You are on page 1of 60

1

Compiled: Er. Ayush Shrestha


Introduction to E-Commerce
PRINCIPLES OF MANAGEMENT :

Compiled By: Er. Ayush Shrestha [ 9841515311 ]


Lesson 9: Payments and Order Fulfillment

Compiled: Er. Ayush Shrestha


Topics 4
9. Payments and Order Fulfillment
1. Electronic payments: A critical element in EC support services
2. Security for e-payments
3. Electronic cards and smart cards
4. E-cash and innovative payment methods
5. E-checking
6. Order fulfillment and logistics
7. Problems in order fulfillment
8. Solutions to order fulfillment problems

Compiled: Er. Ayush Shrestha


9.1 Electronic payments: 5
A critical element in EC support services

 Paying with credit cards online

 Until recently consumers were extremely reluctant to use their credit card numbers on the
Web

 This is changing because:

 Many of people who will be on the Internet in 2004 have not even had their first Web experience
today

 85% of the transactions that occur on the Web are B2B rather than B2C (credit cards are rarely used
in B2B transactions)

Compiled: Er. Ayush Shrestha


6
 Four parties involved in e-payments
 Issuer
 Customers must obtain e-payment accounts from an issuer
 Issuers are usually involved in authenticating a transaction and approving the amount involved
 Customer/payer/buyer
 Merchant/payee/seller
 Regulator

Compiled: Er. Ayush Shrestha


Key issues of trust that must be addressed by any e-payment, known as “PAIN” 7
 Privacy
– Ensure customer’ privacy

 Authentication and authorization


– Is the ability of each party in a transaction to ascertain the identity of the
other party.
– Process to provide assurance for the claimed identity of a user

 Message Integrity
– Is the ability to ascertain that a transmitted message has not been copied or
altered
– Protect against improper modifications to message

 Non repudiation
– You can not deny a message you received from a certain person

Compiled: Er. Ayush Shrestha


8
 Characteristics of successful e-payment methods
1. Independence
2. Interoperability and portability
3. Security
4. Anonymity
5. Divisibility
6. Ease of use
7. Transaction fees

Compiled: Er. Ayush Shrestha


9.2 Security for e-payments 9

 Public key encryption (PKI)

Encryption (cryptography)—the process of scrambling (encrypting) a message in such


a way that it is difficult, expensive, or time consuming for an unauthorized person to
unscramble (decrypt) it
.

Compiled: Er. Ayush Shrestha


10
 All encryption has four basic parts:

 Plaintext—an unencrypted message in human-readable form

 Ciphertext—a plaintext message after it has been encrypted into unreadable form

 Encryption algorithm—the mathematical formula used to encrypt the plaintext into


ciphertext and vice versa

 Key—the secret code used to encrypt and decrypt a message

Compiled: Er. Ayush Shrestha


11
 Two major classes of encryption systems:

 Symmetric (private key)

 Used to encrypt and decrypt plain text

 Shared by sender and receiver of text

 Asymmetric (public key) : The most used method


Uses a pair of keys

 Public key to encrypt the message

 Private key to decrypt the message

Compiled: Er. Ayush Shrestha


12
 Private key encryption

method of encryption that uses a pair of keys—a public key to encrypt a message and a
private key (kept only by its owner) to decrypt it, or vice versa

 Private key—secret encryption code held only by its owner

 Public key—secret encryption code that is publicly available to anyone

Compiled: Er. Ayush Shrestha


13

Compiled: Er. Ayush Shrestha


14
Key Sizes & Time to Try All Possible Keys

Compiled: Er. Ayush Shrestha


15
 Digital signatures

An identifying code that can be used to authenticate the identity of the sender of a
message or document

 Used to:

 Authenticate the identity of the sender of a message or document

 Ensure the original content of the electronic message or document is unchanged

Compiled: Er. Ayush Shrestha


 Digital Signatures—how they work: 16
1. Create an e-mail message with the contract in it

2. Using special software, you “hash” the message, converting it into a string
of digits (message digest)

3. You use your private key to encrypt the hash (your digital signature

4. E-mail the original message along with the encrypted hash to the receiver

5. Receiver uses the same special software to hash the message they

received

6. Company uses your public key to decrypt the message hash that you

sent. If their hash matches the decrypted hash, then the message is valid

Compiled: Er. Ayush Shrestha


How digital Signature works
17

Compiled: Er. Ayush Shrestha


18
 Digital certificate
• Is an attachment to an electronic message to verify the identity of the sender and to
provide the receiver with the means to encode a reply
• The user identity is validated by a third party called “certificate authority” –CA

