Chapter - 1 Electronic Commerce Environment and Opportunities
Chapter - 1 Electronic Commerce Environment and Opportunities
2
Sunil Mahesh
- On-line networks and services: - On-line services provide access to informa-
tion, entertainment, communications and transaction services. In general, this term
refers to networks by companies such as America Online (AOL), Compuserve, etc
- The on-line environment presents challenges as well as opportunities to a variety
of markets
- The Internet: Web commerce: The Internet is the most popular commercial
domain for business marketers due to low-cost commercial point and clicks Internet
software and WWW browsers. The Web's ease of access as well as its multimedia
capabilities and downloadable applications (eg. with Java)
- Screen Phones: Screen phones are similar to regular telephones but have ad-
vanced features such as credit card readers, small screen, and keypads that can be
used for a variety of interactive, transactional and information services.
- Kiosks: Kiosks are displays used to provide merchandise information in a remote
location, such as a retail store or a shopping mall.
3
Sunil Mahesh
Chapter – 2
Modes of Electronic Commerce
2) What EDI? Explain EDI process or sellers or buyers with neat dia-
gram
Ans: - EID is defined as the Inter-organization exchange of documents in a
standardized electronic form directly between computer applications.
- In basic terms, EDI can be thought of as the replacement of paper - based purchase
orders with electronic equivalents.
- Hence, EdI’s goal is to enable easy and inexpensive communication of structural
information throughout till-6 corporate community
4
Sunil Mahesh
- Above diagram illustrates process involved in typical sellers & buyers transactions
- Pre- purchasing activity is supported by white/yellow pages, supplier directories
online pricelist, and offer details.
- Post- purchasing activity is cheque writing & dispatch process.
System Approach
There are a number of ways in which computers can be set up to support EDI. A
single dedicated PC can be used as the company's link to the outside world.
i) Application Software: - Using P.C with dialog we can start EDI.
ii) Message translator: - software is available that provides all necessary func-
tions, such as communication protocol & message translator.
5
Sunil Mahesh
iii) Routing Manager: - Used to establish communication links, whenever data
exchange is required.
iv) Communication handler: - It is possible to print the messages, so that infor-
mation can be a handler.
Approach: The development of open EDI enables several types of rollout strate-
gies. Generally, users can be classified into two groups.
- The first group is composed of users (individuals or companies) who are not cur-
rently EDI users.
- This presents three migration paths to users.
(i) A non-user becoming a private network/ VAN user. This is the most common
migration when companies are considering the additional use of EDI.
(ii) A current EDI user who wishes to make a transition to open EDI.
(iii) A non- EDI user who can make a direct transition to open EDI.
6
Sunil Mahesh
- The Internet remains considerably less expensive than the use of VANs. Migration
from EDI to open EDI for many firms is due to cost factor.
Tools are:
i)File Transfer protocol (FTP):
- FTP can provide an inexpensive method to deliver information to customers, par-
ticularly for long technical materials such as manuals, specifications, Frequently
Asked Questions.
- FTP is the way most Internet users get files from another Internet host (servers).
FTP allows a user to log on to a remote host (server) but restricts the user to a lim-
ited set of commands
ii) Telnet:
- Telnet is a utility allows users a log into a remote system just as though they were
logging into a local system.
- Once logged in, the users have the same access to the system as though they
logged in from a terminal attached directly to the system.
- This method requires computer skills. Also, the logged - in party tends to get ac-
cess to a lot of the system capabilities, including OS access
iii) Gopher: Gopher is one of the information search and retrieval tools that pre-
ceded the widespread use of WWW. Gopher's use is now commonly integrated with
the most sophisticated browser interfaces.
- The important aspect of Gopher is, it can be easily implemented. It can be de-
scribed as document delivery tool.
iv) World Wide Web: The world wide web is the most user - friendly informa-
tion service on the Internet.
- WWW has the ability to incorporate FTP, WAIS, Gopher, e-mail and FTP appli-
cations through one user interface.
- WWW applications are available since the early 1990s before that, a user would
need an FTP client to connect to an FTP archive, a WAIS client to search a WAIS
server, and a Gopher client to get to a Gopher server.
7
Sunil Mahesh
Chapter – 3
Approaches to safe Electronic Commerce
ii) Merchant: This is a merchant of goods, services and/or e-products who accepts
payment for them electronically and may provide selling services and/or electronic
delivery of items for sale (eg. e-products).
iv) Certificate Management System: This is an agent of one or more bank card
associations that provides for the creation and distribution of electronic certificates
for merchants, acquirers and cardholders.
V) Banknet: This represents the existing network which interfaces acquirers, issu-
ers and (now) the certificate management system.
