Professional Documents
Culture Documents
Data Validation Ecommerce
Data Validation Ecommerce
ECommerece
(MSC-IT)
Mukta Sharma
MCA,B.Sc(PCM)
Lecturer
Deptt. of Information Technology
Biyani Girls College, Jaipur
E-Commerce
Published by :
Think Tanks
Biyani Group of Colleges
Edition: 2012
Price:
While every effort is taken to avoid errors or omissions in this Publication, any
mistake or omission that may have crept in is not intentional. It may be taken note of
that neither the publisher nor the author will be responsible for any damage or loss of
any kind arising to anyone in any manner on account of such errors and omissions.
E-Commerce
Preface
the students. The book has been written keeping in mind the general weakness
in understanding the fundamental concepts of the topics. The book is selfexplanatory and adopts the Teach Yourself style. It is based on questionanswer pattern. The language of book is quite easy and understandable based
on scientific approach.
Any further improvement in the contents of the book by making corrections,
omission and inclusion is keen to be achieved based on suggestions from the
readers for which the author shall be obliged.
I acknowledge special thanks to Mr. Rajeev Biyani, Chairman & Dr. Sanjay
Biyani, Director (Acad.) Biyani Group of Colleges, who are the backbones and
main concept provider and also have been constant source of motivation
throughout this Endeavour. They played an active role in coordinating the various
stages of this Endeavour and spearheaded the publishing work.
I look forward to receiving valuable suggestions from professors of various
educational institutions, other faculty members and students for improvement of
the quality of the book. The reader may feel free to send in their comments and
suggestions to the under mentioned address.
Author
E-Commerce
Syllabus
Paper 133: E-Commerce Technologies
Electronic Commerce Framework, Electronic Commerce and media
Convergence, Traditional vs. Electronic Business Applications, The Anatomy of
E-Commerce Applications. Overview of Mobile Computing Applications.
Network Infrastructure for E-Commerce: Components of 1-way-Global
Information. Distribution Networks- Public Policy Issues, Shaping the 1-way The
Internet as a Network Infrastructure. The business of Internet
Commercialization.
Network Security and Firewalls-Client Server Network Security Threads,
Firewalls and Network Security Data and Message Security, Encrypted
Documents and Electronic Mail.
Architectural Framework for Electronic Commerce, World Wide Web as
Architecture, Consumer Oriented E-Commerce Electronic Data Interchange
(EDI),EDI Applications in Business, EDI Security and Privacy issues, EDI and ECommerce, EDI Implementation.
Intra-Organizational Electronic Commerce Supply Chain System, Electronic
Commerce Catalogs, Documents Management and Digital libraries.
Consumer-Oriented Applications, Mercantile Process Models, Mercantile Models
from the consumer's perspective, Mercantile models form the merchant's
Perspective.
Types of Electronic Payment Systems; Smart Cards and Electronic payment
Systems, Credit Card-Based Electronic payment Systems, Risk and Electronic
payment Systems, Electronic payment and security issues and measures,
Designing Electronic Payment Systems.
E-Commerce
Content
S.No
Name of Topic
E- commerce framework
E-Commerce
Chapter-1
E- commerce Framework
Q1. What is e commerce ? What are its characteristic?
Ans The term commerce is define as trading of good & services or if e for
electronic is added to this, the definition of e commerce is defined as
trading of goods, services, information or anything else of value between
two entities over the internet.
Following are some definations of e commerce:1. It is the ability to conduct business electronically over the internet.
2. It means managing transactions using networking and electronic means.
3. It is a platform for selling products & services via internet.
Characteristics of e commerce:1. Establishment of B to B relationship.
2. Electronic payment.
3. e distribution of products & services.
4. Exchange of information.
5. Pre and post sales support.
6. Customer relationship management.
Q2. What are advantage of e commerce ?
Ans Advantage of e commerce:1. Facilitates the globalization of business:-e commerce facilitates the
globalization of business by providing some economical access to distant
markets and by supporting new opportunities for firms to increase
economies by distributing their products internationally.