Compiled: Er. Ayush Shrestha


 Digital certificate: How it is issued and used during transactions?
19

Compiled: Er. Ayush Shrestha


 Secure socket layer (SSL)— 20
• protocol that utilizes standard certificates for authentication and data encryption to
ensure privacy or confidentiality

• Originally created by Netscape to secure transactions between


clients/ servers

• Become the standard for browsers and servers (Microsoft and


Netscape)

• Is a protocol that utilizes standard certificates for authentication


and data encryption to ensure privacy or confidentiality

• E.g. secure credit card sent from a customer to a merchant)

Compiled: Er. Ayush Shrestha


21
 Transport Layer Security (TLS)—

• as of 1996, another name for the Secure Socket Layer protocol

• TLS was not designed to handle the following:


• The credit card number must be checked for validity
• The consumer’s bank must authorize the card
• The purchase must be proceed

Compiled: Er. Ayush Shrestha


22

 Secure Electronic Transaction (SET)


• Is a protocol designed to provide secure online credit card transactions for both
consumers and merchants;

• developed jointly by Netscape, Visa, MasterCard, and others

• Is designed to handle a complete online transaction

Compiled: Er. Ayush Shrestha


9.3 Electronic cards and smart cards 23
 Definition
• Electronic cards that contain information that can be used for payment purposes
Three types
• Credit cards (e.g. Visa and MasterCard): provides holder with credit to make
purchases up to a limit fixed by the card issuer
• Charge cards (e.g. internet card, PetroNet)—balance on a charge card that can
refilled based on customer request
• Debit card (e.g. Knet)—cost of a purchase drawn directly from holder’s checking
account (demand-deposit account)

Compiled: Er. Ayush Shrestha


24
 The Players

 Cardholder

 Merchant (seller)

 Issuer (your bank)

 Acquirer (merchant’s financial institution, acquires the sales slips)

 Card association (VISA, MasterCard)

 Third-party processors (outsourcers performing same duties formerly provided by issuers, etc.)

Compiled: Er. Ayush Shrestha


Online Credit Card Processing 25

Compiled: Er. Ayush Shrestha


26
 Credit card gateway
• An online connection that ties a merchant’s systems to the back-end processing
systems of the credit card issuer (a a customer)
• Objective speed-up the online transaction

 Virtual credit card


• An e-payment system in which a credit card issuer gives a special transaction number
that can be used online in place of regular credit card numbers
• E.g. CashU

Compiled: Er. Ayush Shrestha


27
 Electronic wallets (e-wallets)
• A software component in which a user stores credit card numbers and other personal
information
• When shopping online the user simply clicks the ewallet to automatically fill in information
needed to make a purchase
Benefits of e-wallets
• One-click shopping—saving your order information on
retailer’s Web server
• Speed up the transaction process s

Compiled: Er. Ayush Shrestha


28
 Security risks with credit cards
 Stolen cards
 Reneging by the customer—authorizes a payment and later
denies it
 Theft of card details stored on merchant’s computer—isolate
computer storing information so it cannot be accessed
directly from the Web

Compiled: Er. Ayush Shrestha


Smart Cards
29

an electronic card containing an embedded microchip that enables predefined


operations or the addition, deletion, or manipulation of information on the card

Compiled: Er. Ayush Shrestha


Categories of smart cards

30
 Contact card
– A smart card containing a small gold plate on the face that when inserted in
a smart-card reader makes contact and so passes data to and from the
embedded microchip

 Contactless (proximity) card


– A smart card with an embedded antenna, by means of which data and
applications are passed to and from a card reader unit or other device

 Securing smart cards


– Theoretically, it is possible to “hack” into a smart card
• Most cards can now store the information in encrypted form
• Same cards can also encrypt and decrypt data that is downloaded or
read from the card
– Cost to the attacker of doing so far exceeds the benefits

Compiled: Er. Ayush Shrestha


31
 Important applications of smart card use:
 Loyalty
 Financial
 Information technology
 Health and social welfare
 Transportation
 Identification

Compiled: Er. Ayush Shrestha


9.4 E-cash and innovative payment methods 32

 E-cash

the digital equivalent of paper currency and coins, which enables secure and anonymous
purchase of low-priced items

 Micropayments

small payments, usually under $10

 Wireless payments

Vodafone “m-pay bill” system that enables wireless subscribers to use their mobile phones
to make micro-payments

