc. Figure 10.2 shows
you graphically how this server works.
E-Commerce Unit 10
Sikkim Manipal University Page No. 186
Browser reads
the text sent by
server and web
page is
displayed on
clients screen
www.ask.com
www.khojo.com
Figure 10.4 Home Page of the Google Search Engine
External
Modem
Internet
PC
Figure 10.5 Connecting to the Internet
E-Commerce Unit 10
Sikkim Manipal University Page No. 189
Self-Assessment Questions
3. State whether the following statements are true or false.
(a) TCP/IP is the basic protocol that enables users to communicate over
the Internet.
(b) A website is a collection of web pages linked to each other.
(c) Uploading enables you to transfer any content from a Web server to
a host computer.
4. Fill in the blanks with the appropriate words.
(a) ______accesses content on the Web and then displays it on the
computer screen.
(b) _______is a form of text on a computer that leads a user to related
information on demand.
(c) _________ is a firm that provides Internet access to a consumer for
a fee.
(d) _____is a software that can control traffic to and from any IP address.
10.4 Summary
Let us recapitulate the important concepts discussed in this unit:
set; today, almost any media format can be sent, including attachments
consisting of audio and video clips.
File transfer protocol (FTP) is a network protocol used to transfer data
from one computer to another through a network, such as the Internet.
Telnet is another technology with which a user can get access to a
command line interface on a remote machine.
Web chat allows users to communicate in real time using easily accessible
Web interfaces. All that is required to chat is a Web browser and it gives
the user instant access.
In early 1992, the Internet was opened to commercial activities. A new
class of online service providers emerged later on to provide access to
the Internet and offer a slew of Internet-based services.
The three types of Internet software that enables a user to connect to the
Internet are protocol, dialer software and Web browser.
10.5 Glossary
World Wide Web: It is a system of interlinked hypertext documents
accessed via the Internet.
File Transfer Protocol (FTP): It is a network protocol used to transfer
data from one computer to another through a network such as the Internet.
Telnet: It is a network protocol used on the Internet or in LAN connections.
Instant Messaging (IM): It is a form of real time communication between
multiple users based on typed text which is conveyed through devices
connected over a network such as the Internet.
Hypertext: It is a form of text on a computer that leads a user to related
information on demand.
URL: It is the web address of any resource on the WWW. It identifies the
Internet application protocol, host name, path and file name.
Hyper Text Markup Language (HTML): It is a web programming
language. HTML allows users to bring texts, images, audio and video so
that they can be viewed on the Web.
E-Commerce Unit 10
Sikkim Manipal University Page No. 191
10.7 Answers
Answers to Self-Assessment Questions
E-Commerce Unit 10
Sikkim Manipal University Page No. 192
References
1. Schneider, Gary P., and Jessica Evans. New Perspectives on the Internet.
Course Technology, 2002.
2. Schlein, Alan M., Peter Weber, and J. J. Newby. Find It Online: The
Complete Guide to Online Research. Facts on Demand Press, 2002.
3. Turban, Efraim, Jae Kuy Lee and Michael Chung. Electronic Commerce:
A Managerial Perspective. Prentice-Hall, 1999.
4. Whitley, David. E-Commerce: Strategy, Technologies and Applications.
Tata McGraw-Hill, 1998.
Unit 11 E-Marketing
Structure
11.1 Introduction
Objectives
11.2 Challenges of Traditional Marketing
11.3 Retailing in E-Commerce Space
11.4 Internet Marketing
11.5 Advertisement and Display on the Internet
11.6 E-Commerce for Service Industry
11.7 Summary
11.8 Glossary
11.1 Introduction
The previous unit discussed the technologies available on the Internet, including
e-mail, instant messaging, search engines and Internet-related software.
The world is changing every minute, every second. Change has taken
over the field of marketing too. New methods of marketing, that is, online
marketing and e-marketing have evolved. The successful harnessing of Internet
marketing has given rise to benefits such as online purchase and sale of goods
along with the generation of leads. This unit will discuss the benefits that the
Internet offers over traditional marketing. It will also talk about the advantages
that retail businesses can achieve through e-commerce and by advertising on
the Internet.
Objectives
After studying this unit, you should be able to:
List the challenges faced in traditional marketing
Identify and summarize the advantages of Internet marketing
Classify the types of Internet marketing
Describe the importance of e-commerce in the service industry
Discuss the effectiveness of adverstiments and displays on the Web
E-Commerce Unit 11
Sikkim Manipal University Page No. 194
Self-Assessment Questions
1. State whether the following statements are true or false.
(a) Traditional marketing operates on the basis of the four Ps.
(b) In traditional marketing, a detailed marketing plan is drawn after
segmenting and studying the target customers.
2. Fill in the blanks with the appropriate words.
(a) It is not possible for the company to interact with the customers
because between the two operate the______and_______.
(b) With customers being exposed to more and more brands with each
passing day, _______is reducing.
Self-Assessment Questions
3. State whether the following statements are true or false.
(a) Online transactions are always high on cost.
(b) In e-commerce, it is possible for consumers to keep track of their
orders.
4. Fill in the blanks with the appropriate words.
(a) ________and_________related to purchasing are used to guide
marketing and purchasing and to improve the quality of services.
(b) ________enable you to avoid printing and mailing costs.
of potential customers. All that is required is a few clicks of the mouse. Thanks
to the Net, your products and services can be viewed or read about by many
people in different parts of the world, at the same time.
online. It does not require you to be physically present with the customer for the
sale to take place.
Before the Internet became popular, a businessman would have had to
travel abroad in search of overseas clients and to finalize transactions. As a
result, only affluent businessmen or big companies could afford foreign travels.
Now, even small-scale businessmen can attract foreign customers and interact
with prospective clients without having to travel anywhere.
Unlike the traditional forms of marketing including print and audio/video
media, the Internet offers an economical and cost-effective method of marketing.
You can get business without bothering to participate in trade fairs or shows.
The Internet enables prospective buyers to go through the product
catalogue/gallery at any hour of the day or night, at their convenience.
For a company with diverse products, advertising on radio and television
can be very constraining. The limitation is in terms of the time. In such situations,
the Internet offers freedom to display a wide range of products and give detailed
descriptions and information related to rates, size, colours, etc.