2. Provides increased purchasing opportunities for the buyer:-As e
commerce increases sales opportunities for the seller, it also increases
purchasing opportunities for buyer.
E-Commerce
9.
High start up cost:The various components of cost involved with e commerce are:A
connection:- connection cost to the internet.
E-Commerce
B
C
3.
4.
Legal issues:- these issues arises when the customer data is fall in
the hands of strangers.
Lack of skilled personnel:- there is difficulty in finding skilled
www developers and knowledgeable professionals to manage and
amaintain cutomer on line.
5.
6.
7.
Some business process may never be available to e commerce:Some items such as foods, high cost items such as jwellery may be
impossible to be available on the internet.
E-Commerce
Makes payment
E-Commerce
10
8. After sales service:- after sale, the firm wants to maintains a good
relationship with its customers. It is called CRM customer
relationship management.
2. Business to business (B to B):- this is called as a business motivated by
another business.
B2B is classified as:1. Market place:- a digital electronic market place where suppliers and
commercial purchasers can conduct transactions.
2. E distributors:- a company that suppliers products and services directly
to individual business.
E-Commerce
Q5
11
Ans
S.No
Traditional commerce
e commerce
1
Customer
can
easily
identify
& It is not easy in this case.
authenticate a merchant by seeing directly
to him.
It is slow method.
Q6
Ans
E-Commerce
12
Bank
Consumer
payment gateway
business
Authentication centre
Q.7
Ans
Q.8
Ans
Q.9
Ans
E-Commerce
13
1. "The private sector should lead." The Web Industry and the W3C has been
proactive in addressing concerns of those using the Web (including content
control, Web privacy. intellectual property, access for the disabled, etc.)
2. "Governments should avoid undue restrictions on electronic
commerce." The Web is growing and changing very quickly -- often for the
better, consequently it is often better to allow the Web to mature on its own
rather than to potentially impede its development.
3. "Where governmental involvement is needed, its aim should be to
support and enforce a predictable, minimalist, consistent and simple
legal environment for commerce." Stability leads to user and market
confidence, key elements to the Web's success.
4. "Governments should recognize the unique qualities of the Internet."
The Internet and Web are unique.
5. "Electronic Commerce over the Internet should be facilitated on a
global basis." The Web has no boundaries or borders; the W3C is a global
consortium.
Q.10 What is Architectural framework of e-Commerce?
Ans Architectural framework means synthesizing of various existing resources
like databases, computer languages, software agent based transaction,
monitors on communication protocol to facilitate the integration of data
and software for better application.
E-Commerce
14
Chapter 2
E-Commerce
15
This server could be the host operating system or network file server; the
server is then provided both file system services and application services.
Or in some cases, another desktop machine provides the application
services.
The server process acts as a software engine that manages shared
resources such as databases, printers, communication links, or high
powered-processors. The server process performs the back-end tasks that
are common to similar applications.
Q.3
Ans
2)
E-Commerce
16
E-Commerce
17
E-Commerce
Q6.
Ans
18
2)
3)
4)
E-Commerce
19
E-Commerce
Q.7
Ans
20
E-Commerce
21
E-Commerce
22
Chapter 3
Q2.
Ans
1. Plan:- it is the first step of SCM. It plans for meeting the customer
demand.
2. Source:- it means from where customer are ready to purchase their
products. In this step, price, delivery & payment process of the goods are
maintained.
3. Make:- it is the manufacturing step. In this the necessary step for
manufacturing steps are taken like production, testing, packaging and
prepation for delivery.
4. Deliver:- in this step customer give receipt of orders which he wants. A
warehouse is maintainesd to store the product details.
5. Return:- in this step a customer relationship management is maintained.
In this customers are supported & feedback is taken from customers about
products. A network is maintained for receiving defective & excessive
products from customers.
E-Commerce
Q3.
Ans
23
1.
2.
3.
4.