 Qpass (qpass.com)

Charges to qpass account, are charged toa specified credit card on a monthly basis

Avoid some of e-cash problem (see more in www.qpass.com)

Compiled: Er. Ayush Shrestha


33
Stored-Value Cards

 Stores cash downloaded from bank or credit card account

 Visa cash—a stored-value card designed to handle small purchases or


micropayments; sponsored by Visa

 Mondex—a stored-value card designed to handle small purchases or


micropayments; sponsored by Mondex, a subsidiary of MasterCard

Compiled: Er. Ayush Shrestha


E-Loyalty and Reward Programs 34

 Loyalty programs online

 B2C sites spend hundreds of dollars acquiring new customers

 Payback only comes from repeat customers who are likely to refer other
customers to a site

 Electronic script—a form of electronic money (or points), issued by a third party as
part of a loyalty program; can be used by consumers to make purchases at
participating stores

Compiled: Er. Ayush Shrestha


35
 Beenz—a form of electronic script offered by beenz.com that consumers earn at participating sites and redeem for
products or services

 Consumer earns beenz by visiting, registering, or purchasing at 300 participating sites

 Beenz are stored and used for later purchases

 Partnered with MasterCard to offer rewardzcard—stored-value card used in U.S. and Canada for purchases where
MasterCard is accepted

 Transfer beenz into money to spend on Web, by phone, mail order, physical stores

Compiled: Er. Ayush Shrestha


36
 MyPoints-CyberGold

 Customers earn cash for viewing ads

 Cash used for later purchases or applied to credit card account

 Prepaid stored value cards—used online and off-line

 RocketCash

 Combines online cash account with rewards program

 User opens account and adds funds

 Used to make purchases at participating merchants

Compiled: Er. Ayush Shrestha


37
Internetcash

 Teenage market—primary reason for going online


 Communicating with friends via email and chat rooms
 homework
 Researching information
 Playing games
 Downloading music or videos

Compiled: Er. Ayush Shrestha


38
 Why they do not shop online

 Parents will not let them (children) their (the parents) credit cards online

 They cannot touch the products

 It is difficult to return items purchased on the Web

 They do not have the money

 Transaction may be insecure

Compiled: Er. Ayush Shrestha


 InternetCash offers prepaid stored-value cards sold in amounts of $10, $20, $50, 39
and $100

 Must be activated to work

 Gives the user shopping privileges at online stores that carry an InternetCash icon

 Purchases are automatically deducted from the value of the card

 InternetCash’s transactions are anonymous

 InternetCash is facing obstacles

 First, they have to find retailers willing to sell the cards

 Must persuade merchants to accept the card for online


purchases

 Legal issues

Compiled: Er. Ayush Shrestha


Person-to-Person Payments 40

 Person-to-person (P2P) payments—e-payment schemes (such


as paypal.com) that enable the transfer of funds between two
individuals

 Repaying money borrowed

 Paying for an item purchased at online auction

 Sending money to students at college

 Sending a gift to a family member

Compiled: Er. Ayush Shrestha


Global B2B Payments 41

 Letters of credit (LC)—a written agreement by a bank to pay the


seller, on account of the buyer, a sum of money upon presentation of
certain documents

 TradeCard (tradecard.com)—innovative e-payment method that


uses a payment card

Compiled: Er. Ayush Shrestha


Electronic Letters of Credit (LC)
42

 Benefits to sellers  Benefits to the buyer


 Credit risk is reduced
 Allows buyer to negotiate for a lower purchase
 Payment is highly assured price

 Political/country risk is reduced  Buyer can expand its source of supply

 Funds withdrawn from buyer’s account only


after the documents have been inspected by
the issuing bank

Compiled: Er. Ayush Shrestha


TradeCard Payments 43

 TradeCard allows businesses to effectively and efficiently complete B2B


transactions whether large or small, domestic or cross-border, or in
multiple currencies
 Buyers and sellers interact with each other via the TradeCard
system
 System
 Checks purchase orders for both parties
 Awaits confirmation from a logistics company that deliveries have been
made and received
 Authorizes payment completing financial transaction between the
buyer and seller

Compiled: Er. Ayush Shrestha


9.5 E-checking 44

 E-check—the electronic version or representation of a paper check

 Eliminate need for expensive process reengineering and takes advantage of the competency
of the banking industry

 eCheck Secure (from vantaguard.com) and checkfree.com provide software that enables the
purchase of goods and services with e-checks