Increased sales and profits enable the website owner to recover the cost
incurred on the maintenance of the website.
It often happens that certain markets are not tapped by a seller because
he is not aware of it or is located far away from it. This drawback is taken care
of by Internet marketing. As a result, new markets have been discovered.
11.4.1 Types of Internet Marketing
There are many types of Internet marketing. Some of these are discussed as
follows:
1. Pay per click
2. Search Engine Optimization (SEO)
3. Internet auctions
4. Affiliate marketing
5. Banner advertising
6. Directory listings
7. Ethical e-mail marketing
8. Viral marketing
Let us learn a little about each of these types.
Pay Per Click: In this type of marketing, a certain amount is paid to the
search engine by the website, to ensure that the site is featured separately
E-Commerce Unit 11
Sikkim Manipal University Page No. 199
the reader into a prospective buyer. This will result in an increase in the
brand value of e-commerce. Professional agencies help their clients/
website owners to prepare news articles and upload on relevant sites and
online news media.
Viral Marketing: Viral marketing is an idea that spreads and while it is
spreading, it helps to market your business. It is a phenomena that
encourage people to pass on a marketing message. Some marketing
campaigns can be huge and they use social media to achieve their cause.
They may be in the form of video clips games, images, text message. For
example, the Tamil song Why this Kolavari Di is from the sound track of
an upcoming film. It became viral on the net due to its Tanglish lyrics!
When you visit a shop, for instance, to purchase a bed, the salesman will
try to sell you matching sheets, cushions, pillows, mattresses, etc. Similarly,
on the Net, when people send e-mails, they unwittingly end up infecting
the recipient of their mail with the ads appearing at the bottom of the
message. This is called viral marketing.
11.4.2 Internet Consumer and Market ResearchNeeds of
Website Consumers
While designing a website, a company may have many objectives in mind. An
effective website would attract consumers and describe the objectives of the
company such as:
1. Creating a healthy relationship with consumers
2. Attracting consumers to the website
3. Designing an interesting website to encourage consumers to explore
4. Motivating consumers to stay on the website
E-Commerce Unit 11
Sikkim Manipal University Page No. 201
effective content.
Research on consumers generally involves the following:
Identification of the audience
Segmentation of visitors to the website
Study of the level of Internet usage by visitors, whether it is light, medium
or heavy
Integration of data pertaining to consumer profiles, sales and attitudes
Comparison of online and offline performances
Study of the channels that are used frequently
Exploration of the ways in which offline and online channels can be
used together to gain an edge and increase sales
Use of custom surveys
Evaluation of customer satisfaction levels
Identification of the most effective ways in which customers can be
attracted
11.4.3 Advantages and Disadvantages of Internet Marketing
Internet marketing has its positive as well as negative aspects. Both the merits
as well as the demerits have to be understood well before a proper Internet
marketing strategy can be created.
E-Commerce Unit 11
Sikkim Manipal University Page No. 202
Advantages
The online store is open at all times, day and night. Customers from all
parts of the globe can shop at any time of the day or night.
It is the most economical way of spreading your message. Sending emails
to subscribers is a lot cheaper than posting letters to them.
Subscribers can be updated promptly through e-mails. Website visitors
can access current and updated information every time they visit the
website. Customers can be informed about promotional schemes and
sales as soon as they access their e-mails.
Online magazines/newspapers or law firms are information-sensitive
businesses. They can obtain products straight without relying on the courier
service. Products can be delivered directly to the customers without using
a courier service.
Disadvantages
Online marketing does not come without a price. The cost of offering the
product or providing the service should take into account the expenditure
on software, hardware, time, effort, website design and maintenance and
online distribution costs.
Only about 50 per cent of households indulge in online shopping. This
means that you are able to reach out only three out of six households.
from the marketing point of view and not from the customer service point
of view.
The security of various sites is doubted by the visitors. Many visitors do
not want to risk transacting online using credit cards for fear of having
their personal/credit card information stolen.
Those visiting your site have probably been to other similar sites as well.
A purchase can be guaranteed only if they find exactly what they want.
Visitors expect some free content or special offers or bonuses.
Activity 2
Search the Web and prepare a chart showing real examples of the various
types of Internet marketing.
Self-Assessment Questions
5. State whether the following statements are true or false.
(a) Mall linking service enables the clients site to get linked to the Internet
connection of many other online shopping mall service providers.
(b) In pay per click, a certain amount is paid to the search engine by
the website.
(c) Online marketing comes at free cost.
6. Fill in the blanks with the appropriate word.
(a) ________ and _____enable the website owner to recover the cost
incurred on the maintenance of the website.
(b) When a firm engages other websites or firms to market their products,
it is called______.
(c) ______occurs when a customer is convinced to buy another product
When the Web first began to get commercialized in the late 1990s,
innumerable new websites were created and a lot of money in the form of venture
capital was invested in them. The websites were either e-commerce websites
or content sites. While the former offer things for sale and earn their income by
selling services and products, the latter create content or collect and offer
pictures, videos, words and other content for interested readers to view.
Content websites earn their income mainly through advertising, like TV
stations, radio stations and newspapers. Advertising on the Web is on the rise
across the globe. Marketers cannot ignore the strength, effectiveness and power
leads to the meta data (about the web pages) and the advertisements becoming
commodities and proxies for the ads and web page content. This process is
used by the search engine, Google.
So, nowadays when people discuss e-advertising, they generally refer to
it as online advertising. This is advertising in the online environment, that is,
using websites, e-mail ads, etc. Although the forms may be different, the basic
principles remain more or less similar to that of traditional advertising; for instance,
organizations make use of paid space to promote businesses.
E-advertising is considered as persuasive, non-personal information
related to a product or service that appears in an e-mail or on a web site.
Businesses have realized that by advertising online, they will be able to reach
their target market faster and in a more efficient manner. Online marketers and
advertisers have highly benefitted from e-advertising because of cost-effective,
innovative and better targeted opportunities.
Advertisement and Marketing
E-advertising and marketing go hand-in-hand. The world of e-advertising is
known for its technical expertise and brilliance on the Internet. The marketing
industry uses the might of this electronic medium to bring about the publicity of
goods and services. The colour, brilliance and attractiveness of this medium
serves the purpose of the marketing industry in total and to the maximum.