What is value chain analysis? What are the primary and secondary
activities?
The value chain, also known as value chain analysis, is a concept from
business management that was first described and popularized by
Michael Porter in his 1985 .
A value chain is a chain of activities for a firm operating in a specific
industry. Products pass through all activities of the chain in order, and at
each activity the product gains some value. The chain of activities gives
the products more added value than the sum of added values of all
activities. It is important not to mix the concept of the value chain with the
costs occurring throughout the activities. A diamond cutter can be used as
an example of the difference. The cutting activity may have a low cost, but
E-Commerce
24
the activity adds much of the value to the end product, since a rough
diamond is significantly less valuable than a cut diamond.
Activities
The primary activities include: inbound logistics, operations (production),
outbound logistics, marketing and sales (demand), and services
(maintenance).
The support activities include: administrative infrastructure management,
human resource management, technology (R&D), and procurement. The
costs and value drivers are identified for each value activity.
The Value Chain framework of Michael Porter is a model that helps to analyze
specific activities through which firms can create value and competitive advantage.
Primary activities
1)
Inbound Logistics Includes receiving, storing, inventory control, transportation
scheduling.
2)
3)
support activities
Firm Infrastructure
Margin
Service
E-Commerce
25
4)
Marketing and Sales The activities associated with getting buyers to purchase the
product including channel selection, advertising, promotion, selling, pricing, retail
management, etc.
5)
Service The activities that maintain and enhance the product's value, including
customer support, repair services, installation, training, spare parts management,
upgrading, etc.
Support activities
1)
Procurement :-It refers to the purchase of goods and services for the
organization.Procurement of raw materials, servicing, spare parts, buildings,
machines, etc
2)
3)
4)
Q5.
Ans
E-Commerce
Process:
Outbound Logistics:
26
Retail
Vast number of Consumers
Regional
Whse
Component
Suppliers
Q6.
Ans
Supermarket
Consumer
Q.7
Ans
E-Commerce
27
Various technologies are used in both primary value activities and support
activities:
Inbound Logistics Technologies
o Transportation
o Material handling
o Material storage
o Communications
o Testing
o Information systems
Operations Technologies
o Process
o Materials
o Machine tools
o Material handling
o Packaging
o Maintenance
o Testing
o Building design & operation
o Information systems
Outbound Logistics Technologies
o Transportation
o Material handling
o Packaging
o Communications
o Information systems
E-Commerce
28
Q.8
Ans
E-Commerce
29
E-Commerce
30
What is firewall.
A firewall is a device or set of devices designed to permit or deny
network transmissions based on a set of rules and is frequently used to
protect networks from unauthorized access while permitting legitimate
communications to pass.
Many personal computer operating systems include software-based
firewalls to protect against threats from the public Internet. Many routers
that pass data between networks contain firewall components and,
conversely, many firewalls can perform basic routing functions.
E-Commerce
31
The first generation of firewalls (c. 1988) worked at the network level by
inspecting packet headers and filtering traffic based on the IP address of
the source and the destination, the port and the service. Some of these
primeval security applications could also filter packets based on protocols,
the domain name of the source and a few other attributes.
Network-level firewalls are fast, and today you'll find them built into
most network appliances, particularly routers. These firewalls, however,
don't support sophisticated rule-based models. They dont understand
languages like HTML and XML, and they are capable of decoding SSLencrypted packets to examine their content. As a result, they cant validate
user inputs or detect maliciously modified parameters in an URL request.
This leaves your network vulnerable to a number of serious threats.
Circuit-Level Firewalls
These applications, which represent the second-generation of firewall
technology, monitor TCP handshaking between packets to make sure a
session is legitimate. Traffic is filtered based on specified session rules and
may be restricted to recognized computers only. Circuit-level firewalls
hide the network itself from the outside, which is useful for denying
access to intruders. But they don't filter individual packets.
Application-Level Firewalls
Recently, application-level firewalls (sometimes called proxies) have been
looking more deeply into the application data going through their filters.