 Used mainly in B2B

Compiled: Er. Ayush Shrestha


9.6 Order fulfillment and logistics 45

 Order fulfillment—all the activities needed to provide customers with


ordered goods and services, including related customer services

 Back-office operations—the activities that support fulfillment of sales,


such as accounting and logistics

 Front-office operations—the business processes, such as sales and


advertising, that are visible to customers

Compiled: Er. Ayush Shrestha


Overview of Logistics
46

 Logistics—the operations involved in the efficient and


effective flow and storage of goods, services, and related
information from point of origin to point of consumption
 Delivery of materials or services
 Right time
 Right place
 Right cost

Compiled: Er. Ayush Shrestha


Order Fulfillment and Logistics Systems 47

Compiled: Er. Ayush Shrestha


EC Order Fulfillment Process 48

Steps in the process of order fulfillment

1. Payment clearance 8. Customer contacts


2. In-stock availability 9. Returns (Reverse logistics—
3. Arranging shipments movement of returns from customers to vendors)
4. Insurance 10. Demand forecast
5. Production (planning, execution) 11. Accounting, billing
6. Plant services
7. Purchasing and warehousing

Compiled: Er. Ayush Shrestha


Order Fulfillment and the Supply Chain 49

 Order fulfillment and order taking are integral parts of the supply chain.

 Flows of orders, payments, and materials and parts need to be


coordinated among

 Company’s internal participants

 External partners

 The principles of supply chain management must be considered in


planning and managing the order fulfillment process

Compiled: Er. Ayush Shrestha


9.7 Problems in order fulfillment 50

 Manufacturers, warehouses, and distribution channels were not in sync with the e-tailers

 High inventory costs

 Quality problems exist due to misunderstandings

 Shipments of wrong products, materials, and parts

 High cost to expedite operations or shipments

Compiled: Er. Ayush Shrestha


 Uncertainties 51
 Major source of uncertainty is demand forecast
 Demand is influenced by
 Consumer behavior
 Economic conditions
 Competition
 Prices
 Weather conditions
 Technological developments
 Customers’ confidence

Compiled: Er. Ayush Shrestha


 Demand forecast should be conducted frequently with collaborating business partners 52
along the supply chain in order to correctly gauge demand and make plans to meet it

 Delivery times depend on factors ranging from machine failures to road conditions

 Quality problems of materials and parts (may create production time delays)

 Labor troubles (such as strikes) can interfere with shipments

 Order fulfillment problems are created due by lack of coordination and inability or
refusal to share information

 Bullwhip effect—large fluctuations in inventories along the supply chain, resulting from
small fluctuations in demand for finished products

Compiled: Er. Ayush Shrestha


9.8 Solutions to order fulfillment problems 53
 Improvements to order taking process

 Order taking can be done on EDI, EDI/Internet, or an extranet, and it may


be fully automated.

 In B2B, orders are generated and transmitted automatically to suppliers


when inventory levels fall below certain levels.

 Result is a fast, inexpensive, and a more accurate process

 Web-based ordering using electronic forms expedites the process


 Makes it more accurate
 Reduces the processing cost for sellers

Compiled: Er. Ayush Shrestha


54
 Implementing linkages between order-taking and payment systems can
also be helpful in improving order fulfillment

 Electronic payments can expedite order fulfillment cycle and payment


delivery period

 Payment processing significantly less expensive

 Fraud can be controlled better

Compiled: Er. Ayush Shrestha


55

Managerial Issues

Compiled: Er. Ayush Shrestha


56
1. What B2C payment methods should we use?

2. What B2B payment methods should we use?

3. Should we use an in-house payment mechanism or outsource it?

4. How secure are e-payments?

5. Have we planned for order fulfillment?

6. How should we handle returns?

7. Do we want alliances in order fulfillment?

8. What EC logistics applications would be useful?

Compiled: Er. Ayush Shrestha


57

Assignment
Deadline:

Compiled: Er. Ayush Shrestha


58
• What are the most common forms of online payment?

• How do credit card purchases online differ from credit card purchases face-to-face?

• What is a smart card?

• What is meant by e-micropayment?

• What is an e-check?

• What are the steps in the order fulfillment process?

• What is meant by supply chain? What are some typical problems that can arise in the supply chain?

• How do e-logistics differ from traditional logistics in regard to e-commerce?

Compiled: Er. Ayush Shrestha


59

Thank You

Compiled: Er. Ayush Shrestha


60

Any Question?

Compiled: Er. Ayush Shrestha

You might also like