You are on page 1of 448

coltTEltTS

1. E-COMMERCE: GONVERGENCE OFTECHNOLOGIES


.............1
1.1 Electronics Commerce (e-Commerce or
EC) ...................... 1

1.2 Definition of Electronic Commerce


..................2
1.3 Commerce and Virtual Enterprises
..................2
'1.4 Electronics.
................ 3
1.5 Electronic Communication .............
..................3
1.6 The Convergence of Computing with
Communications .........................4
1.7 Technology Convergence and
GlobalCommerce ..................;...............6
1.8 Advantages of Electronic Commerce
..............7
1.9 Applications of Electronic Commerce.
.............7
1.10 TheTechnologies of Electronic
Commerce .........................7
1.11 Digitization of the Network................
............... I
'1.12 The lnformation lndustry and e-Commerce ...........
............. 8
1.13 The Form-Based lnformation lndustries of the Past
........... 9
1.14 The Global lnlormation lnfrastructure (Gll):
lnternet....... ..................... 11
1.15
lnternetTechnology ...............
......11
1.16 Components of lnternetTechnology.
.............. 13
1.16.1 The lnternet
Network ...................... 13
1.16.2 \rVWW-
WorldWideWeb ..................14
1.16.3 Electronic Mail
14
1.16.4
FTP........... ..................1
4
1.16.5 lnternet Relay Chat (lRC) ..........
..... 15
1.16.6
WebOhat... ..................1
5
1.16.7 News
Groups................. ................. 15
1.16.8 Usenet
...... 15
1.16.9 Telnet
........ 15
1.17 Principles Of Founding lnternet Based e-commerce
.......... 16
.17.1 Pervasive lnternet Access and Mobile lnternet

1 ...............
....17
1.18
lntranets ........-.
.......17
1.19 TheTechnologies of Electronic Commerce
.....17
1.19.1 Electronic Data lnterchange (EDl)..
1.19.2
BarOodes ...................1
8
1.19.3 Electronic
Mail ........... ....................18
1.19.4 lnternet Market
............ 18
1.19.5 Product Data
Exchange .............. ...................... 18
1.19.6 Electronic Forms
.........18
1.2O Differences Between Electronic and Other Forms of
Commerce ...;....................... 19
1.21 DeterminingTechnologicalFeasibility
............ 19
I
1.22 Ecommerce
Marketing ................2A
1.22.1 Be a Resource, Not a Store
...........2O
1.22.2 Your Current
Customers ................. 20
1.22.3 Search Engines and Directories..............
..........21
1.22.4 Discussion Forums, Chat and Newsgroups
......21
1.22.5 DirectOpt-ln E-
mait......... ...............21
1.22.6 Banner Advertising
......21
1.22.7 lnternet News Releases ............
.....n
1.22.8 Co-Branding Site Content &
Features ...............29
1.22.9 Affiliate Programs...
.....29
1.22j0 Reciprocal
Links.......... ................... 23
1.23 Breakthroughs in ComputingTechnology.............
.............29
1.24 Technology
Breakthroughs in
Communications ................ 25
1 .25 The Sociology of
Convergence........ ..............25
1.26 ............
The lmpact of
Convergence ................... .............. 26
1.27 lndustry
A Paradigm Shift:The New
lnformation ..............27
1.28 Commerce
The Future of
Electronic ..............29
1.29 Methods of E-
commerce............. ..................29

ELECTRONICS AND COMMUNICATIONS


35
2j
Electronics. ...
........... 35
2.2 Electronic
Components................. .................
35
2.3 Computers :The lnformation
Processor............. ..............3g
2.4 Types of Computers: Digital and Analog.
......42
2.5 Range ot Computer
Ability....... ......................42
2.6 Uses of
Computers ...................
.. 49
2.7 DigitalTechnology ..........
.............43
2.8 Processing
Digitallnformation .......................M
2.9 Digital
Logic .......... ....................
.. M
2.10 Communications............
2.11 Data
Communications ............
.... 49
2.12 DataTransmission .........
.............50
2.13 Types of Signals in Communication.........
......51
2j4 Characteristics of
ElectricalWaves ...............52
2.15 DataTransmission Quality
Factors ................54
2.16 Transmission Degradation.................
............. 56
2.17 Wireless
Communication .............. .................5
7
2.18 Principles of Wireless
Communications........... .................57
2.19 Modes of Wireless
Communication ............ ......................59
2.20
Networks .........
........59
2.21 Future Developments in
Computing............. .....................60
2.22 Mobile
Processors .....................
.61

IN FORMATION TECHNOLOGY ...


3.1 Fundamentals of lnformation
Systems...............;... ,......... 63
3.2 Knowledge.......... .............66
The Relationship Between lnformation and
3,3 lnformation
Age............ ..............66
3.4 What are
lnformationSystems ...........,..........67
3.5 Who Processes
lnformation? .......'.' ...'.)....'......'..""""""'
67
3.6 lnformation lndustry
.'....'."""""" 68
g.7 Transformation to DigitalTechnology
..'......".' 68
3.8 The lnefficient lnformation lndustry
........'.."" 69
3.9 lnformation Functions ....r.....i...rr...
""""""""' 70
3.10 The Functionally Based Companies of the Future
""""""72
3.11 The lnformation Transport lndustry
....."""""' 73
g.12 WhereToday's Computing lndustryWillBe .'.'.'.....
"""""'74
3.'13 Future of lnformation Presentation .......'.'....
""""""""""'74
g.14 Electronic Publishing
"""""""""77
GLOBALINTERNET """'i"""""'
"""""'79
4.1 World Wide Web :The'simplified Access to the lnternet "......."'."
""'79
4.2 History of Web Growth
"""""""" 80
4.g Working of lnternetWeb '.....'.'..'..
4.4 Web Browsers ...............
""""""' 84
4.5 Surfing the Net.......
""""""""""' 86
4.6 Searching theWeb......
"""""""" 86
4.7 Search Engine
""""'87
4.8 Categoriesof Search Engines
"""""""""""' 87
4.8.1 Web Crawlers' ..............'
""""""""' 88
4.8.2 Subject Directories. ..........'..;..."
""' 88
4.8.3
lndexes...... .""""""""'
88
4.8.4 Generalsearch
"""""' 94
4.8.5 Example ol Multiple Serching: Cable Cars to the Stars
"""' 95
4.g Searching Criterion
""""""""""' 95
4.1O Advanced SearchTechniques.'....'.
"""""""" 96
4.10.1 Phrase Searching
"""" 96
4.10.2 Boolean Searching
"""97
4.10.3 Capital Sensitivity
"""' 99
4.10.4 Phrase Searching
""" 100
4.10.5
Truncation .................
. 100
4.10.6 Date Capability..'.'..'.....
"""""""" 100
4.10.7 Restricting searches to specific Parts of the
Document.....................' 100
4.10.8 Restricting searches to specific Areas of the web
........... 100
4.10.9 Restricting Searches to Specific Media
""""" 100
4.10.10 Metasearches ..'.'....'.'..
"""""""" 101
4.11 SearchingTips..............
"""""" 101
4.12 Downloading
""""" 102
4.13 HypertextTiansfer Protocol (HTTP).'.
4.14 The World Wide Web & Hypertext
"""""""" 104
4.15 What is a Url?
"""" 104
4.15.1 URL Syntax
"""""""' 105
4.16 WEB
Servers................ .......................,...
.... 106

106
4.16.1
ATypicalTransactionbetweenwebserversandclients...................'..
4.16.2 The Main Webserver: httpd (The http daemon) """"""""""""""""""'
107
4.16.3 ServerHardware.....'..... """"""""
107
4.16.4 ServerSoftware ...'......'.' """""""
108
4.17 WebGu
...............111
4.18 Portal and Portal Space
............ 111
4.19 Web Browsers ...............
...........112
4.2O Browser..
Working
of ................. 113
4.20.1 Microsoft lnternet Explorer version
5.0
........... 119
4.2'l Explorer...
Working with
lnternet .................. 11S
4.21.1 Basic
Setup .............. 115
4.21.2 Safety in Browsing the Web
......... 115
4.21-3 Learning howto Browsetheweb Fasterand Easier
.......... 115
4.22 UsingYourWeb Browser
........... 115
4.23 lnternet ExplorerWeb
browser... .................. 117
4.23.1 What to do if a Web page isn't working
........... 118
4.23.2 Setting up an lnternet connection using lnternet Connection
Wizard .... 118
4.23.3 Findingthe lnformationYouWant..........
.......... 119
4.23.4
BrowserTips ................ ................
119
4.23.5 The Cache
andToolbar .................124
4.23.6 Stiaring Bookmarks and
Favorites ................ .....................124
4.23.7 To EnterWeb lnformation more Easily
............125
4.23.8 Making Pages Available for Offline Viewing
....125
4.24 Netscape (Netscape communications or Netscape Navigator)
.........127
4.25 Navigating the world wide web with Netscape
communicator ......... ................... 12g
4.25.1 Anatomy of
Netscape ................... 129
4.25.2
TheToolbars................. ................
129
4.26 The Access lndicator.....
........... 131
4.26.1 Some BrowserTricks...............
..... 191
4.26.2 Who Controls the
lnternet? ............... .............. 139
4.26.3 Who Created the
lnternet? ............... ............... 133
4.26.4 Pure-PlayWeb Application
Server .................. 194
4.26.5 Develop-and-Deploy Servers
........1U
4.26.6 Application Servers from
ClienUserverVendors ................................... 135
4.27 Browsing vs.
Building ............... 196
4.28 ISP Web hosting
....137
GENERATING E.COMMERCE
149
5.1
Commerce .............
14g
5.2 Commerce in
History ................ 149
5.3 The Early Modern
Period .......... 149
5.4 The Effects of lndustrialization on Commerce.............. ....................
1S0
5.5 The Period of the World
Wars.......... ............. 151
5.6 The Later20th
Century ............. 151
5.7
FreeTlade ..............15
1
5.7.1 EarlyTrade
Doctrine ..................... 152
5.7.2
ModernTradeTheory ....................1S2
5.7.3 Arguments for
Protection ................ ................ 1Sg
5.7.4 Recent
Developments ........,....... ..................... 159
5.8
ForeignTrade ................ ............
1S4
5.8.1 Emergenceof Modern ForeignTrade................. ................. 154
5.8.2 Advantages of
Trade...... ............... 1il
5.8.3 Government Restrictions..'.........'..........'..,....'...' """""""" 155
5.8.4
Tarifti......... ................155
5.8.5 Nontariff BarrierstoTrade..'..'
"""' 155
5.8.6 2Oth CenturyTrends....'... """""""
156
5.8.7 Trade Negotiations
""' 156
5.8.8 Trading Cbmmunities and Customs.......'......
"' 156
5.9 U.S.Trade """';""""""""""""'
156
5.10
Business ...............
157
5.10.1 Types of Businesses....'..'.......
""'157
5.11 Manufacturing .............. """"""'
157
5.12 Merchandisers............... """""'
158
5.13 Service Enterprises """""""""
158
5.13.1 Forms of Business Ownership
""' 158
5.13.2 Sole Proprietorship
"" 159
5.13.3 PartnershiP
5.13.4 Corporation """"""""
159
5.13.5 Joint Ventures and Syndicates
""' 160
5.13.6 Syndicates """"""""
160
5.13.7 Mercantilism """""""
160
5.13.8 Retailing """""""""" 161
5.14 Retailing Strategy """"""""""'
161

5.15 Kinds of Retailers """"'""""""


162
5.16 Department Stores """""""""'
163
5.16.1 History of Growth of Department Stores
""""' 163
5.16.2 Chain Stores '.'.'.......".. """"""""
165
5.16.3 Suburlcan Branches
"' 165
5.16.4
Franchise... ................165
5.17 Business Operations """"""""
166
5.18 Business in a Free Market Economy....
"""' 167
5.19 Business Activities : currentTrends """i"""""""""""" 167
5.20 E-Business """"""
168
5.20.1 lntra Business.......'.".... """""""'
168
5.20.2 Business-to-Business (BTB or B2B) """""'
"" 168
5.20.3 Business-to-Consumer(BTOorB2C) """""
"' 168
5.20.4 GovernmenVPublic-Consumer """"" """""""
169
5.21 Staying in E-Business .....-........'. """"""""'
169
5.22 The lnternet and e-Business ...'...'.. """"""'
170
5.2g Electronic Commerce """""""'
170
5.29.1 Who is Using....'.'.'
""170
5.29.2 SecuritY Concerns
""' 171

5.23.3 How itWorks .'.'.....""... """"""""


171

5.29.4 The Future of Electronic Commerce """""""'


171
5.24 An lntegrative View Of Electronic Commerce """""""" """""""""'
172
5.24.1 lmplications """""""'
173
5.25 Levels of Web Presence
"""""' 173
5.26 Exactness of the Contents ......""""
"""'""' 174
5.27 E-comWeb Presence Models """"""""""'174
5.28 Basic Steps for Conduting Business on Line """"""""'
175
v
q.28.1 Domain Name
Registration ........... 126
?.28.2 Obtaining a Digital
Certificate ......17g
5.28.3 Finding a Provider of Online
Transactions ....... 1Tg
5.28.4 Web
Hosting .............. 179
5.28.5 Server
Hosting .......... 180
5.28.6 Web Store Design
..... 1BO
5.28.7 Payment Solutions
.... 183
q.28.8 Shopping Cart
Software ............... ................... 184
5.28.9 Getting an lnternet Merchant Bank Account................ ......
184
5.28.10 Traffic Coverage
........ 184
5.29 The Seven Deadly Sins of E-Commerce ................
........ 1g5
5.30 E-Commerce Software Example
................. 1g6
5.30.1 Getting Started
..........1A7
5.30.2 Adding Value .........
....187
5.30.3 Transactions
.............. 1gg
5.30.4 Don't Mess with Taxes
................. .lgg
5.30.5 Shaping Up and Shipping Out ............
............. 189
5.30.6 Backto
Ramforless.com............ .....................
190
!.30.7 Selecting E-commerce
package ..................... 190
5.30.8 Buy, Lease, or Build?
...................

1g.l
5.30.9 ChartYour Course
.....1g2
5.30.10 Ramforless.com: Buildin'lt So They'll
Come ..................... 193
Cold Fusion : The Basic Software for e-Comerce
Applications ............................ 193
5.31.1 BuildingYour Customer
Base.......... ................ 194
5.31.2 Requirements
Document ................. ................ 194
5.31.3 OrderandTransaction
processing. .................. 195
5.31.4 Attracting
Customers ................... 195
5.31.5 Fulfillment and Customer
Service ................... 195
5.31.6 Software and
Hosting .............-.... 195
5.31 .7 Use Those Log
Files ............:...... ...................: 195
5.31.8 Cost-
EffectiveAdvertising............... ............... 196
5.31.9 Everything
Keeping Track of
......... 196
5.31.10 Staying in E-
Business................. ....................197
5.31.11 Play by the "Business Rules. Document
........ 1gg
5.31.12 The Many Ways to Skin a Cat ............
............ 198
5.32 Add Context-Sensitive Help to your lE Applications
....... 199
5.33 Prepare For Growth ln E-Commerce Database
Design ..................... ZO2
5.33.1 Design a usefulWeb-Enabled Database
......... ZO2
5.33.2 Deploy Anytime
......... 203
5.33.3 Other Database Design lssues
.... 203
5.33.4 SupplyChain Management .....r...i...!.....
..........n4
5.33.5
Security .....................2O
4
5.33.6
Availability .................20
4
5.33.7 Volume Growth
.......... 205
5.33.8 Usage
GroMh .,............................ 205
5.34 Guidelines for Universal
Access ................. 206
5.34.1 TestingYourWeb Site............ .......j.!.!.......
.......n7
5'34.2 web Accessibility lnitiative (wAl) Guidetines for universal
Web
Access
to ................... ..........208
5.34.3 Principles of UniversalDesign
""' 208
5.35 GeneralAgreement onTariffs andTrade (GATT)' """"""
209
5.36 WorldTrade Organization (VWO) """""""""
210
5.g7 Writing Softwaies/Programs for Business Applications """"""""""
210
5.37.1 Traditional Business Applications """"""""""
210
5.97.2 lntranet Business Applications
"" 213
5.37.3 Top Tier:The Web Browser as a User lnterface """"""""'
213
5.g7 .4 Middle Tier:The Web Server and Business Logic """""""
216
5.37.5 BottomTier:The Database Server
"""""""""217
5.35.6 lnternationalization and Platform lndependence """""""""""""""""'
218
E-COMMERCE : SALES AND MARKETING
"""""2O
6.1 Competition
""""""2O
6.2 Perfect Competition
"""""""""22O
6.3 Workable Competition
"""""""'22O
6.4 Marketing,
"""""""21
6.5 Tailoring ihe Product
""""""""' nl
6.6 Pricingihe Product
"""""""""'?21
6.7 Prom&ing the Product
"""""""22
6.8 Distributingthe Product
""""""22
6.9 Services and Marketing....'...'.....
""""""""'223
6.10 Marketing Research
"""""""""224
6.1 1 Forces Affecting Modern Marketing "'
""""" 24
6.12 Specialized Mait<eting Developments """"""""
""""""' 225
6.13 The Marketing Profesiion......'.'...'."'
"""""'25
6.14 Marketing and Consumers .........."'
"""""""226
6.15 Global Markets: Definition and Characteristics
"""""""227
6.16 New Forms of Organizationalstructure """"""'
""""""'29
6.17 Telemarketing.................
""""'i"""""""""" 230
6.18 e-Selling ";""""""""
"""""""'231
6.19 Ecommerce Marketing
"""""""232
6.20 Create your own Onliie Storef ront "'
"""""" 2U
6.21 e-Marketing : Web Business Model: Product Sales """"'
""""""""'234
6.22 Designing Site Fot Online Store """"'
""""' 239
6.23 Xeepingirack of Everything ..""""'
""""""'244
6.24 Cost-Effective Advertising ...'.""""
""""""'245
6.25 Auctions Based Selling.....'..
""'246
6.26 Setting Up Shop in Cyberspace"""""""'
""249
6.27 Selling on Line
"""'251
6t.28 Shopiing Cart Software.'...'.'.."""
"""""""' 253
O.Zg Selling pioOucts trom a Web Site Storefront """""""'
"' 265
6.30 Cyber Cash Cash Register """"1"""""
"""'268
6.92 Affiliate ftf"rf,"ting , bimmision Junction's
Solution..".. ...'."""""""'n0

273
7. E-COMMERCE : VIRTUAL CORPORATIONS """"'
7.1 in" C*."ptof VirtualOorporation
"""""""273
7.2 VAN Service Providers
""""""'273
7.3 VANs and the lnternet
"""""""274
ut
7.4 VirtualPrivate Networks
...........275
7.5 lntranets and Virtual private Networks (VpNs)

..............276
7.6 Benefits of lSp-Based private Networks

.....276
7.7 TraditionalWAN NetworkArchitecture

..........277
7.8 Encryption-Based VpNs

...........277
7.9 Private Networking Using Frame-Relay pVCs..........

......27g
7.1O lntranet
7.11 i;;;;;i;;l;;;;;i
Difference i;

""""'.'-.'27s

i13 3:1F3,:,1X,U'*::::::::;I:::::::: : :: ::
: jii
7.14 lntranet and Portals

..................2g4
7j5 Web Personalization
................. 285
7.16 Dot Coms path to profitability
.....................286
7.17 Start an E-company
.................287
7.18 Dot-com DesignTips

................289
7.19 Risks in Dot-Com....
..................29O
7.2O Dot-Coms:What Have We Learned? .

8. E-COMMERCE :WEB S|TE AND E-ADVERTTSEMENT


...
........298
8.1
Advertising ............2
98
8.1.1
Media......... ................299
8.1.2 Direct Advertising.
.....299
8.1.3
Reaserch ................... 300
8.'l .4 Techniques of
persuasion................. ............... 301
8.'1.5 Structure of the
lndustry .............. ................... 302
8.1.6 Economic and Social
Effects........ ..................303
8:1.7
Regulation ................. 303
8.2 History of Advertising Efforts
... n4
83 Web Page : Building a
site ......... .................30s
8.4 About Creating a Web
page .......... ......;........ 307
8.4.1 Create a Web
page ........... ............ 3Og
8'4-2 create a web page orframes page with the web page
wi2ard............ 3og
8.5
Create ...................rrr
g.6 savea
s.7
8 8
conver
How to get started program
12-step
:':trii"lt"",;;;;.:.:.....:
:......::....::.3]l
Advertisement and-A

.....312
8.9 ............
the need of a Web site
........312
10
I 11 Marketing and promotion..............
............... A12
9 Advertising ontnrernet
............. g13
8.12 Website Costs .........
8.13 Typical otfer from some WEb site Design Firm :
Office
The WebCommerce Back
................. g17
8.14 E-mail
Direct Opt-ln
.................. 318
8.15 BannerAdvertising
...................319
8.16 Advertisement for Real Estate : second Highest popularweb
cra2e................. 320
8.17 lncreasing circulation of
ezine ..................... 321
8.18 Web Site
Maintenance................. ................322
8.19 The Seven Negative Aspects of E-
Commerce .............. .................... g24
8.2O Choosing aWebhosting Company
...............326
9. E-COMMERCE: E-BANK|NG .........

.....3g4
9'1 Banking
............... a34
9.2 Early Banking ................
...........334
9.3
CommercialBanking ............
.....335
9.4 CommercialBankingToday.............
............. 336
9.5 Thrift lnstitutions...........
............ 3g7
9.6 European
Banking .................... 33g
9.7 Banking in
Britain..... .................338
9.8 Banking in Developing
Countries ................. 339
9.9 Role of Central Banking
............ 340
9.10
lnternationalBanking ............
.... 341
9.11 European
Banking ....................U2
9j2 American Banking Before World War - |
....... U2
9.13 American Banking AfterWorld War - |
.......... g43
9j4 Current Practices in Banking
....Ug
9.15
Finance ..........
.....34g
9.16
Credit ..........
.....g44
9.17 GlobalFinance Profiles.......
......U7
9.18 Fortune e-50 World's First 50 e-Commerce Companies ............
:

...... 351
9.19 Types Of Electronic Payment Systems
.......353
9.20 Electronic
PaymentTechnologies ................354
9.21 Electronics FundTransfer...............
............. 355
9.22 lntroduction to Electronic Payment Mechanisms
...........356
9.23 lnternet Bill Presentation and Payment (lBpp)
..............35g
9.24 NSE MarketTrading System
....363
9.25
CreditCard........... ...................
.. 38t
9.26 Accepting Credit Cards
............. 367
9.27 Wireless Credit Cards:How Soon and How
pervasive? .................... mg
9.28 Smart Card
Overview .............. ......,............. 370
9.29 lntroduction to Smart Cards in Wireless Communications ..........
......g71
9.30 Discover Olfers Online'Virtual Credit Card' .........
.......... g77
9.31 Smart
Card .......... .....................37g
9.32 What is a DigitalSignature?
.....381
9.33 Use your Debit Card with
Caution ................ g84
9.34 Online Credit CardTransaction Processing ...........
.........3g9
9.35 Lenders UseYour Credit
Score .................... 391
9.36 Loan Criteria Also Top Secret
... gg2
9.37 lmpacts and Effects of Digital Money
.........394
9.38 Cybercash Service : US Dollars
Payments ....................404
9.39 Authorizenet Service : US Dollars
Payments ................. rc4
9.40 Merchant
Accounts.... ............... 405
9.41 Worldpay Multi-Currency Payments (with NatWest) for UK based
Merchants ..... 4Og
9.42 lnternetSecure GuaranteesYour Merchant
Status......... .................... 4Og
9.43 E-Gold
Payments... ...................410
9.44 e-Pay it Online's Online Bill Payment
Portal. ..................410
9.45 eComm PRO Shopping Cart
.....41O
9.46 PDG
Software................ ........... 412
9 47 Wired-2-
Shop ................ ............412
9.48 Quickcommerce/E-commerce Exchange: Merchant Account
program .............. 413
9.49 IBM Net.Commerce:Taking the Lead
9 !0
Cash Re9ister...............
....
........414
9.51 Stock
Exchange ............ ...........414
9.52 lnternational
Exchanges ...........417
9.53 History of U.S. Stock Exchanges...........
..... 418
9.54 Regulation of
Exchanges ................. ............ 418
9.55 Direcent
Developments................ ................42O
9.56 lnvestment
Banking ..................420
9.57
Underwriting ...........4n
9.58 Other
Services............... ........... 421
9.59 OASIS :The LargestWeb Commerce
Arrangement......... .................4p.
10. E-COMMERCE : ELECTRONTC SERVTCES
DELtVERy. .................:. ..........42g
10.1 Electronic Services Delivery
.... 42g
10.2 Purpose
...............42g
10.3 Definition
...............424
1O.4 Drivers
...............424
10.5 Technologies for ESD
...............424
10 6 Single-Organisation ESD ...........
..................425
10.7 Business Models for Single-Organisation ESD ...........
... 42g
10 8 lssues in Single-Organisation
ESD ........... .....................42g
10.9 The lnadequacy of Singte-Organisation ESD ...........
...... 430
10.10 Multi-Organisation
ESD ........... ....................431
10.1 1 Architecture for Multi-Organisation ESD ...........

.............. 4gz
10.12 Challenges in Multi-Organisation ESD...........
.................4g2
10.13 Conclusions
...........433
11. E-coMMERCE : wirelessTechnotolgy to Enable Mobile e-
Business ...........:....... .....4g
11.1 Mobile
Commerce ..................... 4U
11.2 Challenges of e-
commerce ............. .............434
11.3 Global Mobile e-Commerce.................
......... ztgs
11.4 European M-Commerce Seen at Euro 3g Billion in
2004 ................... 436
11.5 Secure Mobile Commerce.
........ 1136
11.6 Secured Payments through
Mobile ..............437
11.7 First Mobile Commerce
Service ..................4g7
11.8 Wireless
Business .................... 43g
11.9 OEM
Portal ............ MO
11.10 WAP
Applications ..................... 44O
11.11 Platforms for WAP
Applications ...................444
1'1.12 MobileforMobileWorkforce
.....445
11.13 lnformation Technology and Mobile wAp enabled
relephones ........... 44s
1'l.14 Wireless Devices
... 446
11.15 Mobile Banking via
WAP ........... 450
11.16 Wireless
Portal ......... ................450
11.17 Multi-party
Communication............. ............. 452
""" 45s
12. E-COMMERCE:WEB PUBL|SH|NG """"""""
12.1 Electronic Publishing - Definition
""""""""' 455

12.2 Electronic Publishin! - A Business Process Model


"""' 456

12.g Electronic Publishini - Alternative Business Models


""' 457

12.4 Electronic Publishini - A Maturation Path Model


"""""' 457

12.5 Web Publishing'........'.'.'


"""""' 461
12.6 Document tntethange Standards
"""""""' 463
12.7 Components of WEEi-Publishing
""""""""" 465
12.8 Document Management '.....'...'."""
""""""' 465
12.g Web Documents ."........
"""""" 465
li.lO Component Software
"""""""" 466
12.11 WhyWeb Publishing?
"""""""' 466
12.12 Web Page Design Clonsiderations"""""""'
"""""""""" 466
12.19 YourWeb Page's Layout
"""""' 472
ti.tq lngredients oiw"u Site Design
"""""""""'474
12.15 Enhance Your Site Design foi Better Business
""""""" 482
12.16 Other Design Tips .....'...
"""""" 496

"' 498
12.17 Design PrinciPles
12.18 Tips on Graphics Design
""""" 502'

12.19 Authoring:Tools for CrJating and Changing Web Pages


"""""""""" 503

508
12.20 Non-Standard New Standards
"'
12.21 Style Sheets '.".............
"""""" 508

12.22 MicrosoftWeb iublishing Wizard Overview


"""""""""' 508

12.2g How to Publish and Publicis9 """"""""


""" 513
12.24 Where to host your Web Site """"""
"""""' 516

12.25 Web Site Location


"""""""""" 517

12.26 Finding a Home forYour Site """"""


"""""' 519

12.27 HTTP Server Requirement""""""""


"""""'522
12.28 Microsoft's WEB Server '.."""""""'
""""""' 523
12.29 SeruertnternetConnectionSpeed
"""""""'524
12.90 MaintenanceandUpdating "i"""'"""
"""""525
12.91 Your Presence on lnternet creating a Home Page ........"
""""""""' 528
12.32 Web Com's Web Authoring Service
""""""' 531
12.33 Attracting Visiters
""""""""""' 531
13. MULTIMEDIA AND APPL|CAT|ONS.......""
"""""" sl6
13.1 What is Multimedia?
""""""""' 536
1g.2 Transition to Multimedia """"""""
"""""""' 537
13.3 GeneralMultimedia Developments """"""""
""""""""' 537
13.4 ls Multimedi" o"V U,tiness Modesty? """"""'
""""" 538
13.5 Uses of Multimedia
"
""""""""" 539
13.6 Multimedia Content Control """""""';"'
""" 539

1g.7 lnteractive Communications """""'


""""""' 539
13.8 MultimediaOommunications """""
""""""' 540
13.9 lnterface Devices..."'
"""""""" 541
13.10 Development and Uses
""""""'il2
13.11 StreamingTechnology
"""""""' 543

)(I
14. ELECTRONTCCOMMERCEANDSECURTTY
........s7
14.1 Electronic Commerce and Security
............. il7
14'2 Privacy
...............g7
14.3 lnformation privacy.......
............549
14.4 A Common Misuse of theTerm ,privacy'
..... 54g
14.5 Data Surveillance..........
............ 5SO
14.6 Human ldentilication
................. S51
14.7 Authentication...............
............ 552
14.8 Anonymity, ldentification and pseudonymity
.................553
14.9 MessageTransmissionSecurity
14.10 Cryptogr:aphy ................
............556
14.11 lnternet Security
.... 5@
14.12 Security System of lntexnet..
....561
14.13 Overview Of lnternet Security
.....................561
14.14 Security for lnternetwork Connections
............ 567
14.1s Usins Secure rnternet.sites
rorTransactions ...... .::..:...:.:.::::...:::..:...................... soa
14.16 Protecting Your ldentity over rhe lnternet
.... 56g
14.17 lnternet Security : Other Aspects
................ 570
14.18 Security Risks in eBusiness
....575
14.19 Security-Related problems ..............
............577
14.19.1 Security lncidents on the lnternet
...................5TT
14.20 Secure ElectronicTransaction
.....................57g
14.21 Secure ElectronicTransactions (SET) .........
................... 578
'14.21.1 Who needs SET? .........
.....
...........529
14.21.2 SET: Merits and
Demerits ............... ..............58O
14.21.3 Adoption of SET by lnformation and e-commerce
lndustry .................. 581
14.2't.4 The Conduct of a payment
Transaction................. ............. 583
14.21.5 lnfrastructure for Digital
Signatures. ................ 5gg
14.21.6 lssues in public Key Cryptography .........
........ SB4
14.21.2 The Need For a Comprehensive Security
Regime ............. 5gg
14.21.8 Secured Socket Layer..........
........ 588.
14.2'1.1 The Need For a Comprehensive Security Regime.......
... S88
14.21.2 Secured Socket Layer..........
........ 588
14.22 Security Blanket for Credit
Cards ............... 5g9
14.23 Secured Credit Cards : Mondex System
..... 590
14.24 Use your Debit Card with Caution
14.25 Transfering funds from your Customer Account to Merchant
Account ................. 5g2
14.25 Microsoft Wallet Security for Online Shopping....
............ 594
14.26 FindingTrustworthy e-Commerce
Companies ................ ................... 59S
14.27 lntroduction to Firewalls
........... 596
14.28 Security of Gil .........
.................600
ls. EC AND LEGAL, SOCTAL AND OTHER ISSUES..
.................... 6(}2
15.1 Consumer and Shape of the Market place
..................... 602
15.1 .1 Financial lssues
........ 602
15.1.2 Electronic payment Systems
......... 603
15.2 Legal lssues
..........604
15.3 Privacy
...............608
15.4 Elegibility of Contents
............... 6'1 1
15.5 Technical Standards for Global e-Commerce ................
.................... 612
15.6 Copyright lssues
....614
15.7 LegalAspects of E-Commerce.........
........... 614
15.8 lntellectualProperty
.................616
15.9 Copyright
...............618

16. SoFTWARE FOR E-COMMERCE......


._...................623
16.1 Web Application lnf rastructure ..........
.......... 623
16.2 The Need for Structure: Roles and Development Models
..................624
16.3 Seruer-side Application Building Blocks
.....627
16.4 Application Services Framework
.................631
16.5 TheWebSphere Application ServerWorkbench
............. ffi6
16.6 lnteractivity Tools..........
............ 639
16.7 Visual Basic Script : Overview
....................652
16.8 A Simple VBScript Page..........
....................655
16.9 OtherWays to Attach Code to Events
.........656
16.10 Java
...............656

rlli
16.15
*l:
["ilji!],1,="#*J*r,,,:::::::::::::::::::::::::::::::::::::::::::::::::::::::::.'.'.
ilgi
6.0
Microsoft Visual J++
........... 663
16.16 Java Script
............663
16.17 lntel's Just-ln-Time (JlT) Compiler ..............
................... 663
16.18 JAVA and Websites
.................. 665
16.19 Programming in JAVA
...............666
16.20 Command Line Arguments .............
............. 667
16.21 JAVA Capabilities ..........
...........678
16.22 Java
Tools .............:................
...678
16.23 JavaScript
.............679
16.24 PushTechnology............
...........681
16.25 Push Technology and Various Products
....... 688
16.26 Features of Different Push Technology Products ...............
............... 689
16.26 How is content delivered?
........ 689
16.27 Client Operating Systems
......... 689
16.29 Push for Executive Communication ............
................... 691
Appendix
.......69e7q2

xIlI
E-COMMERCE : CONVERGENCE OF
TECHNOLOGIES / 1

Cbnpb, I
C-COMMERCE:
C onv erg enc e of Technolo gies

l.l Electronics Commerce (e.Commerce or EC)


Simply defined EC is the activity of carrying out business activities through the
lnternet. This could
include, but not be limited to, examining product and merchandise descriptions and
catalogs, ordering
and paying for products or merchandise, banking, filing applications and forms,
Email communications
relating to business, advertising and promotion, research on subjects, and software
distribution. e-
Commerce is being embraced and adopted by businesses, educational institutions, and
governments
at a very high rate because it reduces the cost of conducting business in many
ways.
While there is no one correct definition of e-commerce, it is generally described
as a method of
buying and selling products and services through electronic means of
communications. The main
methods of e-commerce remain as the lnternet and the World Wide Web, but use of
email, fax, and
telephone orders are also prevalent. e-commerce also encompasses all ranges of
transactions:
business-to-business, business-to-consumer, and consumer-to-busi ness.
Electronic commerce is an integrative concept, designed to draw together a wide
range of business
support services, including inter-organisational e-mail; directories; trading
support.systems for
commodities, products, customised products and custom-built goods and services;
ordering and
logistic support systems; settlement support systems; and management information
and statistical
reporting systems.
EC is intended for people who need a sense of the boundaries and content of EC, or
who need help
in explaining EC to others.
Some people use the more restrictive terms 'elec.tronic tradinj and'electronic
markets', and others
use broader terms such as'electronic business'. Some people also restrict the scope
of EC to
procurement; but it's more usefully conceived much more broadly, to include any
kind of business-
related transaction conducted with the assistance ef efectronic tools. Yep, even
the telephone and
fax.
A startup EC bookstore with the name "Amazon.com" makes waves with an enormously
successful
lnternet portal that raises $54 million. Proclamations are made about 9 billion
online transactions,
totaling $50 billion by the year 2OOO.
So what is it? Electronic commerce, or e-commerce, refers to all transactions that
take place
electronically; for the purposes of this article, it is def ined as goods and
services that are bought and
sold online.
Web sites that let customers make purchases online are the bread and butter of e-
commerce.
Amazon.com, mentioned above, is a perfect example of successful electronic
commerce. A customer
2 / ELECTRONIC COMMERCE
visiting Amazon'com can browse and purchase
any of 2.5 million books.
such retail transactions

are
2000. r;faci ii i; ;.ti,*t"o that
50% of al software
:ll?"li::? :f""":T::il,l",l^ol,ll:year
and 25o/o of all CD music sales will tafte place online by 2000.
sares

By the term electronicsin context of electronic


commerce, we always mean
promotion of trade
business by elcronics means of telecommunication
and
, either wired or
wireless type.
ln this intro +!,^ r^--
the term :- :r-^,r :-
in itself is
misnomer.
Elecronics
subsequen nJ|X5:',il:1.il,,11;,IT?,ii3l,
to

in

1.2 Definition of Electronic Commerce


Electronic commerce is the application of communication
and information
sharing technologies among
trading partners to the pursuit of business objectives. ln
the real world of
busin6ss four distinct types
of EC mingle and interact:
tr lnformation access provides search and

D lnterpersonal communication services provide methods


for parties with
mutual interests to
exchange inforrnation, "discuss" ideas, and improve their
cooperation.
Examples include
gn groups jointly working out product
specifications,
fi
updated
asent usins
erectronic mairto
:;1"#ili:"1'rilo;:"chasins
'Shopping services allow people
D to seek a
networks. This form of EC for retail sales
hears the term "electronic commerce". But
directions. As examples, it can apply t
commodities, or freight capacity.

1.3 Commerce and Virtual Enterprises


ln broader perspective commerce means transport of commodities
from place to place
for exchange
purposes' The British economist Adam Smith wrote in
The Wealth of Nations 1r
zzoltn-t,,commerce
is the propensi ?ngeonething for anothe/'is an intrinsic
characteristic

of
processormod
human nature.

of
lffi::*,lplrue
;
and division
organ be impossLle to
r.
ln ancient times, transporting commodities
over any significant distance was an
expensive and
enterprise'Thus, commerce was restricted mainlyio local markets,
risky
and the most
commonly traded
E-COMMERCE : CONVERGENCE OF
TECHNOLOGIES / 3

articles were foodstuffs and clothing. Most people spent the bulk of their
resources on food, and
what they neither grew nor gathered themselves they obtained through trade. The
same was true of
clothing: Garments were either produced and handed down within the family or
acquired through
trade. ln addition to food, clothing, and shelter, the rich devoted their income to
conspicuous attire,
jewelry, and works ol art. As a result, an important trade in luxury items
developed.
Virtual enterprises are business arrangements in which trading partners separated
by geography and
expertise are able to engage in complex joint business activities, as if they were
a single enterprise. One
example would be true supply chain integration, where planing and forecast data are
transmitted quickly
and accurately throughout a multi{ier supply chain. Another example would be non-
competing suppliers
with a common customer using EC to allow that customerto do "one stop shopping"
with the assurance
that a single phone call will bring the right materials to the right location at
the right time.

1.4 Electronics
Electronics is the field of engineering and applied physics dealing with the design
and application of
devices, usually electronic circuits, the operation of which depends on the flow of
electrons for the
generation, transmission, reception, and storage of information.The information can
consist ol voice
or music (audio signals) in a radio receiver, a picture on a television / monitor
screen, or numbers and
olher datalorms in a computer.
Electronic circuits provide different functions to process this information,
including amplification of
weak signals to a usable level; generation of radio waves; extraction of
information, such as the
recovery of an audio signalfrom a radio wave (demodulation); control, such as the
superimposition
of an audio signalonto radio waves (modulation); and logic operations, such as the
electronic processes
taking place in computers.

1.5 Electronic Communication


Communication is at least as old as civilization, but electrical communication
elfeclively started
with the telegraph in the early 19th century.The telegraph revolutionized long-
distance communications
almost everywhere, reducing the time taken to communicate across a country from
days to hours or
minutes, or from months to days between continents.The early telegraph was a very
simple device;
it used a direct current cellto operate an electromagnet.
Morse code, a system of dofs and dashes representing letters, was often used to
send messages,
as the circuit only had two states: on, or off. When large distances had to be
covered, signals were
relayed by human operators who would collect messages from one circuit and relay
them onto
another. ln this way, the first transatlantic telegraph signaled about seven words
per minute. The
telegraph was essentially a digital apparatus;the first analog electrical
communicator, the telephone,
was patented in 1876. While we can't be sure who really invented the telephone -
Bell usually gets
the cr.edit as he held the patent, but other inventors like Elisha Gray played a
part - we do know that
the design owed a lot to telegraphic technology.
At the time of the invention of the telephone, most effort was directed towards the
development of a
'multiple'telegraph: one that could signal more than one code at a time. Despite
digital communication
getting a head start, voice telephony rapidly came to dominate the wide-area
communications
arena. lt is only the last few decades that have seen the development of wide-area
networks exclusively
for data, and only in the last few years that this technology, in the form of
ISDN , has become
availabl.e to home subscribers. Untilvery recently, if one wished to communicate
between a home
computer and a remote site, one had no choice but to use a modem to convert the
computer signals
into a form suitable for a voice communications medium.
4 / ELECTRONIC COMMERCE
It was not long after the invention of the telephone that Hertz discovered that
electromagnetic waves
could be generated and broadcast , and in 1896 Marconi patented the'wireless
telegraph,'a system
for sending telegraphic messages by radio waves. The first transatlantic wireless
messages were
sent in 1902, and by 1907 Marconi had started a commercial wireless service between
lreland and
Canada. Although radio telegraphy was expensive and somewhat unreliable at first,
the development
of the apparatus to allow short-wave transmission made the system much more
practicable, and
cable and radio communications have developed in parallel ever since.
It is only in the last few years that there has been widespread use of
communications networks that
mix radio and cabletransmission: the cellular telephone network is an example of
such a system.
When computers became commercially available in the 1960's, the mechanisms of
electronic long-
distance communication were quite well developed. New switching techniques allowed
telephone
networks to span the globe, and these could carry data at a speed quite fast enough
for the computers
ol the day. However, in the next twenty years it became apparent that some features
of the public
telephone networks were not ideal for data communication. Apart f rom the obvious
problem that they
were designed for analog communication, they used a technique called'circuit
switching'which is
inefficient in the use of the cable's information carrying capacity <inlormation
carrying capacity.
ln 1969, the US Advanced Research Projects Agency, part of the Department of
Defense, funded
the first dedicated wide-area network of mainframe computers, a development that
was eventually
to become the lnternet. This system was noi primarily intended to overcome the
inherent limitations
of the public telephone networks, but to provide a robust network that would be
able to continue to
operate in the event of large-scale war damage. However, it used the principle of
packet switching ,
which made much better use ol available cable capacity.
ln the 1970s, the telephone service providers started to implement data packet
switching networks
for commercial and academic use. The X.25 standard for packet switched networks was
published
by the CCITT in 1976. This development is remarkable in another way: it is probably
the first such
standard which thought of communication protocols forming'layers';this concept is
now widespread.
At abo,-tt the same time local-area networking techniques were being developed to
augment the
point-to-point wiring normally used to connect computers in the same area. The
Xerox Corporation
devized the ethernet protocol in 1975, variations of which are still widely used.
The local area technologies were based on the idea of local broadcasting. Modern
developments in
data communications have mostly been concerned with increasing the speed,
flexibility and
accessibility of networking techniques. lt is reasonable to assume that about 20
million computers
are now members of the lnternet..Modern technologies like f rame relay are faster
than earlier ones
because they are simpler, rather than more sophisticated. This reduced complexity
has been made
possible by the improvement in quality of communications hardware. Another recent
development is
the blurring of the traditional distinction between local area and wide area
networks.

1.5 The Convergence of Computing with Communications


Electronic commerce implies the application of communication and information
sharing technologies
among trading partners to the pursuit of business objectives. ln the real world of
business, four
distinct types of EC mingle and interact:
tr lnformation access provides search and retrieve capability for public domain
3nd proprietary
data archives. The most common example of this type of EC is information
services (e.9.
Diaiog, Nexus - Lexus, and ABI lnforms) that maintain a data base and charges
lor access.
Another example would be a large manufacturer communicate engineering change
notices
to suppliers via dial-up access to a centralized database.
E-COMMERCE : CONVERGENCE OF
TECHNOLOGTES/ s

O lnterpersonalcommunication services provide methods for parties with mutual


interests to
exchange information, "discuss" ideas, and improve their cooperation.
Examples include
customer and supplier design groups jointly working out product
specifications, updated
files being sent by a publisher to a printer, and a purchasing agent using
electronic mail to
negotiate an expediting schedule with a supplier.
O Shopping services allow people to seek and purchase goods or services though
electronic
networks. This form of EC for retail sales is what comes most readily to mind
when one
hears the term "electronic commerce". But this genre of EC can be extended in
many other
directions. As examples, it can apply to the purchase of used industrial
equipment,
commodities, or freight capacity.
C Virtual enterprises are business arrangements in which trading partners
separated by
geography and expertise are able to engage in complex joint business
activities, as if they
were a single enterprise. One example would be true supply chain integration,
where planing
and forecast data are transmitted quickly and accurately throughout a multi-
tier supply
chain. Another example would be non-competing suppliers with a common
customer using
EC to allow that customer to do "one stop shopping" with the assurance that a
single phone
call will bring the right materials to the right location at the right time.
Convergence is the coming together of networks, terminal devices and applications.
convergence is
made possible by the fact that the networks, at least the telecommunicatinos
networks, have largely
been digitized-CATV networks currently are undergoing that process. Additionally,
Cigital
telecommunicatins networks are based on, supported by and managed by computer
systems, Further,
access across those networks is provided by linking access to specialized
applicatinos residing on
computer systems connected to and even embedded in the networks.
75 years after the invention of telephone, an, experiment was made in USA to send
written message
over a telephone through a digital computer in year 1940. Dr. George Stibitz used
telegraph lines to
send data f rom Darmouth college to Bell Laboratories calculator in New York city.
This started the era
of converging technologies that is still continued. Fig. 1.1 shows the overlapping
view of the two
different technologies in fifth decade of twentieth century.

- Flg. l.l : ConverglngTechnologles.


A converged inlormation industry operating within the context of an advanced
information infrastructure
will be a huge boost lor international business and trading resources.
SeveralWashington think-
tanks estimate that it could spur more than $300 billion annually in new sales and
increase worker
productivity by 20 to 40 percent.
6 / ELECTRONIC COMMERCE
Already, an estimated two-thirds of allAmerican jobs are information related,

and that number will


increase as the shift f rom manufacturing to service industries continues. An
information

highway will
also entail new products and services-and hence new jobs. There should be societal

benefits as
well. lf properly managed, this highway would allow people to become better
educated,

healthier,
more productive, more informed, and, of course, better entertained.
The convergence of information industries will happen because the technological
and

business
imperatives are compelling. ll one company does not see the possibilities,
anotlier

will. What is not


set in stone is exactly who will build it, when it will happen, or what
applications will prove

the most
popular.
As the Chinese saying goes, "May you live in interesting times." ln that regard,
we are in for

some
interesting times indeed; few periods in the history of any industry can compare
with the next

decade
or two of the information industry.

1.7 Technology Convergence and Global Commerce


The US economy activity namely the lT sector grew from around 6.1 percent in 1990
to g.2 percent
in 1998, employing roughly 7.4 million workers (or 6.2percent of the total
employment).

Most remarkably,
investments in lT (including computers, software, and communications
now account for
45 percent of business investments in the US. Other countries such as"quipr"ni;
Finland
are emerging fast
with similar patterns thus demonstrating the power of digital convergence on
economies.
Currently, computing telecommunications, meciia (TV and publishing) and the
lnternet exist as separate
mediums where business-to-busrness(BTB)or business-to-govelnment(BOG) or peoplelo-
people
(POP) interact and work independently and not through integiated mediums. Now the
move
is to get
TV to the desktop, radio to the desktop, and the lnternet witn tutt blown
integration of media which
includes transactions. What will happen will be truly in my opinion a great peiioO
of growth of every
conceivable economy.
These mediums are about to collide and integrate and thus the ideas qf the
convergence will be real!
This will result in TVs integrated with interactive content, cable TV providers
will inte-grate the lnternet
and the boundaries that divide what we see today will be blurred to such as extent
w[ere you will ask.
Traditional media industries will see large scale integration and thus the
transformation of products
and services, as we see them today. All of this is happening right now and the
impact on economies
is going to be incredibly interesting and violent. So what are the implications
with respect to economies?

Business-lndustries who today work and depend directly or indirectly on these new
age business will
see large scale cross integration and convergence which will impact the economics
of the products,
delivery and services. Traditional media companies will buy or merge with online
service providers,
companies that are analog will go digital, services will get customized and the
customer will benefit
with cross integration of businesses and industries.
Traditional industries such as banking will be transformed into digital empires
that spawn huge computing
power read convergence) where the customer will work with all media as a part of
thJservice and
transactions will be truly global. Banks will, for example, become increasingly
virtual resulting in the
decreased use of real estate. TimesBank is one such example in lndia. Thus
willfollow industries
from healthcare to education and oil and gas.
Customers are also getting increasirrgly virtual (already a phenomenon in lndia
with the large scale
acceptance of cableTV), thereby placing new demands on business to reach, process,
transact and
deliver products of all kinds in new models of business never seen before. The
customer will benefit
and so will be economies of scale for companies.
E-COMMERCE : CONVERGENCE OF
TECHNOLOGIES/7

1.8 Advantages of Electronic Commerce


Electronic commerce [e-commerce] is the use of telecommunications and dala
processing technology
to improve the quality of transactions between business partners. lt has existed in
some lorm since
the invention of the telegraph and early automated data processing equipment but
its use has greatly
increased. E-commerce improves organizational efficiencies by leveraging data
processing, database
storage, and data communications technologies. Existing network facilities can be
utilized to achieve
great savings in labor costs and the reduction of paper storage and handling
facilities. lt has enabled
firms to be more effective in improving the quality of standard goods and services
and to offer a
variety of new services. The global marketplace has become larger and wider than
ever because of
the expansion of e-commerce activity.