By considering the context of client requests and application responses,
these firewalls attempt to enforce correct application behavior, block
malicious activity and help organizations ensure the safety of sensitive
information and systems. They can log user activity too. Application-level
filtering may include protection against spam and viruses as well, and be
able to block undesirable Web sites based on content rather than just their
IP address.
If that sounds too good to be true, it is. The downside to deep packet
inspection is that the more closely a firewall examines network data flow,
E-Commerce
32
the longer it takes, and the heavier hit your network performance will
sustain. This is why the highest-end security appliances include lots of
RAM to speed packet processing. And of course you'll pay for the added
chips.
Stateful Multi-level Firewalls
SML vendors claim that their products deploy the best features of the
other three firewall types. They filter packets at the network level and they
recognize and process application-level data, but since they don't employ
proxies, they deliver reasonably good performance in spite of the deep
packet analysis. On the downside, they are not cheap, and they can be
difficult to configure and administer.
E-Commerce
33
Chapter 4
Q2.
Ans
What are the strategies that are adopted to gain competitive advantage ?
1. Differentiation:- this strategy is used to attract more customers, this
strategy allow you to change a higher price because you are delivering
more value to your customers.
This can be done as
More value Often products or services for same price.
Freebies
Free upgrades & coupons for future purchases.
Discounts
Includes offering regular sales, coupons etc.
New/first be the first one to offer something in your location.
Deliver/fast next day or one hour make it faster than customers
think possible.
Before/during/after sales support provide technical or other
support to customers.
Guarantee/warranty free replacements parts.
E-Commerce
34
E-Commerce
35
Entrants
Supplier
Competitive
Rivalry
Buyers
Substitution
1) Barriers to entry/ threat of entry:Any firm should be able to enter and exit a market and if free entry and
exit expsts, then profit always should be nominal.
But industries always possess high nomial rate & thus inhibit additional
rivals from entering the market. These are barriers to entry.
Barriers to entry arise from several sources:1. Government create barriers:- role of govt. in a market is to preserve
comprtition through anti trust actions, govt. also restricts competition
thorugh granting of mono polices and through regulation.
2. Patents and proprietary knowledge serve to restrict entry into an
industry:-ideas and knowledge that provides competitive advantages are
preventing
others from using the knowledge & thus ccreating a barrer
to entry.
3. Economies of scale:- the most cost efficient level of production is termed
as minimum efficient scale (MES).
This is the point at which unit costs for production are at minimum i.e. the
most cost efficient level of market share mecessary for low cost entry or
cost parity with rivals.
Easy to enter if
- common technology
E-Commerce
36
little branding
access to distribution channels
Intensity of rivalry depends on:It rivalry among firms in an industry is low, the industry is considered to
be disciplined.
In pursuing an advantage over its rivals (competitior), a firm can choose
1 changing prices
2 improving product differentiation
3 take advantage of relationship with suppliers.
E-Commerce
37
Q.
What is cryptography?
Ans. Cryptography (or cryptology; from Greek , "hidden, secret"; and
, graphein, "writing", or -, -logia, "study", respectively) is the
practice and study of techniques for secure communication in the
presence of third parties (called adversaries).
E-Commerce
38
Q.
Types of cryptography?
Ans.
Q.
Define RSA Algorithm.
Ans. RSA is an algorithm for public-key cryptography that is based on the
presumed difficulty of factoring large integers, the factoring problem.
RSA stands for Ron Rivest, Adi Shamir and Leonard Adleman, who first
publicly described it in 1978. A user of RSA creates and then publishes the
product of two large prime numbers, along with an auxiliary value, as
their public key. The prime factors must be kept secret. Anyone can use
the public key to encrypt a message, but with currently published
methods, if the public key is large enough, only someone with knowledge
of the prime factors can feasibly decode the message.[1] Whether breaking
RSA encryption is as hard as factoring is an open question known as the
RSA problem.