Messages for off-line (ie. e-mail) transactions or transactions sent to merchant non-
on-line with the acquirer
Purchase Order Response (acknowledgement without authorization).
8
Sunil Mahesh
Following Task performed by Acquirer:
i) Authenticate the merchant.
ii) Verifies the Acquirer.
iii) Decrypt the payment instruction from buying cardholder.
iv) Formats authorization request to the issuer & receives the response.
v) Response to the merchant with a validates authorization request response.
SEPP Architecture
In the above diagram, the buying cardholder workstation is based on the World
Wide Web browser. Through this web browser, the buyer can shop and conduct ne-
gotiations with the merchant system offering items for sale.
- The merchant’s website is hosted on the web server.
- Two designs of cardholder work stations are supported.
(1) The electronic payment system is integrated into the WWW browser.
(2) An alternate system called "bolt-on payment software may be provided along-
side an independent browser to implement the payment process.
-Functions added to traditional WWW browsers to support electronic payments in-
clude encryption and decryption of payment data, certificate management, and au-
thentication, and support for electronic payment protocols.
- The certificate request server issues the authentication certifications for clients.
- The buying cardholder must obtain authentication certificate from the certificate
request server before making the transactions, as the cardholder's credentials are
verified by the merchant (through acquirer).
-Another important interface in the buying cardholder's system is with the merchant
system. This interface supports the buying cardholder's segment of the payment
protocol, which enables the buying cardholder to initiate payment, perform inquir-
ies.
9
Sunil Mahesh
- Provide for confidential payment information and enable confidentiality of order
information that is transmitted with payment information.
- Ensure integrity for all transmitted data.
- Provide authentication that a buyer is a legitimate user of a branded (e.g. Visa,
MasterCard, American Express) bankcard account.
- Provide authentication that a merchant can accept bank card payments through its
relationship with an appropriate financial institution
- Ensure the use of the best security practices and design techniques to protect all
legitimate parties in an electronic commerce transaction.
- Ensure the creation of a protocol that is neither dependent on transport security
mechanisms nor prevents their use.
- Facilitate and encourage interoperability across software and network providers.
10
Sunil Mahesh
Class 3: It verifies information as in class-2, in addition, it requires organization
ID, other information. This is used for E-bank, corporate database access, E-
commerce server software validation.
Chapter – 4
Payments and Security
1) What is Electronic Payment? What are the payment related issues for
successful e-commerce?
Ans: - Electronic payment systems are becoming central to on-line business process
innovation as companies look for ways to service customers faster and at a lower
cost.
- Emerging innovations in the payment for goods and services in electronic com-
merce promise to offer a wide range of new business opportunities.
12
Sunil Mahesh
-When c-cash created by one bank is accepted by others, reconciliation must occur
without any problems.
(2) E-cash must be interoperable: that is. exchangeable as payment for other e-
cash, paper cash, goods or services, lines of credit, deposits in banking accounts,
bank notes or obligations, electronic benefits transfers, etc..
- Most e-cash proposals use a single bank.
(3) E-cash must be storable and retrievable: Remote storage and retrieval (eg.
from a telephone -or personal communications device) would allow users to ex-
change e-cash from home or office or while travelling.
Advantages:
i) They work in the same way as traditional cheques, thus simplifying customer
education.
ii) Electronic cheques are well suited for clearing micropayments: their use of con-
vention cryptography (symmetric encryption) makes it much faster than systems
based on public-key cryptography (e-cash).
iii) Electronic Cheques create a float and the availability of float is an important re-
quirement for commerce. The third-party accounting server can make money by
charging the buyer or seller a transaction fee or a flat rate fee, or it can act as a bank
and provide deposit accounts and make money on the deposit pool.
iv) Financial risk is assumed by the accounting server and may result in easier ac-
ceptance. Reliability and scalability are provided by using multiple accounting
servers.
- A prototype electronic cheque system called "NetCheque" was developed at In-
formation Sciences Institute (ISI) by Clifford Newmann.
- Net Cheque will include software for writing and depositing cheques independent
of other applications to be called automatically when integrated with other systems.
13
Sunil Mahesh
Ans: - Smart cards are credit and debit cards and other card products enhanced with
microprocessors capable of holding more information than the traditional magnetic
stripe.
- Smart cards are basically of two types:
i) Relationship-based smart cards.
ii) Electronic purses. Electronic purses, which replaces money, arc is also known as
debit cards and electronic money.
ii) Electronics purses and Debit Cards: - The electronics purse works in the
following manner: After the purse is loaded with money, at an ATM or through the
use of an inexpensive special telephone.