1.9 Applications of Electronic Commerce


The groMh ol electronic commerce has been fueled by the availability of worldwide
telecommunication
networks along with enhanced information delivery techniques utilizing the various
multimedia
technologies.
Client-server architecture allows systems with different hardware and software
platforms to interact
in an open system computing environment. Electronic commerce can be viewed from two
business
application perspectives. One perspective on e-commerce in business is to look at
those businesses
engaged in providing electronic commerce technology to help enable other
businesses. lnternet
Service Providers ISP] and private commercial network providers help tie companies
into wide area
networks [WAN] for use in e-commerce activity.They may offer additional features
such as protocol
conversion and are they described as Value-Added Networks [VAN]. Other types of
firms specialize
in helping organizations build electronic commercial sites. Software firms selldata
encryption and
other types of security-related technologies, user interface programs and other
types of software
used to implement e-commerce. Other firms specialize in consulting and designing e-
commerce
applications such as World Wide web sites.
Another perspective on e-commerce is to examine the application uses to which a
business uses
such technologies. Linkages between business partners may be tightened through
improvements in
Just-ln-Time [JlT] supply logistics overall improvement in supply chain management.
Consumer marketing and sales techniques like shopping kiosks and home shopping
techniques
have removed barriers of distance and increased product awareness. Electronic
publishing services,
financial news and remote banking services are now avaihble over networks.
Commercial databases
and library seruices provide general information resources.
On-line job placement services are numerous, and distance education and job
training services can
assist in career development. A wide variety of recreational and entertainment
services are currently
available and such services will expand dramatically in the near future.

l.l0 The Technologies of Electronic Commerce


While many technologies can fit within the definition of "electronic commerce," the
most important
are:
tr Electronic data interchange (EDl)
o Bar codes
c Electronic mail
o lnternet
8 / ELECTRONIC COMMERCE
tr World Wide Web
D Product data exchange
D Electronic forms

l.l I Digitization of the Network


Wilh digitization,allof the media becometranslatable into each other-computer bits
migrate merrily_and
they escape from their traditional means of transmission. lf that's not revolution
enough, with
digitization, the content becomes totally plastic-any message, sound, or image may
be edited from
anything into anything else.
Historically, information was created, stored, manipulated, and transformed by its
form. Textual
information existed mostly as hard copy or as metallic templates used by printers
to make copies.
Audio information existed mostly as analog waveforms, captured on vinylor magnetic
tape. Stilland
moving images were rendered in chemical form; later on, moving images shifted to
analog form
through the development of videotape technology. Only computer-based information
existed as precise
digitaldata.
The digital world is characterized internally by a monotonous sameness; regardless
of what they
represent, constellations of zeroes and ones remain just that to the computer. As
more and more
content is digitized, the computer virtualizes it and liberates it from most of the
shackles of its
previous medium.
Over time, the computer industry has developed numerous technologies to store and
manipulate
digitaldata. Digital information is essentially distortion-free, perfectly and
infinitely replicable, instantly
transportable (given fiber, cable, and future communication bandwidths), highly
translatable, inherently
editable, readily amenable to various forms of processing, and compatible with
other forms of digital
information.
The network has been undergoing a process of digitization since the 1960's. Digital
switching systems
and their complements, in total, an end-to-end network which delivers more
bandwidth, bqttererror
performance at lower power levels, and lower overall cost. Compression is
relatively easily
accomplished,yielding highly efficient utilizatino of bandwidth, and access and
datasecurity are easily
enhanced through the use of data encryption techniques. Such a network is also more
controlable
and manageable on a centralized basis.
Digital networks also have the unique ability to treat all information streams as
equals-all information
is carried as a digital bit stream.
The primary driver of convergence of different forms of information is
technologicalchange, primarily
the rapid diffusion of digital technology into an ever-wider array of information
businesses. Beyond
digitization, dramatic changes in the computing and telecommunications industries
(primarily in laster
microprocessors and increasing bandwidth) are also driving convergence. We examine
each of these
in turn.

l.l2 The lnformation lndustry and e-Commelce


When broadly defined, worldwide revenues of information-centered businesses
(including publishing,
entertainment, computing, consumer electronics, imaging, telecommunications, and a
host of smaller
sectors) exceed one trillion dollars annually.
The information industry has been defined in many diflerent ways. Traditionally, it
has been viewed
as consisting of three elements: computing (dealing with information storage and
processing), office
E-COMMERcE ; CONVERGENCE
OF TECHNOLOGIES / 9

technologies (dealing with task automation and information creation and display),
and
telecommunications. We have recognized lor many years now the implications of the
gradual blurring
of technological lines between these three components, especially between computing
and
telecommunications.
However, the traditional definition is unduly limited. Both the scope of the
industry, 1s well as the
extent of its ultimate technological convergence, is far greater than previously
suggested'To

understand
that, we must first broaden the definition of the information industry.
,r0r,rili

(:rt:^tl: & (.'0l,tl:ct


((:alYll:h t)

lllstl-\Y
?.
a- (lDlVtC[\l

sroru:
(:ql:uatRl Divlctlv
F
fl{(xrl:!it
(,\l'ltl.lc".lrlONsl

Das-ru18t: rl:
I Ill^ssl'trLl)

Figure 1.2 :The lnformation Mega'lndustry

information
Figure 1.2 presents a broaderview of the information industry. As depicted in the
columns,
audio/video, and data'
Historically, each form of
exists in five basic forms: voice, text, images,
information has been dominated at the retail level by one
imaging
consists of cameras, movies, industrial imaging, xerogra

primarily
been the domain of entertainment-related industries such
cast and
studios. ln addition, several important
background or supplier
cable television networks, and Hollywood
industries, including producers oi components and machine tools, have
existed to support each
form-based industrY.
in ea-ch one of those
The horizontal dimension of the matrix captures what is done with information
processed, or distributed. we first
examine the vertical
industries: it is created, displayed, stored,
columns: the forms of information.

l.t5 The Form'Based lnformation lndustries of the Past


lnformation industries have traditionally been defined in terms ol the form
of
information for two
important reason ing each type of
information have
been vastly differ handle other
forms of information.
second, the gove on-based companies
from entering
other types of information businesses.
o Text
The first information industry was based on text a
in 1455 and movable type later in the lifteenth
industry has been printing and publishing (news
emphasis has been on content creation, with a
1O / ELECTRONIC COMMERCE
The principal technologies at the heart of the industry
are the mechanical
and electromechanical
.:y:r'."t sup,ptier inoustries
(e.g., printins presses, type
,"#.r:*,'l::r"i::,r^:llfl3: l":o_.0:l':1
foundries, and offset printing) iupport the pubrishing in'dlstry.
D lmages
ntity on the capture,
storage, and printing of
race when Louis Jacques Mand
bague-rre
which he and his
camera had
capturedandfixedafaith.furimager?#,,r".rn"primary,"oJs;"uon
Today, however, the imaging induitry is rarge and
diverse and incrudes
makers, filmmakers, industriarand medicirfirming (such
as r"r,.nog
include xerography and mimeography. The tunctions
most empnasized in this
industry have been
g:tfl?':T,:f.",,"" (via capturei, stoiage, and display.The undertying technotogi"s
r,aue historicalty

D Voice
The telephone industry, created in the 1g7Os, q
industry includes phone companies and other s
manufactu rers, copper-wire producers, and nu me
of the telephone industry has been voice distri
image (fax) and data transport. The industry has also
been involved in the
information content
business (e'g', the Yellow Pages) and in the voice-display
business via the
manufacture of terminal
equipment such as telephone set cal underpinnings of
the industry have
been in the transmission and sw ls; however, the
technology is moving
rapidlytoward 1OO-percent softwa ng.
O Audio/Video
This category is comprised of audio information (m
industry has owned these forms of information f
define here as the entertainment industry, and eac
Hollywood, music studios, and television networks have predominantly
concentrated
on content
tion (done by movie theaters,
video, cable television

electronics industry

the technologies at

een a move toward


catesorv;rhey have exceiled in contenr, dispray,
i:illt"..iil;:1,ffi::';:J:;T:iltT:,"ffi:i"
O Data
Data represents the ased information businesses. Here,
the major industry
has beencomputing, e tabulating and calculating
businesses. From mainframe
computers, the indu ers and thLn personal computers,
workstations, and
supercomputers' Forcomputing, the main emphasis has been on information

storage
while it was mechanical and electromechanical in its early
"nd-pro"es.ing.
)rears, the
technoloiical base for this
information form was the first to become predominantly elettionic
and
digital.
As described, the technologies underlying these form-dominated
industries
were inherenly different
and formed a logical basis for their definition and separation. All
of that is
changing, however, as the
E-COMMERCE : CONVEBGENCE OF
TECHNOLOGIES / 11

form of each information type becomes digitized. Once voice, text, images,
audio/video, and data
are translated into their binary equivalents, the rationale of a separate industry
to support each
becomes unsupportable. ln the process, the more recent of these industries (i.e.,
those on the right
side of the matrix in Figure 2.1 will enjoy significant technological leadership
over the others and,
thus, may become stronger competitors or consolidators of the total information
industry.

l.l4 The Global lnformation lnfrastructule (Gll): lnternet


Gll is still in the early stages of its development, is already transforming our
world. Over the next
decade, advances on the Gll will affect almost every aspect of daily life
education, health care,
-
work and leisure activities. Disparate populations, once separated by distance and
time, will experience
these changes as part of a global community'.
No single force embodies our electronic transformation more than the evolving
medium known as the
lnternet. Once a tool reserved for scientific and academic exchange, the lnternet
has ernerged as an
appliance of every day life, accessible from almost every point on the planet.
Students across the
world are discovering vast treasure troves of data via the World Wide Web. Doctors
are utilizing tele-
medicine to administer off-site diagnoses to patients in need. Citizens of many
nations are finding
additional outlets for personal and political expression. The lnternet is being
used to reinvent
government and reshape our lives and our communities in the process.
As the lnternet empowers citizens and democratizes societies, it is also changing
classic business
and economic paradigms. New models of commercial interaction are developing as
businesses and
consumers participate in the electronic marketplace and reap the resultant
benefits. Entrepreneurs
are able to start new businesses more easily, with smaller up-front investment
requirements, by
accessing thb lnternet's worldwide network of customers.

t.t5 Internet Technology


The lnternet has been described as "a loose collection of related networks' or as a
"network of
networks." Both of these descriptions are accurate,in a sense,but both fall short
of describing fully
what the lnternet really is.That is perhaps because it is very hard to exactly
describe the lnternet; it
appears to be differentthings to different people.lnternet is called network of
networks because there
are actually many different network systems redily accessible through the lnternet.
Each of these
networks has its own roots,and each collectively helps to define the scope and
breadth of the
lnternet.

Fig. I .3 : Internet : Networks of Various Types


12 / ELECTRONIC COMMERCE
The lnternet is a "network of networks," meaning that many different
networks
operated by a multitude
of organization are connected together collectively to form the internet.
communicate,share resources,a d share data with people across

inu lnt"rnet lets you


the street or
around the world. The
biggest advantage of the lnterne is that it is a tool providing accesr
to vast
(worldwide) quantities of
information.

distances, as shown in Figure 1.3.


A variety of programs have been installed on the lnternet to use these
services,
combine them, or
make them easier to use. These include Archie, Gopher, WAIS and the
World wiOe
Weu (WWW).
lndividuals, companies, and institutions use the lnternet in many ways.
Businesses
use the lnternet
to provide access to compl
commerce online, including
sales services. Businesses
and other forms of commun
The use of electronic mail overthe lnternet has greatly speeded communication

between companies,
among coworkers, and between other individuals. Media and entertainment

companies use the lnternet


to broadcast audio and video, including live radio and television programs;to offer

online chat, in
which people carry on discussions using written text; and to offer onlinJne*s and

weather programs.
Scientists and scholars use the lnternet to communicate with colleagues, to perform

research, to
distribute lecture notes and course materials to students, and to publish paper.
and

articles. lndividuals
use the lnternet for communication, entertainment, finding iniormation, and

to buy and sell goods


and services.

obaltrade in services.
World trade irlvolving
ctures, videos, games,
sound recordings),
hnical information,
product licenses, financial
nd technical consulting,
accounting, architectural
design, legal advice, tlavel services, etc.) has grown rapidly in the past d-ecade,
no*l."ornting

for
well over $40 billion of U.S. exports alone.
An increasing share of these transactions occurs online. The Gll has the potential
to revolutionize
commerce in these and other areas by dramatically lowering transaction costs and
facilitating

new
types of commercial transactions.
The lnternet will also revolutionize retail and direct marketing. Consumers will be
able

to shop in their
homes for a wide variety of products f rom manufactu rers and retailers all over
the world.

They will be
able to view these products on their computers or televisions, access information
about

the products,
visualize the way the products may fit together (constructing a room of furniture
on their screen,

for
example), and order and pay for their choice, all from their living rooms.
Commerce on the lnternet could total tens of billions of dollars by the turn of the
century. For this
potentialto be realized fully, governments must adopt a non-regulatory, market-
oriented approach

to
electronic commerce, one that facilitates the emergence of a transparent and
predictable legal
environment to support global business and commerce. Official decision makers must
respect the
unique nature of the medium and recognize that widespread competition and increased
consumer
choice should be the defining features of the new digital marketplace.
E-COMMERCE : CONVERGENCE OF
TECHNOLOGIES / 13

Many businesses and consumers are still wary of conducting extensive business over
the lnternet
because of the lack of a predictable legal environment governing transactions. This
is particularly
true for international commercial activity where concerns about enforcement of
contracts, liability,
intellectual property protection, privacy, security and other matters have caused
businesses and
consumers to be cautious.
As use of the lnternet expands, many companies and lnternet users are concerned
that some
governments will impose extensive regulations on the lnternet and electronic
commerce. Potential
areas of problematic regulation include taxes and duties, restrictions on the type
of information
transmitted, control over standards development, licensing requirements and rate
regulation of seruice
providers. lndeed, signs of these types of commerce-inhibiting actions already are
appearing in
many nations. Preempting these harmful actions before they take root is a strong
motivation for the
strategy outlined in this paper.
Governments can have a profound effect on the growth of commerce on the lnternet.
By their
actions, they can facilitate electronic trade or inhibit it. Knowing when to act
and
important

- at least as
when not to act, will be crucial to the development of electronic
commerce. This report
-
articulates the Administration's vision for the emergence of the Gll as a vibrant
global marketplace
by suggesting a set of principles, presenting a series of policies, and
establishing a road map for
international discussions and agreements to facilitate the growth of commerce on
the lnternet.

l.l5 Components of lnternet Technology


t.l5.l The lnternet Network
But the everyday network that most resembles the lnternet is the street running
right outside your
building. You've got an address on that street. And it, and the other streets in
your neighborhood or
town, connect and eventually pour onto a wider street or highway. That highway
connects to other
neighborhoods ortowns. And these highways eventually dump into higher-speed
freeways that connect
other main highways. And the f reeways connect to airports and shipping ports
that,'in turn, cross the
waters to connect to the freeways, highways (even donkey trails), and neighborhoods
on other
continents.
Think of each neighborhood or town as a network of streets. lf you know the address
you want, you
can find a route to some other building clear across the world. Picture, then, the
"highway network"
as a network of networks. That's what the lnternet is like.
lnterestingly, you can thank the former Soviet Union for the lnternet. The
forerunner of today's
commercial lnternet actually started in the '60s as a U.S. Defense department
project. The desire
was to crehte a communications system that the Soviets couldn't easily bomb.
Telephone networks
were vulnerable because they relied on central switching points. Nuke the switch,
and you close
down large portions of the network.
The Rand Corporation came up with the decentralized network concept. lnstead of a
strict hub-and-
spoke phone-switch arrangement, you had a fish net arrangement. Communication lines
crisscrossed
and intersected, and messages were switched-or "routed"-f rom point to point in
many directions. lf
part of the "net" was destroyed, the "Net" (initially called ARPANET) could route
messages around
the disaster.
The lnternet gradually widened to serve nonmilitary research, and finally,
commercial use.The National
Science Foundation initially provided the high-speed "freeway" portions of the
lnternet, but now, as it
14 / ELECTRONIC COMMERCE
has opened to commercial use, most of the main freeways are commercially
owned.
lt's a complicated
ownership, but basically, big-time operators pay big bucks to telecommunications

firms for a stretch


of the highway, and then charge the rest of us by the minute or by the mile_so to

speak.
l.l5.Z WWW. World Wide Web
The World Wide Web is a collection of documents written and encoded with the

Hypertext Markup
Language (HTML). With the aid of a relatively small piece of software (called a
"browser,,),

a user can
ask for these documents and display them on the users local computer, although the
document

can
be on a computer on a totally different network elsewhere in the world. HTML
documents (or,,pages,"
as they are called) can contain many different kinds of information such as text,
pictures, video,
sound, and pointers which take users immediately to other web pages. Because Web
pages are
continually available through the lnternet, these pointers may cali up pages from
anywhere in the
world. lt is this ability to jump from site to site that gave rise to the term
"World Wide WLO:' Browsing
the Web (or "surfing the Net") can be a fascinating activity, especially to people
new to the lnternet.
The World Wide Web is by far the most heavily used appiication on the lnternet.
The World Wide Web is the multimedia experience on the lnternet. The WWW consists
of pages
where you can find out just about anything you want, or don't want to know about.
The best place

to
start is to a search on one of the many search engines. Click on the Net Search
button at the top of
you browser and follow the instructions, or use Yahoo! to browse the Web by
category.
The World Wide Web is essentially a document delivery system running over the
lnternet

network.
Connected to the lpternet, Web browsing software runntng on your computer can find
and fetch
documents located on lnternet web servers anywhere in the world.
Making a web site requires knowledge of "HTMI-'(HyperText Markup Language),
universal document
format of the World Wide Web apart f rom more than a dozen components and
application programs
listed in Unit 19 of this book.
For a fee, many companies will"host" yourWeb site, maintaining it on Web server
computers connected
to the lnternet. Browsing the World Wide Web can snag you lots of information, moie
ihan you might
expect' Plus, with your own Web site, you can get folks'attention from virtually
anywhere in the
world, 24 hours a day.
You don't have to know much about the "Web," or how it works, to browse fairly
successfully. But

if
you're planning to create a Web "site," you might find it less daunting if you
understand whai you're
dealing with.
With your own Web site, anyone with Web browser software and a connection to the
lnternet can f ind
the Web pages you publish. Your site can be an advertisement for you or your
organization. lt can be
an on-line newsletter, a catalog of goods or services, a customer support vehicle,
or an employee or
sales management system for remote offices. Think of what you're doing via
brochures, catalogs,
faxes, and forms, and chances are you can do a lot of it more efficientlybver the
lnternet, and the
World Wide Web, in particular.

1.15.5 Electronic l.lail


The lnternet is now the world's largest electronic mail system. More than 250
million people are
directly connected to the lnternet and can send and receive electronic mail.
Through gateways to
other electronic mail systems, millions more can join in.

1.t5.4 FTP
E-COMMERCE : CONVERGENCE OF
TECHNOLOGIES /15

FTP or File Transfer Protocol is protocol used to transfer liles between computers
on the tnternet.
There are two types of FTP conections anonymous.non-anonymous. lf you connect to an
anonymous
FTP server then you would use anonymous as your login name and your e-mail address
as a
password. Non-anonymous, you will need a private login name and password. There are
also two
types of file transfers, ASCII and binary. ASCII is for text transfers only. Binary
transfers are for
transfering angthing else. lf in doubt, uSe binary(bin).

1.15.5 lnternet RclayChat (lRC)


lnternet Relay Chat is whersto meet people on the net.There is a channelfor just
about anythingll
First a few words of warning: Do not give any information out about yourself over
irc, and do not type
in anything sorpe stranger asks you to. And please, if you have children, closely
moniter their
activities on irc. (Now alter allthis, irc is a great place to visit.You meet
people from all over the world
and can talk about any subject you want.)
IRC provides real-time communication with others on the lnternet.

1.15.5 Web Chat


You can also mdke use of more traditional live chat conferencing or bulletin board
systems (BBSs)
with real-time capabilities. (Note that during live chats, participants actually
type messages to each
other.) This type of software can be used on the World Wide Web with your browser
to conduct online
chat sessions wjth other users and can accommodate between 50 and 1,000 users
simultaneously.
Some companieis can use this feature on their websites to facilitate communication
with customers
or as an informalion-based value-added feature.

1.15.7 News Groups


News Groups are like an international bulletin board. Each group is a forum for a
different subject,
where you can post questions and answers.There are many tllousands of groups
covering just about
any area of interest. You can use lnternet Explorer or Netscape Navigaior lo v.iew
these groups.
Please note that any post that you make to a newsgroup will be sent all over the
world to every news
server on the planet, so never post anything personal to a newsgroup. Also, there
afe many newsgroups
which may contain material that is not suitable for children. Becau.se of the
global nature of lnternet,
there isn't a way to control the viewing of inappropriate material The best way to
prevent children
from viewing these groups is to be with them while they're surfing.

1.15.8 Usenet
Usenet is a collection of more than 5,000 newsgroups, or discussion groupsl on
every conceivable
subject. For example, some newsgroups are self-help groups for victims of cancere
or sexual
abuse, and oihers give the latest in gossip about show business personalities.
Anyone can contribute
a message, called an article, to a Usenet newsgroup or post a reply, known as
afollow-up post, to an
existing article. With the aid of a newsreader (a program designed to access Usenet
newsgroups),
you can read an entire thread-all the replies to an interesting article.
The system is intended for exchange of information in an informal way. Anyone can
post new messages
to the group and reply to other messages. News groups are arranged in a lose
hierarchical order
covering about 5,000 subjects. About half of these are related to computing, the
rest are for recreational
subjects, professional discussion and trivia. To use Usenet you need a news viewer
and access to an
NNTP server. Most lnternet service providers have such a servel as do most large
academic institutions.
16 / ELECTRONIC COMMERCE
1.15.9 Telnet

l-17 Principles 0f Founding lnternet Based e.commerce


(1) The private sector should lead

s expansion

, the private

lower prices

ndustry.

(2') Governments should avoid Undue Restrictions on Electronic


Commerce
Parties should be able to enter into legitimate a
across the lnternet with minimal government invo
commercial activities will djstort development o
and raising the cost of products and services f
evolve rapidly to keep pace with the break-neck speed of change
in the
technology; government
attempts to regulate are likely to be outmoded by the time theyari
' finalty -"-
vrYY' ver'
-"'
"n""i"0, JJpecialy to the
extent such regulations are technology_specific.
.

Accordingly, governments should refrain from imposing new and


unnecessary
regulations, bureaucratic
procedures, or taxes and tariffs on commercial actiiities that take place via
the
lnternet.
(3) where governmental involvement is needed, its aim should be to
support and
enforce
a predictable, minimalist, consistent and simple legal environr"iti
roi

"orr"r"".

mmerce and

simple legal

is necessary to facilitate electronic commerce, its goal should


T,:??;'"?il1
be to ensure
competition, protect
intellectual property and privacy, prevent fraud, fosteriransp"r"*V,
support
commercialtransactions,
and facilitate dispute resolution.
(4) Governments should recognize the unique qualities of the lnternet
The genius and explosive sui:cess of the lnternet can be attributed
in part to its
decent ralizednature
and to its tradition of bottom-up governance. These same characteristics
pose
significant logistical
and technological challenges to existing regulatory roo"rr, governments
should tailor their
policies accordingly. "no
Electronic commerce faces significant challenges where it intersects
with existing
regulatory schemes.
E-COMMERCE : CONVERGENCE OF
TECHNOLOGIES / 1 7

We should not assume, for example, that the regulatory f rameworks established over
the past sixty
years for telecommunications, radio and television fit the lnternet. Regulation
should be lmposed
only as a necessary means to achieve an important goal on which there is a broad
consensus.
Existing laws and regulations that may hinder electronic commerce should be
reviewed and revised
or eliminated to reflect the needs of the new electronic age.
(5) Electronic Commerce over the Internet should be facilitated on a global basis
The lnternet is emerging as a global marketplace. The legal framework supporting
commercial
transactions on the lnternet should be governed by consistent principles across
state, national, and
international borders that lead to predictable results regardless of the
jurisdiction in which a particular
buyer or seller resides.

Ll7.l Pervasive lnternet lccess and ]'lobile lnternet


ln imagining the future of pervasive lnternet access, including wireless, panelists
and participants
listed major challenges as cultural/psychological concerns, complexity, network
coverage and reliability
issues. Significant opportunities for accelerating the deployment of pervasive
technology included
shrinkage and convergence of device sizes, proliferating and more sophisticated
applications, SMS/
text messaging and improved displays. Panel members underscored the need to think
beyond current
lnternet approaches.
The mobile lnternet is very different from the fixed-line lnternet and cannot be
thought of as an
extension.

l.t I lntranets
'lntranet' is a term used to describe the application of lnternet technologies to
serve the internal
needs of organisations and as is the greatest e-commerce facility to promote
internal business to
business interests
lnternet technologies offer several important advantages over conventional means
for developing
internal systems. lmportant among these are:
O The use of a common, readily available and familiar access tool, the web-browser
D The ease with which documents are handled and indexed
tr The ease with which multiple media can be supported
l.l9 The Technologies of Electronic Commerce
While many technologies can fit within the definition of "electronic commerce," the
most important
are:
o Electronic data interchange (EDl)
o Bar codes
o Electronic mail
o lnternet Market
o Product data exchange
o Electronic forms
l.l9.l Electronic Data lnterchange (EDl)
EDI is the computer-to-computer exchange of structured business tnformation in a
standard electronic
format. lnformation stored on one computer is translated by software programs into
standard EDI
format for transmission to one or more trading partners. The trading
partnerscomputers, in turn,
translate the information using software programs into a form they can understand.
18 / ELECTRONIC COMMERCE

1.19.2 Bar Codes


Bar codes are used for automatic product identification by a computer.They are a
rectangular pattern
of lines of varying widths and spaces. Specific characters (e.g- numbers 0-9) are
assilned unique
patterns, thus creating a'Tont" which computers can recognize based on light
reflected irom

a laser.
The most obvious example of bar codes is on consumer products such as packaged
foods. These
codes allow the products to be scanned at the check out counter. As the produci is
identified the
price is entered in the cash register, while internal systems such as inventory and
accounting

are
automatically updated.
The special value of a bar code is that objects can be identified at any point
where a stationary or
hand held laser scanner can be employed. Thus the technology carries tremendous
potential to
improve any process requiring tight control of material flow. Good examples would
be shipping,
inventory management, and work flow in discrete parts manufacturing.

1.19.5 Electronic Xail


Messages composed by an individual and sent in digital form to other recipients via
the lnternet.

t.19.4 lnternet Xarket


The lnternet is a decentralized global network of millions of diverse computers and
computer networks.
These networks can all "talk" to each other because they have agreed to use a
common
communications protocol called TCP/lP. The lnternet is a tool for communications
between people
and businesses. The network is growing very, very fast and as more and more people
are gaining
access to the lnternet, it is becoming more and more useful.

1.19.5 Product Data Exchange


Product data refers to any data that is needed to describe a product. Sometimes
that data is in
graphicalform, as in the case of pictures, drawings and CAD files. ln other cases
the data may be
character based (numbers and letters), as in the case of specifications, bills of
material, manuf4cturing
instructions, engineering change notices and test results.
Product data exchange differs f rom other types of business communications in two
important ways.
First, because graphics are involved users must contend with large computerfiles
and with problems
of compatibility between software applications. (The difficulty of exchanging CAD
files from one
system to another is legendary.) Second, version control very quickly gets very
complicated. product
designs, even late in the development cycle, are subject to a great deal of change,
and because
manufacturing processes are involved, even small product changes can have major
consequences
for getting a product into production.

1.19.5 Electronic Forms


Electronic forms is a technology that combines the familiarity of paper forms with
the power of
storing information in digitalform. lmagine an ordinary paperform, a piece of
paperwith lines, boxes,
check-off lists, and places for signatures. To the user an electronic form is
simply a digital analogue
of such a paper form, an image which looks like a form but which appears on a
computer screen ind
is filled out'via mouse and keyboard. Behind the screen, however, lie numerous
functions that paper
and pencil cannot provide.Those extra functions come about because the data from
electronic forms
are captured in digitalform, thus allowing storage in data bases, automatic
information routing, and
in[egration into other applications. As an example, a supplies form may filled out
by the requester
and automatically sent to a supervisor for approval. Once approved, the actual
order may be input
ihto an EDltrarrslator, and go to the vendor by means of a structured X12
EDltransaction.
E-COMMERCE : CONVERGENCE OF
TEGHNOLOGTES / t9
1.20 Differences Between Electronic and 0ther Forms of Commerce
These methods of doing business differ from traditional commerce in the extent to
which electronic
commerce combines in{ormation technology, telecommunications technology, and
business process
to make it practical to do business in ways that could not othenlrrise be done. To
illustrate, lei's draw
on some examples. ln each of these cases technology and business process must work
together if
EC is to be successful.

l.2l Determining Technological Feasibility


As business needs are determined, it is necessary to establish the
technologicalfeasibility of various
EC plans which could meet those needs. The starting point should be a cleai sense
of what f unctions
each EC technology can provide to improve business functioning. We summarize these
in Table 1 .1.
Table 1.1 Most Power{ul Functions of Various EC Technology
Technology BusinessValue
EDI lnte$ration of incoming and outgoing structured data
into other
applications (e.9., use of customerorders to schedule
production) Lowers
cost when transaction volume is high Eases
communication with many
diflerent trading partners (customers, suppliers,
vendors)
Bar Code Locate and identify material
lntegrate location and identification information
with other applications
and data bases (e.9., barcodes inserted at loading
dock can be integrated
into an advance ship notice EDltransaction).
Electronic mail Free-text queries to individuals or
groups Share
information via simple messages
Share complex information (via attachments)
Collaboration across distance (by making it easierto
communicate and
share information)
World Wide Web Present information about company
Search for information from a large number of sources
Electronic cdnnerce buy/sell products and services Collaboration,
information sharing among
selected users within or witlrout a company
Pnodrct Data Exchange Accurate product details transmitted to
trading partners
Oversight of trading partners design work
Collaborative engineering across distance
Electronic Forms Managing processes when human
oversight,
approvals, or information input needs to be combined
with standard
elements of information (e.9., catalogue data)
Tracking progress in a process where many people are
involved doing
different activities
lntegrating human input data with automated data
bases or applications
Electronic commerce (through integration with the WWW
and internal
systems)
20 / ELECTRONIC COMMERCE

1.22 Ecommerce Marketing


This section will cover the basic methods of marketing on the internet. euite
simply, if you

haven,t
set aside money and time to market your e-business then it might as well not
exisi. iuckily

fo1. yor,
marketing on the internet can be much more cost effective than marketing using
traditional

methods.
Many are even free and can be very effective given the right planning and
exe'cution.
Don't underestimate the effort that will be required in order to make your e-
business

successful.your
online marketing plan should be no different than a "real-world" maiketing plan.
Before you start looking for a provider, you should stop for a moment and consider
what exacly you
need. How many transactions do you expect to be completing in a month? How many
proOucts

Oo
you have to put on your web site? How complex does the software need to be? How
much

are you
willing to spend?
transaction providers out there, and they all have
varying packages. Deciding
e that fits your needs is perhaps the most important
aspect in creating an

The Directory page provides a good cross section of the companies out there. lt is
a good idea to go
through a few of them and compare their prices and services. For a quick breakdown
of the most
popular packages these companies provide, visit the summary section.
The methods reviewed are as follows:
O Be a resource, Not a store
tr Your Current Customers
O Search Engines and Directories
D Discussion forums, Chat and Newsgroups
O Direct Opt-in Email
O Banner Advertising
D lnternet News Releases
O Co-Branding and Sponsorships
O Affiliate Programs
D Reciprocal Links
1.22.1 Be a Resource, Xot a Store
The most successful web properties have one thing in common:They are resource. They
don't just
sell a product or service. They interact with their vistors. They provide a forum
for information exchange
and discussion. They answer questions. They ask questions. They build community!
Before yo, go
any further take a look at your web site. ls it merely a storefront? Or, is it a
community? ConsidLr
how your planned design will serve your customers and keep them coming back.

1.22.2 Your Current Customers


Often businesses assume a seperation between their "electronic" customers and their
"real live"
customers. ln reality, statistics tell us that the internet has become the primary
source of research
and information especially when planning purchases. Let everyone know about your
web site. Make
sure it's on all your correspondence and traditional advertisements. Tell your
customers about your
move online in a effort to serve them better.
But it shouldn't end there. Keep in touch with your online clients as well. Keep an
e-mail list of clients
and regularly inform them of updates and offers.Iet them know that you value their
business and
hope to keep them coming 6ack. Develop an ongoing relationship with your online
customers
E-COMMERCE : CONVERGENCE OF
TECHNQLOGIES / 21

1,22.3 Search Engines and Directories


When you go to find something on the internet where do you go? Chances are you go
to one of a
dozen or so top search engines and directories lor your information. These include
sites such as
Yahoo.com, Go.com, Excite.com, Lycos.com or the browser linked sites such as
Netscape.com or
MSN.com. As well, many of you probably use the directories provided by your ISP
such as AOL.com.
Being listed on these sites is free and if done properly can generate a lot of
traffic to your site.
Each of the search engines and directories operate differenily and thus categorize
individual web
sites differently. lf you list your site on Yahoo! for instance, an actual person
reviews the information
and places a description of your site in the appropriate category. On the other
hand, a listing on
Excite involves a "spide/', or indexing program visiting your site and cataloguing
it based on the
frequency of keywords in the underlying code and content of your site. How you
design your site is
of utmost importance!The relative f requency of key words and search terms on your
site can make
or break your search engine listing under your industry category. Do some research.
Find out what
search terms perspective customers would use to find you and incorporate those
terms into your site
content. Make sure you get listed in the major search engines and any specialty
engines that may be
available.

1.22.4 Discussion Forums, Chat and Newsgroups


The most important thing to remember here is: Be a user!
Use the internet as a source of information both within your industry and outside
of your normal
realm. Get involved with discussion groups, chat and newsgroups in subject areas
that interest you.
Let people know who you are and what you do while being an interesting contributor
to internet based
discussions. Don't spam (the internet equivalent of unwanted junk mail)the
discussions with unsolicited
advertisements, that willjust serve to annoy perspective clients. lnstead develop a
relationship with
the users. They will see you as a "friend in the business". This is an often
overlooked and very
powerful tooi if used properly. lt can also help you get a taste for "internet
culture" and help you
become an active internet citizen. A greater understanding of what drives people on
[he internet will
ultimately help your business serve better and sell more.

t.22.5 Direct Opt.ln E.mail


There are a number of companies who rent out lists of "opt-in" e-mail subscribers,
or voluntary
subscribers to commercial newsletters and offers. This isn't unsolicited junk e-
mail, or spam, but
friendly recipients expecting regular mailings. Renting these lists can cost
anywhere from $0.10 to
$0.35 per name. Of course just because you send an e-mail, it doesn't mean it Will
be read. How you
write your headlines and the information you provide will play a large part in the
success of a direct
e-mail campaign. Proven traditional methods can be applied to internet campaigns as
well.The best
campaigns:
tr Attract Attention
O Generate lnterest
D Stimulate Desire
tr Ask for Action
Effective campaigns incorporate all of these elements, in the order listed.
Especially important is a
call to action. Your campaign will not be effective unless you ask for something!

I .22.6 Banner Advertising


Banner advertising is probably the most visible form of internet advertising, yet
launching a successful
22 / ELECTRONIC COMMERCE
banner campaign can be something of a challenge. As with TV
commercials, the
public haslearned
to "tune out" unwelcome solicitations. Advertiseis must work for good
a response. As
with e-mail
marketing, banner ads must incorporate a number of basic factors:
O Attract Attention
A Generate lnterest
O Stimulate Desire
D Ask for Action
ln addition, a number of other factors have proven effective with
banner ads.
please see our tutorial
on effective banner design.
Banner ads can be circulated using link e are
may be useful if you don't mind having splay
more professional exposure you may consider Bann
using two basic methods.

aying for that banner to .,show


up" on the user,s

searched, etc.., usually for a premium on top of r


Which is better? Well, the initial thought might be that paying for click-throughs
produces

a more
calculated result and is therefore more effective. This can oeieno however, o-n pre

effectiveness of
your banner and the location you choose. For instance, let's assume you
have a
$5ooo budget for a
one month campaign:
tr Your CpM cost = $20.00 (Typical CpM rate)
O 5000.00 /20.00 = 250 or 25O,OOO impressions
tr Your CPC cost = $0.65 (Standard CpC rate)
O 5000.00 / 0.65 = 7692.3 or roughly 7,692 clicks
Based on these numbers a click through rate of g.o7yo would be required in

order to match the


numbers achieved by the click{hrough campaign. Most of the major sites
claim
click through rates
of about 5o/"' Of course' the law of averages tells us for every banner getting

a 9% click-through,
there's another one getting 1%. other factors such as building'brand awareness

can also come into


play. There may be a value even if the banner isn't clicked.
W-here will you fit
in? lt depends on your
campaign, your creativity and your end goal.
You may also find that certain sites, particularly large sites,

CpM basis. ln
this case you have no choice if you want to advertise with th

you think may


be a good advertising forum for your product and find out about

s.Alternatively,
you can approach any of a number of internet ad agencies rep

sell ad sp"ce.
1.22.7 lnternet News Releases
News Releases are a popular way to get free publicity. There are a number of
lnternet

based news
services that distribute news releases to media outlets locally, nationally and
around

the world. lf
your news release gets noticed the free coverage can generate huge returns.
How do you get noticed? First and foremost, your news release ha
nd not
an advertisement. You need to understand who you're sending it
eir job
easier. lt should be professionally written using the generally aJce
E-COMMERCE : CONVERGENCE OF
TECHNOLOGIES / 23

1.22.8 Co.Branding Site Content & Features


This may not seem like marketing at first glance but being associated with a winner
can only help. ls
there a site tfrat offers complementary content to yours, or another that offers a
useful service? Co-
brand! Offering their seruice or content to your users can help build community on
your site and add
to its usefulness as a resource. Many sites are ready and willing to form
partnerships' lt increases
brand awareness and tratfic for both parties and ultimately serves the users
better.
Examples of co-branding could include:
D The provision of regular articles on subjects of interest to your users.
D The provision of anlnternet based service such as a co-branded discussion
forum or chat
room.
O The provision of data such as weather reports, stock quotes or news.
lf you find a site that offers useful features or content don't hesitate to ask
about co-branding or
partnership opportunities.

1.22.9 Affiliate Programs


Both starting an affiliate program and joining other affiliate programs can be
beneficial to your e-
business efforts. By joining Ln affiliate program you can associate yourself with
complementary
products and providayour u"ers with increased information and product selection. By
developing a
network of aliiliates promoting your product or service you can increase traffic to
your site and

paid on
ultimately increase sales. Affililtes are generally paid a commission per sale but
can also be
a per teid or per click ba
anY of a
numbercommercial softwa
romoting
your product, then an affili
ity' lf you
ion't'have anyone helping
an make
this happen quickly andlasily. Of course, since affiliate programs are
voluntary, you must put
together an attracttve program in order for it to be successful'
A typical affiliate program would offer:
O A 15"/" commission per sale (gross)
tr A $5.00 fee lor a qualified lead
O Or a $0.05 per click rate for users referred to your web site
your program should reflect the goals of your e-business and still be attractive to
potential affiliates.

1.22.10 Reciprocal Links

you to their
This is a very effective and free method of site promotion. Links. Ask everybody to
add
list of links. plain and simple. you don't have to restrict you cross-linking
plan to related and
complementary sites; add educational directories, business directories,
community sites, local

process but a
sites,...EveryOoOy.you can never have too much exposure.This is a time consuming
worthwhile one. Not only will users from other sites find you, but since many of
the search engines

engines more
spider sites by following all of the links on a page, your site will be seen by
the search

priorities.
often! Make sure recipiocal linking is high on yot r list of web marketing

1.23 Breakthroughs in Computing Technology

paradigm
The advent of the microprocessor represented the beginning of distributed
computing, a

and
shift that pushed the power of the computer to the deslitop. f urtfrer advances in
miniaturization
have made laptop computers more power{ulthan mainf rames
were in the early 1980s'
electric
"ior"g"
Key developments in computing in recent years have been the following:
24 / ELECTRONIC COMMERCE
A Processing
There is a continuous migration toward more powerful,
smailer, and less
expensive processors.
Aided by advances in very large scale integration (vLSi) of
micioprocessors,
computer hardware
systems have evolved rapidly from the earlier mainframe-based
modeltoward one
based on desktop
computers, laptops, and pDAs.
O Data Storage
The trend in data storage is toward greater capacity, easier
access, and lower
cost. paralleling the
improvements in computer hardware, data storagecapabilities
are expanding, and
their costs are
declining' Contemporary systems are designeJ to uccommodate
video images
of ever-higher
resolution, along with rapidly growing amounts of alphanumeric
data. cD-RoMs
provide.much greater
storage capacities than earlier modes;their appaient successor,
DVD-ROMs, can
store a two-hour
movie on a disk the same size.
O Miniaturization of Component technologies
Miniaturization is enabling manufacturers to incorporate computer-on-a-chip

components into a wide


variety of products that are becoming smarter through the use
ol tuzzy togic,
exjeri systems, and
smart networks.
O Display
The dramatic improvements in processing p
understood as a continuous process. lmprove
As color replaced black and white television, th
cathode ray tubes in both computer monitors an
include improvements and cost reductions for
computers. Other technologies still in devel
including plasma screens and digital high-def
O Software
Software is becoming easierto use and is more ve
user interface (GUl) systems (such as Macintosh
has made computers much more accessible to
application programs continues to grow rapidly,
assisted software engineering (CASE) and object_o
programming language, has shown significant promrse
as a cross-platform programming
language
ideally suited to the lnternet.
George Gilder's Law of the Microcosm
1' The power of the chip grows faster than the power of the host processor running
a vast
system of many terminals.
2' The power of the individual commanding a single workstation increases
lar
faster than the
power of an overall bureaucratic system.
3. The organization of enterprise follows the organization of the chip,
4' The power of entrepreneurs using distributed information technology grows

far faster than


the power of large institutions attempting to bring information to heel.
5' Rather than pushing decisions up through the hierarchy, the power
of
microelectronics
pulls them remorselessly down to the individual.
E-COMMERCE :
CONVERGENCE OF TECHNOLOGIES / 2s

Figure 1.4 shows the rapid growth in embedded microprocessors.

E
9r*
*
$ tt t t IJ a.ru n<t fu t eta p ffi
wc f 6
3^ ratl)
2
::l G o fi r I I ft r rvlcf o/,r4.1d4
o a*
^

.FI

Figure 1.4 : Embedded versus Computer Microprocessors

1.24 Breakthroughs in Communications Technology


You think computer prices are plummeting? Wait till you see what happens to
bandwidth. lnfinite
processing power will get you only so far with limited bandwidth. But the coming
era of nearly free
bandwidth will liberate the computer to fulfill its powers.
While computing power and affordability are expanding at a dramatic rate, they are
doing so in a
relatively steady fashion. On the other hand, advances in telecommunications
promise even greater
change of a discontinuous nature_we will see an explosion of bandwidth in coming
years that will
dwarf anything seen in the past.
lmprovements in bandwidth had been slow and steady, but, driven by powerful market
dynamics,
quantum advances in the delivery of broadband services are emerging.While fibey-
optic lines marked
a dramatic increase in the backbone capacity of long-distance networks, recgnt
advances in dense
wave multiplexers, digital subscriber line (DSL)technology, and cable modems herald
a paradigm
shift in the types of information that can move across networks. A fitting analogy
for this explosion
in digital transport capacity can be seen in the development of the PC industry.
Microsoft CEO Bill
Gates founded his company on the keen observation that computing power, once
prohibitively
expensive, would become cheap.The resulting shift from centralized to distributed
processing created
a paradigm shift in the computer industry. When similar improvements are created in
the price/
performance ratio of bandwidth, parallel shifts in the communications industry are
inevitable.
As a lesult of anticipated growth in telecommunications bandwidths, some obseruers
predict a reversal
of the recent decentralizing of computing power. When the network runs faster than
the processors
and buses in the PC, the computer hollows out. The network becomes the bus, and any
set of
interconnected processors and memories can become a computer regardless of their
location.
Through improvements in technology, computer speeds will rise about a hundredfold,
while bandwidth
increases a thousandfold or more. Under these circumstances, the winners will be
the companies
that learn to use bandwidth in combination with (and sometimes as a substitute for)
computer
processing and switching.

t.25 The Sociology of Convergence


The primary focus of convergence industries to date has been on the technologies
that make it
26 / ELECTRONIC COMMERCE

ogical
implications will ultimately
f the
lnternet. The assumption of
and
networks was that video-on-
iller applications driving
customer demand. When
this did not materialize, broadband projects were scaled back or shelved. lt was

the dramatic, and


totally unexpected, growth in lnternet use that created the demand for more
bandwidth

to the residential
marketplace.
The sociological band communications
infrastructure are not yet
fully understood his interactive broadband
technology will cause
the most dramat ce the introduction of the
automobitel it will affect
how people shop, socialize, are entertained, conduct business, and handle
finances.
Critical to such adoption will be the nature of the interface. Any technological
interaction

that users
regard as dehumanizing will be shunned; it will be imperative, therefore,ln"t
nigfr-tech companies
pay great attention to high-touch issues. Videoconferencing, for example, can
greatly

increase the
human quotient in communications. Conversely, voice-response systems frustrat-e
cattLis

who would
prefer to interact with a fellow human being.
ln the global market, convergence will have a dual impact. For developed economies,

it will foster a
higher degree of cross-cultural exchange as global communications and transactions
become

highly
facile. Developing economies will benefit greatll from the affordability that comes
with volume;
deploying these technologies once the costs have come down will provide great
economic

development
benefits. The creation of a relatively inexpensive electronic infrastructure can
reduce the need for
more expensive physical infrastructure. lt can also aid in better allocation of
resources and in
reducing
waste.

1.25 The lmpact of Convergence


The primary focus of convergence industries to date has been on the technologies
that make it
possible to combine different forms of information. However, sociological
implications

will ultimately
drive the industry. This is most clearly illustrated by the explosion of the
lnternet. The assumption of
cable and phone companies in their earlier attempts to build broadband networks was
that video-on-
demand and interactive shopping would be the killer applications driving customer
demand. When
this did not materialize, broadband projects were scaled back or shelved. lt was
the dramatic, and
totally unexpected, growth in lnternet use that created the demand for more
bandwidth to the residential
marketplace.
The sociological implications of an interactive broadband communications
infrastructure are not yet
fully understood but will undoubtedly be profound. This interactive broadband
technology will cause
the most dramatic shift in behavioral patterns since the introduction of the
automobile] it will affect
how people shop, socialize, ate entertained, conduct business, and handle finances.
Critical to such adoption will be the nature of the interface. Any technological
interaction that users
regard as dehumanizing will be shunned; it will be imperative, therefore, that
high-tech companies
pay great attention to high{ouch issues. Videoconferencing, for example, can
greatly increase the
human quotient in communications. Conversely, voice-response systems frustrate
call-ers who would
prefer to interact with a fellow human being.
ln the global market, convergence will have a dual impact. For developed economies,
it willfoster a
higher degree of cross-cultural exchange as global communications and transactions
become highly
facile. Developing economies will benefit greatly from the affordability that comes
with volume;
deploying these telhnologies once the costs liaue c-ome down will provide great
economic development
E-COMMERCE : CONVERGENCE OF
TECHNOLOGIES / 27

benefits. The creation of a relatively inexpensive electronic infrastructure can


reduce the need for
more expensive physical infrastructure. lt can also aid in better allocation of
resources and in reducing
waste.

1.27 A Paradigm Shift The New lnformation lndustry


Eric Hoffer stated :
*"We used to think that revolutions are the cause of change. Actually it is the
other way around:
change prepares the ground for revolution."
With information technology moving toward electronics and digitization, the
structuraltranslormation
of the information industry has become inevitable. lndustry structure is driven by
the definition and
extension of certain core competencies. A criticalcore competence for most
companies is a mastery
ol the enabling technologies that help them create, produce, and distribute their
products and services.
ln the traditional definition of information industries by media, enabling
technologies were different
for each medium (voice, text, image, video/audio, and data). Firms could thus
specialize by devoting
resources to developing distinctive competencies in those technologies.
The underlying principle of vertical integration of these industries around the
form of the content lvas
logical. However, digitization transforms all content to the same base units. ln
the face of this
trinsformation, it is no longer logicalto integrate eiach industry vertically by
the form of the content.
All information companies now harness essentially the same technologies, and these
technologies
are rapidly becoming multimedia. Therefore, the underlying logic by which companies
participate in
the information industry must reflect this new reality.
There will be a fourfold structural impact of the migration of the entire
information industry toward
digital electronics: the industry will reorient itself along the horizontal axis
depicted inFigurel .5 (i.e.,
based on capabilities). As Figure 1.5 shows, there will be a series of within-
industry and cross-
industry consolidations as major players position themselves for the future based
on a functional
specialization.The transformation will result in only three major industries (not
five), which suggests
that it is going to become more efficient in the process.The three industries will
be digitized content,
multimedia devices, and convergent networks.Today's computer industry will largely
disappear and
will primarily become the provider of processing, memory, and storage capabilities
to the three main
industries.
fr FOBlts
-->
l tiXI t\t^flis V(|t(S.
Dla.ti\ ^lrl)l(l|
vttlti0

-"]-'
I NFotrMATroN
tltcnwAYs'

Figurel.S : How the Information IndustryWiil Realign


The impact of the information industry will be pervasive throughout other
industries, given the extent
to which electronic technologies can fuse with other technologies. For example, the
automotive and
appliance industries use significant and growing amounts of information
technology.The logic of this
28 / ELECTRONIC COMMERCE

ch
inf
co
on
pe
industry was highly inefficient in some areas and efficient in other
areas. As
they focus on their core
competence, industries will have to divest noncore functions to specialist
prouid"rs.
Some companies from each form-based industry will become the new

incumbents in the functionally


defined industries of the f uture. They will be best positioned to extend
their f
unctional core competence
and broaden their base across allthe different media, as depicted in Table

1.2.
Tabre 1.2. core competencies in the New rnformation rndustry
T14>e of Information Business Examples of Needed Core CompEencie
CLtrrent
lndustries Mapping to lt
informati.on content Fostering and managing creativity, information
gathering, and
programming skills publishing and entertainment
inf orrnat,ion appliances strategic
sourcing, design and
nt
engineering and marketing,
ity
battery power consumer

information transport network management, interactive communications,


billing
systems, and lT platforms public telephone
networks, ca-ble TV,
broadcast media, and private networks

1.28 The Future of Electronic Commerce


Some of the directions that the industry is moving are truly incredible. VISA
and
t{asterCard just
released the specifications for a technology that will make online cash
and smart
cards more viable.
Hewlett Packard just purchased VeriFone, the makers of those boxes that your

card is swiped
through at the supermarket. We can't be far from the day when new computers

and public Net


terminals are shipped with magnetic readers that let you swipe your credit card

through them if you


want to buy something online.
mpanies are positioning themselves to
as traditional shopping malls. Almost
f it's just a T-shirt or bumper sticker in
e-commerce is fast becoming an integ
Silk Road, ancient trade route linking China and imperial Florne, named after the

silk carried on it.


Also called the Silk Route, it was about 6000 km (4OOO mi) long, stretching by
various

routes from
the Chinese capitalChang'an (now Xi'an), across the North China Plain, tnrougn
the
pamirs and the
Karakorum Range to Samarqand and Bactria, to Damascus, Edessa, and the
Mediterranean ports

of
Alexandria and Antioch. The Silk Road began to be used around 100BC, after Emperor

Wu Ti of
China's Han dynasty subdued large areas o-f Central Asia by conquest and
alliance. The area,s new
stability, and extensive Han road building, enabled caravan trafiic to travel these
vast

distances,
which favored high-value goods: silk from China; wool, gold, and silverfrom Rome.

Caravans generally
met on the road and traded goods, ratherthan traversing the entire route. ldeas
also

traveled to and
from China along the Silk Road. Nestorianism, a sect of Christianity, was
introduced into

China from
Europe and Buddhism came to China from lndia. The Silk Road fell into disuse when
the

Roman
E-COMMERCE : CONVERGENCE OF
TECHNOLOGIES / 29

Empire disintegrated in the Sth century, and safety conditions deteriorated after
nomadic tribes came
to control sections of the route. lt was used intermittently thereafter during
subsequent, more peaceful
periods. Under the Mongol Empire in the 13th century, Venetian merchant Marco Polo
traveled to
China by the Silk Road, a trip that took about three years.

t.29 Methods of E-commerce


tr Electronic Data lnterchange (EDl)
EDI is the computer-to-computer exchange of structured business information in a
standard electronic
format. lnformation stored on one computer is translated by software programs into
standard EDI
format for transmission to one or more trading partners. The trading
partnerscomputers, in turn,
translate the information using software programs into a form they can understand.
Electronic Data lnterchange [EDl] concerns the exchange of transaction data between
business
partners in a standardized electronic format.
These standard EDI formats have been issues by the American National Standards
lnstitute [ANSI]
and are generally referred to as the X.12 standards Many types of forms are def
ined, each relevant
to the type of transaction that is being conducted. An application, such as order-
entry or accounts-
payable, "translates" the internal native format of the data into an ANSI X.12
version of a business
transaction form. The resulting EDI document is then sent between business partners
by using a
"third-party" network provider. ln ihe past, EDI transfers were often carried by
private Value-Added
Network [VAN] providers, but now services are offered over the public lnternet by
lirms such as
Premenos, which may result in dramatic savings over private networks as well as
greater convenience.
Among the most widely perceived advantage of EDI is the speed in which transactions
can be
processed.This has furthered capabilities of organizations to adopt just-in-time
UlTl logistics. Another
value of EDI is due to the ability to integrate the transaction handling processes
with other computer
based systems in the enterprise. This has reduced errors due to manual processing
and provided
better security.
Finally, as a result of overall increase in efficiency, EDI has provided cost
savings. Estimates of
savings through processing efficiencies alone are about a 75% reduction on average.
tr BarCodes
Bar codes are used for automatic product identification by a computer.They are a
rectangular pattern
of lines of varying widths and spaces. Specific characters (e.9. numbers 0-9) are
assigned unique
patterns, thus creating a'Tont" which computers can recognize based on light
reflected f rom a laser.
The most obvious example of bar codes is on consumer products such as packaged
foods. These
codes allow the products to be scanned at the check out counter. As the product is
identified the
price is entered in the cash register, while internal systems such as inventory and
accounting are
automatically updated.
The special value of a bar code is that objects can be identified at any point
where a stationary or
hand held laser scanner can be employed. Thus the technology carries tremendous
potential to
improve any process requiring tight control of material flow. Good examples would
be shipping,
inventory management, and work flow in discrete parts manufacturing.
O Electronic Mail
Messages composed by an individual and sent in digital form to other recipients via
the lnternet.
30 / ELECTRONIC COMMERCE

tr Intern0t
The lnternet is a decentralized global network of millions of diverse computers

and computer networks.