E-Commerce
39
Key generation
RSA involves a public key and a private key. The public key can be
known to everyone and is used for encrypting messages. Messages
encrypted with the public key can only be decrypted using the private
key. The keys for the RSA algorithm are generated the following way:
1. Choose two distinct prime numbers p and q.
o For security purposes, the integers p and q should be chosen at
random, and should be of similar bit-length. Prime integers can
be efficiently found using a primality test.
2. Compute n = pq.
o n is used as the modulus for both the public and private keys
3. Compute (n) = (p1)(q1), where is Euler's totient function.
4. Choose an integer e such that 1 < e < (n) and greatest common divisor
of (e, (n)) = 1; i.e., e and (n) are coprime.
o e is released as the public key exponent.
o e having a short bit-length and small Hamming weight results
in more efficient encryption - most commonly 0x10001 = 65,537.
However, small values of e (such as 3) have been shown to be
less secure in some settings.
5. Determine d as:
E-Commerce
40
Encryption
Alice transmits her public key
to Bob and keeps the private key
secret. Bob then wishes to send message M to Alice.
He first turns M into an integer m, such that
by using an
agreed-upon reversible protocol known as a padding scheme. He then
computes the ciphertext corresponding to
.
This can be done quickly using the method of exponentiation by
squaring. Bob then transmits to Alice.
Note that at least nine values of m will yield a ciphertext c equal to m,[5]
but this is very unlikely to occur in practice.
Decryption
Alice can recover
computing
E-Commerce
41
Chapter 5
Product
Component/
Supplier
Materials
Supplier
Business to Business
(inter-organisational)
Manufacturer /
Retailer
Customer
Business to
Consumer
Search
Negotiate
Pre-Sale
Order
Deliver
Execution
Invoice
Payment
After Sales
Settlement
After Sale
E-Commerce
42
E-Commerce
43
What is e marketing ?
An inter organizational information system that allows participating
buyers and sellers to exchange information about price and product
offerings.
Q5.
Ans
Q6.
Ans
E-Commerce
44
3. It save time and cut steps from the marketing process. The
customer easily get desired information of products whenever they
want.
4. It is information rich and interactive.
5. It reduces the time and distance barriers that get in the way of
conducting business transaction.
6. It gives equal opportunity to each & every customers.
E-Commerce
45
Chapter 6
E-Commerce
46
1)
2.
EDI standards:- It specify business form structure and it also influence the
content at application layer.
The most two important standards are:EDIPACT
ANSI X12
3.
4.
E-Commerce
Q
Ans
47
The application software on the supplier's computer can now process the buyer's
order.
E-Commerce
48
Supplier
2) Cutting costs
a) Stationery
b) Postage
c) Staff:
order entry
invoice matching
payment checking
d) the principle saving is staff costs staff savings can be very significant
E-Commerce
49
3) Accurate invoicing
automatic matching to orders elimination of queries and delays
5. Accuracy of data (no re-keying of data into a system is required
eliminating the human error factor at the receiving end.)
6.
E-Commerce
50
The need for EDI standards:EDI provides on electronic linkage between two trading partners. To send
documents electronically to each other, firms must agree on a specific data
format and technical environment.
EDI standards and initiatives:National standards:1.
2.
E-Commerce
51
Establish a plan
Develop a workplan that identifies the tasks required and provides
initial time estimates. This plan should also provide a direction of
what type of documents you wish to trade.
3.
4.
5.
6.
7.
E-Commerce
52
9.
10.
11.
E-Commerce
53
Solutions group contact can help you with the decision on which
network and how to communicate to that network to get your
company the best Return on Investment.
12.
13.
14
15.
16.
E-Commerce
17.
54
Implementation
It is recommended that you collect data during the first few months to use
to access what savings/costs your company is experiencing. This
information is useful for your management and future trading partners.
18.