- It can be used to pay for coffee vending machine need only verify that card is au-
thentic & enough money available for a cup of coffee.
- Electronics purses would virtually eliminate for change or small bills in a busy
store or rush hour toll booth. And waiting for a credit card to be approved.
(i) Payments using plain credit card details: The easiest method of the ex-
change of unencrypted credit cards over a public network such as telephone lines or
the Internet.
- The low level of security inherent in the design of the Internet makes this method
problematic authentic is also important. Without encryption, there is no way to do
this.
(ii) Payments using encrypted credit card details: It would make sense to en-
crypt our credit card details before sending them out, but even then there are certain
factors to consider. One would be the cost of a credit card transaction itself.
- Such cost would prohibit low-value payments (micropayments) by adding costs to
transactions.
(iii) Payments using third party verification: One solution to security and
verification problems is the introduction of a third party: a company that collects
and approves payments from one client to another.
- After a certain period of time, one credit card transaction for the total accumulated
amount is completed. Some of the companies involved in online credit card
processing: VISA, MasterCard, American Express etc.
14
Sunil Mahesh
Encryption and Credit Cards:
- In this scheme, each consumer and each vendor generates a public key and a se-
cret key (also called private key).
- The public key is sent to the credit card company and put on its public key server.
The secret key is re-encrypted with a password and the unencrypted version is
erased.
15
Sunil Mahesh
8) Explain the process of OTPP for buying online information.
Ans:
- OTPP to refer ‘Online Third Party Processors’. OTPPs have created a 6 steps
process that they believe will be a fast and efficient way to buy information online:
(1) The consumer acquires OTPP account number by filling out a registration form.
This will give the OTPP a customer information profile that is backed by a tradi-
tional financial institution such as a credit card.
(2) To purchase a product online, the consumer requests the item from the merchant
by quoting his/her OTPP account number.
(3) The merchant contacts the OTPP payment server with the customer's account
number.
(4) The OTPP payment server verifies the customer's account number for the ven-
dor and checks for sufficient funds.
(5) The OTPP payment server sends an electronic message to the buyer. This mes-
sage could be an automatic WWW form that is sent by OTPP server or could be a
simple e-mail. The buyer responds to the form or e-mail in one of the three ways:
Yes, I agree to pay; No, I will not pay; or Fraud, I never asked for this.
(6) If the OTPP payment server gets a Yes from the customer, the merchant is in-
formed and the customer is allowed to download the material immediately. The
OTPP will not debit the buyer's account until it receives confirmation of purchase
completion.
ii) Managing Information Privacy: - The electronic payment system must en-
sure and maintain privacy.
- All details of a customer's payment can easily be aggregated where, when and
sometimes what the consumer buys is stored.
- This collection of data tells much about the person and as such can conflict with
individual's right to privacy.
- Users must be assured that knowledge of transactions will be confidential, limited
only to the parties involved and their designated agents if any.
- Privacy must be maintained against eavesdroppers on the network and against
unauthorized insiders.
iii) Managing Credit Risk: - Credit risk is a major concern in net settlement
systems because a bank's failure to settle its net position could lead to a chain
reaction of bank failures.
- The digital central bank must develop policies to deal with this possibility.
Various alternatives exist, each with advantages and disadvantages.
- A digital central bank guarantee on settlement removes the insolvency test from
the system because banks will more readily assume credit risks from other banks.
11) What is E-mail? Explain e-mail working & Secure E-mail Technolo-
gies.
Ans: - E-mail: it is the use of electronic messaging technologies to allow computer
users to communicate with each other for a variety of purposes.
- An electronic message can consist of a single line text; or some other document
encompassing text, video, sound, images, or some other document as an attachment.
- Due to the quick and inexpensive form of communication, email has become a
primary means of communication within corporations as well as among individual
users.
- Corporate electronic mail systems now support electronic commerce, group
discussion, scheduling and workflow applications, widespread use is forcing users
to examine the reliability and performance of their e-mail infrastructures, including
security.
- E-mail messages pass through a series of hosts and/or routers that direct them to
their intended destinations; this creates the possibility of a security liability.
- There are several protocols designed and implemented for the same e-mail
communications through the Internet.
- E-mail allows one to transmit messages and other files (through the Internet) to
people located anywhere in the world.
18
Sunil Mahesh
ii) S/MIME (Secure MIME): - Developed by RSA in 1993. It is secure multiple
part e-mail based on PKCS standards.
iv) SMPT: - It performs message transmission function, but only supports seven-
bit ASCII transmissions and limit the maximum message size. It is standard for
internet mail.
v) PKCS: Public key Cryptography standards:- Describes how to sign & en-
crypt massage & distribute/manage keys.