These networks can all "talk" to each other because they have agreed to use

a common
communications protocol called TCP/lP. The lnternet is a tool f,cr, comrunications

between people
and businesses' The network is growing very, very fast and as more and more people

are gaining
access to the lnternet, it is becoming more and more useful.
tr WorldWideWeb
The World Wide Web is a collection of documents written and encoded with the

Hypertext Markup
Language (HTML). With the aid of a relatively small piece of software (called a
"browse/'),

a user can
ask for these documents and display them on the users local computer, although

the document can


be on a computer on a totally different network elsewhere in the world. HTML
doluments (or,,pages,"
as they are called) can contain many different kinds of information such as text,
pictures,

video,
sound, and pointers which take users immediately to other web pages. Because Web
pages

are
continually available through the lnternet, these pointers may cali ui p"g". from
anywhere

in the
world, lt is this ability to jump from site to site that gave rise toihe term
"World WiOe

WLO:' Browsing
the Web (or "surfing the Net") can be a fascinating activity, especially to people
new

to the lnternet.
The World Wide Web is by far the most heavily used appiication on the lnternet.
O Product Data Exchange
Product data refers to any data that is needed to describe a product. Sometimes
that

data is in
graphicalform, as in the case of pictures, drawings and CAD fiies. ln other cases

the data may be


character based (numbers and letters), as in the case of specifications, bills of
material, manufacturing
instructions, engineering change notices and test results.
Product data exchange differs from other types of business communications in two
important

ways.
First, because graphics are involved users must contend with large computerliles
and with problems
of compatibility between software applications. (The difficulty of exchanging CAD
files from one
system to another is legendary.) Second, version controlvery quickly gets very
complicated. product
designs, even late in the development cycle, are subject to a great deal of change,
and

because
manufacturing processes are involved, even small product changes can have malJr
consequences
for getting a product into production.
tr Electronic Forms
Electronic forms is a technology that combines the familiarity of paper forms with
the power

of
storing information in digital
lines, boxes, check-off lists, and places for signatures. To the user an electronic
form is simply a
digital analogue of such a paper form, an image which looks like a form but which
appears on a
computer screen and is filled out via mouse and keyboard. Behind the screen,
however, lie numerous
functions that paper and pencil cannot provide. Those extra functions come about
because the data
from electronic forms are captured in digitalform, thus allowing storage in data
bases, automatic
information routing, and integration into other applications. As an example, a
supplies form may filled
out by the requester and automatically sent to a supervisor for approval. Once
approved, the actual
order may be input into an EDltranslator, and go to the vendor by means of a
structured X12 EDI
transaction.
D Differences Between Electronic and other Forms of commerce
These methods of doing business differ from traditional commerce in the extent to
which electronic
commerce combines information technology, telecommunications technology, and
business process
E-COMMERCE : CONVERGENcE OF
TECHNOLOGIES/ 31

to make it practical to do business in ways that could not otherwise be done. To


illustrate, let's draw
on some examples. ln each of these cases technology and business process must work
together if
EC is to be successful.
What is E-Commerce?
E-Commerce is the buying and selling of goods and services across the lnternet. An
e-commerce
site can be as simple as a catalog page with a phone number, or it can range all
the way to a real-time
credit card processing site where customers can purchase downloadable goods and
receive them on
the spot. E-Commerce merchants can range from the small business with a few items
for sale all the
way to a large online retailer such as Amazon.com.
Web Designing and Publishing: Form of Electronic Commerce
lntroduction
The term'electronic publishing'can be used to referto the efforts of conventional
publishers to adapt
their existing forms of hard-copy publishing to take advantage of the new
opportunities offered by the
information infrastructure. This paper takes the view that this is an unnecessarily
constraining
perspective, and should be avoided if the real potentials of the technology are to
be f ulfilled.
A considerable proportion of the existing literature on the topic relates expressly
to the publication ol
academic works (Harnad 1991 , 1995, Clarke 1994, Barry 1995b, Treloar 1 995, 1 996,
Peek & Newby
1996, Bailey 1995-97), and particularly e-journals (Odlyzko 1995). Another segment
relates to e-
zines (electronic magazines - Labowitz 1997). Many sources focus on particular
technologies and
their application to electronic publishing, particularly the World-Wide Web (Zwass
1996). Another
relevant literature is that relating to digital libraries (D-lib 1997, Ketchpel
1997). For general references,
see also Varian (1997) and Kahin (1997).
This paper adopts an alternative approach. lt considers electronic publishing as a
particular form of
the general class of electronic commerce systems.
Relevant concepts of electronic commerce are reviewed, in order to establish a
working definition of
electronic publishing.Three models are then presented, which provide:
tr a structured description of the processes involved in the business of electronic
publishing;
tr a taxonomy of business models whereby electronic publishing can be f unded; and
tr an interpretation of the maturation.path that is being followed by existing
publishers, as
they convert from conventional to electronic publishing.
tr lmplications of the analysis are drawn, for both practitioners and researchers.
Electronic Commerce
This short, preliminary section provides an outline of key electronic commerce
concepts, as a basis
for the subsequent analysis.
'Electronic commerce' (EC) is a general term for the conduct of business with the
assistance of
telecommunications infrastructure, and of tools and services running over that inf
rastructure.
EC's scope extends across all forms of business process within and between private
sector
organisations (corporations, partnerships and sole traders), public sector
agencies, convivial sector
organisations (associations and clubs) and individuals.
EC's most aclive area of application has to date been in procurement processes,
where models of
both 'deliberative purchasing'also encompasses other business processes such as
the design of
complex artefacts like buildings, ships and aircraft, and admintstrative mechanisms
such as insurance
claims, and registration, licensing and court procedures.
32 / ELECTRONIC COMMERCE

The concept of 'marketspace' (Rayport & Sviokla 1994) has been adopted to
distinguish the space,
within which EC is conducted, from the conventional, physical marketplaces in which
traditional
commerce occurs. The marketspace is the virtual context in which buyers and sellers
discover one
artother, and transact business. lt is the working environment that arises from the
complex of
increasingly rich and mature telecommunications-based services and tools, and the
underlying
info rmation i nf rastructu re.
EC can support most of the processes involved in the purchasing of physical goods
and services,
with the exception of the actual delivery or performance: as the old hacker's joke
goes, there just is
no u ubp (unix-to-unix-beer-protocol).
Digital goods and services (Negroponte 1995) are those whose purchase can be not
only negotiated
and settled using the information infrastructure, but which can also delivered
through the same
channels. Hence, for digital goods and services, the marketspace provides a context
that can support
the entire procurement process.
Web Designing and Publishing: Form of Electronic Commerce
lntroduction
The term'electronic publishing'can be used to refer to the efforts of conventional
publishers to adapt
their existing forms of hard-copy publishing to take advantage of the new
opportunities offered by the
information infrastructure. This paper takes the view that this is an unnecessarily
constraining
perspective, and should be avoided if the real potentials of the technology are to
be fullilled.
A considerable proportion of the existing literature on the topic relates expressly
to the publication of
academic works (Harnad 1991, 1995, Clarke 1994, Barry 1995b, Treloar 1995, 1996,
Peek & Newby
1996, Bailey 1995-97), and particularly e-journals (Odlyzko 1995). Another segment
relates to e-
zines (electronic magazines - Labowitz 1997). Many sources focus on particular
technologies and
their application to electronic publishing, particularly the World-Wide Web (Zwass
1996). Another
relevant literature is that relating to digital libraries (D-lib 1997, Ketchpel
1997). For general references,
see also Varian (1997) and Kahin (1997).
This paper adopts an alternative approach. lt considers electronic publishing as a
pariicular form of
the general class of electronic commerce systems.
iele,rant concepts of electronic commerce are reviewed, in order to establish a
working def inition of
electronic publishing.Three models are then presented, which provide:
O a structured description of the processes involved in the business of
electronic publishing;
tr a taxonomy of business models whereby electronic publishing can be funded;
and
tr an interpretation of the maturation path that is being followed by existing
publishers, as
they convert from conventional to electronic publishing.
lmplications of the analysis are drawn, for both practitioners and researchers.
Electronic Commerce
This short, preliminary section provides an outline of key electronic commerce
concepts, as a basis
for the subsequent analysis.
'Electronic commerce' (EC) is a general term for the conduct of business with the
assistance of
telecommunications infrastructure, and of tools and services running over that
infrastructure.
EC's scope extends across all forms ol business process within and between private
sector
organisations (corporations, partnerships and sole traders), public sector
agencies, convivial sector
organisations (associations and clubs) and individuals.
E-COMMERCE : CONVERGENCE OF
TECHNOLOGIES / 33

EC's most active area of application has to date been in procurement processes,
where models of
both'deliberative purchasing'also encompasses other business processes such as the
design of
complex artefacts like buildings, ships and aircraft, and administrative mechanisms
such as insurance
claims, and registration, licensing and court procedures.
The concept of 'marketspace' (Rayport & Sviokla 1994) has been adopted to
distinguish the space,
within which EC is conducted, from the conventional, physical marketplaces in which
traditional
commerce occurs. The marketspace is the virtual context in which buyers and sellers
discover one
another, and transact business. lt is the working environmeni that arises from the
complex of
increasingly rich and mature telecommunications-based services and tools, and the
underlying
info rmation inf rastructu re.
EC can support most ol the processes involved in the purchasing of physical goods
and services,
with the exception of the actual delivery or pedormance: as the old hacker's joke
goes, there just is
no uubp (unix{o-unix-beer-protocol).
Digital goods and services (Negroponte 1995) are those whose purchase can be not
only negotiated
and settled using the information infrastructure, but which can also delivered
through the same
channels. Hence. for digital goods and services, the marketspace provides a context
that can support
the entire procurement process.

Ouestions With Answers


Consumer electronics companies and PC manufacturers will converge into the
industry.
a. information packaging
b. digitized content
c. information appliances
d. information transpori
2 One reason information industries have traditionally been defined in terms
of lhe form of information
is because the government has actively constrained companies f rom entering
other types of information
busrnesses.
a. true
b. false
With information technology moving toward electronics and digitization, the
structural transformation
of the information industry is predicted to result in major inCustries
instead of
a. two: six
b. three; five
c. seven; five
d. five; three
4 Which of the fotlowing factors will be crucial toward the luture of the
information industry?
a. flexibility, speed, and productivity
b. alliances and partnering
c. global orientation
d. all of the above
5 Convergent technologies witl tead to worldwide end-to-end voice. data, fax,
vicieo, and image services
and a global network that is both a transparent communications service and
a platform for content-
filled or content-enhancecl services.
a. true
b false
6 The five functions of information are creation, display, storage,
processing' and -........'...
a. digitizaticn
b. imagtng
c. transpori
d. convergence
34 / ELECTRONIC COMMERCE

7' lt was the dramatic, and iotally unexpected, growth in video-on-demand and
interactive shopping that
created the demand for more bandwidth to the residential marketptace.
a. true
b. false
8. All companies in the industry will have to focus on customers, as they
provide the volume and velocity
needed to achieve required price/performance ratios.
a. true
b. false
9. Today'q information industry is characterized by which of the foilowing?
a. inefficientinformationdistribution
b. adequate matching of information content with the needs of recipients
c. limited use of economic resources
d. all of the above
10. Of the three new form-based industries, the transpoft area is farthest along
in moving to the new
model.
a. true
b. false

ANsWERs
l.c 2.a 3.b 4.d 5.a 6.c 7.b 8.a 9.a 10.b
Cuprn 2
ELECTRO]VCS AI{D
COMM(I]VICATIOI{S

2.1 Electronics
The introduction of vacuum tubes at the beginning of the 20th century was the
starting point of the
rapid growth of modern electronics.With vacuum tubes the manipulation of signals
became possible,
which could not be done with the early telegraph and telephone circuit or with the
early transmitters
using high-voltage sparks to create radio waves. For example, with vacuum tubes
weak radio and
audio signals could be amplified, and audio signals, such as music or voice, could
be superimposed
on radio waves.The development of a large variety of tubes designed for specialized
functions made
possible the swift progress of radio communication technology before World War ll
and the develop-
ment of early computers during and shortly after the war.
The transistor, invented in 1948, has now almost completely replaced the vacuum
tube in most of its
applications. lncorporating an arrangement of senticonductor materials and
electrical contacts, the
trahsistor provides the same functions as the vacuum tube but at reduced cost,
weight, and power
consumption and with higher reliability. Subsequent advances in
semiconductortechnology, in part
attributabte to the intensity of research associated with the space-exploration
eflort, led to the devel-
opment of the integrated circuit. lntegrated circuits may contain hundreds of
thousands of transis-
tors on a small piece of materialand allow the construction of complex electronic
circuits, such as
those in microcomputers, audio and video equipment, and communications satellites.

2.2 Electronic Components


Electronic circuits consist of interconnections of electronic components.
Components are classified
into two categories-active or passive. Passive elements never supply more energy
than they absorb;
active elements can supply more energy than they absorb. Passive components include
resistors,
capacitors, and inductors. Components considered active include batteries,
generators, vacuum
tubes, and transistors.

2.2.1 Vacuum lbbes


A vacuum tube consists of an air-evacuated glass envelope that contains several
metal electrodes.
A simple, two-element tube (diode) consists of a cathode and an anode that is
connected to the
positive ierminal of a power supply. The cathode-a small metal tube heated by a
filament-frees

plate). tf
electrons , which migrate to the anode-a metalcylinder around the cathode (also
called the
positive
an alternating voltage is applied to the anode, electrons will only flow to the
anode during the
half-cycle; during tne negative cycle of the alternating voltage, the anode
repels the electrons, and
no cuirent passes tnrorigh the tube. Diodes connected in such a way that only the
positive halt
36 / ELECTRONIC COMMERCE

cycles of an alternating current (AC) are permitted to pass are called rectifier
tubes; these are used
in the conversion of alternating current to direct current (DC) (see Electricity;
Rectification). By
inserting a grid, consisting of a spiral of metalwire, between the cathode and
thsanode and applying
a negative voltage to the grid, the flow of electrons can be controlled. When the
grid is negative, it
repels electrons, and only a fraction of the electrons emitted by the cathode can
reach the anode.
Such a tube, called a triode, can be used as an amplifier. Smallvariations in
voltage at the grid, such
as can be produced by a radio or audio signal, will cause large variations in the
flow of electrons f rom
the cathode to the anode and, hence, in the circuitry connected to the anode.

2.2.2 Transistors
Transistors are made from semiconductors.These are materials, such as silicon or
germanium, that
are "doped" (have minute amounts of foreign elements added) so that either an
abuidance or a lack
of free electrons exists. ln the former case, the semiconductor is called n-type,
and in the latter
case, p-type. By combining n{ype and ptype materials, a diode can be produced.
When this diode
is connected to a battery so that the p{ype material is positive and the ntype
negative, electrons are
repelled from the negative battery terminal and pass unimpeded to the p-pggion,
which lacks elec-
trons. With battery reversed, the electrons arriving in the p-material can pasi
only with difficulty to
the n-material, which is already filled with free electrons, and the current is
almosi zero.
The bipolar transislor was invented in 1 948 as a replacement for the triode vacuum
tube. lt consists
of three layers of doped material, forming two p-n (bipolar) junctions with
configurations of p-n-p or n-
p-n. One junction is connected to a battery so as to allow current flow (forwaid
bias), and the other
junction has a battery connected in the opposite direction (reverse bias). tf the
curreni in the lonruard-
biased junction is varied by the addition of a signal, the current in the reverse-
biased junction of the
transistor will vary accordingly. The principle can be used to construct amplifiers
in which a small
signal applied to the forward-biased junction causes a large change in current in
the reverse-biased
junction.
Another type of transistor is the field-effect transistor (FET). Such a transistor
operates on the
principle of repulsion or attraction of charges due to a superimposed electric
field. Amplification of
current is accomplished in a manner similar to the grid control of a vacuum tube.
Field-effect transis-
tors operate more efficiently than bipolar types, because a large signal can be
controlled by a very
small amount of energy.
2.2.3 lntegratedCircuits
Most integrated circuits are small pieces, or "chips," of silicon, perhaps 2 to 4
sq mm (0.0g to 0.1 5 sq
in) long, in which transistors are fabricated. Photolithography enables the
designerto create tens of
thousands of transistors on a single chip by proper placement of the many n-type
and p{ype regions.

Fig. 2.1 : A part of microprocessor Fig. 2.2 : Compteted


Microprocessor
circuit magnified havlng very large scale
lntegrated clrcult
(vLsr)
ELECTRONICS AND
COMMUNICATIONS / 37

Topview t<;

F.l[TE
Nor
gstet

ffil

AEF

1oo
connectihg pint
110*J I

Fig.2.3 :Typical comPonents used in a microprocessor circuit

Fig.2.4 : Size of a chip as compared to a ball pen


These are interconnected ths during fabrication to
produce complex
special-purpose circuits. s ed monolithic because
they are fabricated
on a single crystal of silicon. s space and power and are
cheaperto manufacture
than anlquivalent circuit built by employing individual transistors'

2.2A Resistors
lf a battery is connected across a conducting material, a certain amount of current

willflow through
current is dlpendent on the voltage of the
battery, on the dimensions
the material (see Resistance).This
of the material itself. Resistors
with known resistance are
of the sampie, and on the conductivity
used for current control in electronic circuits.The resistors are made from

carbon mixtures, metal


two connecting wires attached. Variable
resistors, with an adjustable
films, or resistance wire and have
to control volume on radios and
television sets'
sliding contact arm, are often used

2.2.5 Capacitott
material
(see capacitor).
capacitors consist of two metal plates that are separated by an insulating
38 / ELECTRONIC COMMERCE
lf a battery is connected to both plates, an electric charge will flow for a short

time and accumulate


on each plate. lf the battery is disconnected, the capacitor retains the charge
and the voltage
associated with it. Rapidly changing voltages, such as caused by an audio o, radio
signal, produ-e
larger current llows to and from the plates; the capacitor then functions

for the
changing current. This effect can be used, for example, to separate an audio".or"
radio

"onjrctor

signalfrom a
direct current in order to connect the output of one amplifier stage to the input
of the neit

amplifier
stage.

2.2.6 lnductors
lnductors consist of a conducting wire wound into the form of a coil. When a
current passes through
the coil, a magnetic field is set up around it that tends to oppose rapid changes
in current intensity
(see lnduction). As a capacitor, an inductor can be used to distinguish betwlen
rapidly and

slowly
changing signals. When an inductor is used in conjunction with a capacitor, the
voltage in the inductor
reaches a maximal value for a specific frequency. This principle is used in a radio
receiver, where a
specific frequency is selected by a variable capacitor.

2.2.7 Near Past llevelopments in Electronics


The development of integrated circuits has revolutionized the fields of
communications, information
handling, and computing. lntegrated circuits reduce the size of devices and lower
manufacturing and
system costs, while at the same time providing high speed and increased
reliability. Digital watches,
hand-held computers, and electronic games are systems based on micropro"essors. O-
ther develop-
ments include the digitalization of audio signals, where the frequency and
amplitude of an audio
signal are coded digitally by appropriate sampling techniques, that is, techniques
for measuring the
amplitude of the signal at very short intervals. Digitally recorded music shows a
fidelity that is not
possible using direct-recording methods. Digital playback devices of this nature
have already

en-
tered the home market. Digital storage could also form the basis of home video
systems and may
significantly alter library storage systems, because much more information can
bqstored on a disk
for replay on a television screen than can be contained in a book.
Medical electronics has progressed from computerized axial tomography, or the use
of CAT or CT
scanners (see X Ray), to systems that can discriminate more and more of the organs
of the human
body. Devices that can view blood vessels and the respiratory system have been
developed as well.
Ultrahigh definition television also promises to substitute for many photographic
processes, because
it eliminates the need for silver.
Today's research to increase the speed and capacity of computers concentrates
mainly on the
improvement of integrated circuit technology and the development of even faster
switching compo-
nents. Very-large-scale integrated (VLSI) circuits that contain several hundred
thousand components
on a single chip have been developed. Very-high-speed computers are being developed
in which
semiconductors may be replaced by superconducting circuits using Josephson
junctions (see
Josephson Effect) and operating at temperatures near absolute zero.

2.3 Computers : The lnformation Ptocessor


The physical computer and its components are known as hardware. Computer hardware
includes the
memory that stores data and instructions; the central processing unit (CPU) that
carries out instructions;
the bus that connects the various computer components; the input devices,. such as
a keyboard or
mouse, that allow the user to communicate with the computer; and the output
devices, such as
printers and video display monitors, that enable the computer to present
information to the user. The
programs that run the computer are called software. Software generally is designed
to perform a
ELECTRONICS AND
COMMUNICATIONS / 39

particular type of task{or example, to control the arm of a robot to weld a car's
body, to write a letter,
to draw a graph, or to direct the general operation of the computer.

2.3.1 The 0perating System


When a computer is turned on it searches for instructions in its memory. Usually,
the first set of
these instructions is a special program called the operating system, which is the
software that
makes the computer work. lt prompts the user (or other machines) for input and
commands, reports
the results of these commands and other operations, stores and manages data, and
controls the
sequence of the software and hardware actions. When the user requests that a
program run, the
operating system loads the program in the computer's memory and runs the program.
Popular oper-
such as Windows 95 and the Macintosh operating system, have a
graphical user
"iing "yJt"rs,
inteiace (GUl)-that is, a display that uses tiny pictures, or icons, to represent
various commands.To
execute these commands, the user clicks the mouse on the icon or presses a
combination of

keys
on the keyboard.

2.3.2 Computer l{emory


To process information electronically, data are stored in a computer in the form of
binary digits, or
bits, each having two possible representations (O or 1). lf a second bit is added
to a single bit of

00,
information, the number of representations is doubled, resulting in four possible
combinations:
01 , 10, or 1 1 . A third bit added to this two-bit representation again doubles
the number of combina-
tions, resulting in eight possibilities: ooo,001,010,011,100, 101, 1'10, or 111.
Each time a bit

is

added, the number of possible patterns is doubled. Eight bits is called


a byte; a byte has 256
possible combinations of 0s and 1s.
infor
A byte is a usefulquantity in which to store es
enough possible patterns
fo represent the entire in lower and numeric
digits, punctuation
"tpn"U"t, graphics sy
marks, and severalcharacter-sized nglish
characters such as d'
A kilobyte-
A byte also can be interpreted as a pittern that represents a number between 0 and
255-

characters; a gigabyte can


10oo bytes-can store lOOO characters;a megabyte can store 1 million
store 1 billion characters; and a terabyte can store 1 trillion characters'

read or
The physical memory of a computer is either random access memory (RAM), which can
be

read the computer


changed by the user or computer, or read-only memory (ROM), which can be
by

in tiny
but not altered. One way to store memory is within the circuitry of the computer,
usually
these
computer chips
computer chips that holi millions of bytes of information. The memory within
on
external storage de-
is RAV. Memory also can be stored outside the circuitry of the computer
vices, such as magnetic floppy disks, which can store about 2 megabytes of
information; hard

(compact discs),
drives, which can store thousahds of megabytes of information; and CD-ROMs

store nearly as much


which can store up to 630 megabytes of infoimation. A single CD-ROM can
information as 700 floppy disks can.

2.t.3 The Bus

components in a
The bus is usually a flat cable with numerous parallel wires- The bus enables the

a time are sent


computer, such ai the CPU nicate. Typically, several
bits at
along the bus. For example, rallel wires, allows the
simultaneous transmis-
sion-of 16 bits (2 bytes) of in ce to another'

2.3.4 lnput Devices

with the
lnput devices, such as a keyboard or mouse, permit the computer user to
communicate
40 / ELECTRONIC COMMERCE

computer. Other input devices include a joystick, a rodlike device often used by
game players; a
scanner, which converts images such as photographs into binary inforrnation that
the computer can
manipulate; a light pen, which can draw on, or select objects from, a computer's
video display by
pressing the pen against the display's surface; a touch panel, which senses the
placement of a
user's finger;and a microphone, used to gather sound information.
The Central Processing Unit (CPU) lnformation from an input device or memory is
communicated via
the bus to the CPU, which is the part of the computer that translates commands and
runs programs.
The CPU is a microprocessor chip{hat is, a single piece of silicon containing
millions of electrical
components. lnformation is stored in a CPU memory location called a register.
Registers can be
thought of as the CPU's tiny scratchpad, temporarily storing instructions or data.
When a program is
run, one register called the program counter keeps track of which program
instruction comes next.
The CPU's control unit coordinates and times the CPU's functions, and it retrieves
the next instruc-
tion from memory.
ln a typical sequence, the CPU locates the next instruction in the appropriate
memory device. The
instruction then travels along the bus f rom the computer's memory to the CPU,
where it is stored in
a special instruction register. Meanwhile, the program counter is incremented to
prepare for the next
instruction. The current instruction is analyzed by a decoder, which determines
what the instruction
will do. Any data the instruction needs are retrieved via the bus and placed in the
CPU's registers.
The CPU executes the instruction, and the results are stored in another register or
copied to Jpecific
memory locations.

2.3-S Output Devices


Once the CPU has executed the program instructio.n, the program may request that
information be
communicated to an output device, such as a video display monitor or a flat liquid
crystal display.
Other output devices are printers, overhead projectors, videocassette recorders
(VCRs), and speakeri.

2.1.6 Programminglanguages
Programming languages contain the series of commands that create software. ln
g6neral, a lan-
guage that is encoded in binary numbers or a language similar to binary numbers
that a computer's
hardware understands is understood more quickly by the computer. A program written
in this type of
language also runs faster. Languages that use words or other commands that reflect
how humans
think are easier for programmers to use, but they are slower because the language
must be trans-
lated first so the computer can understand it.
(1) Machine Language
Computer programs that can be run by a computer's operating system are called
executables. An
executable program is a sequence of extremely simple instructions known as machine
code. These
instructions are specific to the individual computer's CPU and associated hardware;
for example,
lntel Pentium and Power PC microprocessor chips each have different machine
languages and
require different sets of codes to perform the same task. Machine code instructions
are few in
nurhber (roughly 20 to 200, depending on the computer and the CPU). Typical
instructions are for
copying data f rom a memory location or for adding the contents of two memory
locations (usually
registers in the CPU). Machine code instructions are binary-that is, sequences of
bits (Os and 1s).
Because these numbers are not understood easily by humans, computer instructions
usually are not
written in machine code.
(21 Assembly Language
Assembly language uses commands that are easier for programmers to understand than
are machine-
ELECTRONICS AND
COMMUNICATIONS / 41
language commands. Each machine language instruction has an equivalent command in
assembly
language. For example, in assembly language, the statement "MOV A, B" instructs the
computer to
copy data f rom one location to another. The same instruction in machine code is a
string of 16 Os and
1s. Once an assembly-language program is written, it is converted to a machine-
language program
by another program called an assembler. Assembly language is fast and powerful
because of its
correspondence with machine language. lt is still difficult to use, however,
because assembly-language
instructions are a series of abstract codes. ln addition, different CPUs use
different machine languages
and therefore require different assembly languages. Assembly language is sometimes
inserted into
a high-level language program to carry out specific hardware tasks or to speed up a
high-level
program.
(3) High-LevelLanguages
High-level languages were developed because of the difficulty of programming
assembly languages.
High-level languages are easier to use than machine and assembly languages because
their com-
mands resemble natural human language. ln addition, these languages are not CPU-
specific. ln-
stead, they contain general commands that work on different CPUs. For example, a
programmer
writing in the high-level Pascal programming language who wants to display a
greeting need include
only the following command:
*Write ( rHello, e-Commerce User! I ),.
This command directs the compute/s CPU to display the greeting, and it will work no
matter what
type of CPU the computer uses. Like assembly language instructions, high-level
languages also
must be translated, but a compiler is used. A compiler turns a high-level program
into a CPU-specific
machine language. For example, a programmer may write a program in a high-level
language such as
C and then prepare it for different machines, such as a Cray Y-MP supercomputer or
a personal
computer, using compilers designed for those machines. This speeds the programmer's
task and
makes the software more portable to different users and machines.
American naval officer and mathematician Grace Murray Hopper helped develop the
first commerbially
available high-level software language, FLOW-MATIC, in 1957. Hopper is credited for
inventing the
term bug, which indicates a computer malfunction; in 1945 she discovered a hardware
failure in the
Mark ll computer caused by a moth trapped between its mechanical relays.
From 1954 to 1958 American computer scientist Jim Backus of lnternational Business
Machines,
lnc. (lBM) developed FORTRAN, an acronym for FORmula TRANslation. lt became a
standard
programming language because it can process mathematicalformulas. FORTRAN and its
variations
are still in use today.
Beginner's All-purpose Symbolic lnstruction Code, or BASIC, was developed by
American math-
ematician John Kemeny and Hungarian-American mathematician Thomas Kurtz at
Dartmouth Col-
lege in 1 964. The language was easier to learn than its predecessors and became
popular due to its
friendly, interactive nature and its inclusion on early personal computers (PCs).
Unlike other lan-
guages that require that all their instructions be translated into machine code
first, BASIC is inter-
preted-that is, it is turned into machine language line by line as the program
runs. BASIC commands
typify high-level languages because of their simplicity and their closeness to
natural human lan-
guage. For example, a program that divides a number in half can be written as
10 INPUT IIENTER A NUMBER,I' X
20 l=X/2
30 PRrNT ilHALF OF THAT NUMBER rS, r' Y
The numbers that precede each line are chosen by the programmer to indicate the
sequence of the
42 / ELECTRONIC COMMERCE
commands'The first line prints "ENTER A NUMBER" on the computer

screen followed by a question


mark to prompt the user to type in the number labeled "X." ln
the next line,
that number is divided by
two, and in the third line, the result of the operation is displayed
on the
computer screen.
otherhigh-level languages in use today include C, Ada, pascal, LlSp, prolog,
Java' New compilers are being developed, and many features

coBol, HTML, and


available in one
language are being
made available in others.
(4) Object-Oriented programming Languages
object-oriented programming (ooP) languages like c++ are based
on traditional
high-levet languages,
but they enable a programmer to think in terms of collections of
cooperating
objects instead of lists
of commands. objects, such as a circle, have properties such
as the radius of
the circle and the
inherit
features from other
tures
such as right angles
es the
programmer's task,

2.4 Types of Computers: Itigital and Analog


computers can be eirher digitaror anarog. Digitar

puters that manipu-


late binary numbers (Os or 1s), which iepresen

or off by electrical
current. Analog refers to numerical values that h

O and 1 are analog


numbers, but so is 1.5 or a number like d (approximr

le, consider a desk


lamp' lf it has a simple on/off switch, then ii is'digital, because the lamp

either produces tight at a


given moment or it does not. lf a dimmer replaies the on/off
switch, then
the lamp is analog,
because the amount of light can vary continuously from on to off
and all
intensities

in between.
Analog computer systems were the first type to be
20th century was the slide rule. lt performs calcu
inside a rulerlike holder. Because the sliding is con
exact value, the slide rule is analog. New interes
particUlarly in areas such as neural networks th
modern computers, however, are digital machines w
for example, the o or 1 , or on or off of bits. These bits can be
combined to
denote information such
as numbers, letters, graphics, and program instructions.

2.5 Range of Computer Ability


Computers exist in a wide range of sizes and power. The smallest are
embedded
within the circuitry
of appliances, such as televisions and wrist watches.These computers
are typically
preprogrammed
for a specific task, such as tuning to a particular television frequency
or keeping
accurate time.
Programmable computers vary enormously in thei
size.The smallest of these computers Can be
assistants (PDAs).They are used as notepads,
with a cellular phone, they can connect t,o wor
regardless of location.
Laptop computers and Desktop PCs are typically used in businesses
and at home
to communicate
on computer networks, for word processing, to track finances, and
to play games.
They have large
amounts of internal memory to store hundreds of programs and documents.They

are equipped with


a keyboard; a mouse, trackball, or other pointing Oeviie; and video
a display
monitor or liquid crystal
ELECTRONICS AND
COMMUNICATIONS / 43

display (LCD)to display information. Laptop computers usually have similar hardware
and software
as pCs, but they ur" ror" compact and have flat, lightweight LCDs instead of video
display monitors.
workstations are similar to personal computers but have greater memory and more
extensive

to
mathematical abilities, and they are connected to other workstations or personal
computers

that
exchange data. They are typicilly found in scientific, industrial, and business
environments
require high levels of computational abilities.
Mainframe computershave more memory, speed, and capabilities than workstations and
are usually

and
shared by multiple users through a series of interconnected computers.They control
businesses
industrial facilities and are used lor scientific research. The most powerful
mainframe computers,

used to
called supercomputers, process complex and time-consuming calculations, such as
those

and the
create weather predictrons. They are used by the largest businesses, scientif ic
institutions,
military. Some supercomputers have many sets of CPUs. These computers break a

task into small


pro""sses portion the task to increase overall
speed and efficiency. Such
pieceq and each bpU a of
computers are called parallel processors.

2.6 Uses of ComPuters


people use computers in a wide variety of ways. ln business, computers track
inventories with bar

ln
codes and scanners, check the credii status of customers, and transfer funds
electronrcally'

control the indoor


homes, tiny computers embedded in the electro ric circuitry of most appliances

recorders on and
temperature, operate home security systems, tell the time, and turn videocassette
ofl.
gas
nrileage. Computers also
Computers in automobiles regulate the flow of fuel, thereby increasing
from a digitally
enteitain, creating digitized sound on stereo systems or computer-animated features
level
of education, from
encoded laser disc. Computer programs, or applications, exist to aid every

calculus. Educators use


programs that teach simple addition or sentence construction to advanced

projection units, they can


coriputers to track grades and prepare notes; with computer-controlled
add graphics, sound, and animation to their lectures'

display
Computers are used extensively in scientific research to solve
mathematical'problems,

such as testing the air


complicated data, or model systems that are too costly or impracticalto build,

in sophisticated
flow around the next generation of space shuttles. The military employs computers
to ericode and unscramble messages, and to keep track of

personnel and supplies'


communications

2-7 ltigital TechnologY

manipulate numbers'
DigitalTechnology includes study and development of devices that store and
for a computer to
process and then
Digital devices can translat *oid" and pictures into numbers
"
translate the numbers back into pictures or words'
By contrast, analog technology is the study of
bers. For example, an analog watch contains
steady motion of its hands. Although numbers
nism does not store or use those numbers to
stores and manipulates numbers representing t
watch.
of these
digits' Every digit in
Humans write numbers using ten digits. O through 9, and combinations
store
numbers using only two
a decimal number 1."pr"."ni" powe-rs of ten. Modern digital devices
Every digit
in a binary number
digits, 1 and 0, called bits. such numbers are called binary numbers'
44 I ELECTRONIC COMMERCE
represents a power of two. For example, tn the
binary number 101 . the 1 at the
right represents

1 x 20:
*,2.,:?nd the_1'to thei",i"ti',"p,esenrs 1 x
22 (see
R:",t"*l^f^Til1=lT_?Tl
systems).Thedecimarequi arentof 1o.r rs(1 x 2,)+(ox21)+rr'""r,iill'_lr:1-]"r:
_?
Number

2.8 Processing Digital lnformation


ts that can turn on
and off exlremely rapidly.
n a circuit ls off, lt
represents a value of O rn
matical operations by
iurning these switches

pid rate at which a


computer can manipulate
computers. All
instructions that direct the
uters are first
converted into binary numbers
urckly.
ed to perform mathematlcal operations as fast as
possible.

Devices that
g complete multiple operations simultaneously.

Fipelined devices behave


that at any given time, severar operations in various

.tug". are being


Computerst into brnary numbers
in a process called
encod
digital
letter wrth its
numericai positron (1-26) in
the alphabet
into
^, .- , binai.y
equivalents. A sound can be
encoded as a series of numbers that measure its pitch and voiume at each instant

in time. An image
can be encoded as a sequence of numbers that represent
the color and brightness
of each portion of
the picture' The computer is able to decode information
oy conveiting the numbers
back into letters,
sounds, or images.
Digitaldevices can process encoded information i
nds, and chec
aldevice also
epresenting th
on, and it save
Progress n by the human ne ate.
Acjvanced compression
technolog store, and transmi nts of
information efficiently.
Digitally e es, and video can her on
magnetic media and
compact disks and broadcast over cable to homes and
o
cellular phones.
computer, machine that performs tasks, such as mathematical
calculations or
electronic
s called a program.
programs usually reside
the computer's
electronics, and the

Irogram
ideo display monitors or
printers. Computers
ability, accuracy, and
speed.
2.9 Digital logic
Digital logic is a rational process rue,,oi. ,,false,,
decisions based on the rules of
Boolean algebra. "True" can be and ,,false,, by a O, and
in logic circuits the
numerals appear as signals of tw Logic circuits are used to
make specific true-
false decisions based on the presence of murtipl e-fa]se signals at the
inputs
ELECTRONICS AND
COMMUNICATIONS / 45

The signals may be generated by mechanical switches or by solid-state transducers.


Once the input
signal has been accepted and conditioned (to remove unwanted elecirical signals, or
"noise"), it is
processed by the digital logic circuits.The various families of digitai logic
devices, usually integrated
circuits, perform a variety of logic functions through logrc gates, including
"OR;'"ANDJ'and "NOT"'
and combinations of these (such as "NOR." which includes both OR and NOT). One
widely used logic
family is the transrstor-transistor logic (TTL)" Another family is the
complementary metal oxide semi-
condlctor logic (CMOS), which performs srmilar functions at very low power levels
bui at slightly
lower operatrng speeds. Several other, less popular tamilies of logic circuits
exist, including the
currently obsolete resistor-transistor logic (RTL) and the emitter coupled logic
(ELC), the latter used
for very-high-speed systems.
The elemental blocks in a logrc device are called digital logic gates. An AND gate
has two or more
inputs and a single output. The output of an AND gate is true only if all the
inputs are true. An OR
gate has two or more inputs and a single output. The output of an OR gate is true
if any one of the
Inputs is true and is false if all of the inputs are false. An INVERTER has a
single input and a single
output terminal and can change a true signal to a false signal, thus performing the
NOT function.
More complicated logic circurts are built up from elementary gates. They include
flip{lops (binary
switches), counters, comparators, adders, a.nd more complex combinations.
To perform a desired overallfunction, large numbers of logtc elemenls may be
connected in complex
circuits. ln some cases microprocessors are utilized to perform many of the
switching and timing
functions of the individuai logic elements (see Micrcprocessor). The processors are
specifically
programmed with individual inslructions to perform a given task or tasks. An
advantage of micro-
proJ"..or. is that they make possible the performance ol different logrc functions,
depending on the
program instructions that are stored. A disadvantage of microprocessors is that
normally they oper-
ateln a sequential mode, which may be too slow for some applications. ln these
cases specifically
designed logic circuits are used'

2.1 0 Communications
More and more businesses and other governmental agencies are using PCs and computer
in networks
for basic business applications.The small computer is providing an economical
method for distributing
computing needs within am organization. lnstead of using a computer terminal
connected to the
main computer system for performing these simple computing functions, a computer
network consisting
of small computers in conlunction *ith larger central system with data base
inforrnation is'becorning
"
a more feasible alternative.
ln cases where the officesiplants of an organisation are spread over the large
geographical area, it
has been felt that computerisation of officeslplants activities in isolation does
not step up efficiency.
ln such cases reliable data communication has to go hand with computerisation to
achieve the
desired efl iciency standards.
The clevelopment of computer systems has been combined with improved communication

facilities

be
which extend the power ol the computer beyond the computer room, and a!low system
benefits to
more widely available. This combination allows computer facilities at remote sites,
whilst

preserving

is the "dialing-
on one site the expertise needed to operate the whole system.The simplest example
up,, on the telephone network to connect a remote terminal with the computer and

all its facilities.

Fig. Z.1is an example of a combination of computers and a communications

network for a large f irm


wiih numerous branch offices and several factories. Each of the factories
could have its own me-
dium-sized computer, linked to terminals within the lactory and further
terminals at adjacent branch
offices. Communications links could also exist between at adjacent branch
offices. Communications
46 / ELECTRONIC COMMERCE
links could also exist between these machines and a larger machine at the corporate
headquarters.
The individualterminals would be used for the collection and dissemination of the
user data, with the
"satellite" computer collating and editing this data and carrying out much of the
total data processing.
Major computation and corporate matters would be passed to and handled by the large
machine at
headquarters.
A Backbone Network
Backbone bus

Outside
Modem world

Tape device

Prini server

Network server
File server

Star
LAN PC
Hard disk Printer

To PBX
network

Fig.2.1 : Combination Computers and Communication


ELECTRONICS AND
COMMUNICATIONS / 47

This blend of computers and communications is now taken for granted and as
industry-standard in a
rapidly growing number of business organisations. Even the most unsophisticated
user may un-
t<nowingty be using very complex systems. For example, a small business may have a
fairly simple
terminai which is connected, via telephone, to a local computer service bureau, in
orderto use one of
the facilities offered by that bureau.
Not apparent to user, however, the local call may link to a system a very long way
from home (see
Fig.2,1). The first connection is to the local small communications computer. This
concentrates the
da1a, along with that from other local users, and passes it to a larger computer in
the capital. Here,
because ol the particular services being used, it is passed via a communications
satellite in orbit
above the ocean, to the service company's main computer centre in the United
States. The results
come back over the same links, giving the user the impression that the bureau is
just next door'
This development was mobilised due to developments in "personal/office computing"
(e.9. word-
processing, desk-top microcomputers, business minicomputers) coupled with moves
towards digital
communications, as exemplified by digitaltelephone exchanges, digitalfacsimile,
etc. Opportunities
are now being seized to take advantage of the economies of scale and added cost-
efficiency offered
by combining services. The convergence of voice, word processing and message
systems is being
cipitalised on to the advantage of the user. The results are that a business
manager will no longer
have to turn separately to the :
o lnformation technology department for computer services
o PABX for telephones
c Typing pool for document preparation
D Mail room for document transmission'
The first step towards understanding communications is to look at computer data at
its must base
level. As all of .us know computer and computer device manage store and exchange
data using
electronic pulses or digital signals, that come in two varieties, the binary
digit'0' indicates the
absence 1"bFf"; and't;indicaie ("ON") the presence of electric current. A series of
ONs and OFFs
in various combinations can be sent on the communication channels to represent any
character.
Every character (letter, numeral, symbol, or punctuation mark) is composed of a
group of bits called
codes. To avoid incompatibility beiween systems, the computer industry has created
a number of
standards that establish relationships between bit combinations and their
corresponding characters.
The most widely used codes are the American Standards Code for lnformation
lnterchange ((ASCll))
and the IBM standard, Extended Binary Coded Decimal lnterchange Code (EBCDIC).
To ensure successfultransmission of data between two points, the sender and
receivers should use
the same code, or they can use translates to aid in communication. Translation are
data communica-
tion software, which translate the sender's data into the codes receiver
understand.
To ensure successfultransmission of data between two points, the sender and
receivers should

use
the same code, or they can use translates to aid in communication. Translation are
data communica-
tion software, which translate the sender's data into the codes receiver
understand.
There are several manufacturers of computer hardware and software across the globe.
For successful
data communication these products should be compatibles with each other or they
should conform
to certain set of rules so that any one can use them. These set of rules is known
as communication
protocols or communication standard.
ln other words protocols are technical customs or guide lines that govern the
exchange of signal
transmission and reception between equipments'
48 / ELECTRONTC COMMERCE

Each protocolspecifies the exact order in which signals will be transferred, what
signalwill indicate
that the opposite device has completed its transfei, and so forth. Both hardwar"
anO

software are
designed to handle specific protocols.
Communication protocols are usually defined and approved by some international body

such as lSO,
CCITT or IEEE' At times protocols defined by certain manlfacturer of comput"r. t;
networking
products become so widely accepted, that they be :ome'defacto/ standard
even
tirough these protocols
may not have approval of any standardisation body. Some ol the functions thal
communication
protocol regulates are:
A Controlof information transfer
D Structure and formats of data
D Error recoveries
D Retransmissioncontrol
O lnterfaces management.
Only communication devices using same protocols can communicate with each other.
To make sure that the bits (or characters) are securely transmitted through the
channel or line, we
need a link level protocol between two computers. Some of the main functions to be
performed by
such a link level protocol are:
O Assuring the data to be transmitted is split into data blocks with beginning
and ending
markers. This is called framing and the transmission block is called alr"re.
D Achieving data transparency. This allows a link to treat a bit pattern,
including normally
restricted control characters, just as pure data.
tr Controlling the flow of data across the link. lt is essential not to transmit
bits faster. Than
they can be received at the other end. Otherwise, the receiver overflows and
the data is
overrun, or all buffering capacity is used up, leading to loss of data.
o Controlling errors. This involves detection of errors using some kind of
redundancy check.
It also involves acknowledgement or correctly received messages and requests
for
retransmission of faulty messages.
There are basically two classes of link protocols.They are, Binary SYNchronous
protocols (BlSNyC)
and High Level Data Link Control (HDLC) protocols. BISYNC is based on character
control, whereas
HDLC is a bit oriented protocol. ln fact, HDLC is widely used in most link
protocols of computers.
Computing technology today allows people to create stunning graphics, the likes we
have seen in
Jurassic Park, and The Abyss, and provide impressive digitized sound systems such
as the Talk
album by the Classic Rock band of the seventies Yes. Yet, the most amazing
technologies are really
those available to the common household and businesses, Networking technology is
racing towards
the future in instant global communication.There are now proposals for global
coverage of data and
telephony communication via satellites f rom various organizations but before we
can tilk to the boss
through video telephones on a regular basis like George Jetson, we first have to
understand the
current capabilities of global networks and computing technology.
For businesses, large and smallalike, computing and networking technology is
quickly becoming an
absolute necessity. Computers are already populating many offices by providing
tools such as word
processors, databases, and spreadsheets. Towards the late 8O's, Local Area Networks
(LANs) of
computers became a much demanded utility as businesses tried to connect the various
depart-
ments of their organization together. Now into the 9O's, networking on a much
larger scale, nation-
ELECTRONICS AND
COMMUNICATIONS / 49

wide and even global, is becoming the need.


Why is global networking so important? Some businesses have discovered that their
area of service
naturally extends to a global scale and wish to contact a whole new base clients.
Others have found
peer organizations and people involved in similar work to share and communicate new
ideas for
various aspects of their business. Still others have found a whole new way of
advertising their
company's services or products. Global networks such as the lnternet have also
become a cost-
effective and quicker way to transfer important documents to remote offices than
courier services or
even fax.

2.t t llata Communications


Data communications are used to link the systems both locally and throughout the
networks. ln a
sense, data communications is something of a misnomer, since analogue transmission
is being
changed to digital transmission, and it is thus possible to transmit information in
all its forms with
equal facility. The forms include speech, numerical information, text and images,
whether in fax or
video format.
A communication or telecommunication process consists of three components:
tr Source device
tr Destination device
tr A medium actively engaged in exchange of data.
Sending a message involves a devise at source end and another devise at destination
end.The
message is communicated using a communication medium. To be effective one more
processed
added of getting feedback from the remote (destination) station. As such there are
four essential
components (Fig. 2.6) of any communication system.
a. The sender creates the message.
b. The medium carries the message.
c. The receiver receives the message.
d. Feedback verifies the message.

The SENDOR
creates the

The MEDIUM I FEEDBACK


creates lhe
message
T verilies the
T message
I

I
I
I

Fig.2.6 :The Essential four components of communication process


The field of data communications links the computer and the telecommunications
industries.
Computers are digital in nature and transfer information internally via parallel
connections.Traditionally
telecommunications have been an analog process, and data have been transmitted in a
serialfashion.
50 / ELECTRONIC COMMERCE

Data has a wide definition and includes multimedia objects may range from a simple
text retrieval to
intricate voice-annotated changes in a complex 3-D visualization model of particle
physics. The
range of bandwidth involved is truly staggeririg. A typical database text retrieval
requires about 1
Kbps, whereas a complex visualization needs an 800 Mbps throughout, which is almost
a million
times greater.
ln between those extremes there is a whole gamut of multimedia objects such as
text, graphics,,
audio, and video, each of which requires a different amount of bandwidth for timely
transmission
within computers and across the netWorks depending on the type of application of
which they are a
part. The most demanding of those multimedia objects are high-quality videos with
synchronized
audio that must be transmitted interactively and in real time. As a result, audio
and video transmis-
sions are practical only when compression schemes are incorporated within the
transmission proc-
ESS.

This variety of multimedia objects must be transported over private and public
networks and data
transmission facilities consisting of various types of analog and digital links
whose configurations
offer different bandwidth capabilities. These may range from 1O Kbps of the
traditional telephone
lines all the way to the 1.2- Gbps, capacity of high-speed ATM cell relay services.
Bandwidth capacities also depend on the nature of connecting media, which may range
from copper
wire, througI coaxial cable and optical fiber to photonic networks of the future.
Switching and inter-
facing mechanisms present varying bandwidth capacities that must also be taken into
account in
multimedia networking design.
Data communications includes data transmission, but also includes the control,
checking and move-
ment handling of information . ln computer systems, it includes:
tr The physicaltransmission circuits and networks
tr The hardware and software which support the data communication functions
D Procedures for detecting and recovering f rom errors
tr Rules and protocols to ensure the disciplined (and therefore comprehensible)
exchange of
information.

2.12 Data Transmission


Data transmission is the movement of information using some form of representation
appropriate to
the transmission medium. This will include:
D Electrical signals carried along a conductor
tr Opticalsignals along an opticalfibre
tr Electro-magnetic waves, eg radio, or infra-red signals transmitted through
space.
With the small computer now available in many homes and offices, there is often a
need to share
data and programs and other in{ormation between the various computers. Consider a
company
manager or planning officer who is preparing a budget. lt could be for a particular
project, work
center, company department, or even the consolidated company budget. There are now
several
inexpensive programs available for PCs which are designed specif ically for this
activity. ln perform-
ing these planning activities, information on such items as salaries,
equipment,etc. is usually needed.
The user may have this information at hand, or it may be in a data base
administered by another,
perhaps larger, compuier, then the planner will need to access this data base.
The fact that the data base computer needs to be accessed via an information
channel between the
computers provides the basrs for a computer network. We shall study this in chapter
2. The planner
ELECTRONICS AND
COMMUNICATIONS / 51

would access the computer with the needed data base through the network by using
the appropriate
network and systems software, and request that the desired information be
transferred to a f ile within
his/her own system. Any additional information needed from another data base for
completing this
budget could be obtained in a similar manner.When the planner's finished, a hard
copy of the budget
.ouh b" printed and mailed,and /or the budget file could be sent through a
network to another
system for review by other personnel'
Suppose a manager had to Write several letters to clients. lnstead of dictating
these letters to a
,""i"t"ry as has been done in the past, he/she would use the same PC and a word
processing
program for writing the main body of each letter. These letters are then sent via
the network to a
similar small computer on the secretary's desk for completion. The secretary uses
the same or

a
similar word processing program to perform any needed editing and to complete each
letter by adding
the p[roper address. n'"opy of each letter suitable for mailing is then obtained by
using a

letter
qu"iity printer located in yet anothe t areaand which is shared by other users'
The secretary would

quality printer, once


send ihe finished letter to the computer which is dedicated to serving the letter

quality printer, insert the


again using the same network.Then the secretary would walk to the letter
afpropriate letterhead paper and direct this third computer to print each letter'

personnel in other
Now suppose that the manager has some technical memorandums to be sent to
company divisions in other physical locations. lnstead of actually printing a
hard copy and mailing it,
by network directly to the computer of the
division secretaries where
the memorandum could be sent
possible because the company's cornputer
network consists not only the
it would be printed. This is
computers in the same UuitOing local
( network), but also those at remote
sits. These sites may be
different countries. This type of
communications is often
in the same town, different towns, or even

described
referred to as electronic mail. The business office using the equipment and methods
above is often referred to as an electronic office'

2.13 Types of Signals in Communication


as
either analog or
The signals that pass along physicalwires and wireless media can be classified
digital. (Fig.2.3)
O Analog Signals

of numerous
Analog signals carry data as continuous waves. For instance, the human voice
consists
ol sound waves. All signals that
travel over these older
complex inflections that are combinations
telephone lines are in analog form.
Any analogue is a system of representing real-world quantities by

electrical
voliage thir models the quantiiies. For example, in a calculation
ted by 1
volt, i metres by 2 volts and so on. While analogue computers enj
ll modern
computers are digital.
O Digital Signals
1-
bit of a data can be
Digital signals carry data as on/off or high/low electrical signals. Thus, the

of both data and


represented as an on (high) signal; the O-bit, an off signed for
digitaltransmission
voice.

2.t5.1 Analogue Yelsus Digital Communication


The difference between analog and digital signals is shown in Figure 2'7
52 / ELECTRONIC COMMERCE

<_1
ttttttttlt
tllttttttt
llrl_Jl_Jl_J,<o
Fig.2.7:The difference between analog and digital signals.

The dispute about the relative merits


1970, when the problem that it required
incontrovertible way. The solution was
sands to millions of electronic compon
i

2.14 [haracteristics of Electrical Waves

strength of the signal

imilar location on the

equency of the signal

interval. These three

Points A1 , &, A,, . ...... ...Arare suil


to be in the same pHASE

AMPLITUDE

--i Time

FREOUENCY = numbers or times repeated


in unit interval of time
= S in this tigure

Fig. 2.8 : showing sine-wave and depicting Ampritude, phase


and
Freguency
lf the basic shape of a wave form is known, a few measurement
at selected time
intervals (in other
ELECTRONICS AND
COMMUNICATIONS / 53

For a
words, a sampling) provide the receiving instrument with enough data to identify
the signals.
and a maximum frequency required
to deline a
provides a different signalto
encode a state. For
represented by a signal having
one amplitude,
n be represented by a signal
having the same

2.t4.1. Wavelength of a Signal


ints in the adjacent cycles of
a waveform signal
the illustration. ln wireless
systems. this length is
ters. ln the case of inlrared,
visible light, ultravio-
ften specified in nanometers
(units ol 10-9 meter)

signal, the shorter the


Wavelength is inversely related to frequency.The higher the frequency of the
w is
the wavelength as
waveleng-th. lf f is the iiLqr"n"V of tne iignaias mealured in megahertz, and
gOOlt a-nd conversely f = 300/w' Wavelength
is sometimes repre-
measured in meters, then w =
sented by the Greek letter lambda.

2.14.2 Frequency of the Transmission


is the number of complete
cycles per second in
recjuency is the hertz,
abbreviated Hz. ll acurrent
cy is t H2; 60 cycles per
second equals 60 Hz (the

(1,000's) of cycles per


Larger units of frequency include the kilohertz (kHz) representing thousands
second, the
representing billions
of cycles per second'
used; 1THI= 1,000,
per second' Note that
owers of 10, in cont
for multiples of bytes'
Fig.2.9Frequency spectrum ol various electronic signals
:
writing, new
personal computers
computer clock speed is generally specified in megahertz. As of this
54 / ELECTRONIC COMMERCE
have clock speeds ranging from about 166 MHz to
more than 3oo MHz. within a few
years, we will
probably see personar computers whose crock
speeJ; il;;p,=;sed in
siqahertz.
l-requency is important in wireless communicatiors, where
the frequency of a
signal is mathematically
related to the wavelength. lf f is the frequency of an
electior"grJii" field in
free space as measured
and w is the wavetength as measured in mete"rs,-tlen
lbil;:"n"rtz, w =
300/f and conversely f =

The frequency spectrum of ail types of erectronic signars


are shown in Fig. 2.g.
2.15 Data Transmission 0uality Factors
2.15.1 lnformation Carrying Capacity
The amount of be carried on a communications channel
between any
points'The disti
two
ation and data is a subtle one, so the
terms'information carry-
ing capacity an (or rate)'are used interchangeably.
(1) The Speed of communication : Bit Rate
The handling of comput erized data may occur at many speeds.
For some
users, dialed service is
adequate, while others might need satellites to teleprocess
data between
continents. The speed of
each codtmunications media is measured by the number
of bits transmitted per
second, or the BpS
rate' For ease of identifications, three classes of speeds or bandwidths
have
been established as
detailed in section 2.15'2' Each bandwidth defines a category
of Bps rate within
which that service
is available.
The amount of data that a computer network can transmit is
called the bandwidth of
the network and
is usually measured in Kil per second (Mbps). A
bit_the smallest
unit of information that co
of two values, either
O or 1. A Kilobit is
one thousand bits' while ransportation of
information between
routers generally uses communication lines dedicated to this function,
with
capacities currenly
rangingfrom64KbpsuptoasmuchasseveralhundredMbps.
The speed at which information can be transmitted across the
lnternet depends on
the lofuest infor-
mation transporting capacity along the route and the number of people
using that
route at any given
time' A narrow bandwidth somewhere along the route acts as
a botflenecr tJdata
transport, and the
more people using the line, the less informltion each of them
can transport at any
one time.
(21 Signaling Rate (baud)The Baud Rate
The signaling rate of a line is measured in bauds. lt's the switching
speed, or
number of transitions
(voltage or f requency changes) that are made per second.
The speed at which data is transmitted is referred to as baud. Baud
is commonly
identified as the
number of bits d over a communication line. Bald
rates vary. The
most common rs are 3OO baud and 1p0O baud. A
2,400_baud

sisnarof *s str
modem is avai

used only in specialized data transmission.