Q.7
Ans
E-Commerce
55
are not allowed to see, some you can see but not alter, some to which you
can add information and some where you can change existing
information. Application level security makes use of passwords to admit
different catagories of users to the different levels of application to which
they can gain access. For example, a clerical staff may only be given
authority to key in data in an electronic purchase order but not the
authority to send the EDI document to the supplier. A higher level
managerial staff may hold a password which allows him to view the data
keyed in by the clerical staff, make the necessary corrections and send the
document out.
A system administrator is usually appointed to oversee the EDI
application to maintain a system that both identifies the data and
monitors which password holders shall be given and to decide on the
kind of access to the system.
(3) Message level security
Message level security can also be put in place to combat unauthorized
disclosure of message content, non-bona fide messages, duplication, loss
or replay of messages, deletion of messages and repudiation of message
responsibility by its sender or its receiver. To counter these, EDIFACT has
in place several methods of message-level security:
(i) Encryption
The idea of data encryption is that data, whether on screen or as ASCII
within a computer system, can be totally enciphered by a transmission
process, and on receipt by an authorized user can be reconstituted into its
original format.
This method of security is used to ensure confidentiality of contents and
protects against unauthorized reading, copying or disclosure of message
content.
(ii) Message authentication
Message authentication, or a MAC (Message Authentication Code), can be
applied to a whole message or only part of a message.
E-Commerce
56
The idea behind the MAC process is to ensure that only authorized
senders and receivers correspond and that no one is impersonating
another correspondent.
(iii) Message sequence numbers
Message sequence numbers are used to protect against duplication,
addition, deletion, loss or replay of a message.
(iv) Hashing
Hashing is a technique used to protect against modification of data.
Message content integrity can be achieved by the sender including with
the message an integrity control value (or known as hash value). The
receiver of the message computes the integrity control value of the data
actually received using the corresponding algorithms and parameters and
compares the result with the value received.
(v) Digital signatures
Digital signatures protects the sender of a message from the receiver's
denial of having received the message. The use of digital signatures can
also protect the receiver of a message from the sender's denial of having
sent the message.
Protection can be achieved by the sender by including a digital signature
with the transmitted message. A digital signature is obtained by
encrypting, with an asymmetric algorithm. The digital signature can be
verified by using the public key which corresponds to the secret key used
to create it. This public key may be included with the interchange
agreement signed by the parties.
Protection can be achieved by the receiver sending an acknowledgement
which includes a digital signature based on the data in the original
message. The acknowledgement takes the form of a service message from
the receiver to the sender.
E-Commerce
57
E-Commerce
58
Ans
Linear Structures are the structures in which web pages are linearly
connected or related to each other. These are associated with each other in
a sequence.
1. Simple Linear: - In this web page has single linear sequence.
2. Linear with optical flow: -In such type of structures, a linearly defined
sequence is followed but some options are also included at some places.
3. Linear with Diversions: - These types of structures are wore complex ones
than the previous ones. In these type of structures, some diversions are
also included among the web pages.
Q14. What is grid structure?
Ans These are an architectural category that can be applied when web
application content can be organized categorically in two. A typographic
grid is a two-dimensional structure made up of a series of intersecting
vertical and horizontal axes used to structure content.
Q15. What is hierarchical structure?
Ans . It is also known as tree structures. It allows the flow of control
horizontally, across vertical branches of the structure.
Q16. What is networked of pure web structures?
Ans In such type of structures, architectural components or web pages are
designed in a manner so that they may pass control virtually to each other
web page in the system.
Q17
Ans
E-Commerce
Q18
Ans
59
E-Commerce
60
Q24
Ans
Q25
Ans
Q26
Ans
What is testing?
Testing is generally done at two levels- testing of individual modules and
Testing of the entire system.
It is always a good practice to test the system at many different levels at
various intervals, i.e. sub-systems, program modules as work progresses
& finally the system as a whole.
Q27
Ans
Q28
Ans
Q29
E-Commerce
61
Ans
Q30
Ans
Q31
Ans
Q34
Ans
E-Commerce
62
Q35
Ans
Q36
Ans
What is conversion?