All advertising industries work toward the same goal, that is, boosting
clients sale. Manufacturers, retailers, service providers and non-profit
organizations approach e-advertising agencies to develop attractive webpages
which will help in the publicity of the goods and services being offered.
When it comes to e-advertising and marketing, it is interesting to note
that e-advertising helps to bring about marketing. This is because e-advertising
is a cost-efficient way by which you can carry the message of your product to
potential customers. The knowledge of the product can reach customers all
over the world.
The other major advantage of e-advertising and marketing is that unlike
any other form of marketing, the Internet provides advertisers the scope to
keep a track of the number of customers who have visited their site and more
so enrolled and carried out a booking for their goods and services. E-advertising
and marketing help in the promotion and expansion of online shopping. Eadvertising
and marketing help in acquainting customers with the utility and
durability of products.
E-Commerce Unit 11
Sikkim Manipal University Page No. 207
Self-Assessment Questions
7. State whether the following statements are true or false.
(a) Advertising involves bringing a product or service to the attention of
potential and current customers.
(b) Advertising is usually the largest expense of a marketing plan.
(c) E-advertising is a type of indirect marketing.
8. Fill in the blanks with the appropriate words.
(a) Content websites mainly earn their income through_______.
(b) _______of the websites helps to determine the price of the
advertisement.
Self-Assessment Questions
9. State whether the following statements are true or false.
(a) The smaller travel agencies benefit more from e-commerce than
the bigger well-established companies.
(b) Most major airlines earn a good part of their revenue from their
website dealings.
10. Fill in the blanks with the appropriate words.
(a) All travel-related business deals on the Net are referred to as..
(b) ______gives the smaller firms a competitive advantage over their
larger counterparts.
11.7 Summary
Let us recapitulate the important concepts discussed in this unit:
E-marketing has become popular by providing solutions to the challenges
and issues that are generally faced in traditional marketing. These
challenges include high cost of offerings and lack of interaction with
consumers.
With more and more brands coming into the market with each passing
day, the need for an all-round marketing strategy has led to the adoption
of the Web for marketing purposes.
Online marketing results in reduced cost, greater potential and high returns.
For Internet marketing to succeed it is important for a firm to emphasize
on market, which is its target, with the help of correct selection of media,
design and type of advertising, directory listings, online news articles and
viral marketing.
11.8 Glossary
11.10 Answers
Answers to Self-Assessment Questions
E-Commerce Unit 11
Sikkim Manipal University Page No. 211
References
1. Turban, Efraim, Jae Kuy Lee and Michael Chung. Electronic Commerce:
A Managerial Perspective. Prentice-Hall, 1999.
2. Whitley, David. E-Commerce: Strategy, Technologies and Applications.
Tata McGraw-Hill, 1998.
12.1 Introduction
In the previous unit, you learnt that today many business firms and individuals
benefit from the commercial development of the Internet. The unit discussed
the merits of Internet marketing and how it overcomes various challenges faced
by the traditional marketing system. However, this development of Internetbased
marketing also exacts a price from individuals, organizations and societies.
The benefits must be carefully considered to seek and make ethical and socially
responsible decisions in this environment.
E-commerce is so new that the legal, ethical and other public policy issues
necessary for setting up an e-commerce are still evolving.
Such issues are important for the success of e-commerce. The major
social, ethical and political issues surrounding e-commerce are categorized as:
Privacy
Consumer protection
Taxation
Intellectual property
Free speech
Other legal issues and ethics
Every organizations mission states the purpose of the organizations
existence, determines the purpose of the website and provides the framework
for a companys e-commerce strategy. Regardless of its involvement level, a
company has to develop strategies to meet its goals. Making it easier for website
E-Commerce Unit 12
Sikkim Manipal University Page No. 214
perform transactions over the internet through credit cards without fear of criminal
mishaps. The Act offers the much-needed legal framework so that information
is not denied legal effect, validity or enforceability, solely on the ground that it is
in the form of electronic records.
Keeping in view the growth in transactions and communications carried
out through electronic records, the Act empowers government departments to
E-Commerce Unit 12
Sikkim Manipal University Page No. 216
accept filing, creating and retention of official documents in the digital format.
The Act has also proposed a legal framework for the authentication and origin
of electronic records / communications through digital signature.
From the perspective of e-commerce in India, the IT Act 2000 and its
provisions contain many positive aspects. Firstly, the implications of these
provisions for the e-businesses would be that email would now be a valid and
legal form of communication in our country that can be duly produced and
approved in a court of law.
Companies shall now be able to carry out electronic commerce using the
legal infrastructure provided by the Act.
Digital signatures have been given legal validity and sanction in the Act.
The Act throws open the doors for the entry of corporate companies in
the business of being Certifying Authorities for issuing Digital Signatures
Certificates.
The Act now allows Government to issue notification on the web thus
heralding e-governance.
The Act enables the companies to file any form, application or any other
document with any office, authority, body or agency owned or controlled by the
appropriate Government in electronic form by means of such electronic form as
may be prescribed by the appropriate Government.
The IT Act also addresses the important issues of security, which are so
critical to the success of electronic transactions. The Act has given a legal
definition to the concept of secure digital signatures that would be required to
have been passed through a system of a security procedure, as stipulated by
the Government at a later date.
Under the IT Act, 2000, it shall now be possible for corporates to have a
statutory remedy in case if anyone breaks into their computer systems or network
and causes damages or copies data. The remedy provided by the Act is in the
form of monetary damages, not exceeding `1 crore.
Source: Adapted from: http://www.lexvidhi.com/article-details/importantprovisionsof-the-information-technology-act-2000-144.html; http://www.aicteindia.
org/downloads/itact2000.pdf
12.2.2 Legal Issues
(b) Intellectual property: Trademarks, copyrights and patents are the most
common intellectual property issues affecting cyberspace.
(c) Free speech: The Internet provides the maximum opportunity for free
speech.
(d) Taxation: It is illegal to impose any new sales tax on Internet business.
(e) Consumer protection: Different types of fraud exist in electronic trade.