.Tf:.litr""r""1'#"Tl:',RTffiJl,x.":T;s3*:
(3) Difference between BpS and Baud
ual to bits per second; for exampre, 300 baud is
equar to 3oo

bps.
e to represent more than one bit per second. For
exampre, the
bps at 600 baud. Thus it is commonry (and
erroneousry) used to
ELECTRONICS AND
COMMUNICATIONS / 55

specify bits per second for modem speed; for example , 12OO baud means
1200 bps'

Bir
Value

Baud 112 34 567


Number *lon" +

Bit
Va ue

Baud
Number

Bit
Value

Baud
*
1

Number I on, sign?r p"..ioo


l.-
Fig.2.10 :The relationship between bps and baud
Shannon,s law concerning a communications channel provides the formula that relates
bandwidth

in
Hertz,to information carrying capacity in bit per second. Formally:

e:B1og2(1+S)
where e (lCC), B is the bandwidth , and S is
tbe signal-to-noise
is the information carrying capacity
ratio. This expression shows that the ICC is proportional to the bandwidth , but is
not identical

to it.

2.t5.2 Grade of Communication Channels and Bandwidth


The term internal data transmission refers to the transfer of data within a
computer, while external

(e.9., printers) or
data transmission refers to the transfer of data to either local peripheral
equipment
remote computers.
A data-communications channel is a path through a medium that data can take to
accomplish

a
sta-
communications task. ln effect, channels are "data highways," carrying signals from
sending
tions to receiving station along predefined routes.

speed
Bandwidth is the range of frequencies which a system can handle, or (sloppily) the
maximum
of data communication. Bandwidth is used in two main contexts in modern computing.
(1) Network or Communication Bandwidth

by a
Network or communication bandwidth is the maximum amount of data that can be
handled
(like a modem ).This is a slang
term, and should not be
network or other communications equipment
For more details see the article on
Shannon's law .
used by people who should know better.
(2) Display Bandwidth

an incoming
Display bandwidth is the maximum frequency at which a monitor must be able to
accept
56 / ELECTRONIC COMMERCE
signal to create a picture of a particular quality.
The grade or bandwidth of a channel determines the rate at which the channel can
transmit data. A
narrow bandwidth channel, such as telegraph line, transmits data rates of 45 to g0
baud. Telephone
lines have a wider f requency rage and fall into the classif ication of voice-grade
channels. They carry
data at 300 to 9,600 baud. For high-speed transmission of large volumes of data,
broad- band
channels transmit data at rates of up to 120,000 baud. Coaxial cables, microwaves,
and f iber optic
cables
(3) Narrowband Channel
Narrowband handles low data volumes. Data transmission rates are f rom 45 to 3OO
baud. The low-
speed devices might use narrowband communications. Narrowband rates are effective
for low-speed
operations such as those used with telegraph or teletype lines. Western Union is
the largest com-
mon carrier which offers this type of service.
(4) Voiceband channel
Voiceband channel handles moderate data transmission volumes between 300 and 9600
baud.They
are used for applicati6ns ranging from operating a CRT to running a line
printer.Their major applica-
tion is fortelephone voice communication- hence, the term voiceband.This is the
most widely used
service, as it involves the use of common telephone lines from which its name is
derived. Voice-
grade transmissions support much of today's online processing activities. Common
telephone lines
are generally rated at 1800 BPS. Through a process called conditioning, the
transmission speed of
telephone lines may be increased to 9600 BPS. Conditional lines reduce the
interference which
normally accompanies higher transmission rates. Leased lines, WATA lines, and
regular telephone
lines are examples of voice-grade service.
(5) Broadband Channel
Also called wideband channel handles very large volumes of data.Wideband channels
have the
highest transmission rates, with speeds of 19,200 BPS and higher. Transmission
rates this high are
possible with coaxial cables, fibreoptic cables, and microwave transmissions.These
systems provide
data transmission rates upto 1 millionbaud or more. High-speed data analysis and
satellite
communications are examples of broadband communications systems.

2.15.5 Latency
The information carrying capacity of a communications channel is very important,
but it is an
average figure; it tells us nothing about how quickly a given bit of data will move
from one point to
another. The time taken for this to happen is called the latency of the system. The
theoretical limit
to latency is the speed of light; as far as we know, information cannot be
transmitted faster than this.
An electrical signal propagates along a wire at about 70% of the speed of light.
Over a wide-area
network the latency is much longer, because the message has to be processed at a
number of
intermediate stations between the sender and the recipient.

2.t5 Transmission Degradation


Depending on the media type, the following problems can affect the quality of
transmissions:
O Attenuation refers to loss of signal as it goes through the transmission
medium, measured
in decibels (dB).
O Electromagnetic interference (EMl) is electrical background noise that
disturbs or distorts
a signal as it travels down the transmission media. Fiber-optic cable is
usually immune to
ELECTRONICS AND
COMMUNICATIONS / 57

EMI because it uses light rather than electronic signals to transfer data.
tr Crosstalk is a form of EMI caused by wires next to each other interfering
with signals as
they travel through the transmission media.
D Dispersion applies to f iber-optic cables. Chromatic dispersion occurs when
light enters the
core at different angles and spreads apart slightly as it travels to the
destination.

2.17 Wireless Communication


Wireless Communications includes various telecommunications systems that use radio
waves to
carry signals and messages across distances. Wireless communications systems use
devices
called transmitters to generate radio waves. A microphone or other mechanism
converts messages,
like sounds or other data, into electronic impulses. The transmitters change, or
modulate, the radio
waves so they can carry the impulses, and then transmit the modulated radio signals
across dis-
tances. Radio receivers pick up these signals and decode them back into the
original messages.
Commercial radio and television are also wireless telecommunications systems, but
radio and televi-
sion are mainly public broadcast services rather than personal communications
systems.
Wireless communications allow people greater f lexibility while communicating,
because they do not
need to remain at a fixed location, such as a home or office. Wireless technologies
make communi-
cations services more readily available than traditional wire-based services (such
as ordinary tel-
ephones), which require the installation of wires. This is useful in places where
only temporary
communications services are needed, such as at outdoor festivals or large sporting
events. These
technologies are also useful for communicating in remote locations, such as
mountains, jungles, or
deserts, where telephone service might not exist. Wireless services allow people to
communicate
while in a car, airplane, or other moving vehicle. Police, fire, and other
emergency departments use
two-way radio to communicate information between vehicles that are already
responding to emer-
gency calls, which saves valuable time. Construction and utility workers frequently
use hand-held
radios for short-range communication and coordination. Many businesspeople use
wireless commu-
nications, particularly cellular radio telephones, to stay in contact with
colleagues and clients while
traveling.
All wireless communications devices use radio waves to transmit and receive
signals. These de-
vices operate on different radio frequencies so that signals from one device will
not overlap and
interfere with nearby transmissions from other devices. The number of companies
offering wireless
communications services has grown steadily in recent years. ln 1988 about 500
companies offered
cellular radio telephone (cell phone) services. By 1995 that number had grown to
over 1500 compa-
nies serving millions of subscribers. Wireless communication is becoming
increasingly popular be-
cause of the convenience and mobility it affords, the expanded availability of
radio frequencies for
transmitting, and improvements in technology.

2.18 Principles of Wireless Communications


Wireless communications begin with a message that is converted into an electronic
signal by a
device called a transmitter. The transmitter uses an oscillator to generate radio
waves. The transmit-
ter modulates the radio wave to carry the electronic signal and then sends the
modified radio signal
out through space, where it is picked up by a receiver. The receiver decodes, or
demodulates, the
radio wave and plays the decoded message over a speaker. Wireless communications
provide more
flexibility than wire-based means of communication. However, there are some
drawbacks. Wireless
communications are limited by the range of the transmitter (how far a signal can be
sent), and since
radio waves travel through the atmosphere, they can be disturbed by electrical
interferences (such
58 / ELECTRONIC COMMERCE
as lightning) that cause static.
Wireless communications systems involve either one-way transmissions, in which
person

a merely
receives notice of a message, or two-way transmissions, such as a telephone
conversation

between
two people' An example of a device that sends one-way transmission is a pager,
which is

a radio
receiver.When a person dials a pager number, the pager company sends a radio-
signal to

the desired
pager.The encoded signaltriggers the pager circuitry and notifies the customer

cairying the pager of


the incoming call with a tone or a vibration, and >ften the telephone number of
the caller. Advanced
pagers can display short messages from the caller, or provide news updates
or
sports scores.
Two-way transmissions require both a transmitter and a receiver for sending and
receiving signals.

A
device that functions as both a transmitter and a receiver is called a
transceiver. Cellular radio
telephones and two-nray radios use transceivers, so that back-and-forth
communication between
two people can be maintained. Early transceivers were very large, but they have
decreased in size
due to advances in technology. Fixed-base transceivers, such ai those us-ed at
police stations, can
fit on a desktop, and hand-held transceivers have shrunk in size as well. Several
current models of
hand-held transceivers weigh less than 0.2 kg (0.5 lb).

2.19 ).lodes of Wireless Communkation


Wireless communications systems have grown and changed as technology has improved.
Several
different systems are used today, allof which operate on different radio
frJquencies. New technolo-
gies are being developed to provide greater service and reliability.

2.19.1 Sea and Air Transceivers


The first wireless communications devices were radio telegraphs. A telegraph is a
device that sends
simple electrical pulses along copper wires. The pulses were caused bytontact
between two metal
surfaces, and receivers interpreted these electrical pulses as tones or beeps. A
code of long and
short signals was developed to represent the letters of the alphabet (see Morse
Code, lnternational),
and in this way coded messages could be sent between telegraphs. Radio telegraphs
used radio
waves rather than wire telegraph lines to send and receive messages. Radio te-
legiaphs sent tel-
egraph signals over long distances and were ideal for ship-to-shoie communication.
Bulky radio
telegraphs were installed on ships as early as 1899 and were widely used by 1905. A
telegraph-
equipped ship was found to have been sailing in the vicinity of the Titanic
afterihe Titanic,s collision
with an iceberg in 1 912, but the telegraph operator had gone off duty. Because of
the Titanic disaster,
government representatives met and established rules for enhancing the safety of
life at sea through
the use of wireless communications. One of these rules required major ocean-going
vessels to
monitor distress frequencies on a 24-hour basis.
Radio operators still monitor distress channels, but maritime and aviation
telecommunications sys-
tems now use high{requency radios and satellites capable of transmitting speech,
rather than wire-
less telegraphy, to send messages. Aircraft pilots use radios to communicate with
air traffic control-
lers at airports and also to communicate with other pilots. Navigation beacons are
equipped with
transmitters that send automated signals to help ships and aircraft in distress
determine their posi-
tions. While high-frequency radio can transmit signals over long distances, the
quality of these
signals can be diminished by bad weather or by electrical interJerence in the
atmosphere, which is
often caused by radiation from the sun.
Hand-Held Radio Transceivers Police, fire, and other emergency organizations, as
well as the mili-
tary, have used two-way wireless radio communication since the 1930s. Early
vehicle-based radios
were large, heavy units. After the invention of the transistor in 1948, radios
shrank in size to small
hand-held radio transceivers, which civil authorities now use to communicate with
each other di-
ELECTRONICS AND
COMMUNICATIONS / 59

rectly. Public two-way radios with several frequency options are widely available
as well. Usually
limited in range to a few miles, these units are great aids for such mobile
professionals as construc-
tion workers, film crews. event planners, and security personnel. Simpler two-way
radios, called
walkie-talkies, have been popular children's toys for years. Most walkie-talkies
broadcast on channel
14 of the citizens band (CB), a range ol frequencies grouped into channels and
allocated for public
use. CB radios can lransmit and receive on 40 different channels.
Shortwave Long-range broadcast services and f requencies, in what is known as the
shortwave radio
band (with frequencies of 3 to 30 megaherlz), are available for amateur or ham
radio operators.
Shortwave radio broadcasts can travel long distances because of the concentration
of ionized, or
electrically charged, particles in the layer ol the atmosphere known as the
ionosphere. This layer
reflects radio signals, sending signals that are transmitted upward back to earth.
This skipping of
waves against the ionosphere can greatly increase the range of the transmitter.The
degree of reflec-
tivity of the ionosphere depends on the time of day. During daylight hours, the
ionosphere has the
concentration of ions necessary for reflectirrg radio waves in the higher f
requencies of the shbrtwave
band back to earth. At night, it has the concentration necessary for reflecting
lower frequencies
within the shortwave band. lf adequate density of ions is not reached, the radio
waves simply
continue through the ionosphere into space.

2.19.2 Cellular Radio Telephones


Cellular radio telephones, or cell phones, combine their portable radio capability
with the wired, or
wireline, telephone network to provide mobile users with access to the rest of the
public telephone
system used by non-mobile callers. An early form of radio telephone communicated
with a single
powerful antenna within a given geographic or metropolitan area.This large antenna
was wired to the
telephone system. (These fixed radio telephones are still used in some remote
locations to substi-
tute for wireline telephone exchange facilities.) Because there was only one
antenna for a given
metro area, this limited the number of frequencies that could be used, since radio
telephone frequen-
cies would often overlap and cause interference. Modern cellular telephones use a
network of sev-
eral short-range antennas that connect to the telephone system. Because the
antennas have a
shorter range, f requencies can be reused a short distance away without
interference.
Cell phone towers pick up requesls from cell phones for dialtone and also deliver
inboLrnd calls to the
appropriate cell phone.To do this, the cell phone must have a singular identity
that can be recognized
by computers housed in a central Mobile Telephone Switching Office (MTSO). When a
cell phone is
turned on, it connects by radio to the nearest cell tower (the tower receiving the
strongest signal).
The cell towers are spaced so their receiving ranges slightly overlap.This
continuous contact makes
it possible lor the MTSO to transfer a call from tower to tower as a mobile cell
phone user (in a
moving vehicle, for instance) moves from one ceJl area to another.

2.19.5 SatelliteCommunications
Satellite communications services connect users directly to the telephone network
from almost
anywhere in the world. Specialtelephones are available to consumers that
communicate directly
with communications satellites orbiting the earth. The satellites transmit these
signals to ground
stations that are connected to the telephone system.These satellite services, while
more expensive
than celtular or other wireless services, give users access to the telephone
network in areas of the
v.rorld where no telephone service exists.

2.2O Networks
Computers can communicate with other computers through a series of connections and
associated
60 / ELECTRONIC COMMERCE
hardware called a network. The advantage of a network is that data can be exchanged
rapidly, and
software and hardware resources, such as hard-disk space or printers, can be
shared.
One type of network, a local area network (LAN), consists of several PCs or
workstations connected
to a special computer called the server. The server stores and manages programs and
data. A server
often contains all of a networked group's data and enables LAN workstations to be
set up without
storage capabilities to reduce cost.
Mainframe computers and supercomputers commonly are networked. They may be
connected to
PCs, workstations, or terminals that have no computational abilities of their own.
These "dumb"
terminals are used only to enter data into, or receive output from, the central
computer.
Wide area networks (WANs) are networks that span large geographicalareas. Computers
can connect
to these networks to use facilities in another city or country. For example, a
person in Los Angeles
can browse through the computerized archives of the Library of Congress in
Washington, D.C. The
largest WAN is the lnternet, a global consortium of networks linked by common
communication
programs.The lnternet is a mammoth resource of data, programs, and utilities. lt
was created mostly
by American computer scientist Vinton Cerf in 1973 as part of the United States
Department of
Defense Advanced Research Projects Agency (DARPA). ln 1984 the development of
lnternet
technology was turned over to private, government, and scientific agencies.The
World Wide Web is
a system of information resources accessed primarily through the lnternet. Users
can obtain a
variety of information in the form of text, graphics, sounds, or animations.These
data are extensively
cross-indexed, enabling users to browse (transfer f rom one information site to
another) via buttons,
highlighted text, or sophisticated searching software known as search engines.

2.21 Future Developments in Computing


ln 1965 semiconductor pioneer Gordon Moore predicted that the number of transistors
contained on
a computer chip would double every year.This is now known as Moore's Law, and it
has proven to be
somewhat accurate. The number of transistors and the computational speed of
microprocessors
currently doubles approximately every 18 months. Components continue to shrink in
sjze and are
becoming faster, cheaper, and more versatile.
With their increasing power and versatility, computers simplify dayto-day life.
Unfortunately, as
computer use becomes more widespread, so do the opportunities for misuse. Computer
hackers-
people who illegally gain access to computer systems-often violate privacy and can
tamper with or
destroy records. Programs called viruses or worms can replicate and spread from
computer to
computer, erasing information or causing computer malfunctions. Other individuals
have used
computers to electronically embezzle funds and alter credit histories (see Computer
Security). New
ethical issues also have arisen, such as how to regulate material on the lnternet
and the World Wide
Web. lndividuals, companies, and governments are working to solve these problems by
developing
better computer security and enacting regulatory legislation.
Computers will become more advanced and they will also become easier to use.
Reliable speech
recognition will make the operation of a computer easier. Virtual reality, the
technology of interacting
with a computer using all of the human senses, will also contribute to better human
and computer
interfaces. Standards for virtual-reality program languages, called Virtual Reality
Modeling language
(VRML), currently are being developed for the World Wide Web.
Breakthroughs occurred in the area of quantum computing in the late 1990s. Quantum
computers
under development use components of a chloroform molecule (a combination of
chlorine and hydro-
gen atoms) and a variation of a medical procedure called magnetic resonAnce imaging
(MRl) to
compute at a molecular level. Scientists used a branch of physics called quantum
mechanics, which
ELECTRONICS AND
COMMUNICATIONS / 61

describes the activity of subatomic particles (particles that make up atoms), as


the basis for quan-
tum computing. Quantum computers may one day be thousands to millions of times
faster than
current compulers, because they take advantage of the laws that govern the behavior
of subatomic
particles. These laws allow quantum computers to examine al!-possible answers to a
query at one
iime. Future uses of quantum computers could include code breaking and large
database queries.
Communications between computer users and network$ Atill benefit f rom new
technologies such as
broadband communication systems that can carry signilicantly more data and carry it
faster, to and
from the vast interconnected databases that continue to grow in number and type.
ln 1965, Gordon Moore was preparing a speech and made a memorable observation.When
he
started to graph data about the growth in memory chip performance, he realized
there was a striking
trend. Each new chip contained roughly twice as much capacity as its predecessor,
and each chip
was released within 18-24 months of the previous chip. lf this trend continued, he
reasoned, comput-
ing power would rise exponentially over relatively brief periods of time.
Moore's observation, now known as Moore's Law, described a trend that has continued
and is still
remarkably accurate. lt is the basis for many planners' performance forecasts. ln
26 years the
numbei. of transistors on a chip has increased more than 3,200 times, from 2,300 on
the 4004

in 1971
to 7.5 million on the Pentium" ll processor.
,,Gordon Moore just plain got it right . . . I should also mention that Moore's Law
has also given rise
to Machrone's Law, which was true for many years, which is that the machine you
want always costs
$5,0001'
E Bill Machrone : A very small addendum to Moore's Law is Rock's Law which says
that the
cost of capital equipment to build semiconductors will double every four
years."
D lntel's recent roadmap for notebook products looks quite jolly. Already in
the beginning of
next year we will see the first Giga Hertz processor for mobile platforms and
mobile Pentium
lll processors at up to 1.26 GH1 will arrive soon afterwards as well. The
workstation and
server roadmap is not quite as interesting, except for the lSct that lntel is
counting a loi on
,Third party'chipset makers to provide non-RDRAM platfdrms for those systems.

2.22 ).lobile Processors


ntium 4 plans of reaching the
2 GHz-barrier in Q2l
might find your respect as
well. ln the next quarter
Pentium lll at 9OO MHz and 1
GHz, thus being the
ks in history. Both of those
processors will still be
l, Celeron and Pentium lll
processors do for more
than 18 months now.
tlas lntel
will release Pentium lll
he'Coppermine-
T' core which You
OO0. lt is not
hard to figure out that
that runs at
133 MHz, thus finallY
's Pentium lll brothers in
desktop systems. ln this
obile'Tualatin'-Pentium lll
processors at 1 '1'3 and
B. This might be the first
official appearance of
,Tualatin', since it makes more sense for lntel to supply the mobile market with
this 0.13-micron
process cPU early, due to its lower power and heat requirements.

going from a
Basically we can see lntel pushing the mobile processor market quite hard next
year,
62 / ELECTRONIC COMMERCE
850 MHz Pentium lll that is available now to '1.26 GHzin only some 6 months.

obviously those new


processors and their specs require new mobile chipsets ai well,
which will Oe
exptained in detail
further down the article. ., 'r ev
The mobile Celeron is not in quitJJ's much of

brother
Pentium lll is. ln fact, the mobile Celeron sbems

of 2OO1
will see the mobile Celeron T1},e2l2}Otauil,l bri

. By this
time Celeron is far behind pentium lllandJht wo

I
.F'

a
t
.q,

fl
Cn par 3
IIfFORMATIO]Y
TECH]VOLOGY

5.t Fundamentals of lnformation Systems


5.1.1 Data
Very few information systems text-books ever bother to define the term 'data',
assuming that its
meaning is so obvious that it doesn't need discussion. Many misunderstandings can
arise from that
failure to consider the meaning of such a basic concept.
'Data'is the plural of 'datum'. A dictionary definition of 'datum'is "any fact
assumed to be a matter of
direct observation" .This approach adopts the conventional assumption that there is
a reality outside
the human mind, which humans cannot directly capture, but which they can sense and
measure.The
same dictionary defines'fact'as "what has really happened or is the case; truth;
reality". A fact is
therefore in the'real world'and a'datum'is in the human mind.
For the discipline of information systems, a little more care is needed in the def
ining such a key term
as'data'. lf the dictionary formulation is used, then numbers produced by a random
number generator
in a computer might be excluded, and we would need another word to describe those
kinds of
numbers.
The following def inition caters for that problem:
D 'Data' is any symbol, sign or measure which is in a form which can be
directly captured by
a person or a machine. We can then use related terms to differentiate between
different
kinds of data. ln particular:
tr 'Real-world data'is data which represents or purports to represent a fact in
the real world;
whereas'synthetic data'is data which does not.
tt
3.1.2 lnformation
Like'data', the term'information' is often used in information systems text-books
without a clear
definition being given. Many authors assume that their readers' conceptions of the
notion are sufficiently
similar to their own that it can be taken for granted.
Dictionary definitions identify two senses of the word. One is from Shannon and
Weaver's theory of
communications, in which information is 'a measure of the quantity of data in a
message'. This has
been extremely important in communications engineering; but it is far too narrow to
serve the pur-
poses of the information systems discipline. The other is 'an accretion to
knowledge'. But this is very
64 / ELECTRONIC COMMERCE
similarto the definition of real-world data, with the minor exception that
it
implies that the data is new,
i'e' not previously in the collection.To provide a basis for information
systems
tn"ory, *" must probe
a little deeper than the dictionaries go.

y carried out). But we don't


usually bother even
measuring, let alone recording, the pressure in the tyres on the trucks, the
number

ortnip-marks in
the painiwork, the condition of the valves on the motor, or the number of
consecutive

hours the driver


has been at the wheel'There are myriad real-world facts that we let go by, and

never capture as data.


of the real-world data'which we do capture, many kinds are very uninteresting.The
contents of
s record the background noise emanating f rom
various parts of the
signal from a projectile launched from the
earth, and just possibly
which an inter-stellar event can be inferred,
or perhaps the exist-
in the universe. But usually the contents are
extremely boring, and
devoid of any value to anyone. Similarly, a great deal of the data captured by

commerce, industry
and government is either'just for the record'or of interest for only a very
shorftime,

and then filed in


case someone ever wants to look at it again.

5.1.3 Relevance
What is it that makes data interesting or valuable? The most straightforward way in
which

data is
useful is when it is relevant to a decision. Each morning, we don't usually think
about

what the
weather is like outside until we 1re deciding what to do with the day (if it's a
weekend) or

what to wear
(if it's a workday). Data about a delivery of a particular batch of baby-1qe6
to a
particular supermarket
is lost in the bowels of the company's database, never to come to light again,
unless and

until
something exceptional such as the bill not being paid, the custom]er
complaining abotrt
l"?p"l:,
short delivery, or an extortionist making a telephone call io claim that poison has
bben

added to
some of the bottles.
The question as to what data is 'relevant to a decision' is not always clear-cut.
The narrowest
interpretation that we could make is that data is relevant and of value, only if it
actually

;"1;;
difference to the decision made. As we shall see in the next section, decision-
making processes

are
often corniilex,^anci in many circumstances it is unknowable whether data made a
difference

or not.
So that very ndrrow criterion, attractive though it may seem, is not a very useful
approach.
A broader interpretation is that data is relevant and thErefore of value, if,
depending on whether

or not
it is available to the decision-maker, it could make a difference to the decision.
inis approach

can
also lead to difficulties. How do we decide whether it might make difference? What
if the data
4
might
make a difference, but in law shouldn't (e.g. where a person's etlthic background
or mar1al

status is
precluded by anti-discrirnination legislation from being a factor in employment

decisions, but the


decision-maker is known to have a bias for or against people from a pariicular race
or country, or
people who are divorced)? What if the data might make a difference but logically

shouldn't (e.g.
because the person making the decision doesn'f understand how interest is
catcutiteo on

a loan)?
ln addition to decision-making, there are other circumstances in which data can be
interesting
or
valuable' When we read the newspaper, listen to the news on the radio, or watch
,infotainment,
programs on television, we are seldom making decisions, and yet we perceive
informational

value in
some of the data presel:teC to us. Sometimes it is merely humorous. Sometimes it is
not what we
INFORMATION
TECHNOLOGIES / 65

would have expected, and therefore has'surprisal'value ("GoshlThe government might


survive the
election yet!" Or "An injury incurred in training will keep the star fullback out
of the Grand Final!").
ln other cases, it may be something that fits into a pattern of thought we have
been quietly and
perhaps only semi-consciously developing for some time, and which seems, for no
very clear rea-
son, to be worth filing away (things like the proportion of this year's immigrants
who were British, or
Kiwis; or the proportion of companies who are requiring skills with web-publishing
as a condition of
employment).
The most useful and convCntional way to use the term'information' in the
information systems
discipline is to encapsulate these points:
A 'lnformdtion' is data that has value. lnformational value depends upon
context. Until it is
placed in an appropriate context, data is not information, and once it ceases
to be in that
context it ceases to be information.
O Some people feelvery uncomfortable with this def inition. lt forces us to
confront the f luidity
of the sjtuation. Rather than a nice, straightforward 'thing', describable in
mathematical
terms, and analysable using formidable scientific tools, this definition
makes information
rubbery and intangible, a'will o'the wisp'.
Finally, we must again acknowledge that the term'information'is frequently used,
even in the infor-
mation systems discipline, in senses different f rom the somewhat formal def
inition proposed above.
ln particular,'information'and'data'are olten used interchangeably (which seems
like a terrible
waste of a usefulword).

3.1.4 Decision
The most common manner in which data can have value, and thereby become
information, is by
making a difference to a decision. lt is therefore important to consider in some
depth what a decision
is, and what decision-making processes are about. A'decision'is a choice arnong
alternative courses
of action. ln many cases, the making of the decision is performed in the same
breath as the taking
of the action itself. ln other circumstances, however, we may make a nrental
commitment, but take
no action until a short time later. Note, too, that'action' includes 'inaction',
i.e. we can decide to do
nothing, as in "shall ltake part in the demonstration against the cuts to the
tertiary education budget
tomorrow? No, I don't think l'll bothe/'.
A'decision-making process' is the procedures which result in a decision being
reached. How a
decision comes about is important to understand.The simplest model of decision-
making envisages
four steps:
D ATrigger
tr lnformation-Gathering
O Alternative-Generation
5.1.5 Ghoice t
The'trigger'is something that causes a person to realise a decision is needed, such
as the notice
you will receive to re-enrol for units next year. ln order to make the decision,
you will need to gather
information about what units are going to be offered, and of course you'll need to
know your results
for the previous year. The decision-maker needs to generate a set of options, and
then to choose
among them.
Gaining access to information is crucial to most of these steps. ln order to
choose, for example, you
66 / ELECTRONIC COMMERCE
n99d to know what your objectives are, in order to work out a criterion whereby
you

can work out


which is the best of the available options.
ln practice, this model is too simple. lt's a'normative model', because it
describes

how scientists
think people ought to make decisions.To support organisations making complex

decisions, we need
'behavioural models' which describe how managers and executives really
make them.
One example of the difference between the two is that most people don't actually

search out the


'satisfice'. This odd word was
coined, because peo-
ey don't diligently search a
huge decision-space in
think of a few possibilities,
and ask themselves ,,ls
that's adequate, they stop
searching, and the deci-
sion's made. That's 'satisficing'. ln order to understand topics in information
systemi, it is important
to always keep in mind these fundamental notions of data, information and decision-
making.

3.2 The Relationship Between lnformation and l{nowledge


ln a related document, knowledge is defined as either:
O (Naively) a body of facts and principles accumulated by mankind in the
course of time;

or
o (More usefully) the matrix of impressions within which an individual
situates newly acquired
information.
A further concept which can be confused with information is'wisdom'. This is,
however, on an
entirely different plane from information, because it has to do with judgement
exercised by applying
decision criteria to knowledge combined with new information.
Note that the orthodoxy represented in this document is not universally shared. A
nice expression of
the philosophical sceptic's position is as follows:"lnformation, [even today], is
no more than it has
ever been: discrete little bundles of fact, sometimes useful, sometimes tiivial,
and never the sub-
stance of thought [and knowledge] ...The data processing model of thought ...
coarsens subfle
distinctions in the anatomy of mind ... Experience ... is more like a stew than a
filing system ...
Every piece of software has some repertory of basic assumptions, values,
limitationj embedded
within it '.: [For example], the vice of the spreadsheet is that its neat,
mathematical facade, its
rigorous logic, its profusion of numbers, may blind its user to the unexamined
ideas and omissions
that govern the calculations ... garbage in - gospel out. What we confront in the
burgeoning surveil-
lance machinery of our society is not a value-neutraltechnological process ... lt
is, ratn"r, the social
vision of the Utilitarian philosophers at last fully realized in the computer. lt
yields a world without
shadows, secrets or mysteries, where everything has become a naked quanfity"

3.= Information Age


There is no doubt about it, we are in the information age. lf you don't believe me
all you have to do
is listen to the media who tell us this hundreds of times a day, dr just simply
read any business,
computer or internet publication which no doubt will emphatically ntake this point
on numerous
occasrons.
lf listening or reading is not to your liking, then give your fingers some exercise
and log-on to the
World Wide Web. There you will find oodles of information ranging from information
about Moses'
brother Aaron to an analysis of the shape and unique design olthe stripes of each
zebral
Of course with all of this information, there is no doubt that the human race is
better off . Or are they?
INFORMATION
TECHNOLOGIES / 67

3.4 What are lnformation Systems


lnformation Systems is a particulardiscipline, or branch of learning. lt is
concerned with the application
of information to organisational needs.The scope of lS includes manual, computer-
based and other
forms of automated procedures, and applications of information technology
generally.'lnformation
Systems' (lS).is the study of information production, flows and use within
organisations.
lS makes extensive use of information technology (lT) artefacts. But it is very
important to appreciate
that its scope encompasses systems in their entirety, including manual activities,
the interface
between manual and automated components of systems, design aspects of lT artefacts,
and
economic, legal, o€anisational, behavioural and socialaspects of systems.
lnlormation systems overlaps with both the computer science and business clusters
of disciplines;
lor example, software engineering and database management and some aspects of
application
software development overlap with computer science, and systems analysis and
organisational
behaviour overlap with the business-related disciplines.
Commercial lnformation System is derivative from a wide variety of disciplines.
These include:
tr Computer science, electronic and telecommunications engineering;
D Accounting, economics, operations research and other decision sciences;
tr Business administration, individual behaviour (particularly the developing
fieid of the cognitive
sciences), linguistics and organisational behaviour;
O And law.
A major applications area is in commercial, administrative and industrial systems,
but it is also being
applied in association with other disciplines, including applied sciences (such as
geography and
geology), social sciences (such as econometrics) and humanities (such as art
history).

5.5 Who Processes lnformation?


Clearly, our young students can write more informative book reports and as
consumers, obviously
we can make more informed purchase decisions. lmagine, at our f ingertips lies the
ability to find out
everything about every product ever made and more! Gee, with all of this
information all we have to
do is plug it into some formula or equation and out comes an answer. Ah, but where
is that formula?
Who holds the magic key that enables us to process all of this information into a
comprehensive
conclusion?
The answer currently is no one, not even ourselves. Many years ago, Jack Jacoby, a
well-known
marketing scholar established that consumers can easily suffer f rom information
overload at rela-
tively low levels of information processed. ln fact, the human brain begins to have
processing prob-
lems when only 5 pieces of information are processed simultaneously.
Unfortunately the human fingers can type hundreds of requests for information on
the internet much
faster than the brain can process them, and overload lor fingers occurs much later
than an over-
loaded brain! ?
So we ask, what is dramatically needed in today's world? Clearly, it is not more
information, we have
that in buckets. No, what is needed is the ability to process information into a
cohesive who. When
this occurs, information transforms itself into knowledge and knowledge is the
second level on the
learning hierarchy.
Those who believe that bigger is better have been watching too many Godzilla
movies. Size may
matter in horror movies, but it does not cut the mustard when one has been given
the task to write
corporate strategic reports or marketing positioning statements. Here what matters
is clarity, con-
ciseness and support for one's conclusions.
68 / ELECTRONIC COMMERCE

5-5 lnformation lndustry

goods and services_a


P).
Perhaps even more

formation industry is its


, the
United States has
economic power in the world,
largely as a result of
tion technology.
ln the next ten to fifteen years, the world will undergo one of history's
greatest
technologicaltransfor-
rgoes a rapid and fundamental
transformation. A
dramatic shifts in consumer
needs or desires but
technological movement is
triggering a corre_
e new information
industry. Combined, the two
and upheaval.
the core of an
expansive array of informa_
d digitat. The buitding
btocks of this digitat
ors_will realign the
computer, telecommuni_
ess, a new competitive
landscape will be spawned.
ew commercial entities, enabled
through an amal_
y.The same landscape willalso
be litteied with the
remains of once-dominant companies and institutions unwilling to
graif the magnituOe anO
Evolving patterns
of escalating_even
rowth opportunity
ratherthan a mere
will replace physical
assets and physical
d entertainment.
3.7 Transformation to lligital Technology
The information industry.today is in the early stages
ation. Historically, the
industry has been organized on the basis oi infoima
n the inUustry tended
to focus on business opportunities related to r si
such as voice, text,
ary advances have occurred
over the past two
digital electronics. Coupled
with the changes now
tion transmission to broadband
communications,
d a major paradigm shift in the
information industry.
with digital electronics fast becoming the dominant technorogy for eveLy existing
information-based
business, a realignment of the broader information industry [is become inevitable.

We believe that
this realignment will occur along the lines of information function or capability.
ln short,

information-
oriented businesses will, over the next ten to fifteen years, (offcource from year
2OOo)

reorganize
themselves into the following three broad groups:
D Players involved in the creation and collection of diverJe
[pes of
information content
? Players involved in the manufacture of a wide variety of information
a Players organized to engage in various modes of information
transpoit"ppfi"n"".
Significantly, we believe that today's computer hardware industry will be relegated

to an important
but constricted role as the supplier of memory and processing capabilities-to each

of the three
functionally defined information industries. To iuccer'

nies must
learn how

conce'ts;
customize
bilitY' and
efficiency;
INFORMATION
TECHNOLOGIES / 69

The information industry is far from being a mature industry, as evidenced by the
low penetration of
even basic phone service in a large partbf the world. While the information
industry is about a sixth
of the U.S. economy, it accounts ior a mere fraction of that amount for the vast
majority of nations.
However, that proportion will surely increase, fueling unprecedented growth.
Coupled with the dra-

it is
matic new capabiiities made possible by phenomenal and unrelenting advances in
technology,
evident that the information industry is in perhaps the most exciting period ever
seen in any industry.

5.8 The lnefficient lnformation lndustry

and
Because information-based businesses are becoming increasingly crucial to our
commercial

For example,
social lives, inefficiencies in the information marketplace are becoming less
tolerable.
today's informatioh industry is characterized by the following:
B Significant waste of economic and ecological resources-Consider, for
example, the pro-
Orition and distribution of bulky newspapers. A single Sunday printing of the
New York
Times consumes sixteen acres of forest, and the typical customer discards
most of

the
paper unread.

of
tr lnadequate matching of information content with the needs of the recipients-
An example
this is the average llrge city-phone customer who uses only a handful of
the rnillion-plus
numbers available in the localphone directories'
O Severe time and place constraints on information access and availability-For
example,
with prescheduled broadcasts ol television and radio programs, it is safe to
assume that

a
large portion of the target market is excluded from the audience.

tr Cumbersome and expensive physical infrastructures for information


distribuiion-Examples
of these are books, movies, videotapes, and software'
D
video rentals.

P:?::ffiIJ
Book authors

producers
receive barely 10 to 15 percent of what customers pay for their product' CD-
ROM
typically sp"nO 60 to 7b percent of retail revenues on wholesale and retail
margins.
But the question remains, how can such final solution (Salvalion or nirvana)

be obtained? A col-
task one day to present a marketing
positioning report to the
league once told me that he had the
and
hours on the report and the
r"i"g"r"nt of a large consumer goods companv. He worked hours
night before the presentation, and did not get any sleep'

200 slides to
When he was ready to present on the morning of the next day, he brought along over
peeled olf the firsi slide
and said good morning, the
make his case to management. As he sleepily
"ok, in two sentences or less, I
want you to sumtnarize your
CEO of the company stJod up and said:
his cup of coffegand held
back his anger. He hesitated
entire presentationl; My colleague put down

products into the


for a moment, thinking all alon-g and then said-"ok, you have introduced five new
will be losers and one
I am undecided about'"The
market, in my opinionion" will-be a winner, three
CEO then asked him to begin his presentation from the top'

an attempt should
So what does this example suggest? lt implies that as one collects information
the data
suggests. Once these themes are
always be made to ideniify thJunderlying themes that

categories that tell a


identified, the information collected can easily be categorized into relevant
simple yet convincing story.
70 / ELECTRONIC COMMERCE
But the story does not end here, in the learning process, when
information is
amassed and organized
it leads to knowledge, but it is only when knowledge is amassed
that we
have achieved wisdom.
I am sad to say that few. of us get to gain wisdom. The problem'with
wisdom
is that it takes time to
achieve' ln our information addicted iociety where yesieroay is
a day too
late, we lack neither the
time nor the motivation to accumulate the knowledg'e which lLads
to
wisdom.
our.dot'com society is alluring and seductive, but as we ale beginning
to
see many companies and
bodies are beginning to fall by the wayside, lt is my belief thaiwe
should
begin to slow things up,
begin to "smell the roses, or the coffee" and realize that information
which
is older than 1O minutes
old is indeed worthwhile if it can be adeptly fit into the jig.saw
iu=zlecaled t
nowteJg;.
The marketing professor who asked his students to write a report where
no
reference was more
recent than 1952, had the correct idea. As soon as the.laughter subsided
in his
classroom, he made
the point that we should nevei forget the information'which was obtained
when
a given field was
young, for it was the foundation of the knowledg > in that field.
We all know that witho-ut a strtng foundation the house is likely to fall and
we
will forever be con-
demned to toil in the information age instead of seeking to advance through

knowledge into the age


of wisdom! ,

5.9 lnformation Functions


The horizontal dimension of the matrix in Table 1 depicts what people do with

information_create,
display, store, process, or distribute it.
Table 3.1 Examples of Today's lnformation lndustry
Text (Publishing) Voice(Telcom) lmage(Photography) AudioA/ideo
(Entertainment)

Data
(Computing)
Content' (creation and collection)writers,
ncies directory
ph
publishing and Yellow Pages

ising agencies
acto
writers, singers, musicians,
servicJs lOow
publ
Jones, Compuserve, AOL), database
tioris
Display (devices) books, magazines, newspapers, and coupons terephone
equipment,

cpE
(handsets, key systems, and pBX), and wireless (pagers and ceiluiar
prrbnes;
photographs, slides, slide projectors, fax machines, piint6rs,
copiers,

and photo cti


TV f ilm (movies), radio, high fidelity consumer commercial
projectors, VCRs, and

HDTV
PCs, PDAs, terminals, and workstations
Store (memory devices) libraries and information services pagers, answering

machines, and
voice mailfilm, pictures, slides, cD-RoM, and microiic6e videotape,

audio tape, bbs,


film (movies), disks, and game cartridges disks;tapes;floppies;
optical,

nasn memorv,
and PCMCIA cards
Process (applications) printing and publishing industry and
ryord-
processing software voice
processing and telco network_equipment photo-developing services,

iriage processing,
and linotronic film production, TV production, and editing Pds,
workstationi,

maintrameii
supercomputers, transaction processing, and service bureaus
distribute (transport) U.S. Postal Service, other express delivery, fax books,
distribution

system,
and telecom services telecom voice service, communication services,
pagini,

ani
messaging U.S. Postal Service, other express delivery, fax, and
telecom servic6s
fVl
radio broadcast, cable, satellite, theaters, and video'prrchas" and
rental computer
networks (LAN, WAN) and telecom data services.
INFORMATION
TECHNOLOGIES / 71

3.9.1 Creation
The first function is the creation and collection of information content. ln the
digital future, content is
clearly key, and the networks will evolve to support increasingly rich forms of it.
Content includes
text, images, data, movies, and television programming (including sports), as well
as evolving con-
tent, including on-line games and interactive shopping.

5.9.2 Display
The second function is information display. Historically, each form of content
utilized its own form of
display, creating manufacturing companies with distinct core competencies. For
example, textual
information has been predominLntly displayed on paper;telecommunications companies
have used
audio handsets; still images have mostly been displayed on photographic paper (with
a trend toward
plain paper); computer lnd television images are typically displayed on cathode ray
tube (CRT)
ierminals; and portable computers and similar devices use liquid crystal displays
(LCD) and other
f lat-screen technologies.

3.9.3 Storage
The third function is information storage. Because the creation and consumption of
information are
typically separated, and because information tends to have lasting value, storing
information is a
jaluabie function. lnformation can be stored through a variety of means: books,
magnetic media,
CD-ROMs, microfiche, answering machines, film, videotape, audiotape, and game
cartridges. Other
emerging technologies for storage include DVD-ROMs, llash memory (semiconductor-
based memory
cards), and holographic memorY.
The key driver of the value of a storage system is the extent to which information
within it is readily
accessible.Thus, storage that permitJthe use of advanced database-management
software, as well
as random access, is increasingly preferred over other kinds of storage'

3.9.4 Processing
The fourth function is the processing of information (the applications business),
which creates infor-
mation through the intelligent manipulation of data. ln the past, a variety of
processing approaches
and technologies have be-en used, based on the specific media. For voice
information in the telecom-
munications industry, companies have used voice-processing technologies. For text
information,
publishers have used wordprocessors (with spelling and grammar checks) and desktop-
publishing
software. ln the imaging business, companies have primarily used chemical processes
to improve
images, though sottware-Uased approaches are becoming more prevalent. For
audio/video informa-
tionJcompanies have relied heavily on editing and mixing technologies. Finally,
processing has been
(almost by definition) the most intensive for data applications.

5.9.5 lransport
The filth function is the dist igformatio
lndustries
based on different forms of 5laborate
infrastruc.
tures for distribution.The tel velopeda
network of
copper wires. ln the past decade, a wireless infrastructure based on cellular
technology has also
been created for voice communication.Text information has historically been
distributed in a manner
similar to manufactured goods_from factory to intermediaries to end users.
lmage information has
largely ridden on the same infrastructure, which includes the postal system and
various express-
deiivery companies. The telecommunications industry has also entered this area
via the fax ma-
chine. Video and audio information was historically broadcast over the
airwaves; but, in the last two
72 I ELECTRONIC COMMERCE
cjecades, the cable-television system has come to dominate video distribution,
along

with the sale


and rental of videocassettes. lncreasingly, satellite transmission is also playing
a larler role

in the
distribution of video information. Finally, for data transport, a variety
of'compirter-n6tworking

ap-
proaches, such as Ethernet and token-rings, h we become widespread. The

lnternet, utilizing the


telephone rtation network for
computers. The underlying
technologi he separation of these
industries by form have
been rend the forces at work leading to
convergence.

5.10 The Functionally Based Companies of the Future


We postulate that when the industry realigns based on functional capabilities, the
dominant players
worldwide are very likely to be from the:
O Entertainment
O Consumer Electronics
D PersonalComputer
O Communications lndusi?ies.
5.10.1 The lnformation Content lndustry
Content is the driver behind all of the information industries. Networks will
evolve to deliver increasingly
rich content, eventually full broadband multimedia. Similarly, appliances must
advance to display
content in color, full video, and high-fidelity stereo. The expense of these
advancements will be
rationalized by the content they will carry and display.
Publishing and entertainment companies will converge into the digitized content
business. lncreas-
ingly, content is being created or translated into its binary equivilent. Once
digitized, content be-
comes increasingly valuable because it can be reproduced per{ectly and transmitted
instantane-
ously to almost any point on the planet. Much of the information users need is
already out there but
is inaccessible in a timely and convenient manner. Providing greater time and place
value on exist-
ing information will thus be a big part of the future content business.
Packaging of information and verifying its accuracy (symbolized in information
brands) will be an
important value-added function provided by content players. Newspapers and
magazines are well
positioned for the future, because they already deal in digitized information.

5.10.2 Adapting to the Xew Paradigm


Of the three new form-based industries, the conient area is farthest along in
moving to the new
model' First, a great deal of content is alr-eady digitized. Second, the
rationalization of content
businesses has been underway for some time, so that rve already have large content
entities such
asTime-Warner, which owns magazine and book production, television prograrming,
movies, music
labels, sports teams, and cartoons.
Consolidation will continue between the entertainment industry gnd the publishing
industry on a
global basis. The two will dominate the content business in all forms (including
voice, data, and
image content), not just the forms in which they previously specialized (video and
text). They will
also take over content lrom other businesses; for example, they are likely to
acquire the yellow
Pages and white Pages directory businesses currently owned by telcos.

5.t0.5 The lnformation Appliances lndustry


Consumer electronics companies and PC manufacturers will converge into the
information appli-
ances industry. Companies such as Sony, Matsushita (Panasonic), Sharp, LG (Lucky
Goldstar)
INFORMATION
TECHNOLOGIES / 73

Thomson, and Philips have already moved ahead in developing a new generation of
content display
devices. They dominate the manufacturing of traditional consumer electronics
products as well as
for telephony and fax machines, which places them in a superior position to PC
manufacturers and
traditional telecommunications providers such as Lucent, Motorola, and Nokia. These
companies
will continue to dominate in infrastructure but will cede the consumer markets to
electronics manu-
facturers.
Devices were originally manufactured to display content in the form in which it was
created. Sepa-
rate industries were creatbd around designing and building phones, televisions,
computers, and
printing presses, and developing and printing film. Devices are now being designed
to handle content
in multiple forms. For example, digitalwireless phones have an LCD display that can
receive alpha-
numeric messages, including caller lD and eventually e-mail.

5.1I The lnformation Transport lndustry


Public telephone networks, the lnternet, wireless networks (including satellite),
cable television,
broadcast media, and private networks will be consolidated into the information
transport business'
The nerve system of the future information industry, indeed of the future global
economy, will be a
communications network of enormats capacity and sophistication. By the year 2010, a
global net-
work of virtually infinite capacity will be in place. lt will be a network of
networks, consisting of
multiple overlapping and interconnected webs that collectively will realize the
promise of huge (by
today's standards) two-way bandwidth to virtually every node.
During the next ten to fifteen years, convergent technologies will lead to
worldwide end-to-end voice,
data, fax, video, and image services.These services will begin between hub cities
and work outward
toward suburban and rural areas, much the way telephone service did in the 1 920s
and 1 930s. The
global network of networks will be both a transparent communications service and a
platform for
content-f illed or content-enhanced services.
ln the future, we will see integrated, not just interoperable networks. By this we
mean that the same
network can serve multiple needs, and the network will have a common backbone and
shared re-
sources, such as telephony and video-entertainment applications or wireless and
wireline applica-
tions.
ln the information-transport industry, a premium will be placed on managerial
attributes such as
efficient operations, timely maintenance, and outstanding customer service.The
information-trans-
port industry will be the heir to today's telecommunications industry. Other
players, coming from
industries with lower standards, must upgrade their capabilities rapidly and adjust
their mind-sets.
The cable industry, for instance, has been rightly criticized in this area. Most
customers will have a
choice of transport suppliers in the futur.e, and companies will have to provide
the type of customer
service that makes those customers feel close to their suppliers.

5.1l.l lnformation : The PC versus TV Debate /


As the PC becomes more passive (receiving video streams like.today's televisions),
the TV will get
more interactive; hence, convergence will occur.The convergence of the telephone,
television, and
computer will lead to hybrid devices that combine the strongest features of each.
Like the television,
the new devices will display video, sound, and text and be familiar and easy to
use. Like the tel-
ephone, they will allow people to communicate anywhere. Like the computer, they
will be intelligent,
powerful machines that take raw data and turn it into useful information.
We believe that the PC and the television will converge into a device with a f lat
screen and broadband
connection to the world. Savvy manufacturers will also design devices that can be
customized to
74 / ELECTRONIC COMMERCE

meet the preferences of each consumer and grow with the menu of services on the
network.

3.12 Where Today-s Computing lndustry Will Be


Computing will be diffused with distributed memory and processing. Three critical
ingredients of all
information businesses will be :
O lnformation Storage (memory),
O Processing, and
O Software-based manipulation
(see Figure 3.1).These capabilities will become widely diffused, utilized by each
of three highly
computerized information industries: content, devices, and networks. Because the
transformation
will result in three industries (not five), it will enhance operating efficiencies
in the process.

/\ €
Netu,orks Devices

PROCESSINC

Figure 3.1 :The New Computer lndustry


Thus, the computer industry as we know it today will no longer exist. Rather than
downstreaming into
products, the computer industry will go further upstream to focus on creating
superior raw materials.
The two raw materials_components (both memory and processing) and software_will be
distributed
through miniaturization and electronic networks. These capabilities will get
diffused to the point that
traditional stand-alohe computers will be unnecessary; however, many new services
will certainly
emerge (see Figure 3.2).

Figure 3.2 : Possible New Seririces

3.13 Future of lnfornation Presentation


ln this report, we have presented a rationale for transformation, industry
consolidation, alliance-
formation, and specialization in the information industry, based on functionality
for customers and
markets rather than on internal technology factors. Adopting such an orientation
requires that
companies make specific types of investments. lntegrating multiple media can be
exceedingly
complex. For example, in networking, different network platforms will have to
converge and integrate,
INFORMATION
TECHNOLOGIES / 75
as discussed earlier. ln the same manner, devices must evolve to handle
increasingly rich content.
However, we believe that clarity of strategy and marketing capabilities will be as
important as
technological strength.
The upper limits of adoption, especially for electronic and information-based
products, are typically
underestimated. For example, when the televiSion was first introduced, it was
considered a luxury;
the average household now has three televisions. How users interact with
applications will also be
key, and the development of intuitive interaction will greatly spur market
expansion. For example,
speech-recognition software is becoming lar more lunctional and is routinely used
in telecommunica-
tions applications. Thus, it will rapidly migrate to a variety of multifunction
appliances.

5.15,1 The lnportance of Alliances


Few current players enjoy large incumbency advantages in making the transition to
the new industry
structure, because the required core competencies are substantially different from
those that
companies have develfied so far (with the possible exception of content providers).
Because nobody
has all of the needed core competencies, the industry will develop via equity
partnerships and
alliances.
Rather than ownership, a kieretsu-style modelwill emerge. lf each industry pursues
an independent
course, consumer adoption will be slow and fitful. All three industries must work
together in symbi-
otic alliances to create the market.This is similarto the relationship between
software and hardware
in PC markets or between content and conduit, which was responsible for most of the
cable indus-
try's growth.

3.1r.2 Critical Success Factors


Not all corporations are adept at dealing with change of this magnitude. While
status quo or reactive
management styles are often successful in stable environments, what will be
required of players in
the information industry is anticipatory management (see Figure 3.3). Anticipatory
managers align
their company with the direction in which the industry is heading and, when
possible, in f ront of the
trend. This requires a clear vision of the future, a strategic game plan, and an
underStanding of which
position is to be desired in the future. Based on our analysis of the requirements
for success,
companies will have to emphasize the following areas in particular.

3.13.3 Global Orientation


Companies aspiring to succeed in the information marketplace must be globally
oriented and create
a global brand. lnformation technology is inherently boundary-free;the boundaries
that have existed
so far have been imposed by governments or have resulted from cultural differences.
Both of these
barriers are collapsing. ln telecommunications, governments are privatizing state-
owned PTTs and
breaking their monopoly. Companies such as lBM, Philips, and NEC are creating a
global, rather
than multidomestic, focus.
.t
3.1t.4 )'lanaging Geopolitical Dynamics
While world markets are opening up, regional trading blocs are becoming more
widespread. For
example, the three majortrading blocs are expanding their spheres of inlluence.The
North American
Free Trade Agreement (NAFTA) will ultimately expand to cover most of the
Americas;the European
Union (EU) will rapidly integrate Eastern Europe; and the informalAsian bloc
willcontinue to expand
(possibly to include lndia). Globally oriented companies must establish a
significant presence within
at least two of these blocs.
76 / ELECTRONIC COMMERCE

5.13.5 Flexibility, Speed, and productivity


Large companies must be as nimble as small ones in responding rapidly
to
fleeting opportunities.
With shifting geopoliticaldynamics, the windows of opportunity aL oiten-brief.