19
Sunil Mahesh
Chapter – 5
Consumer Oriented E-commerce
20
Sunil Mahesh
Now let us learn about each phase in detail:
i) Pre-purchase preparation: There is a common misconception among sellers
that attractive WebPages would tempt buyers to go for purchase quickly, but there
are many types of customers.
They are:
(i) Impulsive buyers: Who purchase products quickly
(ii) Pattern buyers: Who purchase products often making some comparisons.
(iii) Analytical buyers: Who do more research before making the decision to pur-
chase products or services? Normally consumers search for product information at
first and then a comparison of alternatives; also look for price negotiation and then
finally decide to buy.
- The time taken to go through these steps is called purchase deliberation.
The online shopping experience can be categorized into two, they are:
21
Sunil Mahesh
(i) Utilitarian: - This behaviour has been portrayed as task-related and rational,
the i.e. product is purchased in a deliberate and efficient manner.
(ii) Hedonic: - This type of searching is fun and playfulness rather than task com-
pletion. Here the purchase of the product is incidental to the entire experience of
shopping.
b) Mercantile Process using Digital Cash: In this scenario, a bank (or a con-
sortium of banks) mints electronic currency also called e-cash.
- Such currency is simply a series of bits that the issuing bank can verify to be valid.
This currency is kept secure by the use of cryptographic techniques.
- The e-cash is similar to paper currency and has the benefits of being anonymous
and easily transmitted electronically.
The following is the generic mercantile protocol based on the use of e-cash.
(i) Buyer contacts seller to purchase products/services.
(ii) Seller states price
(iii) Buyer sends e-cash to the seller.
(iv) Banker shows ‘green signal’ to the seller.
22
Sunil Mahesh
i) Order Planning and Order Generation: The order planning is the first step
in the business process.
- The workforce in the production department drafts a capacity plan that specifies
how much money will be spent, how many people will be hired.
- The sales force or marketing unit may have a different forecast. Sometimes, lack
of internal communication can cause the final result to differ significantly from
what is actually needed.
ii) Cost Estimation and Pricing: Pricing is the bridge between customer needs
and company capabilities, but most companies do not understand how to execute
order-based pricing in online markets.
- Order-based pricing is difficult to work but proper execution will fetch a greater
profit. Often, battles erupt between engineers who do the estimation, accountants
who tabulate costs, management that oversees pricing, and the sales force that actu-
ally quotes a price.
iii) Order Receipt and Entry: - After an acceptable price quote, the customer
enters the order receipt. This order is done by customer service.
23
Sunil Mahesh
v) Order fulfilment and delivery: - During this phase, the actual provision of
the product or service is made.
- This is a most difficult phase to implement. E.g: different parts of an order mat be
created in different manufacturing are merged at one site.
- In service operations, it can mean sending individuals with different talents to the
customer site.
Chapter – 6
Inter Organizational Commerce
24
Sunil Mahesh
- Electronic data interchange is the electronic transfer from one computer to another
of computer processable data using an agreed standard to structure the data.
Benefits of EDI
i) EDI saves time, cost and due to automated transfer of information errors are nil.
ii) EDI transactions produce acknowledgements of receipt of data; this facility can
eliminate invoice i.e., paperwork.
iii) EDT reduces postage bill as no papers are sent across.
Iv) EDI can improve customer service by enabling quick transfer of business docu-
ments. Inventory maintenance is done efficiently with the help of EDI.
25
Sunil Mahesh
- It also provides other services including holding messages in 'electronic mail-
boxes' interfacing with other VANs and supporting many telecommunication
modes.
- A VAN's 'electronic mailbox' is software in which a user deposits EDI transac-
tions and then retrieves those messages when convenient.
- It works much like residential personal mailboxes.
- VANs have allowed companies to automatically and securely exchange purchase
orders, invoices, and payments.
b) The Junk Mail Model: Direct mail advertisers use targeted mailing lists to
reach highly specialised audiences.
- The disadvantage of direct mail includes relatively high cost per contact, the need
to obtain updated and accurate mailing lists.
Chapter – 8
Consumer search and Resource discovery
5) What is Information filtering? What are the typical features of the fil-
tering process?
Ans: - Information Filtering:
- Information Filtering describes a variety of processes involving the delivery of
information to people who need it.
- This technology is needed as the rapid accumulation of information in electronic
databases makes it necessary that consumers and organizations rely on computing
methods to filter and take required information.