(f) Other legal issues: Several legal issues are related to e-commerce such
as validity of contests, jurisdiction over trades, encryption policies and
Internet gambling.
Protecting privacy
Privacy is the right to be left alone and the right to be free of unreasonable
personal intrusions. Privacy is a girder supporting freedom. The right to privacy
is recognized today in virtually all the US states and by the Federal Government,
either by statute or common law.
In the 20th century, privacy-related thoughts and legislation focussed on
restraining the government and using personal information. With the widespread
use of the Internet and e-commerce, the issue of privacy became more critical.
A special organization called the Electronic Privacy Information Centre exists
for focussing on the protection of privacy.
Although online businesses gather and use anonymous demographic
information, in many cases, the profiles derived from tracking consumers
activities on the Web are linked with personally identifiable information.
The ways in which someone can collect private information about you
through the Internet are by:
Reading your newsgroups postings
Finding you in the Internet directory
Reading your e-mail
Making your browser record information about you
Website self-registration and the use of cookies are the two information
gathering tools.
Websites can gather customer information through filled-out registration
questionnaires. Information may be collected with an aim to plan the business
or can be sold to a third party and used in a wrong or improper way.
E-Commerce Unit 12
Sikkim Manipal University Page No. 218
information that allows a website to record a visitors comings and goings. This
click stream data is used to create profiles that can include hundreds of distinct
data fields for each consumer.
One way to protect privacy is to form privacy policies or develop codes
which can help organizations to keep legal hassles or problems at bay.
In addition to the common laws and the constitution, there are both federal
laws and state laws that protect individuals against government intrusions and
in some cases define privacy rights, vis--vis private organizations such as
financial, education and media institutions.
Protecting intellectual property
Trademarks, copyrights and patents are the most common intellectual property
issues affecting cyberspace. Intellectual property refers to the intangible property
that corporations and individuals have created and which is protected under the
laws of patent, copyright and trade secret.
Copyright is a statutory grant that provides the creators of intellectual
property with ownership.
A trademark, as defined under the Trademarks Act, 1999, is a mark capable
of being represented graphically and which is capable of distinguishing the goods
or services of one person from those of others and may include the shape of
the goods, their packaging and combination of colours.
A patent is a document that grants the holder exclusive rights on an
invention for twenty years.
Legal protection
The Digital Millennium Copyright Act of 1998 is the first major effort to adjust
the copyright laws to the Internet age. This legislation was the result of a
confrontation between the major copyright holders in the United States.
The penalty for wilfully violating the DMCA includes restitution to the injured
parties of any losses due to infringement.
Criminal remedies are available to federal prosecutors, including fines
upto $ 500,000 or five years imprisonment for a first offence, and upto
$ 1 million in fine and ten years of prison for repeat offenders.
DMCA implements a World Intellectual Property Organization Treaty of
1996 which declares it illegal to make, distribute or use devices that circumvent
technology-based protection of copyrighted material and attaches stiff fines
and prison sentences for violations.
E-Commerce Unit 12
Sikkim Manipal University Page No. 219
Patents are very different from copyrights. Patents protect the ideas
themselves and not merely the expression of ideas. There are four types of
inventions for which patents are granted under patent lawmachines, manmade
products, compositions of matters and processing methods.
In order to be granted a patent, the applicant must show that the invention
is original, novel, non-obvious and not evident in prior arts and practices.
Domain issues
Two controversies concerning that deals names are as follows:
(i) Whether top-level domain names, for example, .com; .org and .gov should
be added.
(ii) Whether companies can use trademarks of other companies as domain
names.
12.2.3 Ethical Issues
Ethics is a branch of philosophy that deals with what is considered to be right
and wrong. Ethics is the heart of social and political debates about the Internet.
In many instances, an individual facing an ethical decision is not actually
considering whether or not to break the law.
Actions may be considered unethical on the basis of the firm, the country
and the particular circumstances related to the scenarios.
The spread of e-commerce has created many new ethical situations. Ethics
is different in different countries. In a continent like Asia, more emphasis is
placed on the benefits to the society than on the rights of individuals.
Codes of ethics are developed by various companies and organizations.
These are sets of principles meant to serve as guides for the members.
Mason et. al (1995) have categorized ethical issues into issues related to
privacy, accuracy, property and accessibility.
(i) Privacy deals with collection, storage and dissemination of
information.
(ii) Accuracy deals with accuracy, authority and fidelity of the information
gathered and processed.
(iii) Property deals with ownership and value of information and
intellectual property.
(iv) Accessibility deals with the right to information and payment of fees
to access it.
E-Commerce Unit 12
Sikkim Manipal University Page No. 220
Legal and ethical issues are important for the success of e-commerce.
The organizations that are active in this area are:
The Organization for Economic Cooperation and Development
CommerceNet
Activity 1
Find out the names of at least two organizations in India that look into the
legal and ethical issues in e-commerce activities.
Self-Assessment Questions
1. State whether the statements are true or false.
In the weaknesses (W) block, the specific areas of current and future
weaknesses for the company are stated.
The study can find an opportunity to sell e-commerce software developed
for the internal purposes to others or to add new products.
E-Commerce Unit 12
Sikkim Manipal University Page No. 222
The trial may come from competitors or from spreading some corporate
resources too thin.
Internal
Factors
External
Factors
Strengths (S) Weaknesses (W)
Opportunities (O)
Threats (T)
SO Strategies WO Strategies
Generate strategies here
to use strengths to
take advantage of
opportunities
ST Strategies ST Strategies
Generate strategies
here to take advantage
of opportunities by
overcoming weaknesses
Generate strategies here
to use strengths to
avoid threats
Generate strategies
here to minimize
weaknesses and
avoid threats
Figure 12.2 The SWOT Diagram
for products and services, but also provides an opportunity for totally new services
and products. Examples are contract services, network supply and support
services and directory services, market makers and many types of online
information services. E-commerce implementation may not be followed by sales
unless companies plan and re-engineer their organizations appropriately.
Strategy formulation can also include several other topics. Therefore, one
can use a methodology such as that of the critical success factors.