Conversion is the process of changing from information system to the new
or modified one.
Q37
Ans
Q40
Ans
Q41
Ans
What is Phase-In-Method?
It is used when it is not possible to install a new system throughout the
organization all at once.
Only one phase of the system is implemented at a time. The file
conversions, personnel, or arrival of equipment may not take place all at
once.
E-Commerce
63
Q42
Ans
Q43
Ans
What is documentation?
Documentation or Procedure manuals explain how the system is designed
and operates. Access to procedure manuals is necessary for new people
learning the system, as well as a reminder to those who use the program
infrequently.
Q44
Ans
Q45
Ans
Q48
Ans
E-Commerce
64
Ans
There are lots of ways this can be done, but for any business there are two
no-brainers. The first is to promote the site to all existing customers - if
they dont know that you sell online, they will go elsewhere. If they use
your site and like it, they will probably tell their friends. So "Order online
at" and your web address should be on every piece of literature and
advertising that a company produces.
The second is to register with search engines. It may take a little time, but
it's often free and can produce good results. Just remember that your site
will register more effectively if the pages are generated in HTML, rather
than being dynamically generated from a database. In our customer's
experience this can affect traffic to your site by around 50%.
E-Commerce
65
Q.51 What are the key things to turn browsers into buyers?
Ans In short, remove the reasons why people might not buy. Make your
ecommerce site oriented towards sales rather than marketing. When
prospects are at the site, the marketing process is complete. So, show them
the products immediately dont hide them behind acres of marketing
copy. Provide full terms and conditions it seems more professional plus
protects you. Give your contact details, including a telephone number.
Explain your guarantee and returns policy. A rock solid guarantee goes a
long way to persuading people to buy. Finally, explain your security,
encryption and privacy policies.
Q.52 What one thing can impress buyers?
Ans Make the site fast. Use graphics effectively, not for the sake of it. Make the
checkout process as easy as possible. Again, ensure that the site is not
dynamically database driven unless this is absolutely essential nothing
is faster than doling out straight HTML.
Q.53 How much will ecommerce software cost?
Ans The answer varies according to the sophistication and volume of the site.
However, professional ecommerce software is available for under 1,000,
even under 500, and you can rent Web space capable of running such
software for under 200 per annum.
Q. 54 Can I compete with the big boys?
Ans The beauty of the internet means small businesses can compete effectively
- no-one knows how small or big you are from a URL. Ensure your site is
professional, attractive, fast and easy to use. Make sure too, that you can
fulfil the orders very promptly - people expect delivery within a day or
two. If you cant achieve this, make sure you communicate with the
customer email is quick and low cost.
Q.55 What security risk does ecommerce involve ?
Ans Less than people think. In fact, the security risks run by web merchants
are similar to those of mail-order companies. It is sensible for merchants to
put anti-fraud policies in place such as phoning to confirm orders that are
a particularly high value or that come from parts of the world more prone
to fraud.
E-Commerce
66
Q60
Ans
E-Commerce
67
E-Commerce
68
Chapter 7
Ans
The following types of electronic payments are most common today. That
said, it is important to realize that new payment types are continual being
discovered and there are additional methods that exist or are being
developed continuously.
Cards:-Credit cards, debit cards and prepaid cards currently represent the
most common form of electronic payments. For all 3 types of cards the
consumer or the business most often uses a plastic card, commonly with a
magnetic stripe. The cardholder gives his or her card or card number to a
merchant who swipes the card through a terminal or enters the data to a
PC. The terminal transmits data to his or her bank, the acquirer. The
acquirer transmits the data through a card association to the card issuer
who makes a decision on the transaction and relays it back to the
merchant, who gives goods or services to the cardholder. Funds flow later
for settlement with credit cards and are debited immediately for debit or
pre-paid cards
A credit card is a small plastic card issued to users as a system of
payment. It allows its holder to buy goods and services based on the
holder's promise to pay for these goods and services.[1] The issuer of the
card creates a revolving account and grants a line of credit to the
consumer (or the user) from which the user can borrow money for
payment to a merchant or as a cash advance to the user.