Comianies must be
highly adaptive and learn to reduce their time{o-market with new products
and
services. They must
continuously increase their productivity to compete globally. Success will be
decided

by an increas-
ingly unforgiving marketplace.

5.13.5 Alliances and Partnering


Companies that are culturally not able to partner with suppliers, customers, and
even

competitors
will be at a major disadvantage. Partnering will be required horizontally as well
as vertically.

For
example, Time Warner, a contenl company, was instrumental in the deveiopment of
the DVD piayer.

t.13.7 Ouality0bsession
Outstanding quality will bEa minimum requirement to be in the running for global
business. Companies
must benchmark their performance against the best in the world anO aOopt
continuous improvement
processes to stay competitive.

5.13.8 XassCustomization
lncreasingly, companies are called upon to provide customized products to markets
at costs

compa-
rable to mass-produced ones. Companies can do this by creating flexible
manufacturing

systems
and by investing heavily in information technology. Both Dell and Gateway computers
are built to
order and shipped directly to the customer. By avoiding high inventory and
distribution costs, both
are redefining how to address the market; both Apple and Compaq are moving to this
model.

5.15.9 Weakthroughlnnovation
With the rapidity of technological change in the information industry, the
importance of research and
development has never been greater. Technological breakthroughs will be crucial at
both the basic as
well as the applied levels. ln other words, companies must periodically break
preveiiling price/per-
formance norms. For example, Sony has excelled at creating new products that meet
needs custom-
ers never thought they had, with products such as the transistor radio, Walkm an
stereos, aid com-
pact-disc players. Leading the markets in this manner wilt be key in the future.

3.15.10 Access to Capital


Competing on a global basis in the information industry will require access to
significant amounts of
capital. Obtaining it will require tapping global capital markets (especially for
constructing informa-
tion highways) as well as sources such as the world Bank and vendor financing.

5"t5.1I lnvestments in Human Capital


Companies must invest in upgrading and maintaining their numdfr capital, as the
half-life of knowledge
in afast-changing environment is remarkably short. Because the'information industry
is likely to
evolve along a very different path than envisioned just a few years ago, there are
very few off-the-
shelf experts to guide companies into the future. Companies must develop new
knowleige and train
their employees on an almost continuous basis.

3.13.12 End-User Focus


All companies in the industry must keep a focus on the customer's customer (i.e.,
the ultimate end
user). Witlrout such a discipline, product-development efforts will fail.
Furthermore, end users pro-
INFORMATION
TECHNOLOGIES / 77
vide the volume and velocity needed to achieve required price/performance ratios.

3.14 Electronic Publishing


The term given to the preparation of publishing rnaterial using exclusively
computer hardware and
software.This may be achieved by using desktop systems with relatively simple
software ( so called
desktop publishing) or by using proprietary systems or more complex and precise
software on typical
microcomputer workstations with standard operating systems.
The three major constituencies, directly or indirectly involved in e-publishing are
consumers, publishers
and the technologyproviders, who include the hardware, software and
(tele)communications vendors.
From a consumer perspective, there are two kinds of content - short term, dynamic,
actionable, such
as news or stock quotes and materialthat is useful or enjoyable lor longer periods,
such as reports,
studies, entertainment and literature.Their concerns are easy and cheap access,
along with none to
minimal cost for short term content and ease of use for content that requires
immersion. The Web,
PDAs and smart phones/pagers serve them relatively well today for the first kind of
content.
This is definitely not the case for the second, long life cycle materials. The
narrow band public
telephone and wireless networks we have today can't handle high volume data
transmissions reli-
ably. They were not designed for it. On the other hand, ihe emerging broadband
services, such as
shared use cable access and DSL are immature technologies, caught in the middle of
competitive
and political battles of all kinds. lt's a total mess out there and until a stable
broadband infrastructure
is created, the whole new lnternet economy, including e-publishing, will be
constrained. Hence the
need to deliver rich content on CD and DVD will be with us until ubiquitous access
to high speed
public networks is assured. Obviously, this is the major issue for technology
companies.
And to say that it is cheap and easy to read a document of more than 50 pages from
a CD is just ain't
so. We all know the routine: it takes 5 to 10 minutes to turn your computer on, put
the CD in, load
plug-ins or players and find what you want on the screen. During this drawn-out
process you may
even get messages about the need to update this or that piece of software.There
goes another 5 to
30 minutes. You need to do a search too? Here is another challenge, due to limited
or incomplete
indexing and inconsistent search methods.
So books, high quality content magazines and newspapers thrive today and will be
around tomorrow.
At least until we all bathe in wireless broadband data streaming down into our e-
paper, a thin sheet
display delivering news, movies, TV broadcast, the tax code (now that will be a
challenge) and
everything else digital under the sun that we can afford to pay for, either with
our time or our money.
Obviously, issues in the last two paragraphs are the concerns that publishers need
to address,
together with technology providers. How well we'll do that will determine ihe face
and shape of things
to come.
E-publishing will become prevalent in 5 to 10 years, as bloadband
broadband access
becomes

becomes cheap

cheap and
universal. Once that happens, the next phase, the age of4ully immersive and
interactive environ-
ments and content within these constructs will be upon us, as We'll have the local
computing power
to render them in real time. The interfaces will still be 2D in ten years, so they
will be pretty similar to
what we have today; beyond that, things will become really interesting, as we enter
into 3D environ-
ments, be they miniaturized, individualized cr built for groups or whole cities.
StarTrek Holodeck,
here we come!
Computer Assited Publishing
The combination of a computer and software that allowed users to compose complete
documents
without cutting and pasting, and a printerthat could produce documents that rivaled
phototypesetting
78 / ELECTRONIC COMMERCE
in quality, revolutionized the graphics and printing industry almost overnight. lt
eliminated manyof ,-
the manual steps previously necessary to prepare materials for printing, and
allowed for the easy
manipulation of both text and graphics when changes were necessary. Although many
in the printing
industry were skqptical of the new technology at firstt it became clear there were
compelling advan-
tages to using DTP systems in many situations.

,
t

CI'pr* 4
GLOBAL IIVTER]VET

4.1 Wodd Wde Web : The Simplified Access to the lnternet


The World Wide Web is a global, seamless environment in which all information
(text, images, audio,
video, computational services) that is accessible from the lnternet can be accessed
in a consistent
and simple way by using a standard set of naming and access conventions.The basis
forthe Web is
the lnternet.The Web is built on the lnternet, and makes use of many of the
mechanisms the lnternet
provides.
You can access sites all over the world. You can connect from your desktop to
thousands of Web
servers simply by "clicking" on a selection (the underlined words), or by entering
a specific address.
You can connect to many different types of systems - and not be aware of the
differences
You can access many different types of information - text, images audio, video,
computational serv-
ices - again, usually with no extra work on your part.
The lnternet is the physical aspects - computers, networks, services. lt allows us
to connect to
thousands of other computers across the world. But it doesn't mean that those
sys'tems users' can
look at, and understand, the information there.
The Web is an abstraction and common set of services on top of the lnternet. lt is
the set of
protocols and tools that let us share information with each other.
The lnternet provides access to mail, interactive conferences, network news, and is
rich with infor-
mation resources....but the lnternet can be difficult to use and understand. The
World Wide Web
makes it easier to use the lnternet:
D lt provides a graphical interface (on many platforms)
O lt supports multimedia (sound, video, as well as graphics)
tr lt uses the same tools as the lnternet, but hides thelgly details that user
has to go while
working through ftp,usenet or telnet
O lt is based on standards/conventions, so sharing is much easier than before
allthis makes
it easier to access information and makes it easier to provide information
tr The wide and rapidly growing amount of information available.
tr The volume of information available is huge, and growing rapidly. Many of the
world's major
companies, universities and research organizations are on the Web today, with
many oth-
ers joining daily.
The various functions of the web are illustrated in Fig. 4.1.
80 / ELECTRONIC COMMERCE

0a$c Wsb Srowsei Rmetions


llrrlgaflorAtde Ssrrlcos
- 0p6lr -rH
-fttd - sattc$*
-h*rv - vlw rowar
- b*cldoffi$d -mri &,
- holllnks/bookm*lc - oPCn ei"'l
- rdord
User he$entallon 0ollons
-ffil
- colorl
-'*
- lr?lp

@
-dB
- hnr&ron/off

Pagee cen soiltaln a varlsty of


ffi thhfooilnrlrgcc

f,fii*l*t.0"

hdtmt

Fig.4.1 : Functions ol aWeb Browser

4.2 History of Web Growth


The World Wide Web (WWW) is simply another approach to offering information on a
computer
system on the lnternet. lt was developed at a particle physics laboratory in Cerne,
Switzerland.
The Web was initially conceived byTim Berners-Lee and others at
inlormation on many different, distributed, computers. Berners-Lee had this idea of
universal reader-
ship, which is that any client should be able to read any information. Berners-Lee
developed the
basis ideas, which others have since added to.
Then those involved agreed to work by a common set of principles:
O There would be no central control.TheWeb works because people work within the
agreed-
to guidelines. As part of this the Web ethic is that anyone can publish, and
anyone (who is
authorized) can read information.
O AllWeb servers would use the same protocols/mechanisms....
tr Http, a fast, stateless, extensible transport mechanism would be used to
communicate
within the Web
O Httpd, or http daemons, would be the base Web server - receiving messages and
providing
data as requested
tr URLs (Universal Resource Locator) would be used for Ditwork- wide addressing
A AllWeb browsers would use the same basic language - HyperText Markup Language
HTML
tr And built into the mechanisms is support for format negotiation.
Web clients tell servers what formats they can handle, and Web viewers allow basic
browsers to use
different formats.
The Web was developed with the concept of "universal readership" any participating
system should
be able to read the information on any connected system using a common set of tools
browsers
servers/gateways addressing schemes common protocols format negotiation.
GLOBALINTERNET /81

The lnternet is growing at a phenomenal rate (no one knows exactly how big it is,
but as of May 25,
1996 lnternet Solutionl estimated there were 59,628,024 people on the lnternet, and
an estimated
304,177 World Wide Web sites on the lnternet.
The World Wide Web (WWW) was originally developed in 1 990 at CERN, the European
Laboratory for
particle Physics. lt is now managed by The World Wide Web Consortium, also known as
the World
Wide Web lnitiative.

Leading the Web fo ifs Full


Patential...
The WWW Consortium is funded by a large number of corporate members, including
AT&T, Adobe
Systems, lnc., Microsoft Corporation drnd Sun Microsystems, lnc. lts purpose is to

promote the
giowth of the Web by developing specifications and reference software that will be
f reely available to
6u"ryon". The Coniortium is run by MIT with INRIA (The French National lnstitute
for Research

in
computer Science) acting as European host, in collaboration with cERN.
The National Center for Supercomputing Applications (NCSA) at the University of
lllinois at Urbana-

Wide
Champaign, was instrumental in the development of early graphical software
utilizing the World
Web features created by CERN. NCSA focuses on improving the productivity of
researchers

by
providing software for scientific modeling, analysis, and visualization. The World
Wide Web was an

distributed
obvious-way to fulfill that mission. NcsA Mosaic, one of the earliest web browsers,
was
f ree to the public. lt led directly to the phenomen tl
growth of the World Wide
Web'

4.3 Working of lnternet Web


PROT{5ER
5otrtvARE

The World Wide Web is by far the most popular part of the lnternet. Once you spend
time on the Web'
the graphical portion of the lnternet, you will begin to feel like there is no
limit to what you can do.The
Web aliows rich and diverse communication by displaying text, graphics, animation,
photos, sound

personal
and video. So just what is this miraculous creation? The Web physically consist's
of your
82 / ELECTRONIC COMMERCE

computer' web browser software, a connection


to an lnternet service
provider, computers called
servers that host digital data and routers and switches
to oirect tne flow of
information.
The web is known as a client-server system. Your
computer is the client; the
remote computer that
stores electronic files is the server. Here's how it works:

tr Let's say you want to pay a visit to the the Louvre museum
website.
First you enter the
y"b orowsei 1moi" this in a
whire). rhen your
#".J:::
browser :::,T:_:t;ll".y:p'll"_,Iy_?I
requests the web page from a web server rocatJin "i"rtparls. The
sends the data over the lnternet to your computer. Your web
Louvr"'. .'"fi:;.
browser
interprets the data and
displays it on your computer screen.
o The Louvre's website also has links to the websites of
other museums, such
as the Vatican
Museum. With a click of your mouse on a link, you can
web
server in Rome.
".a"ar-tn"
llial-up mnnsctifii
bo dam S...t...0...W?
D .the webtoget
his feature allow
he Web to be li

en them' on the
through pages

You at that Par-


s i. cJmmo"nfy
software, such as Netscape Navigator or Microsoft

rnternet Exprorer,
does your web browser distinguis[ between weu pages

and other rires


are written in a computer ranguage cailed
HTMr-,"wrricn

stands for
The lsP in turn is connected to other providers, and
eventuaily to one of the big
carriers, who have
huge networks that use fiber optic cables running
at 45 mb/se"ono 6n"."
Lt"rr"o to as T3s).
At the other end there is probably "r"
you made to a
specific web address,
servei
and who will route it to the
does its magic, and
sends you back
t
what you asked for - again using
work we just went
through.
GLOBALINTERNET /83
The Web has a simple architecture. Clients (now any terminal with web browser) send
messages to
Web servers, which are referred to as HTTP daemons (or HTTPD).The httpd servers are
responsible
for sending the requested information to the client (also known as browsers), who
are then responsi-
ble for presenting the document to the user. (See Figure 4.2).

Request
File

Give
File

Request
Print Job

Spool
and Print Job

Fig.4.2 : Messages from Webbrowser


These messages can be viewed as short bursts - the client send a request to the
server, the server
sends back what was requested, and the connection is ended. This simplifies
communications, but
makes it difficult to handle longer-lived transactions, as the server does not
retain context informa-
tion, i.e. it does not necessarily "remembe/'the messages it has received.
Let's look at that simplified view in a little more detail. This has the same basic
components, but
we've now added a new server path, which can be one that goes through a firewall,
and/or which
accesses applications.
BRowsRs
"@'FJxl
rwd/ctxl4l"
VIEIVR,S

MME
Nrrscs
Mos^rc
Lvro<
MecWrs
Crr.ro

rIns,wt
. no cntr'alcon6pl ' addressing
sbndard
. anyone cancdte, 'mulflIrle
ammethods
anyme(autborlzed) r€ad
.formatnegotiadqr
' dlentlsel*r . rqtns snd
eJderdotrs

' orsident protocds . m all


major platforms

Fig.4.3
84 / ELECTRONIC COMMERCE

A firewall is a mechanism to control access to and from Web servers. Most companies
have firewalls
set up to prevent access to their internal servers from external clients.
There are many different clients (Web browser), such as Netscape or Microsoft's
Explorer. The Web
client usually sends an http message, but as the diagram shows it can send any
lnternet message
(e'9. ftp, file, gopher, wais). The servers can be behind a firewall, which is a
way to prevent access
to a server. Servers can include gateways which allow them to "talk" to
applications. These gateways
can be in any computing language, the most common being perl and TCL, but C and
other languaEes
are also used. Finally, the components know how to find documents because they all
use a standard
addressing scheme, or URLs.
Note that there is no central control. Anyone can create a Web server, and for the
most part anyone
can read what is online. The reason it all works is because everyone is using the
same set of
"standards".

4.4 Web Browsers


A web browser is the software program you use to access the World WideWeb, the
graphical portion
of the lnternet. The first browser, called NCSA Mosaic, was developed at the
National Center for
Supercomputing Applications in the early '90s. The easy-to-use point-and-click
inter{ace helped
popularize the Web, although few then could imagine the explosive growth that would
soon occur.
The World Wide Web clients-the software that enables you to access resources on the
Web-are
called browser.The software that enables you to go from one resource to another by
following hyperlinks
is known as a Web browser . The most popular browsers - such as *Netscape Navigator
tr lnternet Explorer,
D Mosaic
Organisations to access intranets as well.The basic capabilities of a browser are
to retrieve docu-
ments from the Web , jump to links specified in the retrieved document , and save
and print the
retrieved documents.
There is no standard way of viewing or navigating the Web. A variety of Web
browseis exist. Most
browsers have most of the functionality, although there are some differences in
levels of support and
overall performance. Most browsers are still being updated and improved, with new
releases every
two or three months. Each computing platform will have a number of browsers
available on them as
detailed in section a. including character cell browsers like Lynx for terminal-
based users (without
the graphics support, of course).
One of the key concepts behind the Web is that the user should be able to
controlthe presentation,
so most browsers provide ways to tailor the interface (e.g. size, color and type of
fonts, whether
images are always shown, whether traversed links are highlighted, and so on).
lf the computer you are using cannot handle graphics, you will need,to use a
nongraphical browser.This
type of browser will be able to retrieve documents that contaln graphics,but will
just ignore the
graphics and display the rest of the document.The Web is capable of offering full
multimedia ,but if
your computer can't deal with all the media ,you can still access the text
material.Lynx is a popular
nongraphical browser.
The resource requests sent by the client to the server are in the form of Uniform
Resource Locators
(URLs). URLs are strings of characters that determine which of the thousands of
servers to connect
to and which resource on that server to find. After the server locates the resource
specified by the
URLs, the server sends the resource (thedocument) to the client, which displays it
for you to work
with, print, or save.
GLOBALINTERNET /85
The documents sent by the server to the client are written in a language called
HTML, or HyperText
Markup Language. HTML is a language designs to transmit documents that can contain
different
media formats in the same document: text, graphics, movies, sounds, and hypertext
links to other
documents and other resources.YourWeb browser receives the HTML, allowing you to
move around
in the document and follow the hypertext links to the linked-to-documents.
The Web uses a writing technology called hypertext .Traditionaltext , such as a
paper document , is
linear. You begin at the beginning and finish at the end , and there is only one
order in which to read
the document - the order determined by the author . Hypertext f rees the reader
from the linear nature
of text.
Just as you can access Gopherspace through a Gopher server or client, you can
access the Web
through something called a "Web browser." A Web browser can read documents, fetch
or download
documents, access files by FTB read Usenet newsgroups, TELNET
almost everything that we have talked about in the past 22 lessons can be done
using only a Web
browser!
Hypertext uses links , also called hyperlinks. You can be reading a hypertext
document and come
across a link. lt is then your choice to continue in the document or follow the
link . This link could go
to another part of the document or to another document entirely. lf you have many
documents , all
linked to many other documents , you have a network ( or web ) of text , with no
fixed beginning , no
fixed ending , and no fixed way to browse the text .
Data is moved within a network or between networks according to established rules,
called protocols.
The protocol of the World Wide Web is HTTP of Hypertext Transfer Protocol.
A document (or f ile) you create that can be accessed by a Web browser is called a
Web page or Web
site. The tool you use to build your Web pages HTML. When you "surf the Net" with a
Web browser,
you don't want a Web page of your own, you don't have to create one in order to use
and enjoy the
Web.You learn more about creating your own page later in this lesson.
Java is a programming language that can be used to add dynamics to a web page.The
java program
is included in the Web page in a binary form that makes the program execute
regardless of what
computer it is on. Java programs can add animation, sounds, or interactive
programming to a Web
page.
Although many different browsers are available, Microsoft lnternet Explorer and
Netscape Navigator
are the two most popular ones. Netscape and Microsoft have put so much money into
their browsers
that the competition can't keep up. The pitched battle between the two companies to
dominate the
market has lead to continual improvements to the software. Version 4.0 and later
releases of either
browser are excellent choices. (By the way, both are based on NCSA Mosaic.)You can
download
Explorer and Navigator for free f rom each company's website. lf you have one
browser already, you
can test out the other. Also note that there are slight differenocs between the
Windows and Maclntosh
versions.
You can surf to your heart's content, but it's easy to get lost in this electronic
web.That's where your
browser can really help. Browsers come loaded with all sorts of handy features.
Fortunately, you can
learn the basics in just a few minutes, then take the time to explore the advanced
functions.
Both Explorer and Navigator have more similarities than differences, so we'll
primarily cover those.
For the most up-to-date information about the browsers, and a complete tutorial,
check the online
handbook under the Help menu or go to the websites'of the respective software
companies.
86 / ELECTRONIC COMMERCE

4.5 Surfing the Net


Probably the easiest thing to do on the lnternet is to follow hyperlinks in an
almost-random fashion.
This is sometimes referred to as "surf ing" the lnternet, or Net. There are only
two things you need to
keep in mind. First, be adventurous. Try unusual links; go off the beaten path.
Second, have pa-
tience. Net
pages and never find anything interesting. But, there's always that time when you
seem to land on all
of the right sites.
You've made your first connection to your lnternet Service provider, and now you
are ready to begin
surfing. The question is where do you start?
Most web browsers, when you invoke (run) them, will come up to a default
webpage.That is, they will
automatically take you to a specific place on the lnternet, a place that's been
pre-programmed by the
browser company or your lSP, for you.
When you are surfing the web, you can choose from millions of websites to
visit.Your browser has
several ways of allowing you to do this.
The first step to insuring a more productive life on the lnformation Superhighway
is picking some
resources and bookmarking them. ln order tv locate a particular resource on the
lnternet you will
need to know its address. An address can be considered the location of a resource,
and all items,
including you, have an address if they are on the lnternet. Just as you have an
email address which
is different from everyone else, so too, can there be sites within sites, resources
within resources.
Each type of resource has a slightly different format address and name, but the
three most common
addresses you will have to dealwith are EMAIL, FTP and www addresses.
An email address goes to a specific person. i.e.
JainwkPubli cG anysi te . com
The FTP address usually addresses a system as a whole unit. i.e.
ftp. anysite. com
The WWW address is similar to an FTP address in as much as it reaches out to a
system, but it also
specifies exactly where on the system to go. i.e.
http / / www. anysite. con,/mypage. htnl
;
While the addresses for FTP sites and Email addresses are simply called
"addresses", a WWW
address is called a URL or Universal Resource Locator. For a more detailed
description of the term
URL, see our glossary.
There are numerous resources on the net which everybody needs from time to time.The
big problem
is knowing which resource you need. While everyone has certain specific needs,
there are a few
common resources which everyone should use.
/
4.6 Searching the Web
With hundreds of millions of web pages online, you could spend a lifetime surfing
the Web, following
links from one page to another. Amusing perhaps, but not very efficient if you
areafter some spec1i-
information. one of the biggest complaints we hear concerns the difficulty of
targeting information.
Where do you start? Searching the lnternet requires part skill, part luck and a
litile biiof art. Fortu-
nately, a number of free online resources can help with the hunt.
By now you should have several sites bookmarked. So what's the next step? Simple,
now its time to
GLOBALINTERNET /87
start looking for information. We have several search engines bookmarked but that's
only the first
step.
What can you search for? Nearly everything! lt would be improper to state that the
lnternet contains
the sum total of all human knowledge, however its getting there very quickly. Use
one of your new
BookMarks and surf over to one of the search engines. Here you will be presented
with a webpage,
which has a field in which you can enter terms to look for. All of these systems
have a help section
or FAQ clearly marked, so if you get into trouble, you can either hit your "back"
button or try the site
help file.
You begin your search by entering some sort of search criteria into an editable
field on your screen,
then pressing the search button.
Searching the lnternet for some particular information can be both a frustrating
experience and a
rewarding one. lts best to start with a particular search engine or directory,
looking for what you
need. Remember that there is a considerable overlap between the contents of one
engine and an-
other, so you willfind similar references among them.

4.7 Search Engine


A search engine is a service that indexes, organizes, and often rates and reviews
Web sites. lt helps
you find the needle that one Web site you've got to see in the lnternet haystack.
Different search
engines work in different ways. Some rely on pecple to maintain a catalog of Web
sites or pages.
Some use software to identify key information on sites across the lnternet. Some
combine both
types of service. So when you search their "holdings," you're bound to get
different results.
Search engines are online utilities that quickly search thousands of Web documents
for an entered
word or phrase. Although there are some subscription-based search engines, most
operate off of
prolits from advertisements. lt should be noted that no single search engine has
the contents to
every Web page on the lnternet. lnstead, each search engine has the contents to
only the Web pages
that are manually entered into that search engine by the Web page operators. This
is why you might
get different results from different search engines.
Search engines are usually accessed through Web browser software. Each search
engine provides
different searching options and has its own look. Search engines also differ
greatly in the number of
resources they allow you to search some search engines have both searching and
browsing capabili-
ties.
Find the Web sites and newsgroups that interest you. You may find, as many people
do. that it's f un
just to wanderor surffrom site to site, going wherever the links take you. But if
you want to find
something specific and find it as soon as possible, you need to use a search
engine. Here are the
basics of searching.
No search engine keeps track of all the content on the lnternet. Even the major
search engines such
as MSN Web Search, AltaVista, lnfoseek, Lycos, an$ Snap won't give you everything.
(Some stud-
ies indicate that even the top search engines find l5ss than half of what's really
out there!) So try
several search engines to see which produce the most useful results forthe types of
information you
usually look for. Whenever a search fails to produce the results you wanted, try
another search
engrne.

4.8 Categories of Search Engines


Major search sites generally provide more than a search engine for finding Web
sites. They also
allow you to look up information such as recent news stories, newsgroup postings,
reference material
88 / ELECTRONIC COMMERCE

maps), and e-mailaddresses, street addresses,


$1*tr"*t:ffiffi,1i:i.t"and
and tetephone numbers

Search tools can be categorized as


O Webcrawlers
0 Subject directories
D Web databases : lndexes

4.8.1 Web Crawlers.


A web crawler (sometimes called a spider)
is an automated search engine.
when
a resource(website) to the search enginesit
someone submits
sends rr"ir, oripowerful program
back to
the submission which scans the site Io, ror" resources. "
the site of
lf it finds
additionai r".ori""., it catalogs
them as well as the original resource.The advantage
if the site is not dedicated to that specific
ort is i" you find
information in a site, even
type of information.'For ""nexample,
locating information.on
Airplanes in a site about NASA space activiiies.
The main Jrawoact to this
type of search engine
the tendency to catalog too much information.
is

A couple of examples of the best crawlers.are;

I HotBot (http://www.hotbot.com/)
:A l1!os99t (http://ultra.infoseek.com/)
Alta Vista (http://www.altavista.digital.com/)

4.8.2 SubjectDirectories.
Directories are the yellow pages o y tha
submitted to them. Here you will , but

en

he
information didn,t include all of the
for. maY
ng

A couple of examples of Directories are;


YAHOO!(http://www.yahoo.com)
: Linkstar(http://www.linkstar.com/)
IA lnfoHiway (http://www.infohiway.c om/way/index.html)
subject directories are manually compiled by staff
of the directory
and by users who
submit entries.
web databases are completed by soitware'" robots,"
or int"rr,g"'nt agents, that
roam the web and
collect information for the databises. both approaches
products' The search engines highlighted
to selrch engines have
created effective
here are currenfly popular or have
historical
ever' new search engines may be worth using,
interest. How_
so be watc'hiffir trem.
Directories, such as yahoo!, are

websites under
simirar categories, such as rnter
s' The results of
websit
your search will be a list of

u are interested
in rocating the site for the Louvre museum,
for instance, try using
4.8.3 lndexes
information, such as biographicarinformation

about Leonardo da
go, because they search allthe contents
of
a website. lndexes
iders or robots that scour the rnternet,
anaryzing
dexing all of the words.
-.ttion. of web
GLOBALINTEBNET /89

lndexes like AltaVista and Lycos find individual pages of a website that match your
search, even if
the site itself has nothing to do with what you are looking for.You can often find
unexpected gems of
information this way, but be prepared to wade through a lot ol irrelevant
information too.
Search results are usually ranked in order of relevancy-the number of times the
search terms you
used appear in a document, or how closely the document appears to match a concept
you have
entered. This is a much more thorough way to locate what you want'
The directories may not be as up to date, but.when you are looking for specific
inlormation, it's
usually easier to try a directory first. lf that fails to yield results, try one of
the search engines.
1. MSN search
2. Yahoohttp://www.Yahoo.com
3. lnfoseek http://www.infoseek.com
4. Excite httP://www.excite'com
5. Lycos httP://www.lycos.com
6. AltaVista http://altavista.digital.com
7. Webcrawlerhttp://www.webcrawler.com
8. HotBot httP://www.hotbot.corh
9. Dejanews
10. Compuserve
11. Metacrawler
12. Magellan http:i/www.mckinley.com
14. OpenText lndex http://index.opentext'net
15. Snap
16. Lynx
17. Opera
18. Accufind http://nln.com
O MSN search
Using this search page, you can conduct a basic Web search or an advanced search,
specifying one
or more of the following: the type of information, the language, the origin, the
domain, the date
created, and the types of files contained in the Web page.
O Yahoo!
This is an all purpose search engine that provides a wide range of indexed links.
This was the
premiere search engine a lew years ago, but has digressed considerably over the
last 12 months.
Several links are old and no longer in existence, and it is almost impossible to
get a link added to
their database. This is however, a good location to start, because they have the
most comprehen-
sive system to cross-reference their lesser results with other more up to date
search engine
servrces. /,
This is actually a directory rather than a search engine, meaning humans compile
and categorize the
sites it searches. So you may get fewer results. But Yahoo! makes it easy to
search for items by
category and to continue your search using a search engine, if you want to.
Yahoo!, the most popular hierarchical directories, is a good starting point.You
can search by subject,
or like the other search engines, you can specify a search term.Yahoo! works well
if you're searching
for general information on a subject, but because of the way information is
indexed in Yahoo, you
probably won't get great results if you're looking for something specific or very
recent.
90 / ELECTRONIC COMMERCE

O Yahho's People Search


Looking for an old war buddy? old class-mate? Childhood f riend?
Movie star?
This is the great place
to start' You'll have to have at least a clue where the person lives, but
even if
you don,t, you,ll be
amazed at what you lind.To the degree you can enter in information
about the
p"r.on yor,re looking
for, you will have a greater chance of finding them. This site is owned
and
operated by yahoo!.
A Yahoo's City Map
Have a party to go to, but you don't know how to gei there? This search
engine
will use an incredible
amount of city map information to find exactly how to get there. You
can even find
data on to and
from routes. This site is owned and operated by yahooll
O lmagesurfer
owned an operated byYahoo!, this site allows you to find images of nearly
anything. you,re

lf looking
for clipart, they have your image!
O Yellow Pages <http://yp.yahoo.com/>
Looking lor a company that produces a particular product? Then this search
engine
is for you. Just
like your local Yellow Pages, this book cdntains everything. Owned and
operaied
by yahoo, this
service can come in handy if you're rooking for specific proJucts.
O lnfoSeek
This is an all purpose search engine that provides not only a global search
engine
for any subject you
might be looking for, it also provides an online Dictionary and-th"sarrrs for quick

word look-ups. The


results are rated and adding a URL is very simple.
lnfoseek's search engine boasts an extensive catalog of sites. lnfoseek has
a
directory, too, that
categorizes sits by topic using software. Some sites hive been reviewed and
are
recommended.
lnfoSeek, part of the Go Network, searches by keywords, scanning the
information
in its database.
With lnfoSeek, you can search a variety of data6ases, including the Web
and
Usenet. lnfoSeek
gives a score to your search results and returns the,,best,'matches
to your query.
O Excite
Similar to Yahoo!, this is an all purpose search engine that is very up to date
and
very easy to add a
URL to' The search results are very effective and come with a percentile

rating of how close their


results match your search words.
It is a hybrid search engine, Excite fulfills the traditional search
engine
definition (it is always visiting
web. sites and cataloging them using a software program) but
alsoias a
directory-a subsection of its
cataloged sites, which have been reviewed Uy peopte.
An interesting feature of Excite is its "Confidence Rating," a percentage
rating
given to each of the
results it returns; a higher percentage indicates a closdr matchJo your
origiial
query. ln addition,
Excite gives you the option to view more documents similar toihose
desJribed
in that particular
result. Finally, Excite is available in a number of languages.
D Lycos. (tyco.bmp)
Like Excite and lnfoseek, Lycos is a search engine with a directory,
organized by
subject. you can
also search the Lycos service "Top S"/oi' sites considered by its reviewJrs
to oe
amoni the top five
percent of sites on the lnternet.
Lycos is a web-indexing robot. That means Lycos software robots
actually go out and
travel the
GLOBALINTERNET /91
lnternet every day looking for new Web, Gopher and FTP sites. Lycos searches by
keywords, as-
signing a percentage rating for relevancy of each search return. An interesting
feature of this search
engine is the ability to locate pictures and sounds on the Web.
D Alta Vista

This was the premiere search engine of alltime. Created by the Digital Corporation,
Yahoo! uses their
index databanks for some of their information, although it would appear that Yahoo!
no longer uses
their services. Alta Vista is a very large source of information. Results vary in
accuracy, but you can
usually find what you're looking for. Expect to sort through several links that
don't apply, but this is
the price of a huge database.
At AltaVista, you can search for keywords or type your query in the form of a
question. Other
features include Babelfish, which translates sites in several languages; Photo
Finder, which searches
for images; Family Filter, which helps you limit the types of results produced by
search.
AltaVista creates complete indexes of every word on every web page or Usenet
newsgroup it en-
counters, allowing you to make highly targeted searches. AltaVista searches by
keywords, which it
derives from the text of a web page. lt indexes millions f,web pages and articles
from Usenet.
newsgroups. AltaVista updates its inlormation constantly and each page returned
from the search is
given a date and time from AltaVista's most recent update.
D Webcrawler
Webcrawler has a slightly different spin than other all purpose search engines, in
that it offers links
into Yellow Pages, Stock Quotes, Classified's, Weather, People Finding, and many
other interesting
services. lf you don't find what you're looking for, they have a cross-reference
link to Excite for more
searching. Webcrawler also provides a service that allows you to enter a profile of
your favorite type
of websites to surf to. Each time you visit, you can view only the pages that you
like. Webcrawler
92 / ELECTRONIC COMMERCE

HotBot

HotBot keyword searches of websites and newsgroups.


are ran
search results
e rating. You can search for images, video
and
search
Mp3 files and also

O DejaNews

ch newsgroup postings.
lf you're not familiar
c bulletin board. people
discuss all kinds of
looking to get into a
heated discussion, this

O CompuServe
compuserve is a commercial network based in US. lt uses
telephone lines and
microwave for
communication' compuserve user can easily communicate
with each other, around the
world. Fol-
lowing are the services offered by CompuServe
(a) Electronic Mail box for message transfer
(b) Bulletin Board Services
(.) News report alongwith report on sports and weather
(d) lnformation on computer hardware and software.
O Metacrawler.
Rathqr than keeping its own database of Web sites, Metacrawler
conducts
your search simultane-
ously on several search engines, including Excite, lnfoseek,
iy"o., and
yahoo! This takes a litfle
longer than using just one search engine, b-ut it's likely to yieti
a more

comprehensive set of results.


A lmage Surfer
owned an operated byYahoo!, this site allows you to find images
of nearly anything.
lf you,re looking
for clipart, they have your image!
D Snap
snap is a director tory team has chosen, divided
into topic areas,
and summarized' oivioeo into more specific
subjects to help you
locate the type of picks are marked with
a,.Best,,icon.
O Lynx
.
Lynx is a keyboard-orie.nted telt-gnly web browser that was developed
at the
University of Kansas
primarily for students who used UNIX workstations. lt has
also beln rewritten to
run on vrus operat-
ing systems for users of VTl OO terminals.
ll you use the UNIX shell interface and your access provider offers it, Lynx

rnay be interesting for


you since it has a succinct key- (not mouse-) driven user interface.
tntoimation
including
where to download it, is available at the official Lynx server page.
"utril-vn*,
Ly1x32 is just like its Unix and Dos counterparts. lt is a console application
gx/NT TCP stack. and
uses the windows
GLOBALINTERNET /93
o Opera
A web browser that requires very lew resources and delivers most of what the major
browsers
deliVer.
Another recent addition is NeoPlanet which is a relatively small download (1.2M).
lt is actually an
add-on to lE (3.02 and above) but makes browsing much easier, especially for
beginners. lt comes
preconfigured with over 1000 bookmarks organized into "channels" (NOT like Active
Channels, just
an organizational metaphor). lt also includes an integrated mail client and a modem
speed booster.
lnterestingly, it also allows you to change the look of the browser to something
completely unlike
regularWindows.
Opera provides some advantages overthe two most popular browsers from Netscape and
Microsoft.
Much smaller in size, Opera takes only a few minutes to download.The feature you
notice first after
installing Opera is a menu or "hotlist" that serves as both a directory to the Web
and a bookmark f ile.
O Netscape Communicator/Navigator and Microsoft lnternet Explorer
Netscape and Microsoft lnternet Explorer have pretty much the same features on all
ol the operating
systems for which they are available. Netscape is locked in a features and market
share race with
Microsoft lnternet Explorer, which surpassed the former in popularity in 1999, and
is the default
browser in MacOS 8.5 and up.
Both products are free, and feature HTML 4.0, Java, JavaScript, Cascading Style
Sheets, and
various extensions that may or may not work with other browsers. Netscape
Communicator also
includes a suite of additional applications for conferencing, reading newsgroups,
receiving and send-
ing email and so on (Microsoft provides this separately in Outlook Express). At
this time, there are
no other browsers for the Macintosh that have quite as many features as these two
market leaders,
though iCab is catching up.
O CyberDog
Apple Computer's CyberDog is based on Apple's OpenDoc technology, which is designed
to allow
programs to be constructed from reusable components. Although interesting to those
who want to
and up to date as the Microsoft and Netscape products. CyberDog has a small but
enthusiastic user
base, and many user sites have sprung up since Apple took the official CyberDog
site down.
D iCab
While still unfinished at present (09/99), iCab looks like it's going to be an
excellent browser for the
Mac. lt keeps bloat down and performance up by focusing on its main task (web
browsing) without
adding in a lot of bells and whistles, but it is surprisingly complete at what it
does. lt is currently
stable and displays most web pages correctly, but does not yet support JavaScript.
However, it
supports Java through Apple's MRJ. Available in both English and German versions,
for 68K and
PPC.
o WannaBe t'
WannaBe is a small, very basic text-only browserfor PowerPC and 68k Macs. lts main
advantages
are its lightning speed and low memory footprint. Still in beta stage (as of
09/99), it already works
well for those who want to check web pages very quickly.You can download either the
very latest, or
a proven stable version. There is a mailing list on which announcements of new
versions appear
regularly.
O Grail
Grail is a web browser written in the Python programming language. Grail supports
full HTML 2.0,
94 / ELECTRONIC COMMERCE

including images, forms and imagemaps, and many HTML


3.2 features. lt
uses asynchronous docu-
a.no savins docum-enrs, searchinj, bookmarks,
:H:llii:9:::T-"-r!,p_rlltrlg
also supports frames' client-side imagemalps, f ile upload in forms]support

nistorv, ano more. tt

for JpEG, TIFF and XBM


images, image printing, and tables
lwitnin the limitaiions of the Tk ioolkit).
pages can contain applets
written in Python (instead of Java).
Here are two guidelines for picking a search engine:
tr lf you're looking for a as how to buy a
personal computer, use
a search engine that t lts of higher
quatity 1r.r"rry1n" type that
relies on people to ca
o lf you're looking for a rare topic, such as 19th-century Hungarian

authors, use a site that


may be less discriminate but yields more results (usually th-e type

compiteo oy a software
program), such as Excite.
There are several search engine website companies on the internet.
Each
company tries to index
their information more efficiently than the next. Some sites contain
indexed
information about all
topics, while other companies index only specific information, like people's

names and addresses.


At first, you might feel as if the lnternet has so much information,
and in such
a disorganized mess,
that it is impossible to find what you're looking for. well, there are
what you want: Web search engines and Web guides.
Listed below are some search engines available on the web. This is in
no way
intended to be a
comprehensive list. Rather, it is to provide you with the names and
URLs
(addresses) of a few
reputable search engines. Feelfree to try them o t...

4.8A General5carch
Whether you want to search for information about cable cars, investments
or any
other subject,
here's a round-up of some popular search engines. Remember, allweb
search tools
are not alike.
Each uses a different methodology, so your results will vary. You may not
always
find what you,re
looking for on the first try.
Create a folder called Search Engines under your Bookmarks or Favorites

menu. Now add these


engines to the folder so you can easily accessthem whenever you want
to do
a search.
Let's say we are looking for information on a 1977 Jeep CJ-S, perhaps
a
supplier of parts for that
automobile. Going to a search engine like Yahoo, you can search theiidatabase,

but the real ques-


tion becomes what keyword do you use? Yahoo allows only one keyword, or phrase

a in their ad-
vanced search optidns. Start by iooking for "CJ-S", but in alilikelihood, you

won,t find it. lt,s way too


specific. You need to exercise care in picking search terms. For example,

looking for items that


weigh a "ton" will also return references to "washir gton", ,,Alexander
Hamilton,,etc.
Having not{ound anything listed under CJ-5, or perhaps finding listfngs, but of

the wrong type, widen


your search by looking for "Jeep". Here you may find several dealeis
of Jeeps,
p"rr,Jp. even the
parts supplier you need. You may also find someone's Homepage where
they
wriie about owning a
jeep.
As you can see, the steps to finding your desired information are:
o Start Specific, (i.e. Search for "CJ-5',.)
o Broaden your search if you don't find any reference. (i.e. search for,,Jeep,,)
D Broaden further if you still don't find anything. (i.e. search
for,,Automotive';)
GLOBALINTERNET /95

4.8.5 Example of ),lultiple Serching: Cable Cars to the Stars

Let's perform an online search using three popular search engines-Yahoo!,


AltaVista, and Ask Jeeves-
qo you can see how they work and how you can develop an efficient search strategy.
Here's the challenge: You are planning a trip to San Francisco and you've always
wanted to ride on a
cable car. Will they be running in January? How can you find out?
The first thing to ask yourself is this:"How would I get this information in the
realworld?" Perhaps you
would consult a travel guidebook. So let's start with that premise, using Yahoo! ln
the search box,
type in San Francisco travel guide. Be as specific as possible to narrow the scope
of the search.
Just entering "San Francisco" will result in thousands of results. By adding the
additional words,
'travel guide," there's much fewer.
The search returns twelve categories, one of which, San Francisco:Travel, looks
very promising. By
clicking on this category, you get a list of about 20 related websites, along with
a brief description of
each one. Now you have to visit each site to see if there's any information about
cable cars.
What happens if you just do a search for "cable cars?"Yahoo! returns a list of
categories with only a
few related to San Francisco. So much for directories.
Now let's try using AltaVista, an index-based search engine.
Once again, enter San Francisco travel guide in the search box.The AltaVista search
results in over
8 million documents that match the search terms! Life is too short to comb through
all these. The
reason for this enormous list is that AltaVista turns up every document that
contains the words
"San," "Francisco," "travel," and "guide."To search for documents that contain all
of these terms, put
quotation marks around the terms (e.g. "San Francisco travel guide"). Doing this
results in less than
50 documents, some of which look promising.
Now let's do an AltaVista search for cable cars. lf you just enter the words "cable
cars," you will get
over 4,OOO documents that contain the words cable and cars. By using quotation
marks around the
terms, you limit the search. Once again you have to read the descriptions and
vis.it the page to see
if the information you want is available.
Ask Jeeves is a search engine that uses something called natural language query,
which is a fancy
way of saying that you can ask your question in plain English. By typing in a
question like "What is
the San Francisco cable car schedule?" you get a list of related choices, such as
"Where can I find
a city guide for San Francisco?" and "Where can I find tourist information for San
Francisco?" By
clicking on the question, you will access a website that may have the right answer.
AltaVista now uses technology developed by Ask Jeeves, so you can use Alta Vista to
search by
keywords as well as by question queries.
Bear in mind that websites tend to change often. These changes are not always
reflected in the
search engine databases, particularly for directories. That'slgcause a website
developer often reg-
isters the information with the search engines when the sfte {irst goes online.
After that, changes
don't generally get reported. For the most up-to-date report, your best bet are
search engines that
use Web-indexing robots, software that constantly searches the lnternet, recording
changes.

4.9 Searching Criterion


As previously mentioned, search engines work by giving you lists of Web pages that
contain a word
or phrase that you enter. The phrase is entered simply as a group of words, such
as, "rain snow
sleet." You do not need to enter words like, "and," or, 'the." The idea is that you
can enter a word or
96 / ELECTRONIC COMMERCE

phrase that is related to the topic you are interested in, and all of the Web pages
related to that topic
will be listed.lvVhile this might seem simple enough, there are a few things you
should keep in mind
when entering a search word or phrase.
First, make sure your search phrase is specific enough. For example, if you are
looking for a recipe
for apple cider, you wouldn't want to enter only the word, "apple." lnstead, you
should enter some-
thing like, "apple cider ingredients." The word, "ingredients" was added because
recipes usually
contain this word. That brings us to the second tip: always "anticipate" words that
might'be includei
in the desired information. For example, if you were looking lor Ken Griffey,
Jr.'s, batting average for
his 1995 season, you can assume that words like, "Mariners (the team.he plays on,
for those of you
who aren't baseball fans)," "record," and, "RBl," would probably be included in a
Web page that tilks
about Griffey's batting average, in addition to the obvious words like, "Griffey,"
and, "batting average."
Now, you must also remember not to get too specific. For example, if you are
looking for a list ol
poisonous snakes found in South Africa, you would probably not want to include
words like, "Cape
Town," or, "KalahariJ'(which is South Africa's capitol and a desert in the region,
respectively)Third,
you should remember to use capitalization effectively.
Most search engines will search for all instances of the entered word (capitalized
or not) if you enter
the word in lower-case letters. lf you capitalize a word, however, the search
engine will usually only
look for the capitalized word, which might not be what you wanted. Thus, it is
usually a good idea to
go ahead and capitalize proper nouns or initials, but it would not be a good idea
to capitalize a
common word. Finally, if two or more words are usually found together, you might
want to enterthem
in quotations (like "Bill Clinton"). Most search engines will search only for the
words that are together
in the order that you enter them.

4.10 Advanced Search Techniques


Searching lor simple things like "Jeep" or "Washington" is very easy for most
people. A problem
arises however when you need to search for something specific, but requires more
than one word.
Most Search Engines and Directories provide for advanced searching, but their
methods vary from
system to system. Primarily two types of advanced searches are supported, Phrase
searches and
Boolean Searches. Each of these types of searches have their strengths and
weaknesses. Set up a
couple of hypothetical items we want to search on and look at how we can accomplish
them using
the two techniques.
4.10.t PhraseSearching
Perhaps the easiest of the advanced techniques, phrase searching allows you to
search on multiple
words for one topic. For example searching on information concerning Dr. Martin
Luther King Jr., You
might be inclined to search on Martin Luther King. Looking over your results in a
typical Search
Engine, you would be surprised to discover that searching on Martin Luther King
returned pages for
Martin Luther King, BB King, Kings in general, the Christian reformation, Martin
Landau. ln other
words the Search Engine took your three words; Martin, Luther;qnd King and assumed
you were
looking for web pages with references to any of t rese words in them.
lf you want a Search Engine to do a phrase search you need to inform the search
engine that the
words you are looking for need to by grouped together. Sq don't search for Martin
Luther King,
instead search lor "Martin Luther King". By enclosing the keywords within quotes
you are basically
informing the search engine that all three words have to be present on the page and
in close proxim-
ity to one another.
Some Search Engines will allow phrase searching, others will not. When in doubt,
look on the main
page of the search engine for either a help file link or for their FAQ.
GLOBALINTERNET /97

4.10.2 BooleanSearching
Named after an English mathematician, Boolean searching refers to a form ol logic
applied to the
search. Basically a Boolean search requires some additionalwords to be used, for
example search-
ing on the words "Cance/'and "treatment".This type of search allows you to exclude
websites which
may be about Cancer, the constellation, or the horoscope sign.
Booldan Searches require using certain keywords, while these keywords may vary from
search
engine to search engine, the concepts are the same.
D AND - Search onTerml ANDTerm2
D OR - Search onTerml ORTerm2
D NOT - Search onTerml but NOTTerm2
Gandhi AND Lincoln - Look for webpages which contain both words "Gandhi" and
"Lincoln".
Gandhi OR Lincoln - Look for webpages which contain either the word "Gandhi" OR the
word "Lin-
coln", or both.
Gandhi NOT Lincoln - Look for webpages which contain the word "Washington" and do
not contain the
word "Lincoln".
Some systems have the ability to group Boolean terms using parenthesis. i.e.;
(Gandhi and Lincoln)
not Hitler - Look for webpages which contain the words "Washington" and "Lincoln"
but do not contain
the word "Hitle/'.
Washington and not George - Look for webpages which contain the word "Washington",
and do not
have the word "George" in them.
Boolean searching, given these simple, yet powerful, capabilities allows someone to
quickly narrow
their searches so that the results of a search may quickly pinpoint the information
they need. The
more terms you are able to add to the search specification, the finer the results
you will have in the
search engines.
Because there is so much information online, you will usually want to limit
the scope of your searches. How do you do this? This is a good point to
digress a bit to talk about Boolean logic.
The English mathematician, George Boole, developed an algebra of logic,
which has become the basis for computer database searches' Boolean
logic uses words called operators to determine whether a statement is true
or false. The most common operators are AND, OB and NOT. These three
little words can be enormously helpfulwhen doing online searches. A few
examples wiil show you why.
O Cable AND car Documents with both words
George Boole
O Cable OR car The greatest amount of matches; $opuments with
eitherword
tr Cable NOT car Documents about cable, but not about cable cars; a good way to
limit the
search.
The exact syntax each engine uses varies, so familiarize yourself with its unique
properties.
One last word of advice. The lnternet may not be the best place to f ind certain
information' While it
abounds with computer-related subjects, it is not as good lor historical
information. The telephone
and a sharp reference librarian may still be your best bet.
98 / ELECTRONIC COMMERCE

O Boolean Logic
Perhaps the most usefulfeature in defining search criteria, Boolean operators can
provide you with
powerfulcontroloverthe search engine logic.The Boolean operators AND, OR, NOT
(orAND NOT in
some engines), NEAR and parentheses are in many ways analogous to mathematical
operators in
how they shape the execution of a compiex equation. Here's what these Boolean
Operators can do
for you:
O AND
lf you are looking for a document that should contain all of your keywords
you can use the
capitalized word AND between keywords and the engine will only return
documents that
have both words.
Example
An attempt to write 49ers AND schedule will return list of all documents
which contain both
words.
Be sure to capitalize all letters in the word AND, otherwise the search
engine willtreat it as
a keyword, not as an operator.
'ftr--,

49ers d

lf the left oval represents all documents containing the word 49ers and the
right oval repre-
sents all documents containing the word schedule, the intersection of those
ovals, the
green area, represents all documents containing both words.You can see how
this operator
can be useful in narrowing your results.
ooR
lf you want to broaden your search to find documents which contain either of
the keywords
you can use the OR operator between words. This is very usef ul when searching
for lerms
which have synonyms that might be used in a document instead. An exampie is
children
OR kids, which would return any document which had either of the words.

lf the lelt oval represents all documents containing the word children and
right oval repre-
sents all documents containing the word kids, the gleqn area represents
documents which
contain either word or both words. You can see how this operator would broaden
your
search and obtain more results.
O NEAR
This operator is a more specific form of the AND operator. lt ensures that the
document
contains both terms and that they are located near each other. ln many lengthy
docu-
ments, just using the operator AND might not provide useful results as the two
keywords
might be located in very different parts of the document and might not be
related to one
GLOBALINTERNET /99

another.
O NOTOTANDNOT
Using the capitalized AND NOT preceding a search term would eliminate
documents which
contain that term. Why might you want to do this? lf you wanted to find
information on
Dieon Sanders and did not want documents which include information relating to
the Dallas
Cowboys you could use "Dieon Sanders" AND NOT cowboys'
O Parentheses
The operators AND, NEAR, OR and AND NOT are power{ul in their own right but, when
used in
conjunction parentheses, they offer substantial control over the search logic
executed by the engine.
parentheses are used in Boolean logic similar to the way they are used in a
mathematical equation,
limiting and ordering relations between variables'
Here,s an example: if you wanted to find an Web-based lnternet tutorial you might
use the search
criteria lnternet AND (iutorial OR lesson). The documents returned must contain
both of the words
lnternet and tutorial oi lnternet and lesson. Essentially, the parentheses are used
as they are for the
distribution property in mathematics - to dlstribute the keyword lnternetto either
of the two "OR"
words inside the symbols.
The most common use of parentheses is to enclose two possible keywords separated by
an OR

However,
operator and then linking those enclosed/possible keywords with other criteria
using AND.
there are times and instances where the reverse arrangement might prove
useful. For example, if
you were looking for ol you might want to use "gun
control" oR (legislation
itrlO gunlwhich woul the words "gun control" (see phrase
search) or docu-
ments containing the egislation'
you can further refine the search. Since the word law is a synonym of legislation
you can even nest

and while we're at


one set of parentheses inside another to distribute gun to either legislation or
law
to also distribute gun to the variation - laws'
it, truncate law with an asterisk

that each left side


Here's how it would look: "gun control" oR (gun AND (law. oR legislation)). Note
parentheses must be pairei with a right sideone somewhere in the Boolean
expression or the search
engine will get confused (see how stupid they are!)'
+require and -exclude

preceding a word
Some engines offer a variation of the Boolean operators AND and NOT' A + symbol
word be present in documents. A
- symbol preceding a
(with no space between) will require that the
present in returned documents. Note
that all words which
t<eyword will ensure tfrai tne word is not
preceded by a + symbol even the first
word. Example: +fraud
must be in the document should be ,
+election ensues that fraud is also in all the documents'
O Limited Boolean OPtions
pf,lt-.Oo*n menu
choices such as:
Some engines offer limited Boolean logic with radio buttont ot
between
allterms)'
Documents must include "Allterms" (equivalent to using the operator AND
Documents must include "Any terms" (equivalent to using OR between all terms)'

4.t0.5 CapitalSensitivitY

containing the capi-


lf a search keyword is capitalized the search engine will return only documents
to the
country China, capital-
talized word. For example, if you were interested in docurnents relating
1OO / ELECTRONIC COMMERCE
izing the word and using an engine which supports capital sensitivity would
narrow
down the number
of results returned, eliminating documents which relate to china dlshes or
cookery.