Critical Success Factors for E-Commerce
The critical success factors for e-commerce are the business technologies and
human factors without which the desired level of organizational goals cannot be
achieved. Often, it helps to start considering business environments and the
advantages of e-commerce before analysing the risks involved, if any, in the ecommerce
project.
The major success factors of e-commerce can be summarized as support
received from the top management; technological infrastructure; specific services
or products traded; project team reflecting various functional areas; acceptance
of customer; user-friendly Web interface; degree of trust between buyers and
sellers; integration with the corporate legacy systems; security and control of
the e-commerce system; competition and market situation; cost of the ecommerce
project; pilot project and corporate knowledge.
Value Analysis Approach
Value analysis approach is used to assess the desirability of e-commerce to
employ a formal value-chain analysis (Porter, 1985).
A value chain refers to a series of activities performed by a company to
attain its goals at various stages of the production process. The goals may
range from acquisition of resources to product delivery. Companies that pursue
the creation of additional value using their e-commerce channels should consider
the competitive market and current rivalry to best leverage its e-commerce
assets.
One way for an e-commerce vendor to achieve an advantageous position
is to differentiate itself by providing superior service at every point of contact
with the customers.
E-Commerce Unit 12
Sikkim Manipal University Page No. 224
Customer
Acquisition
Relationship
Marketing
Customer
Retention
Customer
Extension
Customer
Selection
All those values and risks need to be examined and appropriate priorities
need to be set to help formulate a desirable e-commerce strategy.
12.3.3 E-Commerce Scenarios
An e-commerce project can be implemented once the strategic planning and
the cost-benefit analysis are completed.
Hutchinson (1997) described four e-commerce scenarios that can be used
to accomplish the task.
(i) Open, global commerce scenarios where removal of intermediaries
is a powerful force that flattens the value chain.
Evaluation of Outsourcing
E-commerce requires access to the Web, building of the site and connection of
the website to the existing corporate information system for its implementation.
A decision has to be taken whether to purchase a commercial e-commerce
software package or use a Web hosting company. Another option is to hire a
Web designing house that specializes in e-commerce designs.
Web Content Design
A Web team has to design Web content features such as e-mall, shopping cart
software, online catalogues, dynamic databases, animation and security.
Security and Control in e-Commerce
The Web team has to develop effective security and privacy guidelines and
these should address the following:
The Internet features that require monitoring
The policies accessed and used
The revelation of information via the Net
Activity 2
One of the critical success factors of e-commerce is maintaining a degree
of trust between the buyers and sellers. What according to you are some
ways to promote a healthy relation between the two?
Self-Assessment Questions
3. State whether the statements are true or false.
(a) Industry and competitive analysis entails the monitoring, evaluation
and dissemination of information.
(b) Organizational strategy risks are external and result from joint venture
alliances.
4. Fill in the blanks with the appropriate words.
(a) A_____describes the specific strengths, weaknesses, opportunities
and threats of a business.
(b) A company will formulate the objectives of each e-commerce project
based on its_______.
E-Commerce Unit 12
Sikkim Manipal University Page No. 228
(c) The critical success factors for e-commerce are the ______
and_______.
(d) A_______refers to a series of activities performed by a company to
attain its goals at various stages of the production process.
(e) __________involves the creation of a Web team that represents
various functional areas as well as the planning for detailed
technology tasks.
12.4 Summary
12.5 Glossary
Copyright: A statutory grant that provides the creators of intellectual
property with ownership
Trademark: A mark capable of being represented graphically and of
distinguishing the goods or services of one person
Patent: A document that grants the holder exclusive rights on an invention
for twenty years
Ethics: A branch of philosophy that deals with what is considered to be
right and what is wrong
E-Commerce Unit 12
Sikkim Manipal University Page No. 229
Domain: A set of websites on the Internet which end with the same group
of letters, for example .com, .org
Pilot project: An activity planned as a test or trial
12.7 Answers
Answers to Self-Assessment Questions
E-Commerce Unit 12
Sikkim Manipal University Page No. 230
References
1. Turban, Efraim, Jae Kuy Lee and Michael Chung. Electronic Commerce:
A Managerial Perspective. Prentice-Hall, 1999.
2. Whitley, David. E-Commerce: Strategy, Technologies and Applications.
Tata McGraw-Hill, 1998.
13.1 Introduction
In the previous unit, you learnt about the legal, ethical and other public policy
issues necessary for setting up an e-commerce. These issues included Privacy,
Consumer protection, Taxation, Intellectual property, Free speech, and other
legal issues and ethics. Every organizations mission states the purpose of the
organizations existence, determines the purpose of the website and provides
the framework for a companys e-commerce strategy.
Also, the units preceding Unit 12 shed light on the various features,
requirements and applications of e-commerce. The units also helped you analyse
the pros and cons of conducting an e-commerce, by comparing it with traditional
business systems. This unit introduces a related conceptM-commerce. A
relatively new conceptin 1997 two mobile-phone enabled Coca Cola vending
machines were installed in Helsinki, FinlandM-commerce is now popular the
world over. From making payments over the phone to booking tickets for a
movie, there is no dearth of M-commerce-related services today.
This unit will also delve into the evolution and development of various
generations of mobile wireless technology, besides giving you a comparative
account of each.
E-Commerce Unit 13
Sikkim Manipal University Page No. 232
Objectives
After studying this unit, you should be able to:
Identify the role of wireless application protocol (WAP) in mobile Internet
Access
Classify the basic components of the WAP model
Describe the architecture of the WAP model and evaluate the significance
of each layer of the model
Assess the evolution of the various generations of mobile wireless
technology
Identify the two components of mobile commerce
Recommend the various networking standards for mobiles
Contrast the various advantages and disadvantages of M-commerce
13.2 Overview of M-Commerce Wireless Application
Protocol (WAP)
Since the development of mobile wireless technology in the early 1970s, the
mobile wireless industry has come up with many new technologies that have
revolutionized the way communication occurs the world over. The recent past
has seen the mobel wireless technologies have seen four or five generations
starting from 0G4G. With the introduction of the cellular concept in the 1G
brought about the mobile wireless communication. Since then the 2G enabled
the replacement of analogy technology with digital communication; while in 3G
emphasis is given to data communication, besides the voice communication.