A smart card, chip card, or integrated circuit card (ICC), is any pocketsized card with embedded integrated circuits. A smart card or
microprocessor cards contain volatile memory and microprocessor
components. The card is made of plastic, generally polyvinyl chloride,
E-Commerce
69
eCheques are payments from buyers who have attached their bank details
to their PayPal account, but do not have a valid backup funding source
such as a credit or debit card. It may also be that their backup card has
expired. So to ensure that a secure payment can still made, an eCheque is
generated.
Sending an eCheque is a bit like sending someone a paper cheque, only it
is done electronically. And because it is processed by PayPal, the payment
is also protected and the sender and recipient do not need to share their
financial details
A debit card (also known as a bank card or check card) is a plastic card
that provides the cardholder electronic access to his or her bank
account(s) at a financial institution. Some cards have a stored value with
which a payment is made, while most relay a message to the cardholder's
bank to withdraw funds from a designated account in favor of the payee's
designated bank account. The card can be used as an alternative payment
method to cash when making purchases. In some cases, the primary
account number is assigned exclusively for use on the Internet and there
is no physical card
E-Commerce
70
Q.2 What are the advantages of credit card over a debit card
Ans. Some advantages of a credit card over a debit card are:
With a flexile spending limit, a cardholder can take advantage of
the easy loan facility of a credit card, and can use it to purchase
items or spend money that he expects in the near future, not just
money that he presently has in his account.
Most of the major features of a debit card such as withdrawal of
cash from ATMs are available on credit cards as well.
A credit card has a wider acceptance and recognition, especially in
online transactions.
A credit card has greater security measures ad checks than a debit
card.
Credit cards allow for cash back and bonus points schemes that a
debit card is not eligible for.
A credit card can be used as a convenient way to check and record
your spending.
Since there is a fixed credit limit, a cardholder cannot overstretch
his purchases.
Q.3
Ans. The disadvantages of using a credit card: Following are the disadvantages
of Credit card
The major one is the hidden costs of a credit card in the form of late
payments, transaction fees, fuel surcharge. The consumer must take all of
this into account before getting a card issued.
It is not compulsory for the entire balance to be paid, but the interest
is charged on the entire amount, regardless of the part paid. This
causes a debt trap for the cardholder.
The security of a card is not total and cases of fraud are extremely
common even today.
Credit cards can be used at ATM cards, but there is a considerable
processing fee required.
Q.4
Ans.
E-Commerce
71
E-Commerce
72
Ans
Q.8
Ans
Web hosting is a way to gain a presence on the internet. The web hosting
company should be capable of providing you with the level of service that
you need to maintain your Web Store.
Q.9
Ans
The merchant submits a credit card transaction to the Payment Gateway
on behalf of a customer via secure connection from a Web site, at retail,
from a MOTO center or a wireless device.
Payment Gateway receives the secure transaction information and passes
it via a secure connection to the Merchant Banks Processor.
The Merchant Banks Processor submits the transaction to the Credit Card
Interchange (a network of financial entities that communicate to manage
the processing, clearing, and settlement of credit card transactions).
The Credit Card Interchange routes the transaction to the customers
Credit Card Issuer.
The Credit Card Issuer approves or declines the transaction based on the
customers available funds and passes the transaction results, and if
approved, the appropriate funds, back through the Credit Card
Interchange.
E-Commerce
73
The Credit Card Interchange relays the transaction results to the Merchant
Banks Processor.
The Merchant Banks Processor relays the transaction results to Payment
Gateway.
Payment Gateway stores the transaction results and sends them to the
customer and/or the merchant. This communication process averages
three seconds or less.
The Credit Card Interchange passes the appropriate funds for the
transaction to the Merchants Bank, which then deposits funds into the
merchants bank account. The funds are typically deposited into your
primary bank account within two to four business days.