- To distinguish information filtering from searching, the necessity to list the filter-
ing process steps arises:
i) Filtering systems involve a large volume of data.
ii) Filtering involves removal of data from an incoming stream, rather than finding
data in that stream.
iii) Filtering access the information that comes as a result of a search query.
iv) Filtering is based on descriptions of individual or group information, preferences
often called profiles.
v) Filtering systems deals primarily with textual information.
Chapter – 9
Electronic Publishing
30
Sunil Mahesh
- A message digest is generated by passing the message through one-way crypto-
graphic functions i.e one that cannot be reversed.
- Message digests are designed to protect the integrity of a piece of data or media to
detect changes and alterations to any part of a message. They are a type of cryptog-
raphy.
- Message digest hash numbers represent specific files containing the protected
works. One message digest is assigned to particular data content.
- Message digests are encrypted with private keys creating a digital signature.
- Message digests protect one-way hash algorithms taking random data and trans-
mitting a set length hash value
Chapter – 10
Web Design
1) What is Website? How you develop a Website? Mention its tools, tech-
nique and methods.
Ans:- A website is a collection of related web pages, including multimedia content,
typically identified with a common domain name, and published on at least one web
server.
- A website may be accessible via a public Internet Protocol (IP) network, such as
the Internet, or a private local area network (LAN), by referencing a uniform re-
source locator (URL) that identifies the site.
31
Sunil Mahesh
- Web pages, which are the building blocks of websites. Typically composed
in plain text interspersed with formatting instructions of Hypertext Mark-up Lan-
guage (HTML).
32
Sunil Mahesh
Note: Ad hoc is the term used to refer unplanned and temporary arrangement made
to accomplish a task.
Basic Web Process Model: There are various phases involved in website devel-
opment just like any other software.
- The process model must help the developers in the following ways:
To address the complexity of the site.
To minimise the risk of project failure.
To deal the near certainty of change.
To deliver the site quickly
- The 'waterfall' model is the most common model adopted in software engineering.
- This model describes the phases in the lifetime of the software.
- Though most web developers adopt the waterfall model for site development,
- The waterfall approach makes the developers plan everything but it requires vast
experience.
A Public Website: An Internet website also called external website is one that is
not explicitly restricted to a particular class of users.
An intranet website: It is private to a particular organisation, generally run
within a private network rather than on the Internet at large.
An Extranet site: This type of website is available to a limited class of users,
but is available via the public Internet.
- The major difference between the three basic site categorizations is an audience.
- The public website designers know little about the users whereas the designers of
private websites can meet every user of the site and take input.
SITE Architecture:
There are two structural aspects of my website. They are:
i) Logical structure: The logical structure will describe documents that are
related documents i.e. link between documents.
ii) Physical structure: The physical structure describes where a document actu-
ally lives i.e, the documents directory path on a web server or its location in a data-
base.
- The designers must hide the real path. In other words, users should not be shown
the physical file structure of the site.
- There are four main organisational models used in websites. They are:
a) Linear b) Grid c) Hierarchy d) Web
a) Linear Model: The linear form is very common in many sites. The information
is presented in a linear fashion just like the flow of textbook contents.
- This model is adopted whenever a step by step procedure is necessarily in linear
order.
There are really only five general areas for navigational elements in a
web page.
top, bottom, left, right and centre.
34
Sunil Mahesh
i) Top Navigation: In most of the websites, 'navigation choices are placed at the
top of the screen because they will be shown immediately.
- Page contents are normally downloaded in top-down order.
- Also traditionally in graphical user interfaces, menus are placed at the top of the
screen.
- The disadvantage of this navigational style is scroll problem.
- When the user reaches the bottom of the page again, scroll up to the top of the
page for the link is a tiresome job.
ii) Bottom Navigation: Placing navigation controls at the bottom of pages is less
preferred as it forces scrolling unless page content is less.
- Using frames or other technologies, it is possible to fix navigation at the bottom of
the screen that appears on the screen.
iii) Left Navigation: This style of page design is very common because most
readers will scan information from left to right.
- This helps to navigate directly to the reading path of the user.
- Sometimes, left navigation controls distract reading and also occupies more screen
area.
- To have navigational controls at the left side of the page without gobbling screen
area, few approaches are adopted.
They are:
Contents must be placed in such a way that only scrolling should be possible
(without panning across the screen).
Open a new window for wide content.
iv) Right Navigation: Recently, placing navigational elements at the right side of
the screen has become popular.
- This style facilitates limiting mouse travel because navigation controls are nearer
to scroll bar.
- Right navigation has serious drawback i.e. depending on a user's monitor or
browser size, the distance from left to right of the screen may vary greatly.
- Right navigation is highly discouraged but not ruled out.
35
Sunil Mahesh