Thus, a converged network for both voice and data communication is
emerging. Moreover, research is in full swing to introduce many killer applications
for the 4G.
The term mobile commerce or M-commerce has no particular definition.
Several analysts and vendors have defined M-commerce in varied ways. Put
simply, when a mobile device is used for electronic commerce, it is referred to
as mobile commerce or M-commerce.
The following are some popular definitions of M-commerce.
(i) M-commerce is the use of a mobile device to communicate, inform,
transact, and entertain using text and data via a connection to the
public and private network. Lehman Brothers
E-Commerce Unit 13
Sikkim Manipal University Page No. 233
E-Commerce Unit 13
Sikkim Manipal University Page No. 234
communication. Figure 13.1 shows that to reach the content on the server a
Uniform Resource Locator (URL) is used by the clients.
E-Commerce Unit 13
Sikkim Manipal University Page No. 236
The client uses a Web browser to display the contents provided by the
server in a standard format called the Hyper Text Markup Language (HTML)
and the script language (Java Script, Visual Basic (VB) Script, etc.,) to enhance
the content functionality.
HTTP Response (HTML)
HTTP Request (URL)
Client Web Server
WAP
Device with
Browser
WAP Device
WAP
Gateway WAB Server
WSP Encoded Request
(URL)
WSP Encoded Response
(WML)
CGI
Scripts
Etc.
Content
The WAP client communicates with the WAP server by using the WAP
gateway. The WAP gateway translates the client requests to www requests
before submitting the request to the WAP server.
(ii) Exchanging data between the client and the server using a coding scheme
that is much more compact than the traditional HTML text.
(iii) Suspending and releasing sessions between the client and the server.
3. Transaction Layer or Wireless Transaction Protocol
A lightweight transaction-oriented protocol is provided by WTP which is
appropriate for mobile phones and which also runs on top of a datagram service.
A dependable way of communication is provided with an ability to avoid
duplication and retransmit lost messages. WTP manages three types of
transactions:
(i) Unreliable one-way request: A message is sent and no
acknowledgement is expected from the receiving device. Such applications
use the Wireless Datagram Protocol (WDP).
(ii) Reliable one-way requests: A message is sent and the recipient sends
an acknowledgement.
(iii) Reliable two-way request-reply transactions: A message is sent and
the recipient replies with exactly one result message. The sender then
finally acknowledges the result message. If the recipient knows that the
message processing time exceeds the initiators timer interval, the recipient
may send a hold on message to prevent the initiator from resending the
original message.
4. Security Layer or Wireless Transport Layer Security (WTLS)
A transport layer security between the WAP gateway and the WAP client is
provided by the security layer. Your data is protected by WTLS including privacy,
E-Commerce Unit 13
Sikkim Manipal University Page No. 239
Each network has its own advantage and disadvantage in terms of performances,
delays and errors.
Activity 1
Prepare a list of some examples of M-commerce.
Self-Assessment Questions
E-Commerce Unit 13
Sikkim Manipal University Page No. 241
Self-Assessment Questions
3. State whether the following statements are true or false.
(a) 1G used FDMA technology for modulation.
(b) In a 2G network, both data and voice use packets.
4. Fill in the blanks with appropriate words.
(a) 2G uses a combination of_______and ______technologies.
(b) ______uses the same encoding techniques as 2G.
E-Commerce Unit 13
Sikkim Manipal University Page No. 242
via antennas.
The wireless (unguided media) methods include radio-based, satellitebased
and light-based wireless systems.
Radio-Based Wireless System: Radio-based systems include radio
waves, satellites and paging systems. These use radio frequency
signals that range between 100 KHz 20 KHz.
Radio waves include the following types:
(i) Short wave
(ii) Ultra high frequency
Radio frequency (RF) is of three types:
(i) One-way RF signals that cover upto 10 miles; for example, digital pagers.
(ii) Two-way Transceivers are used by RF for sending and receiving data
upto six miles.
(iii) Local: It functions in the medical, scientific and industrial (ISM) bands.
Radio-based services can be grouped into two main categories:
(a) Land based: Cellular communication packet data between network and
specialized mobile radio (SMR).
(b) Satellite based: Paging systems and very small aperture satellite (VSAT).
Land-based radio systems use low power transmitters and receivers to
send and receive data, while satellite-based systems use high frequency.
Satellite-Based Wireless System: Satellite microwave systems
transmit signals between directional parabolic antennas. A
communication satellite is a microwave relay station placed 36,000
km above the equator. It is a satellite placed in a geosynchronous
E-Commerce Unit 13
Sikkim Manipal University Page No. 243
not as fast as many cable connections, but it is fine for updating files,
downloading the days schedule or transmitting other forms of data.
The goal is compatibility between personal digital assistants, notebooks
and desktop computers as well as peripherals such as printers, fax
machines and even telephones.
2. Mobile Information Access Devices
There is a wide variety of information access devices. These are:
(i) Portable computer
(ii) Hybrid computers
(iii) Personal digital assistants
(i) Portable computers
Portable computer can be of any of the following three categories.
Portable Computers
Laptops Notebooks Hand-helds
Figure 13.4 Types of Portable Computers
E-Commerce Unit 13
Sikkim Manipal University Page No. 244
(a) Laptops
Laptops are useful for running applications that demand very powerful hardware,
such as Computer Aided Design (CAD) and video presentations.
(b) Notebooks
Notebooks serve the traditional user who wants to do a large amount of word
processing and manipulate sizable spreadsheets. The subnotebook allows a
close approximation of the desktop computing experience and is a mainstream
of mobile computing. Subnotebook designs include applications in ROM and
Windows software.
(c) Hand-held system
Hand-held system is a powerful system when several of its capabilities are
combined with more intuitive functions, such as phone lists and messaging.
(ii) Hybrid Pen Computer
A hybrid pen computer provides a pen-based system instead of a keyboard. It
is provided with two options:
(a) Without keyboard
(b) With keyboard
In case a keyboard is provided, it is of the standard size and there is a
mouse which is used as a pen. The user gets a tablet-size writing pad when the
display is closed.