Note however,
that in many instances it is better to leave keywords uncapitalized to allow the

Lngine to return
results of documents which have keywords in either form.

4.10.4 PhraseSearching
When using search terms containing more than one word in a specific order, if you

enclose the words


in quotation marks the engine will return only documents containing
all the woids
and in that specific
order. Example: When searching for information on gun control, using "gun
control,,will

eliminate
those documents which may contain the word gun lnd control but not in
that order; possibly in
entirely different paragraphs and maybe not eve r relating to gun control.

4.10.5 Truncation
lf you were looking for information on gardening you could use it as your keyword.
However, your

if
results were limited in number (though not likely with gardening) an-d you wanted
to broaden your
search to get more results, you could use a root part of the word and abbreviate it
with the asterisk
(garden-) so that the engine would return results of documents containing gardens,
garden, gardener,
gardeners, etc.

4.10.5 Date Capability


Many search engines offer the ability to limit searches by web page creation dates.
This is a very
useful tool for people who will be doing continuing research on a specific topic
enabling them to limit
the results to pages created since their last search. lt is also usefuiwhen
searching for-current event
topics.
Note that the implementation of this feature varies widely. Some search tools like
Yahoo offer radio
buttons or pull-down menus, while AltaVista and Hotbot provide the ability to
specify dates or time
frames. Also, date sensitivity is related to the web page creation date, not some
historical time
frame, i.e. it would not be usefulto use an engine's date capability to search for
1907 and information
relating to the Wright brothers, since there were no web pages created in 1907 (in
fact the web has
ieally only existed in its present form since 1991).

4.10.7 Restricting Searches to Specific parts of the Document


Some engines can limit searches to specific areas, the most common being: title and
URL. Here,s an
example of a title search: lf you are looking for information on Alternative
Medicine and believe that
there are probably whole web pages devoted to your subject which have the keywords
in the tifles,
you could use the syntax: title: alternative AND medicine.
An example of URL search would be if you are looking forApple computer web
pages.you could use:
url: apple which would probably return web pages create by thacomputer maker Apple
(and others).

4.10.8 Restricting Searchcs to Spccific Areas of thc Web


Some engines allow you to limit your searches to "just the Web" or just
"newsgroups" (see the.
Communicating section for more information on newsgroups).

4.t0.9 Restricting Searches to Specific Xedia


Hotbot and Lycos provide you with the ability to search for various types of media,
including audio,
video, images, Java and VRML. Other search engines which offer a limited set of
media selrching
GLOBALINTERNET /101

include AltaVista.

which search
The library at the University of California at Berkeley has an excellent chart
detailing
features are offered on the more powerful search engines as well as links to

instructions detailing
how to use each specific search engine (links are located at the top of chart)'

4.10.10 Xetasearches
a query to
multiple search'
Rather than search each directory or index individually, you can submit
engines by doing a metasearch'

4.1I Searching TiPs

information' lf you
1. There are many search engines and directories available for linding
cannot f ind what you need f rom one, try some others. Take the time
to read
the help or tips
(e.g' - *
- * ", AND NEAR
file for each one, iince each one uses iifferent symbols or words

the same time'


NoT , etc.) to n"iio* your search. lf you'd like to search everywhere at
there is a site for You - DogPile.
and
What-U-Seek are
lf you think Dogpile searches too many places (Thunderstone,-GoTo'com
All Search Engines. A direct
link to Mamma is
essentially worthless), check out Mamma: Mothei of
also available at the bottom of this page'

ol this page'
Yahoo!, HotBot and lnfoseek are also available near the bottom

part of the page; hit the


2. lf you try to go to a URL but get an error message or only receive
later on. lf you
don't get through' the
Reload (or Refresh) button immediately or try again
exist, but then agiin it miglit' Bookmark the
page and try to visit it at
page may no longer
a differnet time.
blank
http://
3. lf you want to be adventurous, you can insert what you want,into.the
Geographic
is at
www.-.com, hit enter, and see where you go. For example, National
http://www.nationalgeographic.com/, The ilew-York Times is
at
http://www'nytimes'com/'
PBS is at
http://
US News a World-neioris is at http://www.usnews.com/ . However
Harvard would be at
http://
www.pbs.org/, NASA is at http://www.nasa.gov/, and
www.harvard.edu/ '
what you are
looking for' Most
4. sometimes web pages are very long and it's hard to^find
and
type in a word. Your
browsers have a Find button at the toi of the screen. Click on Find
-ur;*r"i*irii"r," page and
highlight it wherever
vo, to that word on ihe currently drsplayed
it appears as well. (ln lnternet
gxpnrer you have tdlirSt click on the word
Edit at the top of
the screen and then on Find in the pulldown menu')
the stop button
and then clicking
5. lf your browser cannot connect to a page at all, try hitting
ontn"hyperlinkagain.Youwilloftenconnectimmediately.
sion
button' web
6. lf your browser is taking a long time to load a web page, click.on ln9
annoying' ll
sometimes fun but
often
pages olten contain exJessive graphics which are
youWanttoseethefullpage'youcanalraysclickonReloadorRe{resh.
102 / ELECTRONIC COMMERCE

7. lf you need some tips for chatting on the lnternet, visit the Beginner's

Guide To Chat.
8. You will get a lot of e-mail that is garbage if not outright f raud.

Check out The National Fraud


lnformation center, lnternet scambusters and clAC lnternet Hoaxes.
9. You may have an e-mail program that can do a lot of fancy colors and

hyperlinks and such.


lf the person to whom you are writing doesn't have the i"r" program

to read the e-mail,


your letter will still be readable but will look quite different and
possibly

quite bizarre.
10. The middle of the night (2AM - 7AM E.S.T.) is a great time to surf the web.

Unfortunatety
it's an even greater time to sleep.
11. Several websites (e.g. - The New York Times) insist on a password even
though

they are
free. You can either make a little password folder in your computer or (like

me; llways use


the same password. lf security is important (such as logging on to an
lnternet Service
Provider) then by all means use a unique password
12. Almost any browser will allow you to visit more than one website at the same

time. This is
particularly useful when you are downloading a large file or graphic-heavy

webpage. lf you
are downloading a file (other than a webpage which is itseli a file or
combinattn

of tiles;,
simply surf off to any page you like and keep surfing until the download is
completed. you
can also open your browser program more than once. lf your computer can
multitask,
simply start your browser program again while leaving the originally started
browser pro-
gram open.
13. lf your browser is running much slower than usual, disconnect from your
lnternet Service
Provider (lSP), wait a minute and then reconnect again. You may have been
connected
through a poorly f unctioning modem or telephone line and may now get
connected through
a better one.
14. Speeding Up Downloads
While text downloads quickly, images can really slow things down. There are
two ways to
speed things up.
D Since text appears first, after it loads, click the STOP button.
The images won't
appear, but should you want to look at an image, use the right
mouse Outton to click
on the image icon, then select View lmage.
O You can view websites in text-only mode by turning off the auto-
loading of images
function under the Options menu.
15. One final word of advice: Your web browser is your gateway to the lnternet.
Take the time to
learn about its features. ln the long run, it will save you hours of
frustration.

4.12 Downloading
Downloading means to transmit a file f rom another computer to yours. lt can be as
simple as clicking
on a hyperlink on a web page, to transferring an entire application using FTp,
Many files are compressed to save space and once downloaded must be "unzipped".
This requires
special software which can also be downloaded from the lnternet. Some files are
self-extracting and
will download ready to use. Use PKZ|p forWindows machines and Stuffit, Stuffit
Delux or DropStuff
for Macs.
GLOBALINTERNET /103

ln a Browser:When the browser displays the page forthe userto see, the page has
been "downloaded."
You can highlight the information, copy it, and paste it into a word processor to
use later. Or you can
save the page as HTML and later open it with the browser. [SAVE..AS...FlLE
TYPE...HTML] NOTE:
lf you save the information as HTML, you will retain the formatting, but you will
not save the
graphics.
Download a Graphic: There are many clip art sites on the lnternet that are there
for the benefit of
anyone who finds them.To download a graphic, simply right-click on the graphic and
choose save..as,
then choose C: drive or A: drive
With the WorldWideWeb, downloading files is as simple as clicking your
mouse.Typically, downloading
refers to the method by which you access digital information f rom a remote
computer. As it turns out,
almost everything you do on the Web is some form of a downloading. For instance,
when you access
a web page, you are actually downloading the page text and all the associated
graphics from a
server. Your web browser looks at the file extension (the letters following the
"J'). lf it recognizes this
type of file, it will display it.
ls there a difference when you download software? Not really. The web browser looks
at the file
extension, and if it doesn't recognize it, it will ask you if you want to configure
a viewer (tell the
browser which software program to use to view the file). You also have an option to
save the lile to
your hard drive.
Another way to download files is to click on the link to the file with your right
mouse button (or hold
the mouse button down if you are using a Mac), and select Save to Disk f rom the
pop-up menu. ln
some cases, you will be prompted to save the file somewhere on your hard drive or
the file may
download automatically to your desktop, depending on how your browser is
configured-
More often than not, you will be downloading files that have been compressed.
These may be
individual files or group" of files that have been compressed into one file to
save downloading time
and disk space. ttlfre iites you download have been compressed, then you generally
need a sepa-
rate software utility to decompress them.
The exception are files w1h a .sea (Macintosh) or .exe (DOSMindows) extension
which are self-
extracting. These files do not require a separate piece of software to run.
Because many of the

files
you dowiload willtake time to be transferred to your computer, you will
want to save yourself the
headache of discovering, afterthe fact, that you d wnloaded a file that won't
work on your computer.
How can you tell? Readlhe Learn The Net article about file formats and extensions
for more informa-
tion on file extensions and how to interpret them'
Tutorial 4.1 To find information using Gopher,
1. you must know the address for the gopher site. Here is a gopher site to help
with learning
the lnternet: GoPher Site
the protocol, "gopher://". To access a gophe-r.site using the
Browser, you do NOT
2. Notice,,http:l/"
type, You will type "gopher://" instead. This fs'then followed by
the domain names.

3. Once the site has downloaded to your Browser, you must navigate through
a series of
hierarchical menus with a list of choices. Each time you select an
item on the menu, you
will be presented with another menu, until you eventually find files that
can be read, copied,
printed. etc.

4.13 Hypertext Transfer Protocol (HTTP)

ln a
HTTP is the protocol, designed byTim Berners-Lee as early as 1989, is really
rathersimple'
104 / ELECTRONIC COMMERCE

nutshell, one application hosts data and "listens" for connections on TCP port 80.
(Think of a .port"
like a telephone number extension.) Another application then opens a connection to
the host on the
same port and initiates a dialog. The dialog is simply a request for data (by the
client) and response
by the host (server). ln many ways, the protocol is much simpler than FTP or SMTp.
Both of these
protocols require there to be a true dialog between client and server.The current
implementation of
HTTP only requires one request and one response.
Hypertext is a method of organizing information;clicking on a word or phrase that
is underlined and
colored takes you to more information. The World Wide Web is made up of files
called Web pages,
which can contain text and images (and links to video, sound, programs, and other
types of files).
You're reading aWeb page right now!
Push programs, programs which ask you about your interests, then forward
information to you in
which they think you might be interested. PointOast is a classic example of push
technology; for
example, you can request National and politics news from CNN, celebrity gossip from
People maga-
zine, and stock information from the Wall Street Journal. Once you have selected
your preferences,
you simply hit the Update button and the program fetches the news. News articles
can even be
displayed as an attractive screen saver! PointOast is free; advertisers support its
expenses.

4.14 The World Wide Web & Hypertext


The World Wide Web, commonly referred to as the Web or the WWW, is the most recent
(and probably
the most revolutionary) addition to the lnternet. Simply defined, the Web is a
large information re-
trieval system on the lnternet, with hundreds of inter-connected hosts
(computers).The Web has two
features that make it stand apart from other parts of the lnternet: hypertext and
multimedia.
Hypertext is what makes all of the documents on the Web inter-connected. Basically,
hypertext can
be defined as any text that includes hyperlinks, which are words or pictures that,
when clicked with
your mouse, automatically load another Web document on your Web browser. These
hyperlinks are
usually called links.
You can distinguish a link from ordinary text because it is usually displayed
(depen(ing on your
specif ic Web browser and its conf igurations) in a different color and is
underlined.Your Web browser
displays links like this:
O Whenever you see text that looks like the link above, you will Web browser
will automati-
cally load another Web document.
tr The second feature of the Web, multimedia, can be defined as the ability of a
Web docu-
ment to display graphics and produce sounds. Although Web documents including
sound.
files (MlDl files) are somewhat rare, most Web pages do make use ol graphic
images.

4.15 What is a Url?


A URL is simply a "Web address" - the identifier for a specific place on the Web.
URL stands for
Uniform Resource Locator. A URL can be viewed as a networkedSitension of the
standard filename
concept: not only can you point to a file in a directory but that file and that
directory can exist on any
machine on the network can be served by any of several different methods and might
not even be
something as simple as a file.
URLs can also point to queries, documents stored in databases, or the results of a
system commaDd.
It is possible to represent nearly any file or service on the lnternet with a URL.
URLs are given to help you find specific resources on the lnternet. The addresses
provided at the
GLOBALINTERNET /105

start of this lesson were the URLs found in advertisements in a popular magazine'
lf
information on the lnternet, you should cite the source of that information.
lnclude the author's name
or the organization's name (if no author is given), the data of the item or the
data you referenced it,the
name oflhe article, and the URL for the resource. URLs are provided in the online
Discovery sec:
tions at the ends of the lessons in this book'

4.15.t URI Syntax


lnternet facilities can be accessed through
D Http a file on a World Wide Web server file
O Ftp or a file on an anonymous FTP server
D Ftp a file on an FTP server
O Gopher a file on a GoPher server
tr WAIS a file on a WAIS server
O News an Usenet newsgrouP
tr Telnet a connection to a Telnet-based service

URLs
URL is a draft standard for specifying an object on the lnternet, such as a file or
newsgroup.
look like this: (file: and ftp: URLs are synonymous.)
Example
tr file://wuarch ive.wustl. edu/mirrors/msdos/g raphics/gif kit.zip
o ftp://wu arc h ive.wu stl. ed u/mi rrors
o http ://www. w3. o rg : 8O/defau lt. html
o news:alt.hypertext
tr telnet://dra.com
The URL has three Parts:

ftp
D The tool used to access the resource.Tools include telent(forTelnet-based
resources),

(for Web - based


(for FTP-based resources). news for Usenet newsgroup), gopher, and http

is a
resources). For example, if a URL begins with gopher, you know that the
resource

the resource. The tool


Gopher resource and you need to use; Gopher browser to access
identifier is usually followed by two slashed(//)'
O the stuff before the colon tells the
browser how to access that
The first part of a URL
- -
particulai file. For example, to access
ftp://wuarchive.wustl.edu/mirrors/your browser

would

Here is a list of some of


use FTp. Most of the access methods are pretty straight-forward.

first part of
the more common access methods that you ire going to see listed
in the
URLs:

Method What lt Stands For

Itp FileTransfer Protocol


news lnternet News Protocol (Usenet)
gopher Gopher
telnet TELNET
http Hype rtext Transfer Protocol
file is a
hypertext document (with
see a URL with "http" at the beginning of it, that means that the
only through a Web
browser'
hypertext links to oti'rer documents; anO it can be accessed
106 / ELECTRONIC COMMERCE

The rest of a URL


- the
after the two slashes
stuff after the colon
(//) indicates a machine
is the address of that particular
resource. The stuff
- name or address (remember those
from MApl 1:
TELNET?). For example,
f ire : / / w.uarc,hive . wustl . edu,/nirrors /nsdos /graphics /
gifki t .z ip
is the URL for an FTP file at "wuarchive.wustl.edu," and

http: / /www. w3. orglpub/WwW/MarkUp


is the URL for a hypertext document at "www.w3.org',
D The address of the computer on which the resource is located. This address
uniquely
identifies the computer on which the resource is located, anywhere on the
lnternet.
O The optional path name of the resource itself. The path name tells you the
names of the
directories and subdirectories on the computer where the resource can be
found. This
piece of information may not be present if it is not needed.

4.15 WEB Servers


The phrase "World-Wide Web" is often used to refer to the collective network of
servers speaking
HTTP as well as the global body of information available using the protocol. ln a
May 1996 survey
Netcraft found 193,150 servers on the Web (and who knows how many more exist behind
corporate
firewalls?). A Web client (or browser) sends requests to a Web server.
Every retrievable piece of information on the Web is identified by a URL, which
includes the name of
the object, where it is located, and the protocol used to get it.
Only information on a server (or your local system) is part of the Web.You need to
"publish it" (i.e. put
it on a Web server) to make it accessible.
The Web server is responsible for document storage and retrieval. lt sends the
document requested
(or an error message) back to the requesting client.The client interprets and
presents the document.
The client is responsible for document presentation.
The language that Web clients and servers use to communicate with each other is
called the Hypertext
Transfer Protocol (HTTP). AllWeb clients and servers must be able to speak HTTP in
order to send
and receive hypermedia documents. Forthis reason, Web servers are often called HTTP
servers, or
HTTP Deaemons (HTTPD).
There are many different Web servers, running on many platforms.
ln this example you are using a browser (Netscape, or Mosaic, or some other
browser) and you,click
on a reference to WebMaster Magazine Online. The browser is able to f igure out
that what you really
want (in Web terminology) is the object the Web knows as
http://www.cio.com/WebMaster/
wmhome.html - the Web address (or URL)forWebMaster Magazine Online.

4.15.1 A Typical Tiansaction between Web Servers afd qients.


The browser sends your request to the right server. How it figures out what that
machine is, and
where it is, is beyond this discussion, but gets us into looking at name servers
and othertools which
keep track of domain names, address names, and physical locations. Let's trust that
some bit of
magic occurs, and the browser can send your request off to the machine that handles
requests for
www.cio.com.
ln the message it sends there is a lot of information you don't need to see, like
the method to be
used, the URL, possibly parameters (used when you want to pass a search string, for
example), and
GLOBALINTERNET /107

other information.

4.15.2 The ).lain Webserver: httpd (The http daemon)


When it gets to the server the Web server, also known as the httpd (which stands
for http daemon)
takes over. lt knows where it stores Web objects, and it tracks down the one you
asked for. lt might
pass your request olf to another process (like a search engine or an application),
and wait for a reply.
when it gets what it asked for, it sends the object back to your browser.
document includes several different graphic files as well as the HTML you are
reading, each of which
is a separate object), the server will send each of these objects back
individually'
your browser collects together the different pieces you requested. A Web page can
have references
to objects all over the iet, and may include objects that are on your local system
(for example

product to you.
objecis that it cached earlier). lt pulls them all together, and presents the
finished

you will need


The server actions can be more complicatecj than a simple object fetch, in which
case
lnterface (CGl) is a standard
for external gateway
to learn about CGI's. The Common Gateway
programs to intedace with information servers such as HTTP servers.This
allows them to do trans'
actions, security, access other applications.

4.16.t Server Hardware

for any
It almost doesn't matter what hardware you use. The ideal way to select the
hardware
computing task is to first ask yourself what software you need to satisfy
the task. The software

you may not


should drive the hardware. ln tlie realworld, this is not always the case.
Consequently,
you may be asking
yourself, "What hardware is
have to ask yourself what hardware to use. Rather
available?"

purpose(s) of your
lf you do have a choice of hardware, then first articulate and enumerate the
guesstimate how many
hits your server will get per
,"ru"r. Analyze who your audience is and try to
services act as a
conduit lor your usual print
day. lf your."ru";, is intendgd to disseminate tisti of or
, pu'Uti""tions, then a microcomputer-based server will do just fine. lf you are
planning for a depart-
mental lntranet, again, a microcomputer-based server will fit the bill.

(maybe 35 K) files'Thirty-
Consider exactly what any HTTP server is doing. lt is disseminating small
five kilobytes of cjata is tin ge computer to serve this
amount
ou"1. ug"in. Furthermore, i ocomputer-based servers can han
hits per hour, if nottens of use of your microcomputer as a se
determined by what infor ou have that you would like to sh

to serve this data


resides in a microcomputer, then you will be using the same microcomputer
(unless you want to move it to another machine)'
ln short, microcomputer-based servers offer a number of distinct
advantages'

O First, the use of an operating system you are alrp?dVoverhead' familiar with;
you will not have to
learn something like Unix and all of its administralive
o second, the microcomputer hardware is readily available. starting out,
consider using one
of those computers in ihe back room that may be gathering
dust' On the
other hand' the
be
something to consider'
use of a Unix, Windows NT, or even a VMS-based server may

systems come at a
This is especiaily true if you desire to serve the rock-solid operating
cost. One is administrative support'
you will almost necessarily have to have some sort of network "guru" managing-
your system' For
Unix, Windows
NT, or VMS environ-
you there may be a learnini curve while you get familiar with the
1 08 / ELECTRONIC COMMERCE

ment' Another cost is distance. "out of sight, out of mind." ln


other words, if
your HTTp resides on a
computer in the back room that only a few people have direct access,to,
tnen
tre computer turns

into
a mystery' This is not the best way to perceive of computers
and makes them seem
far away and out
of your control' At the same time, these bigger computers were designed
to run
client/server appli-
cations.
TCP is a fundamental p.art of the Unix operating system, and
consequenfly there is
a lot of support
for TCP networking built in. Also, there is no denying it, th"r"
bigger computers
are laster. But
remember, the speed of any network connection
users are all using 28.9 modems, then it doesn,t
minicomputer. ln the end, you willprobably find y
and minicomputer-based HTTP servers in your
desktop computer as a test bed and grow from there.

4.16.4 Seryer Software


Features to look for in HTTP server software are described here. By now,
there
must be more than
a hundred different HTTP servers to choose from for just about
every operating
system. They range
from things promising you the Moon to dbsolutely freb applications
where you get
exacly what you
pay for. Obviously you want to choose something in between.
Features
lf you are just starting out, here is a list of features you should look for
when
selecting HTTp server
software:
tr Access control via lp or domain name
D Adequate technical support from the lnternet
O CGlscriptingcompatible
tr Configurable error file definitions
O Flexible log file creation
tr Security through passwords
O Supports server side includes (SSl)
More advanced features include:
tr Built-in imagemaping
A lmplements byte serving
O lmplements the pUT method
B Simple logfile analysis
tr Specialized "hooks" to the server's operating system
D Supports the Secure Socket Layer (SSL) prototot
tr Technicalsupport from the software's vendor
tr Tight integration with database applications ).
Each of the three HTTP servers outlined in the following sections support all of
the

features in the
first list and a few of the features in the second. They are all free, and they are
all very

stable
applications.
(1) ApacheWeb Server
Apache, a server for Unix computers, is the most popular and is considered one of
the most robust
implementations. lt does not do any logfile analysis. There is no vendor so there
is no formal

techni-
cal support. There is no real way to administrate the computer through a Web
interface.

On the other
hand, Apache's modular approach. allows for a great deal of customization. lt
includes

strong links
GLOBALINTERNET /109

for database applications. lt allows you to save your logfiles in formats you
define. But most impor-
tantly, it runs on-any Unix computer, and Unix is an operating system designed for
client/server and
TCP/lP applications.
According to Netcraft , Apache has been the most popular HTTP server for quite some
time.This

is
understandable since it, iike the other servers described here, is "as lree as
a free kitten", runs under

As
any flavor of Unix, is very extensible, and is just about as robust a server you
willfind anywhere.
of version 1 .3b, Apache no* also runs under Windowsg5 and NT. lt will
also be ported to Rhapsody
(Macintosh) when that operating system becomes available this year. Consequently,
Apache repre-

just about any


sents a good, all-around HTTP server. One that you can/will be able to take to

devel-
computei. Apache, based on the original NCSA httpd application, got its name from
when its
opeis where trying to break httpd down into its original parts. Thus, it was "a
patchy server."

precompiled
There are two alternatives for acquiring the Apache software. One, you can download
a

source
binary for your particular version of Unix or windows. or two, you can download
Apache's

it offers you
code and tompile it yourself. This section outlines the second option for Unix
since
greater flexibility.
(21 Quid Quo ProWeb Server

relationship
This server is extraordinarily simple to bring up and maintain. lt does not support
a close
with any database applicaiions, but it is integrated with the Macintosh OS through
AppleEvents'

write and save:


Unlike most other server software implementations, there are absolutely no text
files
include administrative functions
and has built-in
everything is done through dialog boxes. lt does
popular
imagema[ping. ln short,'euid Quo Pro support the vast majority of features of the
most
Macintosh HTTP server but it is infinitely cheaper, $0'
(3) WebSife Web ServerWebSite comes with the most bells and whistles of the servers
mentioned

exception of SSL'
here. lt supports allthe features in the first list as wellas the second list with
the
It comes with

and Windows
server side includes, and administration features. Designed to run under WindowsgS

proliferation of the Windows


NT, this server would fit most people's needs especially considering the
platform.

the original developer,


Like Apache, began its life as a port of the NCSA httpd server. Robert Deny,
quite a number
of improvements since
is now working witn o'Reilly & Associates, lnc. and has made
is painless. lt
involves downloading the ar-
the original dLtribution. aiinging up a website server
Begin by
acquiring the distribution
chive, in"orpr"""ing it, and ioiig il',e tiniest bit of configuration.
from the download pige at website.ora.com <httc://software.ora.com/download/>.
(4) Quid Pro Quo Web Server

based HTTP available, but

Hawk, the develoPer, has

how to bring uP this server

Be
sure to download
Begin acquiring the application from its download page at www.socialeng'com.
rich
versions are available for
Quid pro Quo 2.x since it is the free version. The other more feature
your www
browser is configured
free 30-day trials and require a serial number to activate' lf
a self-
extracting archive' Launch
correctly, then the downloaded file should uncompress and resultin
place on
your hard disk'
the self-extracting archive and tell it to save the compressed file any
1 1O / ELECTRONIC COMMERCE
(5) Microsoft's PersonalWeb Server 4.0
It is possible to serve light-to-moderate loads from a desktop environment
with
Microsoft,s personal
Web Server 4.0. Anyone administering a website knows how helpful access
to
the Web server can
be' Experimenting with new techniques and custom server configurations is a

breeze when you,re


behind the wheel instead of working through a File Transfer Protocol (FTp)
client
and subject to the
mercy of your ISP's systems administrator.
while Unix, Windows Nf, Apache and Linuxare considered the platforms of choice

for serving, it,s


hard to justify the expenditure of the first two for noncommercial or test
purposes.

Linux and Apache


are f ree, but setting them up is too complex for many users, especially ihose who

work every day in


a Win 95 or 98 environment. Try running a Win 9 i or 98-based Web seru"r on your

system.
Microsoft has given everyone the chance to be a webmaster by giving seryer
software

away for free.


lf you have a Win 98 CD-ROM, look under the /add-ons/pws Oirectory for the
installation

files.
Familiar Microsoft wizards guide you through installation. PersonalWeb Server 4.0
lets you

begin
serving dynamic pages, Microsoft's Active Server Pages (ASPs), without having to
install

the
Redmond, Wash-based company's higher-end NT 4.0 Seiver or the lnternet lnformati6n

Server (llS).
Personal Web Server 4.0's Home Page Wizard demonstrates how to set up a Guest

Book page,
which will probably be many users'first chance to put ASps into action.
Of course, Personal Web Server 4.0 also supports other Microsoft technologies such
as

Microsoft
Transaction Server, Data Access Components, and Message eueue server client.
TIP:
1' Avoid using the FrontPage Personal Web Server that comes with Frontpage for
serving
pages for extended periods. A memory leak prevents the Web server bundled
witfr fronteag6
from being a dedicated server. Microsoft recommends using PersonalWeb
Server 4.0 in-
stead.
2" A compact installation of Win 98 will not show the icon for Personal Web
Server under the
Start/lnternet Explorer folder. Run Windows Setup using the Control
panel/Add/Remove
Programs
3' The FTP services found in earlier versions of PersonalWeb Server are not
included with
the latest release. Consider using third-party FTP server software such as
WAR_ftp or FTp
Serv-U.
You'll find some restrictions on PersonalWeb Server 4.0:
A 10-user connection limit, lack of authentication, and NCSA-only log file format
restricts personal
Web Server 4.0 to workgroup-type websites. PersonalWeb Server 4.0 requires allfiles
published by
the server be located on the local hard drive. Also, the lnternet Explorei 4.0
browsei must be in-
stalled. The Microsoft upgrade path should be crystal clear. lf yogwant full server
functionality,
upgrade to Win NT and llS 4.0.
(6) WebSiteProfessionat2.3
O'Reilly WebSite Professional 2.3 has the distinction of being the only Web server
that runs under
Win 95 and 98, NT Server, and NTWorkstation. Unlike Microsoft PersonalWeb Server
4.0, WebSite
Professional 2.3 is a fully functional Web server that offers advanced support for
ASps, multiple
virtual servers, authentication (website and NT-based), and server-side Java.
WebSite Professional 2.3 offers tools geared toward making administration.
development, and site
GLOBALINTERNET /111

analysis abreeze not found with PersonalWeb Server 4.0.


My only grievance with WebSite Professional 2.3 is it isn't free. The $799 price
tag is relatively
expensive compared with PersonalWeb Server 4.0. But it's justified by the quality
of the tools and
documentation. Developers looking for ASP support on the Win 95/98 version of
WebSite Profes-
sional 2.3 may be disappointed. WebSite Professional 2.3 requires llS 3.0 and NT
Server to enable
ASP features.
(71 WAIS (Wide Area lnformation System)
WAIS is a database on the lnternet that contains indexes to documents that reside
on the lnternet.
Using the Zg4.5O query language, text files can be searched based on keywords.
lnformation
resources on the lnternet are called "sources." A directory of WAIS servers and
sources is available
from Thinking Machines Corporation, Cambridge, MA, at address quake.think.com.
When you type in a word or topic, a WAIS Server scans internet libraries. lt
returns a master index
providing links to all the sites related to your request. The index is weighed,
identifying which links
are most closely related to the topic.
There are WAIS programs that work independently of the Web.You can reach these
programs through
special gateway software available on many Web Pages, which lets you do Powerful
WAIS Search
within Mosaic.
Other Servers
There are different types of servers, ranging from Plexus (written in a language
called Perl), to
NCSA's HTTPD (a C-based program), to commercialservers like Netsite.

4.17 Web Guides


Another utility available on the lnternet is the Web guide. Web guides are
comprehensive guides to
information available on the Web, sorted by topic. The Web pages they contain are
entered into their
database by the individualWeb page owners. Some contain a vast variety of topics,
while others
include topics related to a specific field, such as education or music, for
example'. You can usually
browse or search the guides. Following are a few Web guides available:
Paz hllp/la2z.lYcos.com
Alberts2 httP://www.albert2.com
Points httP://Point.lycos.com
Yalrco! httP://www.Yahoo.com

4,18 Portal and Portal SPace


Portal is a new term, generally synonymous with gateway, for a World Wide Web site
that is or
proposes to be a major starting site for users when they get connected to the Web
or that users tend
to visit as an anchor site. ln July 1998, leading portals included Yahoo, Excite,
Netscape, Lycos,
CNet, and Microsoft Network. With its own private array of sites when you dial in,
America Online
(AOL) could be thought of as a portalto its own
portals to the Web for their own users. Most portals have adopted the Yahoo style
of content catego-
ries with a text-intensive, faster loading page that visitors will find easy to use
and to return to.
Companies with portal sites have attracted much stock market investor interest
because portals are
viewed as able to command large audiences and numbers of advertising viewers.
Typical services offered by portal sites include a directory of Web sites, a
facility to search for other
1 12 I ELECTRON!C COMMERCE

sites, news, weather information, e-mail, stock quotes, phone and map ihformation,
and sometimes
a community forum. Excite is among the first portals to offer users the ability to
create a site that is
personalized for individual interests.
The term portal space is used to mean the total number of major sites competing to
be one of the
portals. ln fantasy games, science-fiction, and scme "New Age" philosophies, a
portal is a gateway
to anoiher world of the past, present, or future, or to an expanded awareness. ln
3-D graphics
development, portal rendering is a technique that increases the effect of realism
and speeds up
presentation.

4.l9 Web Browsers


As already explained in module 9 a browser is an application program that provides
a way to look
at and interact with all the information on the World Wide Web. The word
"browse/'seems to have
originated prior to the Web as a generic ierm for user interfaces that let you
browse text files online.
By the time the first Web browser with a graphical user interface was invented
(Mosaic, in 1992), the
term seemed to apply to Web content, too.
Technically, a Web browser is a client program that uses the Hypertext Transfer
Protocol (HTTP) to
make requests of Web servers throughout the lnternet on behalf of the browser user.
A commercial
version of the original browser, Mosaic, is in use. Many of the user interface
features in Mosaic,
however, went into the first widely-used browser, Netscape Navigator. Microsoft
followed with its
lnternet Explorer. Today, these two browsers are highly competitive and the only
two browsers that
the vast majority of lnternet users are aware of. Although the online services,
such as America
Online, Compuserve, and Prodigy, originally had theirown browsers, virtually all
now offerthe Netscape
or Microsoft browser. Lynx is a text-only browser for UNIX shell and VMS users.
Another recently
offered browser is Opera.
A Weo browser contains the basic software you need in order to find, retrieve,
view, and send
information over the lnlernet. This includes software that lets you:
O Send and receive electronic-mail, or e-mail, messages worldwide nearly
instantaneously.
D Read messages f rom newsgroups, forums about thousands of topics in which
users share
information and opinions.
tr Browse the World Wide Web (or Web) where you can find a rich variety of
text, graphics,
and interactive information.
D Browsers such as Microsoft. lnternet Explorer version 5.0 include additional
lnternet-
related software. For example, with lnternet Explorer 5.0, you also get:
O Windows Media server
D NetMeeting.conferencingsoftware
D ActiveX. controls
D Clrat
D ActiveMovieapplicationprogrammingintedace
tr ActiveChannelwebcast
U Subscriptions
A Dynamic HTML
D Windows Media
This allows you to see and hear iive and recorded broadcastssuch as concerts or
breaking news
with synchronized audio, graphics, video, URLs, and script commands. And streaming
technology
allows you to see or hear the information as it arrives instead of having to wait
for the entire f ile to
download.
GLOBAL INTERNET /113
4.2O Working of Browser
Let's take a look at how web browsers work. There are
today:
three basic types of
www browsers in use

O Line-mode browsers;
O Full-screen browsers (like Lynx); and
tr Graphicalbrowsers(likeNetscape)
Line-mode browsers are about as user unf riendly as you can get.
This is hard to
describe, but line-
mode browsers work a little like FTP inasmuch i. you type a"command, get
some
information on
your screen, type a new command, get some more information,
and so on ..^
screen that looks a
little like the Gopher
reen browser works
differently, but in most
creen. select a
highlighted word or phrase
the right arrow cursor
key), and you are

The good news a at they are all pretty simple to


figure out (if you can
figure out how to oblem using a full-screen
browJer). irre uao news
about full-screen isplay pictuies ... and an
overwhelming majority of
the bittions of We neajity on the use of pi.tr,""
;i;;,. graphical
images.
"nJ
lf you want to see these.pictures and other graphical images (a.k.a.
"hypermedia,,),

you are going to


have to use a graphicalweb browser like Netscape, Mosaic, or lnternet
Explorer.
4.20.1 l.licrosoft lnternet Exptorer version 5.0
lnternet Expiorer 5'0 is fast and saves you time on the web by automating
complex
tasks - making
you more productive. Microsoft lnternet Explorer 5.0 Microsoff released
a beta
version of its lnternet
browsing technology, Microsoft lnternet Explorer 5.0, on November 4, 1gg8.
Using Microsoft lntellisense technology, lnternet Explorer simplifies and
automales
common brows-
ing tasks-like searching, navigating, and organizing and accessing information-and

offers users
more flexibility. Here are some examples of changei that users will see.
tr Automated features
To speed and simplify your browsing experience, lnternet Explorer 5.0
includes the
following:
1. Autocomplete-Provides a drop-down list of choices that match what you're
typing
2. AutoOorrect-Fixes typos as you type AutoSearch-Gives you Web search ,e., jt"

rih"n yo,
type part of a URL in the address bar requir ,d by a Web page
3. AutoDetect-Gives you visual cues about what's accessible-otttin"
4. AutoConfiguration-Locates and connects to the appropriate proxy server if you

use one to
connect to a network
5. Web accessories These are developed and distributed by major Web sites to
work

in con-
junction with their sites and customize aspects of your tniernet
Explorer
5.0, such as your
toolbar and menu items. Some sites have already developed custom Explorer
bars, for
instance.
The following is the list of additional lnternet-related software. For example,
with

lnternet Explorer
5.0, you also get:
A NetShow server
1 14 / ELECTRONIC COMMERCE

O NetMeetingconferencingsoftware
tr ActiveX controls
C Chat
D ActiveMovieapplicationprogramminginterface
O ActiveChannelwebcast
D Subscriptions
C Dynamic HTML
0 NetShow server
This allows you to see and hear live and recorded broadcasts such as concerts or
breaking news
with synchronized audio, graphics, video, URLs, and script commands.
And streaming technology allows you to see or hear the information as it arrives
instead of having to
wait for the entire file to download.
O Internet Connection Wizard
The Microsoft Windows g8 operating system includes a new lnternet Connection
Wizard, which
makes it easy for you to set up your very first connection to your ISP or online
service provider. lt
includes a national list of lSPs and online se.rvice providers for you to choose
from. The wizard
automatically sets up your system to connect you to the lnternet using the ISP you
choose.
O NetMeetingConferencingSoftware
With a sound card, speakers, and a microphone, you can talk to others worldwide
from lamily to
colleaguesusing NetMeeting. Add a Windows-compatible video capture card and/or
camera to see
them, too.
Exchange pictures and draw diagrams on an electronic whiteboard, communicate with
text-based
chat, transfer files, and share applications.
O ActiveX Controls
interactive Web sites. ActiveX Controls are the soltware components that run behind
the scenes in
lnternet Explorer so that these sites come alive for you.
D Chat
This program lets you converse online in real time with one or more people. You
decide how your
message is displayed text only or text with graphics. You can send and receive
sounds, files, and
"hot" links of e-mail addresses, Web pages, and newsgroups. You can even "whisper"
to another
person in a group chat. Use it for your next online family reunion.
O ActiveMovieApplicationProgramminglnterface
ActiveMovie allows you to experience television-quality video and CD-quality audio,
while minimiz-
ing file size and download time compared to other video and audio formats. By using
"progressive
downloading,"
ActiveMovie lets you start playing an audio or video clip while it's still
downloading.
O Active Channel
Active Channel webcasts enable dynamic inlormation to be sent regularly to your
computer. They
automatically transmit content that fits your interestseverything from Disney
entertainment to stock
quotes. Use the Channel bar to select your favorite topics, and lnternet Explorer
5.0 gets the infor-
mation, so you can read it whenever you wanteven offline.
O Subscriptions
This feature delivers preferred information straight to your desktop, when you want
it, in the way you
GLOBAL INTERNET /115
want itfor f ree". To subscribe to a Web site, select the site and specify when you
want the information
updated and how you want to be notified, sueh as through an e-mail message.
lnternet Explorer does
the rest. Then you can browse the content offline.
O Dynamic HTML
lnternet Explorer 5.0 supports this programming language, which makes enticing,
unique; fun, and
fast-downloading Web pages possible.The pages download quickly because they are
created using
lightweight HTML instead of heavy-duty graphics. Round trips to the server are
minimized, which
means faster browser performance on your desktop computer.

4.21 Wo*ing with lnternet Explorer


With an lnternet connection and lnternet Explorer, you can find and view
information about anything
on the Web. Just click the topics below to get started. You'll find more
information to help you browse
the lnternet in the Help Contents.

4.21.1 Basic Setup


lf you aren't connected to the lnternet, or you want to create a new connection,
click this link.
Tutorial 1 : Set up an lnternet connection
To set up an lnternet connection
tr On theTools menu in lnternet Explorer, click lnternet Options.
O Click the Connections tab, and then click Setup.
tr Follow the instructions on your screen.

4.21.2 Safety in Browsing the Web


Using Content Advisor, you can screen out objectionable content by using industry-
standard ratings
that have been defined independently by the Platform for lnternet Content Selection
(PICS)
committee.
Using security zones, you can set different levels of security for different areas
of the Web to help
protect your computer.
Using the optional Microsoft Wallet, you can store your personal credit-card and
shipping-address
information on your computer, and take advantage of secure providers when you
connect to
Web sites.

4,21.3 Learning how to Browse the Web Faster and Easier


lf you learn just a few basic things about browsing the Web, such as how to use the
buttons on the
lnternet Explorer toolbar, you'll find that browsing the Web is easier and faster.
To start browsing the Web, click any link on your home page, which is the page that
appears when
you start lnternet Explorer. You can see whether an item on a page is a link by
moving the mouse
pointer over the item. lf the pointer changes to a hand, the item is a link. A link
can be a pictuie, a 3-
D image, or colored text (usually underlined).
Now you're ready to find a Web site on your own.
4.22 Using Your Web Browser
Knowing how to move around the Web with your Web browser can really make using the
Web much
easier. Although the specific features might differ from browserto browser, there
are a few things that
116 / ELECTRONIC COMMERCE

are common to virtually every Web browser.


O The Location (URL) Box
Most web browsers have a space in which your current
location, or URL, is
displayed. This URL
shows you the lnternet address of the web site that yo,
ui"'.rrrenily viewing,
in addition to the
specific directory and filename
of the current document.You can usually direcfly
make your browser change to the new location.
edit the location and

O Toolbar
The lnternet Explorer toolbar consists of buttons that are
shortcuts for menu
commands. They
make browsing faster and easier. click any button on
the toolbar below to find
out its function.
0 The"Back,'and,,Forward',Buttons
once you have loaded at least two web pages, you should riotice "Back"
a button
appear (or darken).
lf you click on this button, your web browsei will return you
"Forward" button (when darkened or shown)
to the last web
page viewed. The
will return v", 6 tn" next web page
viewed, in the case
that you have just pressed the "Back" button to view pievious p"g"..
O Refresh Button
tJpdates any web page stored in your disk cache with the
latest content. (when you
return to a page
you'vevisited,yourbrows.erdisplays
thefilestoredinyouroist<cacne,ratherthanthecurrentpage
on the World Wide Web. This saves download time.)
O Home Button
Returns you to your home page. you can designate any web page
as your home page.
A Search.
Displays a choice of popular lnternet search engines in the left pane. your
search
results appear in
the left pane, too. when you click a link, the page appears in the right pane,
so
you don,t lose sight
of your search results.
ln MS lnternet Explorer with Search Assistant, get more useful
search results by
specifying before-
hand the type of information you're looking for
[such web page,
company, or map)
and using a search engine geared toward ihis type. ". "n "Joi"ss,
O Favorites.
Displays a list of the sites (and, with lnternet Explorer 4.0, the
folders, files,
and servers)

that you,ve
saved as Favorites. Click on any item in the lisi to jump to it.
When you add a Web page to your Favorites, select "Make available

offline,,to store the most


recently viewed version for offline use. Easily create, move, r"n"r",
or delete
folders or files from
options, such as printing.
A Print.
Prints the page you're viewing.This is one way to save information from
the
lnternet so that you don,t
have to reconnect to view it again.
You can even print the URL associated with each hyperlink, making
it easy
to navigate to the site
later.
O Font.
Lets you display text in a larger or smaller font with lnternet Explorer
4.0.
GLOBAL INTERNET ./ 117

o Mail.
Connects you to Microsoft Outlook. Express messaging and collaboration client so
you can read
electronic mail (e-mail) and newsgroup messages.
o Edit.
Opens a file in Microsoft Word word processor that contains the HTML code for the
page you're
viewing so you can see and even edit it.
D "Reload" and "StoP"
Many Web browsers have a cache system.That is, they store f requently-visited
documents on

your
compute/s hard drive. Sometimes, you may view a Web page that is often
updated f rom your cache,
and you may not have the most recent copy. ln this case, it is a good idea to click
yo_ur browser's
,,Reload"
"Reload"
bution, which will re-download the newest copy of the current Web
document.The
button may also be used if errors occurred in the original downloading of a
document.

The "Stop" button can be used to stop the downloading of any Web page to your
computer. This can
be usefui if a page is taking too long to download, or is not downloading properly.
lf, after you have
stopped the download, you decide you do in fact want to download the document, you
may use the
"Beload" button.
o History
List your History sites by date visited, site name, number of visits, or order you
visited today. Use
the search toolto find keywords on any of the pages you visited. The Go button !f
you prefer, click
Go, rather than pressing eNf gn, after you type a uniform resource locator (URL) in
the address

bar.

4.23 lnternet Explorer Web browser


lnternet Explorer makes it easier to get the most from the World Wide Web, whether
you are searching
for new information or browsing your favorite Web sites. And built-in lntelliSense
technology can

connection
save you time completing routineWeb tasks, such automatically Cetecting your
network and
status.
When you start typing a frequently used Web address in the Address bar, a list of
similar

addresses
address is wrong, lnternet
Explorer can search
app"uis that you can choose from. And if aWeb-page
for similai addresses to try to lind a match.

type a
Search for Web sites by clicking the Search button on the toolbar. Then in the
Search bar,
your search results
appear' you can vlew
word or phrase that describes what you're looking for. When
the individual web pages without losing your list of search results.
you can also search directly from the Address bar. Just type common names or words,
and lnternet

for,
Explorer can automaticallyiake you to the site that most likely matches what you
are searching
and list other likely sites as well.

Just use the


Go to other Web pages similar to the one you are viewing, without even doing a
search.
Show Related Sites feature.

kind of Web-
Once you're on a Web page, lnternet Explorer can help you complete entries in any
based form. Start typing, ind a list of similar entries appears that you can choose
from'

on the toolbar'
Browse through a list of Web pages you recently visited by clicking the History
button
ln addition you can reanange or search the History list'

a wide variety of
Listen to broadcast and lnternet-only radio stations while you browse. Choose from
11 8 / ELECTRONIC COMMERCE
music and talk radio stations, and add them to your Favorites list. The radio
toolbar is available in
lnternet Explorer when you installWindows Media player.
Tutorial 2: To open a Web page or folder, or to run a program
D To go to a Web page, type the lnternet address - for example,
www.microsoft.com in the
Address bar, and then click the Go button.
D To run a program from the Address bar, type the program name, and then
click the Go
button.
lf you know the complete path and file name, you can type them for example:
c : \MsOffice\winword\winword. exe .
a To browse through folders from the Address bar, type the drive and folder name,
and then
click the Go button for example:
Tutorial 3 : To link to Web pages you recently visited
tr To return to the last page you viewed, click the Back button.
D To view a page you viewed before clibking the Back button, click the
Forward button.
D To see a list of the last few pages you visited, click the small down
arrow beside the Back
or Forward button.
Tutorial 4 : To link to a specific Web page
O To return to the page that appears each time you start lnternet Explorer, click
the Home
button.
tr To select a Web page from your list of favorites, click the Favorites
button.
A To select a Web page from the list of those you visited recently, click
the History button.
The History list also displays previously viewed files and folders on
your computer.

4.23,.1 What to do if a Web page isn-t working


lf a page you are trying to view is taking too long to open, click the stop button.
lf you get a message that a Web page cannot be displayed, or you want to make sure
you have the
latest version of the page, click the Refresh button.

4.23.2 Setting up an lnternet connection using lnternet Connection Wizard


The lnternet Connection wizard provides you with an easy way to get connected to
the lnternet.
Whether you've never explored the lnternet before or have spent many hours online,
the lnternet
Connection wizard can help you set up a connection.
For new lnternet users, the lnternet Connection wizard creates an lnternet
connection for you, and
then displays a list of lnternet service providers (lSPs) and information about
their services.You can
sign up for a new account by clicking an ISP in the list.
lf you already have an account with an ISP and want to create an lnternet
connection to your
account, the lnternet Connection wizard collects all the necessary information from
you and then
creates the connection.
lf you are not already running the wizard, you can start it f rom lnternet Explorer
as follows:
O On the Tools menu in the browser, click lnternet Options.
GLOBALINTERNET /119

tr Click the Connections tab, and then click Setup.


O Follow the instructions on your screen.

4.23.3 Finding the lnformation You Want


Check out the all-in-one search site accessible through Microsoft's home page. Go
directly to one of
these search engines: AltaVista, lnfoseek, Lycos, Snap, Excite, Yahoo!, and
Metacrawler.
D Click the Search button on the toolbar to gain access to a number of search
providers.Type
a word or phrase in the Search box.
tr Type go, f ind, or ? followed by a word or phrase in the Address bar.
lnternet Explorer starts
a search using its predetermined search provider.
Note : lf a Web address doesn't work, lnternet Explorer asks if you want to search
for similar Web
addresses. You can change this setting so that lnternet Explorer searches
automatically without
prompting. For more information, see Related Topics below.

4.23.4 Browser Tips


Take advantage of all the great features of Microsoft lnternet Explorer version
5.0. These tips will
help.
Spot the links
You can tell whether an item on a page is a link by moving the mouse pointer over
the item. lf the
pointer changes to a hand, the item is a link. A link can be a picture, a three-
dimensional image, or
colored text (usually underlined). Click any'link on a Web page to go to another
page within that site
or another site.
Tutorial 4.2 : Display allWeb pages faster
To display Web pages faster:
1. On the View menu in the browser, click lnternet Options.
2^ Click the Advanced tab.
3. ln the Multimedia area, clear one or more of the Show pictures, Play
animations, Play
videos, or Play sounds check boxes.
4. lf the Show pictures or Play videos check box is cleared, you can still
display an individual
picture or animation on a Web page by right-clicking its icon and then
clicking Show Pic-
ture.
S. lf the pictures on the current page are still visible after you clear the
Show pictures check
box, you can hide them by clicking the View menu and then clicking Refresh.
Tutorial4.3 : Display previously viewed pages faster
To display previously viewed pages faster:
O On the View menu in the browser, click lnternet Options'
D On the General tab, click Settings.
tr To create more space to store pages temporarily, move the slider to the
right'
O To prevent lnternet Explorer from updating pages in the Temporary lnternet
Files folder,
click Never.
To change how page colors are displayed:
120 / ELECTRONIC COMMERCE

1. On the view menu in the browser, click rnt,ernet, options.


2. Change the settings as needed.
3. Display text in a different font
Tutorial 4.4:To display text in a different font:
1. On the view tn€nu in the browser, click rnternet Options.
2. On the General tab, click FontE.
3. ln the Proportional and Fixed-width Jont lists, click the fonts you want.
Tutorial 4.5 : Specify which font and color setting to always use
To specify which font and color settings to always use:
1. On the view menu in the browser, click fnternet options.
2. On the General tab, click Rccessibility.
3. Change the settings as needed.
4. Display text larger or smaller
5. To display text larger or smaller:
6. on the vieyr menu, point to Fontq, and then click the size you want.
Tutorial 4.6 : View Web pages in a different language
Some Web sites offer their content in several languages. You can add languages to
your list of
languages in lnternet Explorer so that you can view these sites in your preferied
l-anguage.
To view Web pages written in a different language:
1. On the View menu in the browser, click Internet options.
2. On the General tab, click rJang'uages.
3. Click Add.
4. Select the language you want to add.
5. lf you speak several languages, you can arrange them in order of priority. lf
a Web site
offers multiple languages, it will supply content in the language with the
highest priority.
6. Adding languages does not guarantee that you have a font that can display Web
pages in
your preferred languages. You may need to download a multilanguage support
pack to
display pages in this language.
7. To download multilanguage support packs, see the lnternet Explorer download
page.
Tutorial 4.7 : Add a page to your Favorites
To add a page to your collection of favorite pages:
1. Go to the page you want to add to your collection of favorite pages.
2. On the Favoritee menu, clickaaa to Favorites.
3. Type a new name for the page if you want to.
4. To open one of your favorite pages, click the Favorires button on the
toolbar, and then
click the page you want to open.
5. To keep track of your favorite ages, you can organize them
6. Click the Creat,e ln button in the eaa to Favorites dialog box.
Tutorial 4.8 : Adding Personal Gomputing to your Favorites
To make sure you always have access to the latest lnternet news, software updates:
and tips and
tricks for using lnternet Explorer, why not add the Personal Computing site to your
Favorites list now?
To add the Personal computing site to your Favorites list, follow these steps:
GLOBALINTERNET /121

1 . On the File
menu of your lnternet Explorer toolbar, point to New, ?fld
click window, so you
don't lose your place in this guide.
2. Under the File menu in the new window, click open, and then type
http z / /www. microsoft ' con/ins ider / in the address
box .