(iii) Personal Digital Assistants (PDAs)
Personal digital assistants are similar to PCs but smaller in size can fit inside a
coat pocket. The PDA is optimized in size and weight, which means it has limited
functionality. The PDA market is divided into three functional segments:
(a) Digital assistants: In this segment, the hand-held device captures data
and digitizes it. It combines personal information management with
Self-Assessment Questions
5. State whether the following statements are true or false.
(a) The unguided media methods include radio-based, satellite-based
and light-based wireless systems.
(b) Land-based radio systems use high power transmitters and receivers
to send and receive data.
6. Fill in the blanks with appropriate words.
(a) Satellite microwave systems transmit signals between___antennas.
(b) Sub-notebook designs include applications in ____and___software.
signal sources. Therefore, each transmitter uses the channel after the time
interval of (577 8) microseconds or 4.615 ms (GSM).
2. Frequency Division Multiple Access (FDMA)
Frequency multiplexing requires a separation of the frequency bands used for
transmission by different channels. The available frequency range is divided
into bands which are used by multiple sources or channels at the same time.
FDMA is an access method which assigns different slices to different users for
accessing the same carrier. FDMA suffers from inter-modulation.
3. Code Division Multiple Access (CDMA)
In CDMA neither the frequency domain nor the time domain are divided, rather
the same frequency is shared at the same time by all users. A code or sequence
is assigned to every user and the bit rate of the information transferred by the
user is bigger than the bit rate of the sequence.
As long the correct code is with the receiving device, it can select its
conversion out from others. Any further user that is added, the complete interface
enhances and it gets difficult to take out a users sequence that is unique to him
from other users. For CDMA, maximizing the battery life of mobiles and the
precise power control is significant in increasing the systems capacity. Mobiles
that transfer extreme power boost interference to other mobile phones.
13.5.1 Future Trends in Mobile Commerce
Most trends and advances are seen in Asia, Europe and North America. But
nowadays, almost all countries benefit from using M-commerce. Many
businesses use M-commerce as a competent process of meeting the demand
of their customers. That is the reason why mobile phones and PDAs have
become so popular.
M-commerce has been adopted by banks and many financial institutions
to access account information, for example, stock quotes, financial advices
and balance inquiries from anywhere and make transactions, like paying money
and buying stocks through the mobile phone. This method is termed as
m-banking or mobile banking.
Mobile phones are also becoming popular for providing news from
anywhere in the world. The demand for mobile services has led to the growth of
sports, entertainment, reservation and shopping service on the mobile phone.
M-commerce is being used by organizations to increase the scale of everything
and widening the rangefrom advertising, marketing and services. Security
plays an important role in mobile commerce. Mobile companies, today, invest a
E-Commerce Unit 13
Sikkim Manipal University Page No. 247
significant part of their revenue for the protection of their customers and
information related to them from intruders and online hackers.
13.5.2 Advantages of M-Commerce
Self-Assessment Questions
13.6 Summary
Let us recapitulate the important concepts discussed in this unit:
When a mobile device is used for electronic commerce, it is called mobile
commerce or M-commerce.
WAP allows a mobile user with a WAP device to access and communicate
information and services.
WAP has three componentsWAP gateway, WAP server and client
device.
The WAP protocol stack has six layers, with each layer having distinct
roles.
The past two decades saw the evolution of several generations of wireless
mobile technology, from 0G 3G. While 4G is still in the evolution phase,
5G is in the pipeline.
The various components of mobile commerce can be grouped into two
categoriesthe wireless communication component and the access
devices for mobile computing.
Some of the popular information access devices are the portable computer,
hybrid computers and personal digital assistants (PDAs).
The three basic mobile networking standards are the Time Division Multiple
Access (TDMA), Frequency Division Multiple Access (FDMA) and Code
Division Multiple Access (CDMA).
13.7 Glossary
Mobile commerce: Using a mobile device such as a mobile phone or
PDA to conduct e-commerce
E-Commerce Unit 13
Sikkim Manipal University Page No. 249
13.9 Answers
Answers to Self-Assessment Questions
References
14.1 Introduction
In Unit 13, you learnt that mobile commerce or m-commerce is the use of a
mobile device to conduct business transactions. The unit discussed in detail the
architecture of WAP (wireless application protocol) and the components of mobile
commerce. The unit also discussed that there are three mobile networking
used to re-key the data into another business application. Inherent in this process
are poor response times and excessive paperwork and the potential for errors
as information is transcribed. The use of the postal system can add days to the
exchange process. The advent of business computers has enabled companies
to process data electronically, that is, exchanging information via electronic
means.
Electronic data interchange (EDI) is defined as the computer-to-computer
transfer of information in a structured and predetermined format.
E-Commerce Unit 14
Sikkim Manipal University Page No. 253
Self-Assessment Questions
14.3 E-CRM
+
Customized Service
benefits
Price
+
Costs others than
price
Perceived Quality
(Obtained)
Perceived Sacrifice
(Given)
Perceived
Value
Figure 14.2 Customer Value Orientation
E-Commerce Unit 14
Sikkim Manipal University Page No. 258
The less profitable ones are deleted from the list. A websites design and quality
plays a critical role in determining the extent to which customers trust a company
and willingly conduct transactions and provide personal information. Just like
the Internet, e-commerce and e-CRM solutions are increasingly being used in
the corporate sector. Consequently, much time is being devoted to making the
system more sophisticated and safe for customers.
It is clear that customer relations are based on three things: service, trust
and loyalty. Customers have to believe that a company or business is working
with their best interest in mind. Actually, this trust creates an emotional bond
between the business and its customers. Without trust, there can be no
relationship.
14.3.5 Use of E-CRM
CRM covers the entire gamut of customer-related interactions and business. A
commendable CRM program is one that not only acquires customers and
provides them service, but also retains them. This can be done by practising
the following:
Providing round-the-clock technical assistance and customer service
Offering methods to manage and schedule follow-up sales calls
Recognizing customers value and developing suitable service strategies
for all customers
Storing information regarding customer preferences in order to target
customers selectively
Tracking all communication pertaining to a customer
Providing a system to rectify service insufficiencies
Providing a system to schedule and manage repair and maintenance and
on-going support
Identifying potential problems before they occur
Providing a method to handle complaints and issues
14.3.6 Failure of E-CRM
Designing, creating and implementing IT projects is not an easy task. It is
considerably risk prone since it involves a lot of money and a high chance of
failure. Nonetheless, the fact that the failure rate of CRM has dropped from 80
per cent to 40 per cent is indicative of a positive trend. The following are the
major issues that are related to CRM failure:
E-Commerce Unit 14
Sikkim Manipal University Page No. 260
E-CRM CRM
1. It provides information in response
to specific customer inquiries.
2. Promotion and discounts are
offered to individual customers.
3. Pricing of products is negotiated
with each customer.
4. New product features are created in
response to customer demands .
1. It has the uniform message of Push
and Sell for all customers.
2. Promotion and discounts are the
same for all customers.
3. The sellers set the pricing of products
for all customers.
4. CRM is determined by the seller,
based on research and development.
Activity 1
Research the Net and find the names of at least six CRM software packages.
Self-Assessment Questions
3. State whether the following statements are true or false.
(a) The first step in E-CRM involves collecting information about the
customer and creating a customer information environment.
(b) There are four phases in E-CRM.
4. Fill in the blanks with the appropriate words.
(a) E-CRM has its foundations in the Internet and.
(b) The third phase of CRM is.
14.4 E-SCM
The Internet has enabled customers to search for specific products, that too at
prices they are willing to pay. Customers are the focus of modern supply chains.
E-Commerce Unit 14
Sikkim Manipal University Page No. 261
and outside the company. They can deliver new products and services to
customers where they demand them and when they demand them.
14.4.1 Why E-SCM?
Supply chains have often been seen as rigid sequences of activities that
contribute to the manufacture, production and delivery of products. It involves
inflexible manufacturing plans, hypothetical shipping schedules and questionable
inventory forecasts.
The Internet has changed this conventional process into something which
is nearer to science. Organizations benefit from an Internet-enabled supply
chain in the following ways:
Minimize administrative overheads
Abstain costly disasters
Reduce the labour cost
Earn bigger profit margins on completed goods
Harvest on revenue-producing gains and cost cutting
Remove outdated business processes
Accelerate responsiveness and production to customers
Decrease needless inventory (thereby maximizing working capital)
Customer service can be improved and inventories can be reduced if a
companys supply chain is integrated effectively.
E-Commerce Unit 14
Sikkim Manipal University Page No. 262
for production, testing, packaging and delivery preparation. The most vital
metrics of supply chain are to measure levels of quality, produce output
and worker productivity.
iv) Deliver: This part of SCM is also called logistics. It manages the orders
receipts from customers, chooses delivery services to send goods to
customers, establishes an invoicing system to get payments and sets up
a group of warehouses.
v) Return: The difficult part of the supply chain is return. A network should
be created that will receive faulty and surplus products back from
customers and help customers who have trouble with the products that
are delivered.
14.4.3 E-SCM: How it Fulfils Customer Needs
All aspects of a business are covered by SCM. It starts from the raw materials
and finishes at the end-user. When you enter a shop to purchase a certain item,
try to imagine the sequence of steps that has brought it to the point where you
see it. You will find a price tag on the material, with all the details of its date of
E-Commerce Unit 14
Sikkim Manipal University Page No. 263
manufacturing, date of expiry, lot number, etc. The shop has carefully placed it
on the shelf after procuring it from a distributor and noting all these details for
billing and tracking future complaints. The shop always maintains an inventory
of this and hundreds of other products that are available in the store, as well as
a minimum stock level and a re-order level.
When you complete your purchase, the point of sale updates this
information at various places. The stock level will decrease and revenue will
increase. If stock levels reach a certain level then the distributor has to replenish
the stock before it becomes zero and the distributor also has to be paid his due
amount. This chain is again pushed backwards to the lowest level of the supplier
who has to supply the material in time. By this process, there is constant flow of
money and material in order to satisfy the needs of the customer.
Actually, a supply chain manages the flow between different stages to
maximize productivity and minimize overstocking. The SCM system is a collection
of many applicationsdemand, inventory and transportation planning.
14.4.4 Advantages of E-SCM
The advantages of e-SCM can be divided into two categories:
Real time advantage
Strategic advantage
Real Time Advantages
The real time advantages of e-SCM are as follows:
Global trading capabilities
Knowledge can be exchanged globally
Self-Assessment Questions
14.5 Summary
14.6 Glossary
Electronic data interchange (EDI): Defined as the computer-to-computer
transfer of information in a structured and predetermined format.
EDI translator: Automatically reformats an invoice into the EDI standard
agreed by both the business entities
Customer relationship management: Involves those techniques that
are used by companies to build their relationships with clients.
Transaction Processing System (TPS): A type of information system
that collects, stores, modifies and retrieves the data transactions of an
enterprise.
End-To-End System: A term used in many business arenas referring to
the beginning and end points of a method or service
Supply Chain Management (SCM): A systematic integration of suppliers,
Original Equipment Manufacturer (OEM), distributors and customers in
order to produce and distribute the right quantities, to the right locations,
at the right time, and at the cheaper cost, while satisfying the entire supply
chain partners
1. Explain the architecture of EDI. Add a note on the benefits of using EDI.
2. Discuss the importance of E-CRM in todays business world.
3. Explain the various E-CRM solutions.
4. Discuss the various phases of E-CRM. How do you implement and
integrate CRM solutions in an effective way?
5. What are the basic components of E-SCM?
6. Identify and list the various advantages of E-SCM.
E-Commerce Unit 14
Sikkim Manipal University Page No. 266
14.8 Answers
Answers to Self-Assessment Questions
1. (a) True; (b) False
2. (a) Business application; (b) An EDI translator
3. (a) True; (b) False
4. (a) Sales Force Automation; (b) retention
5. (a) True; (b) False
6. (a) Customers; (b) independent
References
1. Laudon, Kenneth C. and Carol Guercio Traver. E-Commerce: Business,
Technology, Society. N.J: Prentice Hall, 2004.
2. Turban, Efraim, Jae Kuy Lee and Michael Chung. Electronic Commerce:
A Managerial Perspective. Prentice-Hall, 1999.
3. Whitley, David. E-Commerce: Strategy, Technologies and Applications.
Tata McGraw-Hill, 1998.