3. Click ox.
4. When the Personal Computing page has f inished loading, on the Favorites
menut click aaa
to Favorites, and click or.
5. Close the new window.
Tutorial 4.9 : Organize your Favorites into folders
To organize your favorite pages into folders:
1. On the Favorites menu, click organize Favorites'
2. Click create New Folder, type a name for the folder, and then press ENTEB.
3. Drag the shortcuts in the list to the appropriate folders.
4. you might want to organize ydur pages by topic. For example, you could
create a folder
named Art for btoring information about art exhibits and reviews.
5. lf the number of shortcuts or folders makes ragging impractical, you can
use the Move
button instead.
Tutorial4.10 : Change your home page
To change your home page:
1. Go to the page you want to appear when you f irst start lnternet Explorer.
2. On the view menu, click Internet optsions.
3. Click the General tsab.
4. ln the Home page area, click use current.
5. To restore your original home page, click use Def aults'
Tutorial 4.11 : Save text and graphics f rom the Web
When you see text or graphics on a Web page that you like or want to refer to
later, you can save
them on your computei's hard disk. Later, you can open the saved file and review it
offline.
To save a text or source file:
1. On the toolbar, click pile, and then click save as'
2. Click save to save the file.
Tutorial 412: To save a graPhic
1. Right-click the graPhic'
2. On the shortcut menu that appears, click save Picture As'
3. Browse to the folder where you would like to save the file'
4. Click save to save the file.

lnternel
5. To open a saved file, double-click it from the folder where you've saved
it. Microsoft
Explorer will start automatically, and your saved file will appear in the
browser window.
Tutorial 4.13 : Add a page to your Links bar
To add a page to your Links bar:
1 22 I ELECTRONIC COMMERCE

1. Drag the icon for the page from your Address bar to your Links bar.
2. Drag a link from a Web page to your Links bar.
3. Drag a link to the Links lolder in your Favorites list: You can either drag
it direcfly to the
Favorites menu and then into the Links folder or you can drag it to the
tinks folder when
displaying your Favorites in the Explorer bar.
4. You can also can organize your links by dragging them to a different
location on the Links
bar.
Tutorial 4.14 : Create a desktop shortcut to the current page
1. Right-click the page, and then click create Shorrcur.
2' lf the lnternet Explorer window is not maximized, you can also create a
shortcut by drag-
ging a link from the lnternet Explorer window to the location you want,
such as your desk-
top or a folder.
Tutorial 4.15 : Return to a Web page you've already seen
1. There are several ways to return to a previously viewed Web page:
2' To return to the last page you viewed, you can click the gack button on the
toolbar, or press
the gecxspacu key.
3. To see a list of the last few pages you visited, click the small down arrow
beside the Back
or Forward button. Then click the page you want.
4' lf you want to view one of the last five pages you visited in this session,
click the rite
menu, and then on the list, click the page that you want to go to. This list
is started fresh
every time you start lnternet Explorer.
5. To view more pages, including pages you visited in previous sessions, click the
History
button on the toolbar, and then click the appropriate folder.
Tutorial 4.16 : Change the appetarance of the toolbar
To change the appearance of the toolbar:
You can move or resize the Address bar or Links bar by dragging them up, down,
left, br right. you
can even move them into the menu bar. To make more room on your screen, you can
hide toolbar
button labels.
1. Just right-click the toolbar, and then clear the check mark next to rexr
Labels.
2. You can hide the Address bar or Links section of the toolbar by right-
clicking the toolbar
and then clearing the check mark for each item you want to hide.
3. You can add items to the Links bar by dragging the icon f rom the Address
bar or dragging
a link from a page.
4. You can rearrange items on the Links bar by dragging them to a new location
on the bar.
5. You can use smaller Microsoft Office-style toolbar buttons. On the vlew menu
in a browser
window, click rnternet opt,J.one, dnd then click the Advanced tab. ln the
Toolbar area,
selectthesnre1l l-cons check box.
The radio toolbar is available in lnternet Explorer when you installWindows Media
Player,
Tutorial4.17 : Changing fonts and background colors
When Web authors and designers create Web pages, they often specify particular font
colors and
sizes, typefaces, and background colors. These settings are specified lor each
item, or in a "style.
sheet," which is a type of template for specifying how ditferent styles should
appear throughout a
Web page or site.
GLOBALINTERNET /123
You can override any or all of these settings, which is useful if you have limited
or low vision.you can
specify your font and color preferences for all pages that do not use style sheets,
and then you can
specify whether to use any or all of your preferences on pages that use style
sheets.
Tutorial 4.18 : To correctly display Web pages encoded in any language
Most Web pages contain information that tells the browser what language encoding
(the language
and character set) to use. lf the page does not include that information, and you
have the usuaily
determine the appropriate language encoding.
Tutorial 4.19 : To turn Auto-Select on
0 On the view menu in rnternet, Explorer, point to Encoding, ond then make
sure Auto-
Select has a check mark. lf it doesn't, click it.
D lf you are prompted to download language support components, click
oownload.
0 lf Auto-Select cannot determine the correct language encoding, and you know
what language
encoding it should be, you can manually select it.
Tutorial 4.20 select the language encoding for a Web page. On the View menu,
point to Encod-
=To
ing, point to More, and then click the qppropriate language.
lf you are prompted to download language support components, click Download.

Notes
O lf the Auto-Select feature or a specific language pack is not installed on
your computer,
lnternet Explorer will prompt you to download the files as needed.
O Adding languages does not guarantee that your computer has a font that can
display Web
pages in your preferred languages.To be prompted when fonts need to be
added, click the
Tools menu, click lnternet Options, click the Advanced tab, and then select
the Enable
lnstall On Demand Cnect box. Or you can download a Multilanguage support
pack <http://
www.microsoft.com/isapi/Redir.dll?prd=ie&pver=5.0&clcid=&ar=ienews> to
display pages
in this language.
D You can add a Language Encoding button to your toolbar to make switching
between languages
quicker.
Tutoriaf 4.21 turn off graphics to display allWeb pages faster
=To
D On the Too1s menu in lnternet Explorer, click lnt,ernet options.
D Click the Advanced rab.
A ln the Multimedia area, clear one or more of the Show pictures, Play
animations, Play
videos, or Play sounds check boxes.
Tips

lf the Show pictures or Play videos check box is cleared, you can still display
an individual
picture or animation on a Web page by right-clicking its icon and then clicking
Show Pictur:e.

lf the pictures on the current page are still visible after you clear the Show
pictures check box,
you can hide them by clicking the View menu and then clicking Refresh.
Tutorial 4.22:To create more space for temporary lnternet pages
tr On the ToolE menu in lnternet Explorer, click tnternet options.
D On the General tab, click settings.
124 / ELECTRONIC COMMERCE

O To create more space to store pages temporarily, move the

4.23,.5 The Cache and Toolbar


You've arrived at this page, so you must already know something about how
to
use a Web browser.
Just in case you haven't yet used some of the features of Microsoft. lnternet
Explorer,

here,s a guide
to them.
When you explore the Web, your browser keeps track of the pages yorJ've visited
and saves

them on
your hard disk so they'll load faster when you return to them. This saves you

time and money


because you can view the saved pages without being connected to the lnternei.The
saved filesyour
"temporary lnternet files"are stored in your disk ca che.
Tutorial 4.23l. To empty your lnternet Explorer disk cache
1. When you browse, your disk cache can fill up with files you no longer need.
Here's how to
empty your lnternet Explorer disk cache.
For lnternet Explorer version 4.0:
1' On the view menu of your lnternet Explorer toolbar, click rnrerner optione.
2. Click the General tab.
3. ln the Temporary lnternet files area, click Delere Fites, then click ox.
4. Click ox to close lnternet Options.
To change the size of your lnternet Explorer disk cache
You can change the amount of hard-disk space reserved for your disk cache. A larger
disk cache
may display previously visited pages faster, but it will decrease the amount
of hard-disk space
available for other files. Here's how to set the size of your disk cache.
For lnternet Explorer 4.0:
1' On the view menu of your lnternet Explorer toolbar, click rnternet oprions.
2. Click the General tab.
3. ln the Temporary lnternet Files area, click serrings.
4. Move the arrow on the Amount of Disk Space to Use slider to the percentage
of disk space
you want designated for your disk cache, then click ox.
5. Click ox to close lnternet Options.

4.23.6 Sharing Bookmarks and Favorites


Favorites, known as bookmarks in Netscape Navigator, are a convenient way to
organize and link to
Web pages that you visit
Netscape bookmarks
On the Favorites menu, click the lmported Bookmarks folder to view them. lf you use
lnternet
Explorer on several computers, you can easily share favorites between computers by
importing
them. Also, if you use both lnternet Explorer and Navigator, you can keep your
favorites and book-
marks up-to-date with each other by importing them between programs.
O To import bookmarks or favorites, click the File menu, and then click lmport
and Export.
A To export favorites to bookmarks or favorites on the same or another
computer, click the
File menu, and then click lmport and Export.
GLOBALINTERNET /125
Notes

D Exported favorites are saved as a regular HTML file, so either lnternet


Explorer or Navigator
can import them. You can export a selected folder in your Favorites list, or
all of your
favorites.

tr The exported favorites file is fairly small, so you can copy it to a floppy
disk or network
folder, or attach it to an e-mail message if you want to share the favorite
items with other
people.

4.2r.7 To Enter Web lnformation more Easily


The AutoComplete feature saves previous entries you've made for Web addresses,
forms, and
passwords.Then, when you type informaiion in one of these fields, AutoOomplete
suggests possible
matches. These matches can include folder and program names you type in the Address
bar, and
search queries, stock quotes, or information for just about any other f ield you f
ill in on a Web page.
1. ln the Address bar, a field on a Web page, or a box lor a username or
password, start
typing the information.
2. lf you've typed a similar entry before, AutoComplete lists possible matches
as you type.
3. lf a suggestion in the list matches what you want to enter in that field,
click the suggestion.
4. lf not, continue typing.
Notes
tr The information used for suggested matches is stored on your computer and is
encrypted to
protect your privacy.
tr Web sites cannot gain access to this information. They can only receive what
you explicitly
enter in forms.
tr When typing information in Web forms, and typing passwords, you can remove
an item f rom
the list of suggestions by ciicking the item and then pressing the DELETE
kpy.
4.2I,-g l'laking Pages lvailable for Offline Viewing
When you make a Web page available offline, you can read its content when your
computer is not
connected to the lnternet. For example, you can view Web pages on your laptop
computer when you
don't have a network or lnternet connection. Or you might want to
You can specify how much content you want available, such as just a page or a page
and all its links,
and choose how you want to update that content on yout'computer.
lf you just want to view a Web page offline, and you don't need to update the
content, you can save
the page on your computer.T[ere are several ways you can save the Web page, f rom
just saving the
text, to saving all of the images and text needed to display that page as it
appears on the Web.
What would you like to do?
O Make the current Web page available offline
D Make an existing favorite item available offline
D Save a Web page on your computer

Notes
D ln previous versions of lnternet Explorer, ollline viewing was called
"subscribing."
126 / ELECTRONIC COMMERCE

D lf you used channels in a prevtous version of lnternet


Explorer, you can
find them in the
Channels folder in your F worites list.
Tutorial 4.24 : To view web pages without being connected
to the rnternet
After you mark your favorite pages for viewing offline, you
can view them offline
by using the follow-
ing procedure.
1' Before you disconnect from the lnternet, click the
toorE menu and
then click
Synchronize.
2' when you're ready to work offline, click the Fire menu,
and then click
work of f rine.
3. ln your FavoriteE list, click the item you want to view.

Note

When you choose to work offline, lnternet Explorer will always


start in offline
mode until you
click Work Offline again to clear the check mark.
Tutorial 4.25 : To print a Web page
O On the File menu, click print.
O Set the printing options you want.
Tips
To print a frame or item in a web page, right-click the frame
or item, and then
click print or print
Frame. For Help on an item, click at the top of the dialog
box, and then click the
item.
Tutorial 4.26 :To save a Web page on your computer
D On the FiIe menu, click save As.
tr Double-click the folder you want to save the page in.
A ln the rite nane box, type a name for the pagj.
tr ln the save as type box, select a file type.
To save all of the files needed to display this page, including.
This option
saves each file in its
original format. To save all of the information needed to displayihis page
in a
single MIME-encoded
file, click web Archive. This option saves a snapshot of the current
web page.
Note This option is
available only if you have installed outlook Expiess 5 or later.
To save lusitre
current HTML page,
click web Page, HTML only. This option saves the information on
the Web page,
but it does not save
the graphics, sounds, or other files.
To save just the text lrom the current web page, click rext
only. This option saves
the information on
the Web page in straight text format.

Notes
D With Web Page, complete and Web Archive, you can view all
of the Web page
offline, without
adding the page to your Favorites rist and marking it for offrine viewing.
o When you choose Web Page, complete, only the current page
is saved. lf you
want to view
web pages and the pages they rink to whire offrine, see ierated ropics.
Tutorial 4.27 : Saving pictures or text from a Web page
As you view pages on the Web, you willfind information that you'd like
to save for
future reference or
share with other people. You can save the entire Web p"g" or any part
of it:
text, graphics, or links.
GLOBAL INTERNET /127
You can print Web pages for people who don't have access to the Web or a computer.
O To save a page or picture without opening it
Right-click the link for the item you want, and then click Save Target As.
O To copy information from a Web page into a document
Select the information you want to copy, click the Edit menu, and then click Copy.
O To create a desktop shortcut to the current page
Right-click in the page, and then click Create Shortcut.
O To use a Web page image as desktop wallpaper
Right-click the image on the Web page, and then click Set as Wallpaper.
O To send a Web page in e-mail
Click the File menu, point to Send, and then click Page By E-mail or Link By E-
mail. Complete the
mail message window, and then send the message. Note that you must have an e-mail
account and
an e-mail program set up on your computer.
Tutorial 4.28 : ChooseYour Own Home Page
lf you are using Explorer, first go to the Learn the Net home page. Now click the
View menu, then
select Options. Now click the General tab. Finally, click the Use Current button.
As much as we would like Learn the Net to be your home page, you can select any
page you want.

4.?A Netscape (Netscape Communications or Netscape Navigator)


Mosaic was the first widely-distributed graphical browser or viewer for the World
Wide Web. lt is
usually considered to have been the software that introduced the World Wide Web
( and the lnternet)
to a wide general audience. Once Mosaic was available, the Web virtually exploded
in numbers of
users and content sites. (Of course, the software depended on the recent invention
of the Hypertext
Transport Protocol , or HTTP, by Dr.Tim Berners-Lee.)
Mosaic arrived in 1993. Marc Andreessen, then in his early 20's, is credited with
inventing or leading
the development of Mosaic. He developed it at the National Center for
Supercomputing Applications
(NCSA) at the University of lllinois in Urbana, lllinois. Andreessen and others
went on to become
part of Netscape Communications, originally called Mosaic Communications, that
developed today's
most popular browser, Netscape (it's full name is Netscape Navigator).
Netscape is one of the two most popularWeb browsers and also the name of a company,
Netscape
Communications, now owned by America Online (AOL). Currently, almost all lnternet
users use
either Netscape's browser or Microsoft's lnternet Explorer (MSIE) browser, and many
users use both.
Although Netscape was initially the predominant product in terms of usability and
number of users,
Microsoft's browser is now considered superior by many users (although many other
users see them
as roughly equivalent) and has taken a slight lead in usage.
Netscape's browser originally was called "Navigator," and is still called that in
the suite of software,
Communicator, of which it is now a part. Navigator was developed in 1995 by a team
led by Marc
Andreessen, who created Mosaic, the first Web browser that had a graphical user
inter{ace, at the
University of lllinois' National Center for Supercomputing Applications (NCSA) in
1993.
The latest version of Netscape Navigator is 5.0 (Year 1999), now available in a
beta version. Naviga-
tor can be downloaded as part of the Communicator suite f rom Netscape's Web site
at no charge.
128 / ELECTROI{IC COMMERCE

cD-RoM versions can also be purchased in computer stores and are sometimes

distributed freely
as promotions.
A primary source.of revenue for Netscape and AOL is

tiff:$:'j;jT31
it devetops and has marketed on rhe ru.."., *
otlts
also envision the Netscape Web site, now
transformed , as a leading source
of revenue through advertising and e-commerce.
NCSA at the University of lllinois in Urbana, lllinois is the home
of the first
Web browser that had a
graphical user interface. lts inventor, Marc Andreessen
,lhen 22years old,
later lead the creation of
the Netscape browser and became a founder of that company. T'he original

browser, Mosaic, exists


in a more advanceci version.
Almost everyone surfing the Web uses either Netscape Navigator or Microsoft

lnternet Explorer, and


if you're stuck using your ISP's proprietary browser, you're going to be
missing
out on a lot of pages
designed with the "Big Two" in mind. lf the ISP says you nave to use their
browser, it's

time to look
elsewhere for lnternet access.

4-25 Navigating the world wide web with Netscape


Gommunicator
Netscape Communicator is a suite of softwAre programs that includes the well-known

Netscape
Navigator Web browser. The Standard Edition suite consists of the following
components:
O Navigator:Webbrowser
D Messenger: e-mailclient with Web capabilities
D Collabra: client for Usenet News discussion groups
O Composer: HTML editor with What-You-See-ls-What-You-Get (WyStWyG)
capabilities
D Conference: audio/video conferencing, chat, whiteboarding, file sharing,
collaboration
tools, and file transfer
o Netcaster: subscription capability to push channels on the Web as well as
offline browsing
capability
This section will focus mainly on the Windows 95 version of the Navigator Web
browser.

With the
proper software installed on your local computer, Navigator can retrieve several
kinds of images as
well as video and sound.You can download the Communicator suite with a variety of
plug-ins

configured
to the browser, including:
B The Cosmo Playerto view 3D sites created with Virtual Reality Modeling
Language (VRML)
(file suffixes .wrl, .wrz)
o Netscape Media Player for streaming audio metafiles (file suffix.lam) Live
Audio for
sound files (file suffixes .au, .aiff, .wav, .midi, .la, .lma) The
QuickTime'player for video
(file suffix .mov) NPAl32 Dynamic Link Library to play video in Windows (fite
suffix .avi)
You can install Communicator in yourWindows-based or Macintosh machine.The program
is avail-
able for downloading on the Netscape home page: http://home.netscape.com/.To use

the program to
access the Web, you need an ethernet connection or a dialup connection through an
lnternet

Service
Provider.

4.25.1 Anatomy of Xetscape


When you first launch your web browser, usually by double-clicking on the icon on
your desktop, a
predefined web page, your home page, willappea'.With Netscape Navigatorfor
instance, you

wiil be
taken to Netscape's NetOenter.
GLOBALINTERNET /129

Tutorial 4.29 : ChooseYour Own Home Page


You can change the home page that loads when you first launch your browser.
D With Navigator 4.0, go to the EdiE menu
D Select Preferences.
tr ln the Home page section, type in the new web address in the box.
D lf you want Learn the Net to be your home page, enter:
http z / /www. learnthenet' com
D Any time you want to return to your home page f rom any other website, just
click the Home
button on the toolbar.

4.25.2 The Toolbars


Navigator has three toolbars at the topof the screen:
tr NavigationToolbar:
Contains icons for navigating among Web pages, searching the Web via sites chosen
by Netscape'
printing, and security options.
D LocationToolbar:
Just under the toolbar, you will see a box labeled "Location," "Go To," or
"Address."This is where you
type in the address of a website you want to visit. After you ente.r it, press the
Return or Enter key to
access the site. Contains the browser's Bookmarks file, and the Netsite window that
contains the
address of the current Web Page.
130 / ELECTRONIC COMMERCE

O PersonalToolbar:
contains the bookmarks in the Personal roolbar folder of the bookmarks file.
O The Menu Bar
Located along the top of the browser window, the menu bar offers a selection of
things you can do
with a web page, such as saving it to your hard drive or increasing the size of the
text on a page.
Many of the choices are the same as the buttons on the toolbar below, so don't try
to learn everything
now. Click once on a word to access the drop-down menu, then click on the
appropriate selection you
want to make.
tr The Status Bar

At the bottom of the web browser you'll find a window known as a status bar. You
can watch the
progress of web page transactions, such as the address of the site you are
contacting, whether the
host computer has been contacted and'the size of the files to be downloaded.
The Scroll Bar
The vertical bar to the right of the browser lets you scroll a down and up a long
web page. You can do
this by placing your arrow cursor on the up or down arrows and holding down your
left mouse key.you
can also place the arrow on the slider control, hold down the left mouse key and
drag the slider.
lf a web page is too wide to fit your screen, a horizontal scroll bar will appear
at the bottom on your
browser window.This scroll bar works the same way.
Tutorial 4.30 : Book Marking Your choices
The program comes with certain links pre-installed.These can be deleted, or you can
add your own.
To place your own bookmarks here:
D Go to a Web page that you want to bookmark
O Place your mouse over the icon to the left of the word "Netsil€." This message
will brief ly
appear:"Drag this to create a link to this page."
D Hold down the left mouse button and drag from this icon into the Personal
Toolbar. The
bookmark will be installed.
Tutorial4.31 : Making theToolbars Disappear
You may make any of these three toolbars disappear during a session in order to
give yourself a
larger viewing window. There are two ways to do this:
O Click on the far left hand grill of the toolbar. To bring back the toolbar,
click again on the
grill.
O Selectview>Hide Navigation,/Location/pereonal Toolbar
When to Use the STOP Button
There's a good reason why the Web is referred to as the World Wide Wait. lf you
can'l connect to a
site, use the STOP button and try again later, especially if you are trying to
access a popular site.
ffi@
GLOBALINTERNET /131
4.26 The Access lndicator
Both Navigator and Explorer have a small picture in the upper right hand corner of
the browser. When
this image is animated, it means that your browser software, known as a client, is
accessing data
from a remote computer, called a server. The server can be located across town or
on another
continent'Your browser downloads these remote files to your computer, then displays
them on your
screen. The speed of this process depends a number of factors: your modem .pe"d,
your lnternet
service provider's modem speed, the size of the files you are downloading, how
busyihe server is
and the traffic on the lnternet.

4.25.t Some Browser Tricks


As with most software, there is more than one way to accomplish a task. Here are a
few other
features to help you navigate:

4: yqq hop from page to page and website to website, your browser remembers where
you've been.
With Navigator, select l'listory f rom the drop-down list under the Communicator
menu. With lnternpt
Explorer, click the History button on the toolbar. There you'll find a history of
all the web pages you
have visited during a specified period of .time. To revisit a page, just click on
the address.
Another way move between pages with Navigator is by clicking the right mouse
button. A pop-up
menu will appear and you can choose to move fonruard or back.
Tutorial 4.32 : How to access Resources on the lnternet with Navigator
(1) lf you have the URL (address) of a Web page on the lnternet. Type the
U RL to go directly to
the page. Navigator gives you two ways of doing this.
(a) Type the URL in the Netsite bar at the top of the screen. To
accomplish this, click on
the Netsite bar to highlight the current URL. Then type in the new URL
and press the
Enter key.
(b) Click on File/Open Page location at the top left of the screen. A pop-
up window will
appear with a blank line. On that line, type the URL of the file you
wishto retrieve.
Press the Enter key.
lf you wish to reach the University Libraries home page, type this URL:
http://www.albany.edu/
library/.
(21 lf you are on a web page
Click on words or images which change the shape of the mouse pointer f rom an arrow
to a hand and
display a URL on the bottom of the screen when the mouse pointer is placed over
it.The blue words
on the display screen or the purple words on the display screen (the purple color
indicates that the
resource has been recently accessed on your terminal).
Note: The colors blue and purple are generally the default colors for text that
contains a link, and
text representing a link that has been visited in the recent past. Nowadays, Web
page creators
are coloring their links in all sorts of ways.The best way to figure out which
text represents a link
is to point your mouse over the words and see if the pointer shape changes from
an arrow to a
hand.The hand represents a link.
After you click, the file will be retrieved and will display on your screen.
Note: Often the clickable words will be different colors than blue or purple.
Document creators
have the option ol specifying colors.
132 / ELECTRONIC COMMERCE

(3) lf you want to use pre-installed links


(a) Navigator's resource tinks: Navigator offers two icons on the navigation bar
at the top of
the screen with access to pre-installed resources. Search takes you-to the
well-known Net
Search page. Be aware that the services on this page have paid millions of
dollars for the
privilege of being located here, There are a great many more search engines
that should
also be explored. Guide allows you to search People, Yellow Pages, Wh-at's
New, What,s
Cool, etc.
(b) Bookmarks: The Bookmarks option on the top menu bar contains a list of
resources placed
there by previous users of Netscape at your terminal. This list can be a
source of interest-
ing lnternet resou rces.
Tutorial4.33 : Traveling the WEB with Navigator
Navigator allows you to move back and forth among the Web pages that you visit
during a session.
(1) To go back to Previous Sites
Click on the large Back left arrow on the navigation bar near the top left corner
of your screen. Each
time you click on this arrow, you will return to the next previous site that you
visited. lf you hold your
mouse over the Back arrow, the title of the upcoming page will briefly appear. Or,
click on Go in the
menu bar at the top of the screen. This presents a list of several previous sites
you have visited.
Click on any one of these choices to return to the desired site. This is the
equivalent of clicking on
the Back arrow several times.
(2) To Move Forward
When you have returned to previous sites vrrith the Back arrow, you can go fonivard
again by clicking
on the large Forward right arrow next to the Back arrow. lf you hold your mouse
over the Forward
arrow, the title of the upcoming page will briefly appear. Or, click on Go in the
menu bar at the top of
the screen. This presents a list of several sites you have visited. Click on any of
the more recent
choices to return to the desired site. This is the equivalent of clicking on the
Fonruard arrow several
times.
(3) AdditionalOptions
Reload: Re-retrieves the document you are currently viewing.This is useful if the
document does not
load successfully or completely Home:Takes you back to the document that was on the
screen
when you first started Navigator
Stop: Stops the transfer in progress. This is usef ul if a link is not successf
ully or speedily retrieving.
EdiUFind in Page: Navigator allows you to do a word search of the document on your
screen.
Choose this option and type in the word or phrase you wish to search.
File/NeMNavigatorWindow: You can open up a second copy of the browser by using this
feature.
This allows you to visit more than one Web page at a time.
Bookmarks/Add Bookmark: When you have found a site that you wish to return to at a
later time,
select this option to add the URL to the bookmark list. When you wish to return to
that document,
select Bookmarks and run your mouse down the list of title to choose a page to
which you wish to return.
You can also delete bookmarks:
1. Click on BookmarksiEdit Bookmarks
2. Highlight the bookmark you wish to delete by clicking on it with the mouse
3. Press the Delete key on your keyboard
GLOBALINTERNET /133

The term "internet" is used to identily any collection of networks into a larger
Wide Area Network
(WAN). You can have an internet of AppleTalk-based computers or one of PCs entirely
located over
several geographical areas. However, "The lnternet" or "The Global lnternet", as
most people call it,
is a proper name for a certain internetwork of computers around the world. lt is
also known by other
names:"The Matrix" (Quarterman, 1990), "Cyberspace", and now often incorrectly, the
"lnformation
Superhighway" of the National lnformation lnf rastructure (llTF, 1993). This last
name has been ad-
hered to the lnternet accidentally since the National lnformation lnfrastructure
suggests the lnforma-
tion Superhighway only as the concept which may or may not be based upon lnternet
technology
until final approval by the Government of the United States.
The lnternet itself is a conglomeration of thousands of computer neiworks utilizing
a common set of
technical protocols to create a worldwide communications medium (RFC 1594, 1994).
The lnternet
has an estimated population of 20 million users and has a presence in over 70
countries. This
massive group of users reach the lnternet through their computers and terminals at
educational
institutions, commercial lnternet Access Providers, and other organizations.
These individual networks range f rom commercial medium to large corporate WANs.
Each of these
individual networks are controlled by different organizations, are of different
sizes, and use a range
of network technologies (Malamud, 1993). They are united by common communications
protocols
and services. Throughout most of the lnternet, you will find the same services,
irnplemented in a
variety of forms on a range of computer operating systems and hardware.

4.26.2 Who Controls the lnternet?


Plainly speaking, no one. The lnternet is made of several thousand independent
networks, each of
which have their own administrative authorities. However, the general direction of
the lnternet is
organized by the lnternet Society, a vo!untary membership organization whose
purpose is to promote
gtoOat inlomation exchange through lnternet technoiogy (RFC 1462, 1993).The
technical aspects of
the lnternet is handled by the lnternet Architecture Board (lAB) and its
constituent subdivisions.
They design and approve new network protocol software and network applications that
work on the
lnteinet on a large scale. Another authority, known as lnterNlC, is responsible for
the registration of
allcomputers and networks connected to the lnternet as wellas providing special
consulting serv-
ices to the member networks.The lnterNlC is made up of several commercial
organizations namely
GeneralAtomics which owns CERFNet, Performance Systems lnternational (PSlNet), and
AT&T.
PSlNet and CERFNet are two of the larger networks of the lnternet.
The IAB and lnternic, however, do not command the daily workings of every section
of the lnternet'
This is left to the Network Administrators responsible for each individual
network.These individual
networks can also make rules and regulations commanding the proper use of their
data network and
their network services. Some networks prohibit commercial data traffic and other
prevent insecure
local and remote data traffic.

4.26.3 Who Created the lnternet?


The lnternet is an outgrowth of a projectfrom the 1970's by the US Department of
Defense Advanced
Research Projects Agency (ARPA).The ARPANET, as it was then called, was designed to
be a non-
reliable network servile for computer communications on over wide area. ln 1973 and
1974, a stand-
ard networking protocol, a communications protocolfor exchanging data between
computers on a
network, emeiged from the various research and educational efforts involved in this
project. This
became known as TCP/IP or the lP suite of protocols (Lynch, 1993)
The TCp/lP protocols enabled ARPANET computers to communicate irrespective of their
computer
134 / ELECTRONIC COMMERCE

operating system or their computer hardware.


we call such a protocol
heterogenous. UNIX was
::tlil,:il"'1?:f,"f::,?:l^t,,?l/lt:::iT: "lT:.t.v*"y'.i,s with the UNrX
operatins system
as UNIX was spread throughout the many
educationaiinstitutior"s'a#;;#irH;jru",:il::Jl
such as uNlX and VMS soon became the mosr poputar
ll,ll;:::'svstems method
of accessing the

at
make up the lnternet

ctronic mail appeared in

lnternet gopher made its

ln 1990, the ARpANET had had many other net


components, and so on) from somewhere; every
developing and loading components into the serue
server vendors rely on third_party lDEs and t
bundle integrated development toois with the se
you're trying to achieve.

take advan-

have a rich

trying to do

opte who can tive with


pooro""rT"o;rTi;1
rate lT shops
- where
productivity can be
r documentation, higher
abstraction access ,

t be the defining features,


instead of whether the

4.26.4 Pure.Play Web Application Server


One category of application server is pure_
some sort of standard component model su
on scalability and connectivity to various data so

server. Since HTML page generation is done via


build pages or use any HTML IDE that generates

Server (NAS). NAS allows both


Java ancl C++
4.25.5 Develop.and.DeployServers
A develop-and-deploy server is one that has a well-integrated development

environment and an
application server bundled together. lt allows developers-to quickly
build and
immeolatety deploy
GLOBALINTERNET /135
web applications' The focus is on highly interactive development with
a
sophisticated environment.
one of the products in this category is SilverStream Application Server.

SilverStream is a 100-
percent pu components on the server.
SilverStream's big

deveroper
claim is tha
;i:,"i:,o"T".
[1i":i:::i'fi1Hil";3i5'i;Li
Silve.rStream's page generation see "Building object-orienteo"weu pages
witr
Sitverstream,,in the
Lab Note section of this issue.)

nd say, "Wow, this is cool!


lt,s like Visual Basic or
wonder how anyone could use
this tool because it
n, and it doesn't offer the
fine-grained control that
HTML editor to create pages
for SilverStream, it
would take a lot of manual tweaking to create the hooks that tell the
Silver'Strlam

server what to do.


Sun NetDynamics ( see " Online") seruer and tools are normally included in

this category as well.


is Allaire Cold Fusion. Cold
Fusion has its own
Cold Fusion applications are
built by putting code
e very similar to server-side
includes _ the Cold
piles a server-side class
that will run the logic
environment is included
with Cold Fusion that
s visually. The result
develop_
ause of the server's
gs. Other
t Software's HahtSit
bynamo/
Powersite combo. Listing Two, taken f rom one of cold Fusion,s sampl

the code
required to create a simple data entry form.

4.26.6 Application Servers from Client lserver vendors


Another set of products that might appeal to clienUserver developers are servers
from
current tool
vendors. For example, if you work in a Visual Basic or PowerBuilder shop, you'ttOe

interested in
Microsoft MTS or Sybase Enterprise Application Server. MTS hosts COM components
(and

not
many application servers are adopting COM as a component st
3.0. hosts almost any type of component, including powerBui
native support for PowerBuilder components) :b developers
etary" features, ,but to existing clienVserversrs, they mean
ing code.
Be aware that Microsoft Visual lnterDev is not an application server. Visual
lnterDev

creates Active
Server Pages (ASPs) that are loaded and executed inside Microsoft's llS Web server.

ASp is a page
engine, not an application server. The combination of ASP and MTS results in an
apiiication

server
with a page-development environment.
Application servers c
By providing the abilit
rity, processing logic,
seruers allow scalable HTML and distributed cli
corporate lT development. Because Web development and corporate lT development have
typically
been separate and have had different goals, the new application server market seems
cluttered and
its messages are mixed. What may seem to be the perfect server to one group might
look like the
dumbest design around to another. Over the next year, the application servlr markei
will most likely
splinter into three groups: pure enterprise servers that are iool independent,
develop-and-deploy
seryers that integrate tools and servers, and page servers that focus only on pages
u"i.u. three-tier
136 / ELECTRONIC COMMERCE

clienvserver' I think the servers will begin to look more like


each otherand that
the
primary

differentiator
will be how productive and robust th-e development environrn"ni
1.. As the
market becomes more
segmented, there will also be more consolictation
players will eitherbepurchased - as winners appear
by rarger vendors or fade
-' in
each ."i"-g*y, the other

"*"},.
ea of the
types of applications that
nd
maintaining those applications.
cess,
scalability, openness, devel_
r
viability.
P.rices of application servers vary considerably.
also charge per developer. Cost varies from si
concurrent user pricing. prices range from $A5OO
less of the application server you choose, one t
develop applications today
The "Web"
- iegardless of what

u could ship

imagine the

documents

rucks over the same lnternet


as the nuts-and-bolts
to
your door. That special
es are
Web server comput-
or, of
course, is your Web

Like e didn't play a big part in the creation of


the World Wide Web.The
Web in 1980 at brnrtl iEurope"n Particle Physics
Labcrarory) by Tim
Bern e first "Web" software on Steve Job's Nextstep
operating system,
on a Next UNIX cube.)
-'-----r
By the early '90s, the World^Wid9 Web was poised. Several UNIX
browsers were
kicking around when
Marc Andreessen of the NCSA (NationalCenterfor Supercomputing
Applications at
th-e University of
lllinois at Urbana-Champagne) developed an easy-to-use browserfor
x-winoows, and
then Microsoft
Windows in 1993. Andreessen left NCSA and started his own browser
company,
Netscape Commu-
nications. The commercialization of the "Web" started in 1994, when
only about 1 ,
5oo sites existed
worldwide.

4.27 Browsing vs. Building


what's the difference between browsing a w9b site and setting up one of your
own?
To browse a site,
you first have to connect your computer to the lnternet.
UnleIs you want to pay a
$1 ,ooo or more a
month to wire your home or office computers directly to the lnternet, you'll

generally use someone.


elses direct, high-speed lnternet connection.That "someone else" is an lnternet

service provider
(lSP)' The ISP pays the big bucks to have c.omputers sitting right
on the lnternet.
To get from your
home or office to the lsB you use telephone lines and a moo-emlwhen you
want to
broirse, or check
your e-mail, you dial in-modem to modem to your lSP. lt connects you
to the
lnternet and its Web
seruice and also offers e-mailseruice.
once you're patched into the lnternet-via your ISP-you start running your Web

browser software.
Browser software understands the language of worid Wide Web tralfic running
on
the lnternet. lt
GLOBAL INTERNET /137

understands the rules that govern Web-service traffic, known as the "transport"
rules, or protocols.
ln browsing, you've noticed that each Web page has an address, listed as something
like "http://
www.netobjects.com." Ever wonder what "http" stands for? lt means Hyper Text
Transport Protocol.
Placed at the beginning of the address, HTTP is saying "l want to make a Web-based
connection
over the lnternet, to the following address. Handle the data transportation issues
for me."The rest of
the address is called a Universal Resource Locator, or URL. Every page on the
lnternet can be
reached by a specific URL. lt's a pointer to a specific page, just like your street
address is a pointer
to where you live or work.

4.28 lSP Web hosting


Getting your own Web site means creating Web pages and putting them where folks can
find them
overtl're lnternet. Unlike browsing, yourWeb pages can't sit on your home or office
computer, unless
those are wired directly to the lnternet. A modem connection from an iSP to Web
pages on the
computer just won't do the job.You'll need to rent disk space on your ISP's Web
server computer' As
we described above, a Web server is like a warehouse of Web pages sitting right on
the lnternet,
ready to hop on and travel to whomever needs them, courtesy of the HTTP
service.That means that
as long as the Web server is up and ru'nning, anyone in the world, practically, can
visit those pages.
lf you're already paying for an lnternet connection, your ISP can usually provide
some Web server
sp""". Many ises actually provide their e-mail customers with free Web server space
for
noncommercialWeb pages mine gives me 10M8.
Of course, the f ree route doesn't get you avery snazzy Web site address. To get to
my humble, self-
promotional site, for example, you have to browse for http://id.mind.net/-bweibel'
lf I wanted some-
ihing like http://www.bobweibel.com, I'd have to spend about $160 to set up the
site and to register
the bobweibel.com "domain name", plus $40 a month for lnternet service, instead of
just $10, and an
addition g35 a year to keep "bobweibel.com" registered. Click here to read more
about domain names.
Also, as your site and the traffic to anrl f rom it grows, the fee you'll pay
someone for hosting your site
will grow. Web server providers look at the total amount of data going to and
fromlour site-the
"ban-dwidth, " in tech talk. And they look at the amount of server disk space you
use. The more you
use, the more you'll pay.
I am not aware of any search options for sites without them other than the "Find
on Page" option in
your browser. This ajlows you to look for specific text strings on each page you
visit, but not the
Lntire site unless you visit each page of that site and use that "find" command.
ln both netscape and
explorer that is "command F" or choose f rom your menu bar first "Edit" then
"Find".
I know that is not your desire, but that is the only option I am aware of . lf a
site is well placed in the
search engine you are using, you can sometimes limit your search to a particular
site within the
results tist. Rt Google.com you can choose a link below each match that says
"similar pages". At the
Open Directory Project http://dmoz.org you have the option to "search Within
Results". At Open
Directory there is also a very handy list of links at the bottom of each results
page that will allow you
to searc-h at EIGHT other search engines plus Yahoo with a single click,
maintaining your search
query for you!
At lnfoSeek/Go network http://infoseek.go.com you choose first "Find Similar Pages"
link below

"
each result. When those results return, you can choose the link that says "More
Results from . . '
the same domain. The lnfoSeek f unction will obviously only work for sites indexed
by lnfoSeek. This
is probably the closest to what you are after. Northernlight.com oifers the option
in some search
results that show a blue folder for "More results f rom this site" but they don't
show up on every result.
138 / ELECTRONIC COMMERCE

Finally atYahoo and open Directory, you can search


within categories. lf I was
searching for,!etski,,
::]:E:1,:T^.-11:g^"jy-_T"1". ' ,
Recreation outooois ;B;;lrs
> personat
watercrafr >,,and
search only in related categories that show up in the search results. yahoo

provides suggested
categories that are within the same area of interest.
software that you host.on your own computer cannot do this
without going to the
search engines f irsl
to gather the information and then offering you choices
from among the results
it has gathered.
Although there are s.ome software programs like this,
they are varieo and differ
dramatically in
effectiveness depending on your needsior precision of resuits.
Domain name hijacking
The coso of hijacking I've trademarked a name, but the domain
name is already
taken, and was
reserved right after I registered my trademark by another
company. Do I have a-
lejat right to the
domain name?
http : / /www. ndweblaw. con/home,/donainnames . html
This link is a page titled "Domain Names, A Trademark Owner's
Nightmare,,and
contains an article
and citations to cases that have been well publicized about
domain name
hijackinj.
People who do this may be doing it intentionally or innocenily,
but
generally, you don,t have a case
unless you've got a long established use of the irademarked
name ano can
prove that the registrant
was intending to extort excessive fees from you in the hopes yo
r'o uuy
the name from them.
You can take it to court if you like, but it's not likely to
do you any good
unless you can prove that the
registrant had the intent to squat on the name an-d not use it,
hoping that
you would u"-*itting to pay
excessive fees to get it back.
Still, the case may cost you more than it's worth.
This is an unresolved battle with more and more companies. Until
laws are
passed (not likely) there
will be no way to protect a domain name other than being the first
one to
reserve it. you may have a
case if they are harming your business in some way by-the inappropriate
use
of that name. But if
they are simply using lor another purpose, you might consider
."tting in"r the
trademark instead. ;)
Just kidding' I know this is not something you are likely to consider.
Have you
contacted the regis-
trant of www.your-trademark.com? lf you want to knowwho it is,
there's a way
to find the registered
owner by going to this address and typing in the domain name.
http://www. networksolutions.com/cgi-bin/whois/whois/
It will return a registrant name, host name and the name
servers.You might consider
contacting them
and simply explaining your trademark situation, your desire to own
the name and
then simply ask if
they would consider a reasonable solution. eossibty something
like to avoid a court battle and make it worth theiitime to seii "s
rimpie
al;;G;-J;n that youd
it to you by
offering twice what they
paid for it.
lf they have not spent large sums developing a.branding strategy for
the
name, they may be willing
to give it up. lt's only 4 months old at this point it they reierveo it'in
February.

ltb even possiole that


they haven't begun to develop their site or their stratbgy yet. You may be

assuming the iorst and be


confronted with a friendly and accomodating person wirring to look fbr
an
equitabie solution.
To Be or NotTo Be, The Domain euestion
WebSitel0l Oglol/2000
To Be or Not To Be, That is the Domain euestion
GLOBALINTERNET /139
adaptation by Mike Banks Valentine
with apologies to Shakespear
To be, or not to be: that is Domain question.
Whether'tis nobler in ihe mind to suffer
The slings and arrows of slow, free servers,
Or to take arms against a sea of wannabees,
And by opposing, end them. To search: to seek;
No more; and, by anonymity to say we end
The heartache of a million useless search results
That eBiz is heir to, 'tis a relevancy
Devoutly to be earn'd. To look; to seek;
To find? pei'chance to link! Ay, there's the URL;
For in search fatigue domain names niay come,
When we've shuffl'd off this long URL,
Must give us pause. There's the address
That takes gigabytes for so long a name.
For who would bear the tilde and subdirectory,
The competitor's URL, the name so catchy
The pangs of taken domains, the listing delay,
The insolence of Yahoo, and the spurns
That patient merit ol unworthy geocities,
When he himself might his IPO make
Without Domain name? Who would AltaVista bear,
To grunt through subdirectories and filenames,
But the dread of something after backslash,
The undiscovered Business from whose URL
No surfer returns, puzzles the will
And make us rather bear those URLs we have
Than buy the others that are already taken?
Thus creativity does make cowards of us all;
And thus rush'd to registration of a name
We worry o'er lowly cost of reserving,
And enterprises of great riches and power
With this regard our clients turn away,
And lose the name of action.com
140 / ELECTRONIC COMMERCE

WebSitel0l offers Domain Name Registration


at http://website
1 01 .com/domain. html

where you can read an article on choosing


great domain names, check for availibility
and reserve your online business identity!
How to learn the essentials from others lor free
WebSitel 01O2|OA2OO0
I spend the majority of my time reading. I receive about a
hundred e-mails a day, sometimes much more than that. yes,
some of it is spam and junk and unsolicited commercial crap.
But most of it I've asked to be sent to me. I've requested
that wrtiers submit their articles to my weekly newsletter.
They do, and I have a huge file of articles waiting to run
in the WebSitel0l Reading List.
I've subscribed to the Link Exchange Digest, the HTML Writers
Guild business list, the List of Lists newsletter, a dozen
moderated discussion lists, several business related bulletins
a freebies announcement, a search engine news and advice list,
a daily achievement quote, updates f rom all of the paid and
free services I subscribe to and on top if it all I operate
several online businesses, each of which get regular e-mail
correspondence and inquiries from customers.
Why do I submit to this barrage of information raining down
on my overflowing e-mailbox? I came to online marketing and
the internet with less than zero information about the online
world. I knew no HTML. My lnternet Service Provider laughed
at the list of silly questions I had to ask about how the
web worked and what I get lor my monthly service fee.
I began to learn HTML through a free online course called
Volcano Web at http://www. mcli.dist.maricopa.edu/tut/index.html
it's a step by step tutorialon writing HTML, the language of
the web. Upon "graduation" from that course, I took another,
then another and another.
I began subscribing to newsletters,
discussion- and announcement-lists.l read great articles by the
GLOBAL INTERNET /141
more experienced business people on the web. ljoined some
discussion lists for online business development run by a small
business groups. Then subscribed to multiple services offering
help to "launch" my business with promotion techniques and
marketing "secrets".
Search engines and f ree tutorials were the beginning of WebSite
101, where I list the services I used and the tutorials I took.
I learned what I could and then distilled them into what is now
offered at WebSitel0l as a "Short Course, How to get my business
online!" That course was likely the introduction of a good deal
of the readership of this list to WebSitel0l . I now study the
top web gurus and research and read about !mproving my skills
even further and offer that to this list the way it was first
given to me, free.

TEST YOUR IINOWTEDGE


PART I OUE5TION WITH ANSWERs
Q.l . How do i print legible plain-ascii versions of web pages?
Ans. There are several ways. Most web browsers have a "save as ascii" option;
the quality of the result
varies. Lynx, in particular, being a text-based browser, does a credible
lob if you select the print option
and choose "print to local file" instead of an actual printer'
Q.2. How can i save an inline image to disk?
Ans. Here are three ways:
1. lf you are using Netscape, just hold down the right mouse button (hold down
the single'mouse button
for more than a second if using the Mac version) over the image. A menu
will
2. Turn on "load to local disk" in your browser, if it has such an option;
then reload images. You'll be
prompted for filenames instead of seeing them on the screen. Be sure to
shut it off when you're done
with it.
3. Choose "view source" and browse through the HTML source; find the URL for
the inline image of
interest to you; copy and paste it into the "Open URU' window. This should
load it into your image
viewer instead, where you can save it and othenryise muck about with it
Q.3. Vthy do some Web pages take so long to download?
Ans. Many factors aflect how fast a Web page travels from its Web site to your
computer. Web pages may
load slowly for these reasons:
tr Your modem transmits data slowly.
O Traffic on the lnternet is heavY.
A The page's file is large. lt contains graphic, sound, or video files, for
example, in addition to text.
D The server and connecting lines used by your online service, your
lnternet service provider, or
the Web site transmit data slowlY-
Q.4. How to decrease the download time?
Ans. To decrease download time, try these pointers:
D Get the latest version of your browser.
o Buy a faster modem that transmits at a rate of at least 28,800 baud.
D Browse during off-Peak hours.
D Turn off sound and images in your browser. Text-only pages load faster.
1 4U ELECTRONIC COMM ERCE
D lf a page is loading so slowly that you think it
may be
stuck, click the stop button on your
browser's toolbar, and trv to load t'he oao" again
Q.5.
in a fe
rv minutes.
ing and
whether it is good idea to keep

as many as
Ans.

4.6.
Ans.
k my favorite and always use it?

nical method for extracting results

he same results from two dilferent


Q'7' ln some search toots, like Altavista, I see options for
searching
usenet. what,s that all about?
Ans' some search engines can search not only ihe web, but
also the
contents of newsgroups, which
sometimes collectively called Usenet.
are

PART II OBJETTIVE TYPE OUESTION5 WITH AN5WERS


A1.
1' Selec
rcP/t '|"iii;ii;!'ffI1:rnet tosether, was
created in the tate te60s by
which and for what purptoie?-"-
a' The white House, to be able to locate intetiigenci-cniet quicxty
anywhere

in the wortd, in the

erals in higher
education.
uslness by way of
immediate communication.
rk.
a server computer, you
need a computer, an lnternet
connection, and
?. AThe
b.
right crient program for accessing the particurar type
Nintendo system, some wire, and i g-von battery
of
server.
c. Guts.
d. Matthew Brcderick.
3' A browser is a c.rient program that disprays the ....... stored
on the
rnternet on .........
a. truth machintoshes
b. web pages web seruers
c. examination papers Gmat

5. Which of the foilowing can you do with a WebTV terminal?


a. Browse the web
b. Steam vegetables.
c. Make telephone free
d. Allof above
6' To what web server does the uRL www.nbc.com/today/couric.htiri
point?
a. Couric .corn
b. www, nbc. corn
c. today, show
GLOBALINTERNET /143
d. http://www.nbc.cmltoday/Couric.htm
7. ln a magazine, you see the URL for the Old Farmels Almanac shown as
www.almanac.corn. Which is
the most reliable way to type this URL in a browser's address box?
a. www.almanac,corn
b. http:/www.almanac.corn
c. http://www.alamanca.corn
d. http//www.almanac.corn
8. You've just jumped from a page entitled Jaya, to one called Prem, then to one
called Gita, and finally
to Rima. From Rima, how can you get back to Jaya?
a. Enter the URL lor Jaya in the address box.
b. Click Back three times.
c. Find a link on Rima that happens to lead to Jaya, and click it.
d. All of the above.
4. After you've filled in a form, the information it contains is transmitted to
the server
a. Automatically
b. As soon as you complete the last entry
c. Within 24 hours
d. Only after you click the submit button
10. True or false; lt's a good idea to change your security settings at random,
just to see what happens.
11. A secure site protects you from
a. Sending information to an unscrupulous site
b. Sending information that can be harvested from the lnternet by a third
party
c. Buying junk you don't really want
d. All of the above
12. The difference between a bookmark and a favorite is
a. One's a noun; the other's an adjective.
b. A bookmark marks history, while a favorite indicates preference.
c. A bookmark provides an easy way to return to a page in Navigator and a
favorite does the same
in lnternet Explorer.
d. A bookmark provides an easy way to return to a page in Navigator.
13. Your history file lists all pages you've visited
a. Within the number of days for which your browser is set up to save history
b. ln your entire lifetime
c. With conviction
d. More than four times
14. Saved web pages always include all ......... that you see online, but may
omit
a. Yin Yang
b. text meantng
c. images color
d. text images
A2. Select best possible alternative(s) out of following:
1. Which of the fotlowing is a type of program code that a web site might send
to your computer?
a. Computer/r BASIC
b. JavaScript
c. DOS
d. All of the above
2. The Windows or Mac file types registry
a. Lists the file types your computer wants for its wedding
b. Lists all the files installed on your computer
c. Assigns a program to automatically handle each of many dilferent file
types
d. Assigns your browser to handle all files
3. True or false: Plug-ins are installed automatically, whenever necessary.
4. To see the multimedia enhancements in a "shocked" web page, you need
1 44 / ELECTRONIC COMMERCE

a. Nerues of steel
b. Buns of steel
c. The RealAudio plug-in
d. The Shockwave plug-ins
Which of the following is a way to get to a search toot?
a. Enter the search tool's |JRL.
b. Use a link to the tool, found on another tool's page.
c. Click your browsels Search button.
d. All of the above.
You're searching for information about rabbits. which is the best
search term?
a. Rabbits
b. Rabbit
c. Rabbit or bunny or hare
d. Rabbit and bunny and hare
7. ln the hit list, the search tool puts the hits it considers best
a. ln a special"premief hit list
b. At the top of the hit tist
c. At every fourth position in the hit list
d. At the bottom of the hit list users because
8. web integration may improve the effiiiency of computer users because
a. They'll be grateful, and therefore motivated.
b. They needn't learn or use different skills for local and online
activities.
c. They'll find it easier to email questions to others who can hetp
them.
d. Their computers will run faster
L Experts give the Net PC little chance of catching on as a home lntemet
terminal because
a. A Net PC costs almost as much as a cheap pC, but can,t do as much.
b. A Net PC's "sealed case" prevents its use as a place to hide
jewelry.
c. 'A Net PC" sounds too much like "Annette Peicie," a cheerleader
nobody tiked in high school.
d-. Anything collectively supported by Microsoft, lBM, and lntelcan't
be good for us.
A3. Choose the correct option
t. The protocol that Web clients and seruers use to communicate with each
other is called
(a) HTML (b) HTTP.
(c) URL (d) None of the above.
2. Web documents are stored as text fites with the ertension
(a) .htm.
(b) .htmt.
(c) Both a and b.
(d) None ofthe above.
3. Using Lynx, you can view
(a) Text. (b) Graphics.
(c) Both a and b. (d) None of the above.
4. Which of the follovying is a search engine?
(a) Microsoft,
(b) AltaVista.
(c) Yahoo,
(d) Both b and c.
5. The original developer of the WWW was
(a) Tim Berners-Lee. (b) Marc Andreesen.
(c) Bill Gates, (d) None of the above.
6. The lntemet is also refered to as:
(a) The nVeb."
(b) information superhighway
(c) www
GLOBALINTERNET /145
(d) Network of Networks
(e) All of above
7. The lnternet is a collection of specialized computers located in Silicon Valley.
(a) True @ False.
8. The act of exploing the Web is known as:
(a) Exploring
(b) Searching
(c) Suding.
(d) Browsing
4. American users can only view documents which were created in the United Stafes.
(a) True
(b) False.
10. Which of the foltowing groups is allowed to put pages on the Web?
(a) Universities
(b) Web Consortiam
(c) Microsoft
(d) Any one
(e) All of the above.
A4. Choose the best possible altemative(s) :
1. The dilference between a bookma* and a favorite is
a. One's a noun; the othe/s an adiective-
b. A bookmark marks history while a favorite indicates preference.
c. A bookmark provides an easy way to retum to a page in Navigator and a
favorite does the same
in lnternet ExPlorer.
d. A bookmark provides an easy way to return to a page in lnternet
Explorer and a favorite does the
same in Navigator.
2. Your history fite tists all pages you've visited
a. Within the number of days for which your browser is set up to save
history
b. ln your entire lifetime
c. With conviction
d. More than four times
'
3. saved web pages always include atl ......... that you see online, but may
omit
a. Yin Yang
b. brt meaning
c. images color
d. text images
A5. Select the best suitable alternative(s) from lollowing?
l. The Back and Forward buttons are inactive until a link on a web page is
pressed'
(a) TRUE
(b) FALSE
2. lf you become lost, the best button to press is:
(a) Stop
(b) Home
(c) Reload
g. The easiest method to pint a web document involves:
(a) Copying the text and pasting it into WordPertect
(b) Saitring the brt and loading the lile intoWordPertect
(c) Pressing the Print button
4. To see an animation a second time, press:
(a) Home
(b) Reload
(c) Open
type
S. To see a web page (IJRL) mentioned in the newspaper or an television, press
the ..'.. button and
146 / ELECTRONIC COMMERCE

in the URL.
(a) Back
(b) Home
(c) Stop
(d) Open
6. Text on the web page can be inade to
appear larger by using:
(a) Options-General preferences_Appearance
(b) Options-Networking
(c) Fite-Save As...
(d) Fite-Open
7- web pages risted in the "Go" menu remain in
the rist untir erased by
the user.
(a) TRUE
(b) FALSE
8' attempt or downloading of information can be
interupted
[!f "";|:r"'"n
by pressing:
(b) Home
(c) stop
(d) Forward
9' All information found on the web can be considered
factual and without
error.
(a) TRUE
(b) FALSE
10. The act of exploring the Web is known as:
(a) Running
(b) Roaming
(c) Reading
(d) Surfing
(e) Browsing
81. True or false:
1. To use the rnternet Exoto.rgr we^b browse4 you
! Web. must arso use the Active
Desktop.
2. The basis for the lnternet is the
3.
4.
5.
toped in 1990
at CERN.
t.
6.
n the Internet.
7.
ontain both
words,'Gandhi" and ,'Lincoln,,.
8.
omputer to yours.
9.
orage and retrieval.
10.
approach to
offering information on a computer
c1. Fill in the blanks
1. A ..... is a mechanism to control access to and from
Web seruers.
2. ....... uses links , also called hypertinks.
3. A document (or file) accessed by a web browser is
cat*d a ... ......
or web site.
4.
5.
web page.
6.

to a Web page.
7.
sses are
simply called "addresses", a WWW
address is called a ......
izes, and often rates and
reviews Web sites.
tomated search engine.
general information.
ou to search newsgroup.
loaded must be .......
before use on your computer.
GLOBALINTERNET /147

13. The Wortd Wide Web, commonly referred to as the "" or the WWW'
14. ....... facilities can be accessed through http'
15. ....., a seruer for Unix comPuters.
c2. Fill in the blanks with appropriate word(s)'
(1) ln order to send email to-someone you need to know their""'
2) An address for a webpage is called a ..""
you would use
what Boolean term in the
3) To search for a webpagi about the otd movie comedy teams,
examples below:
Laurel ..... HardY
Comedy..... Movies
4) Tofind'webpagesaboutmoneyotherthanlJSCurrency,youcanusewhatterm?
Currency...... USA
D. Explain the following term.
1. Web browser 2. HyPerlink.
3. Search engine. 4. Web seruer
5. Portal 6. Webcrawlers
E. Differenciate between
1. Web browswr and web-seruer 2. Browser and search engine
3. lnternet and web 4. Poratl and search engine
F. Write the full form of the followingt
1. HTTP 2. HTTPD
3. INERNET 4. HTP
5. Wt/W 6. TCP
7. lP 8. URL
9. FTP 10. //s
11. wAls 12. HTML
G. Activities for trial
1.

t enhance or
detractfrom your lnternet expenence'
2.

3.
Search button. Virlually all search tools s
you to find pages by browsing through -a
for
any ads orf-ree offe-rs fro t providers and
online services (such aYahoo'com)'
4. Start watching
and save the ads if You can'
5. E-mail

Use
you wilt need to set some of the
entries in the Options menu'
on.catatgwei/tninting/netscape'
html#hetper to set- up

.your
e-.mail'

onfigurid your e-miit, try sending a


message to a classmate'
(b)
ean use

Yntt can
Crea book containing at '-^^' t,.,^
^, least a+Ataaeac
You
two addresses'
use mtne
a
another staff member' lf youI

(mcin ,.i"j to, one.o! th6m and plerhaps friend,or


]iou
can,t address, add your o*i i^i"
you'll need to e-mail
never
know when
yourself!
formation; write down
the \JRL of the site at which
uiing ii"nn
engines can be found at: http://
Lhtml
developed'
angiostatin and endostatin'
red the drugs?
1 48 / ELECTRONIC COMMERCE

0 What two companies produce these drugs2


A What is the current price of the companies' stock?
(b) What is the weather forecast for today in Sydney?
(c) When you look at computer ads, the phrase \vith MMX technology" is
often displayed with the
description of the processor.
(d) What team won the Stanley Cup in 1988? What team did they play in the
final round?
7. Bookmaks
O Create a Beokmark file containing: At least two folders, indicating a
subject area of interest to you.
Under each foldef add bookmarks for sites that fall into the subject area.
Add a minimum of two sites
for each folder Changa the name of the top level folder to your name.

[NswERs PART r(B) 0BJECTIVE TypE 0UEST|0X5


41.
1. (d) The DoD (Department of Defense) planted the seeds of the lnternet by
developing TCP/IP. The
other choices had nothing to do with TCP/IB but I swear they're true
otherwise.
2. (a) Each type of server is built to be accessed by a particular type of
client program.
3. (b) Browsers are lor getting web pages from web servers.
4. (d) All this challenges or defeats older computers and operating systems.
5. (a) I know (a) is true. lf you've successfully tried (b) or (c), I
apologize for the error
6. (b) Just the first part ol the URLup to the first single slashshows the
lnternet domain name of the web
server. The rest ol the URL shows the directory path and filename of a web
page file on that server.
7. (d) Choice (a) could work, but only in browsers that permit you to otnit
the http: ll prelix. Choice (b)
omits one of the slashes from the prefix, and choice (c) misspells the URL.
8. (d) Choices (a), (b), and (c) all work, although (b) would be easiest.
9. (d) The server sees nothing you type in a lorm until you click the submit
button, which might be labeled
Submit, Send, or some other name that implies submission.
10. False. Leave your security settings alone unless you have a good reason to
change them.
1 1. (b) Secure sites are a hedge against harvesting. You have to be careful
about (a) and (c) yourself.
't2. (d) (13)(a) 14. (d)
A2
1. (b) Of the choices, onlyJavaScript is a likely contender. Of course, anything's
possible.
2. (c) The file types registry tells your computer (and maybe your browser) which
program'to open to
handle each type of file.
3. False. Often, you must deliberately install a plug-in. Scripts, however, do
their thing automatically.
4. (d) Only (d) gets the job done.
5. (c)6. (c) Only (c) gets youall pages that use any of the three terms for rabbit.
7. (b) The best hits go first.
8. (b) Choices (a), (c), and (d) are silly.
9. (a) The main reason is (a), but I have a feeling (d) isn't that far wrong.
A3 1.(b),2.(b),3.(a),4.(d),5.(a) 6. (e)2. (l),8. (a),4. (b), 10. (e)
A4. 1. (c) 2. (a), 3. (d)
A5. 1a 2b 3c 4b 5d 6a 7b 8c 9b 10d
B. l.FTheActiveDeshopisoptional.2.FS.F4.T5.T6.T 7.F 8.F4.F10.7
Cl. 1. Firewall 2. Hypertext
3. web page 4. Java
5. Java 6. Netscape Navigator
7. URL 8. search Engine
9. Web crawler 10. Directory
11. Dejanews 12. compressed, unzipped
13. Web '14. internet
15. Apache
C2. 1. address 2. URL
3. or, and 4. not
C/,rpf* 5
GEIVERATIIYG
E-COMMERCE

5.1 Commerce
Commerce in a nutcell defined as transport of commodities from place to place for
exchange purposes.
The British economist Adam Smith wrote in The Wealth of Nations (17761that'the
propensity to
truck, barter, and exchange one thing for anothe/'is an intrinsic characteristic of
human nature.
Smith also observed that the expansion of commerce is a critical component of the
process of
modernization. tn modern society, production is organized to take advantage of
specialization and
division of labor. Without commerce it would be impossible to organize production
in this manner.
In ancient times, transporting commodities over any significant distance was an
expensive and risky
enterprise.Thus, commerce was restricted mainly to local markets, and the most
commonly traded
articles were foodstutfs and clothing. Most people spent,the bulk of their
resources on food, and
what they neither grew nor gathered themselves they obtained through trade.The same
was true of
clothing: Garments were either produced and handed down within the family or
acquired through
trade. ln addition to food, clothing, and shelter, the rich devoted their income to
conspipuous attire,
jewelry and works ol art. As a result, an important trade in luxury items
developed.

5.2 Commerce in History


After a decline following the breakup of the Roman Empire, European commerce
expanded gradually
during the Middle Ages, especially during the 12th and 13th centuries. Long-
distance trade became
safer once merchants began to form associations for the protection of travelers who
journeyed
abroad.The main long-distance trade routes were from the Baltic and the eastern
Mediterranean to
central and northern Eu-rope. From the forests of the Baltic came raw materials:
timber, tar, furs, and
skins. Frgm the East came luxury goods: spices, jewelry, and textiles. ln exchange
for these goods,
wqgtern Europe exported raw materials and processed goods. The English sold woolen
garments,
the Dutch offered salted herring, Spain produced wool, and France exported
salt;southern Europe
was also rich in wine,fruit, and oil.The ltalian and German cities straddling these
routes promoted
and financed the trade. Nonetheless, throughout the Middle Ages, commerce between
Europe and
Asia was limited, because overland transport was expensive and because Europe
possessed little
of value for export to the East.

5.3 The Early )'lodern Period


The development of oceangoing warships and efficient merchant carriers in the 15th
and 16th centuries
led to a rapid expansion of commerce. As the cost of transporting bulky cargoes
over long distances
150 / ELECTRONIC COMMERCE

fell, grain was imported on a large scale from the Baltic to the Netherlands and
other parts

of Europe.
New ocean routes between Europe and the East allowed imports from Asia at lower
prices and in
greater volume than had been possible by overland caravan. The discovery of the
Americas

created
trade in such new commodities as tobacco and logwood.
Spanish exploitation of the rich gold and silver deposits in Mexico and Peru
transformed the character
of international commerce. Europe finally possessed a commodity-precious metal-for
which ample
demand existed in the Far East. ln return for AsiAn imports, Europe exchanged
silver coin minted in
Mexico, Spain, ltaly, and Holland. Using technology and skills developed in
tiansoceanic navigation,
the Europeans captured the Asian shipping trade. European vessels transported
Japanese copperto
China and lndia, lndian cotton textiles to southern Asia, and Persian carpets to
lndia.Trade in certain
staple commodities grew with incredible speed. lmports of tobacco into England from
Virginia and
Maryland, for example, increased more than a thousandfold in the 17th century.
As long-distance trade continued to grow, new forms of commercialorganizations
appeared. At first,
informal associations gave way to legal partnership. ln Holland, for example, it
was not uncommon
after 1500 that shareholders, rather than captains, be the proprietors of ships.
Shareholding broke
down the social barriers among different classes of merchants and enabled
individuals to divide their
goods among ships destined for different ports. No longer was international trade
limited to those
who could afford to travel. After the 1 6th century the chartered trading company
replaced the temporary
partnership as the customary way for merchants to organize their affairs. These
great companies,
created by the state but privately owned and managed, held national monopoliei over
trade with
certain regions.

5.4 The Effects of lndustrialization on Commerce


By 1750 the spice trade had been far surpassed in importance by trade in primary
products. ln the
years thatfollowed, commerce was transformed again, this time bythe lndustrial
Revolution. Because
the first lndustrial Revolution occurred in Europe, that continent was at the
center of the global
commercial network for much of the 1 9th century. European economies depended on
foreign mirkets
to supply raw materials and to demand manufactured goods. The growth of industrial
production,
therefore, was accompanied by a rapid expansion of commerce. Between 1750 and 1914,
world
trade increased in value fivefold. During the 19th century alone, world shipping
tonnage grew f rom 4
million to roughly 30 million tons. European merchants carried the bulk of this
trade.
lndustrialgrowth affected commerce in numerous ways. lnitially, the increased
production stimulated
trade in raw materials. The mechanization of European textile production was
responsible for a
dramatic rise in U.S. exports of raw cotton.After 1850, trade in grain, meat, and
woolalso expanded.
Europe became a steady importer of wheat from North America, Australia, Argentina,
and lndia,
paying for its imports with the products of industry.
Another important aspect of industrial growth was the revolution in land
transportation. The
development of the steam engine and the construction of railroad lines promoted
commerce between
coast and interior on virtually every continent.The railroad was especially
important in North America,
East Asia, and Latin America.
By the end of the 19th cpntury, primary producing regions were no longerthe most
important outlets
for the products of European and North American industry. lncreasingly, industrial
nations became
each other's principal customers, and commerce between the Americas and the
European countries
took on a multilateral character. The opposite was true for the primary producing
regions of Af rica,
Asia, and Latin America: Many became part of European colonial empires, and nearly
all came to
depend heavily on a few foreign markets.
GENERATING
E.COMMERCE / 151

5.5 The Period of the Wodd Wars


Both internal and externalcommerce suffered setbacks during World War l.Trade taxes
and quantitative
restrictions were widely imposed, and it took a series of international conferences
during the following
decade to dismantle them. The dismantling of controls, however, was not always
accompanied by
the reduction of trade barriers. The United States and many other countries adopted
new customs
duties in the 1920s.
With the onset of the Great Depression in 1929, commerce was disrupted once more.
National
commercial policies remained basically unchanged through the end of 1929, but
numerous import
controls were imposed in 1930 and the following years. Several relatively self-
contained commercial
areas then came into being: the sterling area, which traded primarily with Britain;
the gold bloc,
centered on France; and the German and American trading areas. Within this
framework, domestic
and foreign commerce recovered slowly but steadily during the 1930s, only to be
interrupted again by
World War ll.

5.5 The Later 20th Century


The reduction of trade barriers and the continued expansion of international
commerce are two of the
notable achievements of the postwar era. Tariff reductions have been accomplished
through the
General Agreement on Tariffs and Trade, or GATT and by the creation of customs
unions, such as
the European Union. Although world exports more than doubled in volume and
increased in value by
a factor of eight between 1954 and 1974, not all countries shared equally in this
growth. ln the 1950s
exports from the industrialized nations of North America and Western Europe
expanded rapidly,
while exports from the developing countries fell behind. ln contrast, after 1965
the exports of the
developing nations grew most rapidly, in part because of the rising value of oil
exports f rom petroleum-
producing countries.The share of world trade held by Japan and the European Union
rose, but that of
the former Soviet republics and Eastern Europe declined. For the world as a whole,
the value of
international commerce (exports plus imports) rose f rom $643 billion in 1970 to
more than $6.7
trillion in 199O-despite the efforts of some countries to impose import quotas and
negotiate voluntary
export restraints. The outlook for commerce across national borders was improved in
the early 1990s
as member nations of GATT signed a major new treaty that struck down many barriers
to free trade
and established the World Trade Organization (WTO). ln addition, regionaltreaties
such as the North
American FreeTrade Agreement (NAFTA) went into effect.
Sometimes we use something every day but never stop to consider how it works. Take
your
toaster_you know it glows when you push down that lever, but you're not sure what's
really going on
(a friend's kid thought there were tiny people holding matches inside). Of course,
it doesn't much
matter since the chances of you having to build your own toaster are slim (safety
hint for those
suddenly interested in how their toaster works_don't stick anything except bread
into your toaster
unless you unplug it first).
But you are going to be building your own Web site, so you need to take a few
moments to stop and
consider how effective sites are designed. The basics are simple and don't require
you to unplug
anything to avoid electrical shock (though, just to be on the safe side, avoid
using your computer in
the bathtub or shower).

5.7 Free Trade


The term FreeTrade implies interchange of commodities across politicalfrontiers
without restrictions
such as tariffs, quotas, or foreign exchange controls.This economic policy
contrasts with protectionist
policies that use such restrictions to protect or stimulate domestic industries.
152 / ELECTRONIC COMMERCE

5.7.1 Early Trade Doctrine


Foreign trade doctrines began to develop during
onomic policy,
known as mercantilism, dominated Western Eu
Supporters of
this policy worked to promole national unity and
ey considered
wealth a necessary condition of power, and th and
silver specie, or coins, a
necessary condition of wealth. Countries without
cquired specie by maintaining
a surplus of exports over imports through strict oi
foreign trade.'
A reaction against such control occurred in France in the 18th century. This
led
to the formulation of
the first theory of free trade by a group of economic philosophers known as

the physiocrats, who


were followers o iocrats maintained
that the iree movement
of goods was in berty. Although
their ideas had litile effect
in France, they i ith, whose free
trade theories contributed
to the later development of trade policy in Britain.
Smith decisively refuted the protectionist conclusions of mercantilist thought. He
pointed

out that
wealth consisted not in specie itself but in the materialthat specie could p-
urchase.

Governmental
regulation of trade actually reduced the wealth of nations, because it prevenied

them from purchasing


the maximum amount of commodities at the lowest possible price. With f ree trade,

each nation cbuld


increase its wealth by exporting the goods it produced most cheaply and importing
goods

that were
produced cheaper elsewhere.
According to Smith, each country would speciali
n which it
had an absolute advantage-that is, it could prod
ts trading
partners. Another British economist, David Rica
h centur!
to encompass the more general case of comparal
e nations
lack an absolute advantage in the production of any commodity. However, even
these
nations could
are produced between the trading countries, and t
of comparative advantage forms the theoretical b

free trade.
The British philosopher
depend on the
strength of reciprocal
e exports of a
country relative to its
de.The gain would be
reflected in an improvement
in the international terms of trade for the country, by the ratio
of its export prices to its
import prices. "s "rpr"is"d
5.7.2 llodcrn Trade Theory
co
The.classicaltheory of trade developed by smith, Ricardo, and Mill was

he
th
analysis of the gains from trade. Modern trade theory by contrast, takes
advantage for granted. lt is mainly-concerned uiin tne analysis of the

ve

ith
accounting for differences in comparative advantage.
Classicaltheorists assumed that differences in comparative advantage resulted

from differences in
the productivity of resources, reflecting the unequal distribution ol technologies

and labor skills


among nations. A more complete explanation was offered by several2Oth-centiry

economists, who
noted that differences in the prices of final goods tend to reflect differences
in
the prices of resources
used to produce the goods, and that these differences reflect differences in
the
availability of the
GENERATING
E.COMMERCE / 153

resources. Countries specialize in the production and export of goods requiring


relatively large amounts
of those resources that they possess in abundance, and they import goods requiring
relatively large
amounts of resources that are scarce within their borders.

5.7.3 Arguments for Protection


Despite the conclusions of classicaltheory, few countries have ever actually
adopted a policy of free
trade.The majorexception was Britain, which,fromthe 1840s until the 1930s, levied
no import
duties of any kind. The historical prevalence of protectionist policies reflects in
part the strength of
industrial vested interests fearful of foreign competition, and in part the
strength of various theoretical
arguments for protection. Such arguments can be classified in three groups: those
intended to
influence the composition of production; those intended to influence the level of
employment; and
those intended to influence the distribution of income. Under appropriate
circumstances all three
groups of arguments have theoretical validity as well as limitations'
One of the oldest arguments for protection is the so-called infant-industry
argument. According to
this theory, when foreign competition is reduced or eliminated by import barriers,
domestic industries
can develop rapidly. After their development is complete, they should theoretically
be able to hold
their own in competition with industries of other nations, and protection should no
longer be required.
ln practice, however, protection frequently cannot be removed, because the domestic
industries
never develop sufficient competitive strength. The limitation of the infant-
industry argument is its
inability to identify those industries that are capable of growing to genuine
maturity.
The national defense argument for protection seeks to avoid dependence on foreign
sources for
supplies of essential materials orfinished products that might be denied in time of
war.The limitation
of this argument is that identification of those industries indispensable for
national defense is
difficult.
A third instance in which protection is advocated is to counter dumping f rom
abroad. Dumping occurs
when products are made available as imports at prices lower than the prices
prevailing in the exporting
country. Protection may be justified in these circumstances, but only if the clear
intention of foreign
suppliers is to drive domestic suppliers out of business.
During periods of high unemployment, protection is often urged as a means of
increasing employment.
With imports reduced, demand for domestic substitutes will be stimulated, expanding
production at
home. Economists call this a "beggar-my-neighbo/' policy: The improvement of
employment at home
is achieved entirely at the expense of employment elsewhere. The limitation of such
a practice is
that it invites retaliation from other nations sullering from similar problems of
high unemployment.
Protection can be used to redistribute income either within nations or between
nations. For example,
if a nation finds that the demand for its exports is relatively strong, it can gain
income at the expense.
of other countries by imposing tariffs or other import barriers. Foreigners
willthen find it more difficult
to earn the income to pay for the exports they desire. Consequently, they will be
forced to reduce
their prices, thus improving the terms of trade for the protectionist nation. Like
the employment
argument, this method invites retaliation from abroad.

5.lA RecentDcvelopments
Although most countries officially favor freer trade and deny protectionhm, the
achievement of this goal
is somewhat ditficult.When economies are booming and jobs seem secure, most
peopletend to support
free trade. When recessions occur, however, many nations become more protectionist
because of national
interest and pressure from interest groups that are adversely affected by
prolonged recessions.
154 / ELECTRONIC COMMERCE

SinceWorldWarllendedin1945theleadingtradingnationsn"u"g
to promote f reer trade and remove protectioi
oarri"i"- rn i #;;" (ranarar
a a,^^-^^e onI Tariffs

tan[s ano

and

hat worked to

y 23 nations,

thousands of
I
1995, when the activities of

ternational organizatiOn that

5.8 Foreign Trade


Foreign Trade is defined as the exchange of goods
and services between
nations. Goods can be
defined as finished products, as intermediate goods
used in producing cther
goods, or as agricultural
products and foodstuffs. lnternational tradelnables
n"fron to specialize in
those goods it can
also enables" a country to consume
more than it would
produce most cheap.ly and efficiently.Trade
able to produce if it depended only on its own. resources.
be
Finally, trade enlarges
the potential market
for the goods of a particular economy. Trade has always
u""n irr" major force
behind the economic
relations among nations.

5.8.1 Emergence of }lodern Foreign Trade


Although foreign trade was^an important part of ancient
and medieval economies, it
acquired new
significance afterabout'l5oo. As empires and colonies
were established by
European countries,
trade became an arm of governmentai policy.The wealth
of a country was measured
in terms of the
goods it possessed, particularly gold and precious metals. The objective of an

empire was to acquire


as much wealth as possible in return lor as little expense
as possible. This form
of international
trade, called mercantilism, was conrmonplace in tne i oth
ano t ztn centuries.
lnternational trade begal to assume its present form
with the establishment of
nation-states in the
17th and 18th centuries. Heads of state discovered that by promoting foreign

trade they could mutualry


increase the wealth, and thus the power, of their nationr.
or.irinj tnis perioo
new theories.of economics,
in particular of international trade, also emerged.

5.8.2 Advantages of Trade


ln 1776 the scottish economist Adam smith, in The
wealth of Nations, proposed
that specialization
in production leads to increased output. smith believed
that in order to meet a
constanily growing
demand for goods, a country's I efficienily.
According to Smith,s
theory, a country that trades int
it has an absoruie advantage-t
partners' The country can then export a portion
_r:__ _r J,'JXt^::liffi:?
*X.;Ji,:ffi
of those goods and, in turn, import
goods that its
trading partners produce more cheaply.'smith's work
is tie f,cundation of the
classical school of
economic thought.
Half a century later, the English economist David
Ricardo modified this theory
of internationaltrade.
Ricardo's theory, which is accepted by most
.still modern economists,
stresses the principle of
comp.arative advantage. Foilowing this principre, a country."n .tirr
even though its trading partners can produce ihose goods
cornes if each trading partner has a product that
roi. J"
wiribring ["tt", iri.
at home' lf each country specializ ls in producing
the gooi." in *niJn it has a
comparative advantage,
more goods are produced, and the wealth of boin
thJuuving selling
nations increases.
"nJ1n.
GENERATING
E.COMMERCE / 155
Besides this fundamental advantage, further economic benefits result when countries
trade with one
another. lnternational trade leads to more efficient and increased world
production, thus allowing
countries (and individuals) to consume a larger and more diverse bundle of goods. A
nation possessing
limited natural resources is able to produce and consume more than it othenruise
could. As noted
earlier, the establishment of internationaltrad'e expands the number of potential
markets in which a
country can sell its goods. The increased international demand for goods translates
into greater
production and more extensive use of raw materials and labor, which in turn leads
to growth in
domestic employment. Competition from internationaltrade can also force domestic
firms to beconre
more efficient through modernization and innovatron.
Within each economy, the importance of foreign trade varies. Some nations export
only to expand
their domestic market or to aid economically depressed sectors within the home
economy. Other
nations depend on trade for a large part o{ their national income and to supply
goods for domestic
consumption. ln recent years foreign trade has also been viewed as a means to
promote growth
within a nation's economy. Developing countries and internationalorganizations have
increasingly
emphasized such trade.

5.8.3 GovernmentRestrictions
Because foreign trade is such an integral pari of a nation's economy, governmental
restrictions are
sometimes necessary to protect what are regarded as national inlerests. Government
action may
occur in response to the trade policies of other countries, or it may be resorted
to in order to protect
specific industries. Since the beginnings of international trade, nations have
striven to achieve and
maintain a favorable balance of trade-that is, to export more than they import.
ln a money economy, goods are not merely bartered for other goods. lnstead,
products are bought
and sold in the international market with national currencies. ln an effort to
improve its balance of
international payments (that is, to increase reseryes of its own currency and
reduce the amount held
by foreigners), a country may attempt to limit imports. Such a policy aims to
controlthe amount of
currency that leaves the country.
Almport Quotas One method of limiting imports is simply to close the ports of eniry
into a country.
More commonly, maximum allowable import quantities may be set for specific
products. Such quantity
restrictions are known as quotas.These may also be used to limit the amount of
foreign or domestic
currency that is permitted to cross national borders. Quotas are imposed as the
quickest means to
stop or even reverse a negative trend in a country's balance of payments. They are
also used as the
most effective means of protecting domestic industry from foreign competition.

5.8-4 Tariffs
Another common way of restricting imports is by imposing tariffs, or taxes on
imported goods. A
tariff, paid by the buyer ol the imported product, makes the price higher for that
item in the country
that imported it. The higher price reduces consumer demand and thus effectiveiy
restricts the import.
The taxes collected on the imported goods also increase revenues for the nation's
government.
Furthermore, tariffs serve as a subsidy to domestic producers of the items taxed
because the higher
price that results from a tariff encourages the competing domestic industry to
expand production.

5.8.5 Nontariff Barriers to Trade


ln recent years the use of nontariff barriers to trade has increasedr Although
these barriers are not
necessarily administered by a government with the intention of regulating trade,
they nevertheless
have that result. Such nontariff barriers include government health and safety
regulations, business
codes of conduct, and domestic tax policies. Direct government support of various
domestic industries
156 / ELECTRONIC COMMERCE

is also viewed as a nontariff barrier to trade,


unfair advantage among trading nations.
because such support puts the
aided inort[n
5.8.5 20th Century Trends

5.8.7 TradeNegotiations

rs to free trade. GATT members


held a number of
specially organized rounds of negotiations t
world trade. After the round of negotiations
signed an agreement to establish the Wor
activities of GATT in 1995. As of 1996 almost ail
agreement had transferred membership to the{\f
and WTO can be seen at section? anO- .... of this chapter.

5.8.8 Trading Communities and Customs

everything produced and consumed in the three countries.

was succeeded in 1993 by the European Union. Thr


Council for Mutual Economic Assistance (COME(
1991 as a consequence of the political and economic changes
in the Communist world.

5.9 U.5. Trade


ln 1992, U.S. exports totaled about $447 billion,
transport equipment constituted 4g.1 percent
constituted 36.9 percent. Major exports also incl
nited States, 10.1
ent, machinery a
essentialmaterial tin,
graphite, sugar, coffee,
Unit
tea, and energy resources. ln the 1960s, the
an
erosion ol its dominant
GENERATING
E.COMMERCE / 1 57
position in world trade, and in most of the years after 1970, it reported a
negative trade balance (more
imports than exports). The U.S. share of world manufactured exports declined from
25.3 percent in
1960 to less than 15 percent in 1992. The American trade deficit with Japan was
perceived to be a
growing problem.
ln 1990 world trade (exports and imports) was approximately $6.76 trillion, roughly
double the f igure
for 1980. Driven by inflation and higher prices for commodities such as oil, the
value of world trade in
U.S. dollars increased nearly tenfold between 1965 and 1985.
ln the 2Oth century trade has increased, becoming a more dominant segment of the
world's economy.
It is expected that the trend toward increasing interdependency among national
economies will continue
into the future.

5.10 Business
Business is defined as an organized approach to providing customers with the goods
and services
they want.The word business also refers to an organization that provides these
goods and services.
Moit businesses seek to make a profit-that is, they aim to achieve revenues that
exceed the costs
of operating the business. Prominent examples ol for-profit businesses include
Mitsubishi Group,
General Motors Corporation. and Royal Dutch/Shell Group. However, some businesses
only seek to
earn enough to covertheir operating costs. Commonly called nonprofits, these
businesses are primarily
nongouern.ental service providers. Examples of nonprofit businesses include such
organizations
as social service agencies, foundations, advocacy groups, and many hospitals.
Business plays a vital role in the life and culture of countries with industrial
and postindustrial (service-
and information-based) free-market economies such as in the United States. ln free-
market systems'
prices and wages are primarily determined by competition, not by governmentg. ln
the United States,
ior example, many people buy and sell goods and services as their primary
occupations. ln 1996
American companies sold in excess of $7.5 trillion worth of goods and services
annually' Businesses
provide just about anything consumers want or need, including basic necessities
such as food and
housing, luxuries suc'h as whirlpool baths and wide-screen televisions, and even
personal services
such as caring for children and linding companionship.

5.10.1 Types of Businesses


There are many types of businesses in a free-market economy. The three most common
are :

(1) Manufacturing firms


(2) Merchandisers
(3) Service enterprises

5.1I I'lanufacturing
Firms Manufacturing firms produce a wide range of products. Large manufacturers
include producers
of airplanes, cars, computers, and furniture. Many manufacturing firms construct
only

parts rather
than complete, finished products. These suppliers are usually smaller
manufactu-ring firms' which
The larger lirms then
assdmble final products for
supply parts and components to larger firms.
ma*"t io For example, suppliers provide many of the components
in personal computers,
and home appliances to large firms that create the finished or end
products. These
"onsumers.
automobiles,
larger so responsible lor marketing and
distributing the products.
The a in being able to efficiently and
inexpensively control any
parts of a production process are known as economies of scale. But small
manufacturing firms may

common in
work bestiqr producing certain types of finished products. Smaller end-product
firms are
1 58 / ELECTRONIC COMMERCE

the food industry and among artisan trades such as custom cabinetry.

5.lZ Merchandisers
Merchandisers are businesses that help move goods through a channel of
distribution-that is, the
route goods take in reaching the consumer. Merchandisers may be involved in
wholesaling or retailing,
or sometimes both.
A wholesaler is a merchandiser who purchases goods and then sells them to buyers,
typically
retailers, for the purpose of resale. A retailer is a merchandiser who sells goods
to consumers. A
wholesaler often purchases products in large quantities and then sells smaller
quantities of each
product to retailers who are unable to either buy or stock large amounts of the
product. Wholesalers
operate somewhat like large, end-product manufacturing firms, benefiting from
economies of scale.
For example, a wholesaler might purchase 5000 pairs of work gloves and then sell
100 pairs to 50
different retailers. Some large American discount chains, such as Kmart Corporation
and Wal-Mart
Stores, lnc. serve as their own merchandisers. These companies go directly to
factories and other
manufacturing outlets, buy in large amounts, and then warehouse and ship the goods
to their stores.
The division between retailing and wholesaling is now being blurred by new
technologies that allow
retailing to become an economy of scale. Telephone and computer communications
allow retail
salespeople to serve far greater numbers of customers in a given span of time than
is possible in
face-to-face interactions. Computer interfaces, because they do not require any
physical
communication between salespeople and customers, can allow close to an unlimited
capacity for
sales interactions. For example, a typical transaction to purchase a pair of shoes
at a shoe store
may take a half-hour from browsing, to fitting, to the transaction with a cashier.
But a customer can
purchase a pair of shoes through a computer intedace with a retailer in a matter of
seconds.

5.t3 Service Enterprises


Service enterprises include many kinds of familiar businesses. Examples include dry
cleaners, shoe
repair stores, barber shops, restaurants, ski resorts, hospitals, and hotels. ln
many cases service
enterprises are moderately small because they do not have mechanized services and
limit service to
only as many individuals as they can accommodate at one time. For example, a waiter
niay be able
to provide good service to four tables at once, but with five or more tables,
cuslomer service will
suffer.
ln recent years the number of service enterprises in wealthier free-market
economies has grown
rapidly, and spending on services now accounts for a significant percentage of all
spending. For
example, private services accounted for about 20 percent of U.S. spending in 1994.
Wealthier nations
have developed postindustrial economies, where entertainment and recreation
businesses have
replaced rnost raw material extraction such as the mrning of mrneral ores, and some
manufacturing
industries. Many of these industries have moved to developing nations, especially
with the rise of
large multinationalcorporations. As postindustrialeconomies have accumulated
wealth, they have
come to support systems of leisure, in which people are willing to pay others to do
things for them.
ln the United States, vast numbers of people work rigid schedules for long hours in
indoor offices,
stores, and factories. Many employers pay high enough wages so that employees can
afford to
balance their work schedules with purchased recreation. People in the United
States, for example,
support thriving travel, theme park, resort, and recreational sport businesses.

5.15.1 Forms of Business 0wnership


There are a number of different forms of business ownership. These include
(1) Soleproprietorships,
GENERATING
E.COMMERCE / 1 59
(2) Partnerships,
(3) Corporations,
(4) Joint ventures, and
(5) Syndicates.
(6) Merchants and Retailers
5.15.2 Sole Proprietorship
The most common form of ownership is a sole proprietorshipthat is, a business owned
by one
individual. Today there are more than 16 million sole proprietorships in the United
States. These
businesses have the advantage of being easy to both set up and dissolve because few
laws exist to
regulate them. Proprietors, as owners, also maintain direct control of their
businesses and own all
their profits. On the other hand, owners of proprietorships are personally
responsible for all business
debts and, constrained by the limits of their personal financial resources, they
may find it difficult to
expand or increase their profits. For those reasons, sole proprietorships tend to
be small, primarily
service and retail businesses.

5.15.5 Partnership
A partnership is an association of two oi tor" people who operate a business as co-
owners.There
are different types of partners. A general partner is active in the operation of a
business and is liable
for all of its debts. ln small businesses with only two or three owners, all will
be general partners. A
limited partner, by contrast, invests in a business but is not involved in its
daily operations.
Partnerships, like sole proprietorships, are relatively easy to establish.
Furthermore, partners can
poolfinancial resources to fund expansion, and can divide their duties and
responsibilities according
to personal expertise and abilities. For example, one partner may be very good at
selling, while
another has a knack for maintaining good financial records. As with sole
proprietorships, however,
partnerships may entail substantial financial risks, as all of the general partners
are liable for the
debts ol the business. And unlike proprietorships, disagreements among partners can
harm partnership
businesses.

5.13.4 Corporation
A corporation is a legal entity that exists as distinct f rom the individuals who
control and invest in it.
As a result, a corporation can continue indefinitely through complete changes of
ownership, leadership,
and staffing. Current owners can sell their holdings to other individuals or, if
they die, have their
assets transferred to heirs. This is possible because a corporation creates shares
of stock that are
sold to investors. One strength of the corporate business structure is that
stockholders have limited
liability, as opposed to the unlimited liability of general partners, so they
cannot lose more than their
initial investment. lnvestors may also easily buy and sell stocks of public
corporations through stock
exchanges. By offering stock publicly, a corporation enables anyone with some money
to buy the
stock and become a part-owner of the company. As a result, corporations can more
easily raise
capital for business expansion than can sole proprietorships and most partnerships.
lnvestors control a corporation through the election of a managing body, known as a
board of directors.
ln a large corporation, investors collectively decide who will oversee the
operation of the enterprise.
ln turn, the board chooses a president, who decides on the key company personnel
and helps
formu late company strategy.
Many corporations are highly successful business organizations, with profits far
exceeding those of
many sole proprietorships and partnerships. However, they traditionally have higher
tax burdens than
other kinds of businesses. Also, the fees involved in creating and organizing a
corporation can be expensive.
160 / ELECTRONIC COMMERCE

5.15.5 Joint Ventures and Syndicates


ln joint ventures and syndicates, individuals or businesses cooperate
to create a
single product or
service package' A joint venture is a partnership agreement in which two
or
more individual- or
gether to carry out a
.S._based
andToyota Motor Co
alled New
lnc., created for the
5.15.5 Syndicates
A syndicate is an association of individuals or corporations formed to conduct
a
specific financial
transaction such as buying a business. Quite often syndicates are created forthe
purpose

of buying
sports franchises. For example, the Miami Heat baslietballteam and the
Newyorkyankees

baseball
team are each owned by syndicates of individuals. Each member of these syndicates

is also involved
in the operation of other businesses.

5.13.7 Xercantilism
Mercantilism is an economic policy prevailing in Europe during the 16th, 17th, and

lgth centuries,
under which governmental control was exercised over industry and trade in
accordance

with the
theory that national strength is increased by a preponderance oi exports over
imports.

Mercantilism
was characterized not so much by a consistent or formal doctrine as by a set of
generally

held
beliefs. These beliefs included the ideas that exports to foreign countries are
preferabt-e

Ootn to trade
within a country and to imports; that the wealth of a nation depends primarily on

the possession of
gold and silver; and that governmental interference in the national economy'is
justified

if it tends to
implement the attainment of these objectives. The mercantilist approach ln economic
poticy

first
developed during the growth of national states; efforts were directed toward the
elimination of the
internal trade barriers that characterized the Middle Ages, when a cargo of
commodities might

be
subject to a toll or tariff at every city and river crossing. lndustries were
encouraged and assisted

in
their growth because they provided a source of tixes to support the large armies
and other
appurtenances of national government. Exploitation of colonies was considered a
legitimate method
of providing the parent countries with precious metals and with the raw materials
Jn'which export
industries depended.
Mercantilism, by its very success in stimulating industry and developing colonial
areas, soon gave
rise to powefful antimercantilist pressures. The use of colonies as supply depots
for the home
economies, and the exclusion of colonies from trade with other nations proouced
such reactions as
the American Revolution, in which the colonists asserted their desire for freedom
to seek economic
advantage wherever it could be found. At the same time, European industries, which
had developed
under the mercantile system, became strong enough to operate both without
mercantilist protection
and in spite of mercantilist limitations. Accordingly, a philosophy of free trade
began to take root.
Economists asserted that government regulation is justified onlyto the extent
nece.sary to ensure
free markets, because the national advantage represents the,sum total of individual
advantages, and
national well-being is best served by allowing all individuals complete freedom to
pursue their economic
interests' This viewpoint received its most important expression in The Wealth of
Nations (1776) by
the British economist Adam Smith.
The free-trade system, which prevailed during the 19th century, began to be
curtailed sharply at the
beginning of the 20th century in what has been called a revival of elements of
mercantilist philosophy,
or neomercantilism. High protective tariffs were reintroduced, and for political
and strategic reasoni,
great emphasis was put on national seltsufficiency as opposed to national
interdependence and a
free flow of trade.
GENERATING
E.COMMERCE / 161
5.15.8 Retailing
Retailingis a business activity of selling goods and services directly to
consumers. lnstead of selling
products for resale, a retailer sells goods or services to individuals making
purchases forthemselves
or their families. Some retailing businesses sell a combination of goods and
services. For example,
an automobile dealership that sells automobiles (goods) may also provide automobile
repairs (services).
Retailers play an important role in getting products from producers to consumers.
Retailers help
direct the physical flow of goods and seruices from places that produce goods to
places where goods
are used. Since the retailer has direct contact with the users of goods and
services, the retailer can
oiscover and attempt to meet the needs and preferences of consumers.

5.t4 Retailing Strategy


To be successful, a retailer must distinguish itself from other retailers and
develop a strategy for
satisfying the needs and preferences of a specific consumer group. This strategy,
called a retail mix,
involves caref ul consideration of
(1) the productto sell,
(2) the quantity at which to make the product available,
(3) the location at which to sellthe product,
(4) the time to make the product available,
(5) the pricing of the product, and
(6) the appeal that can be generated to attract the consumer's interest.
(1) The Product
Retailers strive to offer products that appeal to the tastes of the consurner, are
of good quality, and
function properly. Sometimes the product must also provide psychological and
emotional benefits,
such as prestige or convenience. For example, an expensive watch with a well-known,
visible brand
name may give its owner a sense of prestige.
(21 Quantity
Unlike wholesalers, who sell goods in quantities that often are too large to be
useful for individuals or
families, retailers sell products in small quaniities that are more convenient for
consumers. For
example, wholesalers may selljeans to retail stores in lots (units) of a dozen
parrs each. Retailers
then sell consumers jeans by the individual pair.
(3) Location
A retailer's location must be convenient. ln locating retail stores, retailers
consider the market or
town in which they want to establish themselves, the part of town to be in, and the
actual site of their
store. ln some cases, no store is involved because the right location for shopping
for a product is the
consumer's home or place of business. These retailers without stores. known as
nonstore retailers,
act as direct marketers by contacting customers directly through mail. the
lnternet, television,
telephone, or other means.
(4) Timing
Retailers must make their products availabie at times when consumers are willing
and able to buy
'them. Retailers identify consumer buying patterns and adjust such things as store
hours, inventory
levels, and promotional programs to accommodate consumers. Retailers also rdentify
specialtimes
that generate opportunities to sell merchandise, such as holidays, changing
seasons, and special
occasions, such as weddings and school graduations.
1 62 / ELECTRONIC COMMERCE

(5) Pricing
Fletailers use dilferent pricing strategies to attract different consumers.
For
example, some stores
use low or discount prices to attract economy-minded consumers, while
some
stores set higher
prices to convey an upscale image.
(6) Appeal
Retailers work hard at creating an image of their store or product that customers

find appealing.
Retailers use such promotional techniques as advertising and public relations
to
create awareness
and build interest in their products. These techniques also attract customers
to
the retailer,s store,
provide valuable information about the retailer, and persuade customers
to buy.
5.15 fiinds of Retailers
There are many kinds of retailers and they can be categorized according to their

store format. Each


format has different management and selling techniquel for satisfying thl needs

of a select group of
customers. By using different formats, retailers are able to differentiate
themselves from

their
competition.The most common kinds of retailers include specialty stores,
department

stores, discount
stores, retailchain stores, warehouse retailers, and oflprice reiailers.
(1) Specialty Stores
Specialty stores offer a limited number of different product lines, such as women,s
clothing

or sporting
goods, but provide their customers with an extensive selection of brands
and
styles within each
product line. Examples of specialty stores include those operated by Toys "R" Us,

Clrcuit City, Tower


Records, and Eddie Bauer.
(2) Department Stores
Department stores feature a wide variety of different product lines and a selection
of merchandise
within each line. These large stores have many separate departments that sell
different types

of
merchandise, making a wide variety of goods available to consumers in one place.
etoomingdatet
and Macy's are examples of two national department store chains
(3) Discount Stores
Discount stores, such as Wal-Mart and Kmart, sell a wide variety of merchandise at
low prices.
Discount retailers focus on attaining a large volume of sales and in return give up
some profit

margin
per sale.
(4) RetailChain Stores
Retail chain stores are multiple stores that carry much of the same merchandise and
are

managed
with the same policies. ln many cases chain stores have the same owner, although
sometimes
individuals own franchises that are part of a chain. Any kind of store, such as a
spJcialty stors, 6
department store, or a supermarket, can be a chain store. For example, The Gap is a
chain of
specialty stores that offers casual apparel for teenagers and adults. Sears and J.
C. penney are two
large department store chains.
(5) WarehouseRetailers
Warehouse retailers offer a limited selection of many kinds of products.They deal
in large quantities
and tend to have lower prices. Home improvement centers, such as Builder's Square
and Home
Depot, and warehouse clubs, such as Sam's Club, Price Club, and Costco, are
examples of warehouse
retailers.
GENERATING
E.COMMERCE / 163
(6) Off-PriceRetailers
Off-price retailers include factory o.rtlet stores, close-out stores, and one-price
retailers.These stores
sell irregular or flawed merchandise, factory overruns-that is, excess merchandise-
and other goods
at prices below regular retail prices.
(71 Others Retailers
Supermarkets and convenience stores are also retailers. Supermarkets offer a broad
variety of
grocerles, as well as nonfood items such as toiletries and school and office
supplies. Many
supermarkets also offer a wide selection of ready{o-eat items, such as prepared
salads, sandwiches,
and entrees. Convenience stores, such as 7-1 1 and White Hen Pantry, also sell a
variety of food and
other items. Their strategy is to provide customers with a convenient time and
place to buy needed
items. Convenience stores are usually small and located on busy streets to make it
easy for customers
to make a quick purchase.
Some retailers do not use a store as their principle means of contacting customers.
lnstead, these
nonstore retailers contact customers by telephone, mail, the lnternet, or by
personally meeting with
potential customers at their home, workplace, or some other convenient location.
For example,
telemarketers phone potential customers to market goods and services. Some
retailers send catalogs
to homes and businesses so customers ban order merchandise at their c6nvenience.
Cybermalls on
the lnternet allow customers to browse for goods and services by visiting a site on
the Worid Wide
Web. Finally, vending machine companies act as nonstore retailers by selling items
from machines
that are located where people are likely to find them convenient, such as in gas
stations or work
places.

5.15 Department Stores


Department Stores are large retail stores selling many different kinds of
merchandise arranged in
separate departments. Such stores are found in nearly every important city in the
world, and the
large department stores often contain more than 100 separate departments.The two
major categories
of merchandise sold in department stores generally are apparel and home
furnishings. Besides
making rnany diverse items available for purchase in one place, department
stores.offer numerous
services, including delivery and mailing of purchases; credit seruice, usually in
the form of charge
accounts; and fashion shows.
The organization ol a modern department store is often complex because of the large
number of
goods and services provided. Typically, the operation of a store is conducted
through five principal
divisions: the merchandising division, responsible for the buying and pricing of
merchandise; the
sales promotion division, in controlof advertising, display, public relations, and
other related matters;
the personneldivision, which superuises employment and the training and welfare of
employees;the
operations division, responsible for customer and selling seruices, for deliveries,
and forthe receiving,
marking, and maintenance of merchandise; and the finance and control division,
which deals with
accounting, customer credit, expense control, and other financial and budgetary
matters. Within
these five divisions are many subdivisions.The heads, or managers, of the five
principal divisions
are responsible to the general manager.
Some stores find it practicable to lease certain areas within the premises to
outside concerns, which
then run their own departments under the name of the department store. This
arrangement is most
frequently used for such specialized goods or services as millinery, photographic
supplies, shoe
repair, and beauty salons.

5.t5.1 History of Growth of Department Stores


Although some department stores were outgrowths of general stores, most originated
as dry-goods
stores. The lirst dry-goods store to become a department store was the Bon March,
established in
164 / ELECTRONIC COMMERCE

Paris in 1838. Bythe 1860s it resembled the modern department store in size,

organization, and
administration. Printemps, established in 1885, also in Faris, was probably
the
first store to be
opened as a department store. ln the U.S. the trend toward the transiormation of

dry-goods stores
into department stores began in the 1860s and R H. Macy & Company, lnc.,
in'N-ewyork City,
John Wanamaker in Philadelphia, Marshall Field.70s.
in Chicago, anb Jordan Marsh
Company in Boston
were among the first to be reorganized as department stores during this period.
Among the innovations that characterized the operations of the early department

stores were the


clearly marked prices on merchandise; the system of reimbursement toior exchange

of returned
goods; and the sale of ready-made apparel for men. These innovations, successful

flom the first in


attracting customers, were continued and improved on not only by department stores

but by most
specialty stores as well.

Various economic and social changes that took place in the U.S. during the last tew
OecdOes of the
19th century ensured the success of the U.S. department store. Particularly
noteworthy were the
large concentrations of the population in urban centers; the growth of a large and
relatively

irorp*erou,
middle class susceptible to the appeals of increased advertising;the intioduction
of miss methods
of manufacture;the improved methods of transporting large quantities of goods to
markets;and the
development of certain mechanical aids useful in conducting commercial operations,
for example,
telephones, billing machines, and electric lighting.
The monetary value of department store sales increased steadily during the first
half of the 20th
century. ln 1929 U.S. department stores sold more than $4 billion worth of
merchandise, an amount
equal to 9 percent of the total retail sales in the U.S. ln 1935 the department
store proportion of all
retail sales amounted to 12 percent, but it declined steadily to 6 percent of total
national retail sales
in the middle 1950s. By the late 1980s, however, because ol aggressive
merchandising practices,
such as establishing branches in the suburbs and in large shopping centers, the
storei increased
their sales to more than $150 billion per year, or over 10 percent of total retail
sales.
GENERATING E-
COMMERCE / 165
During the last decades the changing character of competition in retailing has
challenged traditional
department stores. Supermarkets added nongrocery items;variety stores expanded
their merchandise
offerings tremendously; and many discount houses increased the scope of their
merchandise offerings
and became self-service.

5.15.2 Chain Stores


Since the 1920s an increasing number of department stores have been combined into
chain
organizations, or ownership groups, with varying degrees of central control over
individual stores
(see Chain Stores). ln some cases these organizations came aboutthrough mergers of
long-established
stores, which retained their own names. ln other instances, they developed through
the creation of
new stores by an original parent organization. Two of the largest chains, Sears,
Roebuck & Company
and Montgomery Ward & Company, both founded in Chicago in the latter part of the
19th century,
were also notable as mail-order houses, publishing large illustrated catalogs from
which the public
could order merchandise directly by mail. Both firms originally served principally
ruralcommunities.
Following World War l, they opened retail outlets, which numbered in the hundreds
by the late 1980s;
Montgomery Ward and Sears stopped distributing catalogs in 1985 and 1993,
respectively. A third
major department store chain;,J. C. Penney, not only offered retail and catalog
sales but also operated
a home-shopping channel on cable television. Two other chains, Wal-Mart and K Mart,
showed
significant sales growth during the 1980s.
Other famous names included Abraham & Straus, Bloomingdale's, Filene's, Jordan
Marsh, Neiman-
Marcus, and Saks Fifth Avenue. Many had branches in large cities and suburban
shopping malls. As
the economy slumped in 1990, some of these stores experienced hardships, in part
because the
holding companies that controlled them were saddled with debt.

5.15.5 SuburbanBranches
The growth of suburbs around large cities has been responsible for an important
department store
development, the opening of suburban branches. The first such branch was
established in 1930 in
Ardmore, Pennsylvania, by Strawbridge & Clothier of Philadelphia; many other
d.epartment stores
subsequently followed its example, and suburban branch stores are numerous today.
Suburban branches often are grouped together in a shopping center, an aggregation
of retailoutlets
coordinated for the convenience of customers and the mutual advantage of the
stores. The suburban
branch is not operated as an exact counterpart of the parent store.The merchandise,
for example, is
selected to meet the needs, tastes, and desired price ranges of customers located
within a particular
trading area.
More recent methods adopted in many department stores include the self-selection of
merchandise
by customers and a cash-and-carry policy. Both methods are designed to reduce
operating expenses.
ln some stores that have adopted the cash-and-carry policy, delivery services have
been eliminated
altdgether. ln many stores an extra fee is charged lor delivery service.

5.15J Franchisc
Franchise as in government and economics, is a special right or privilege granted
to an individual or
a group to carry on a particular activity.The term is used in severalways. A
municipality, for example,
awards franchises to corporations to operate public utilities, such as electric and
telephone services,
in a given area. Rates to be charged and services to be provided to the public, as
well as tenure and
labor regulations, are stipulated in a contract between the parties. lf the terms
of the contract are
violated, the grantor may institute proceedings in order to revoke the agreement.
166 / ELECTRONIC COMMERCE

ln business, the term franchise refers to the exclusive right given


to someone to
market a company,s
goods or services in a designated territory. ln return fo-r
a-specified fee ano
usuatty a snare of tne
profits, the franchisor provides the product, the name,
and sometimes the
prrysicar pLnt and the
advertising. one well-known example of a franchised business is McDonald's,
the
fast-food restaurant
chain. ln politics, the franchise is the right of an individualto vote.

S.l7 Business 0perations


A variety of operations keep businesses., especially large corporations, running

efficiently and
effectively. Common business operation divisions inciude-
(1) Production,
(2) Marketing,
(3) Finance, and
(4) Human resource management.
O Production
Production includes those ac ualizing, designing, and
creating products
and services. ln recent years changls in t[e wiy
goods are proouceO.
Today, computers help monito perform work]Flexible, high-t6ch
machines can do
in minutes what it used to take people hours to accomplish. Another important

development has
been the trend toward just-intimeinventory. The word inventory refers to the amount

of goods a
business keeps available for wholesale or retail. ln just-in-time inventory, the
firm

stocks only what


it needs for the next day or two. Many businesses rely on fast, global computer

communications to
allow them to respond quickly to changes in consumer demand. lnventories are thus

minimized and
businesses can invest more in product research, development, and marketing.
O Marketing
Marketing is the process of identifying the goods and services that consumers need
and want

and
providing those goods and services at the right price, place, and time. Businesses

develop marketing
strategies by conducting research to determine what products and services
potential.customers
th
think e to purchase. Firms also promote their products and
seruices through
suchte ng and personalized sales, which serve to inform
potential customers
and mo e. Firms that market I roducts for which there are
always some demand,
such as foods and household goods, often advertise if they face competition from
otherfirms

marketing
similar products. Such products rarely need to be sold face-to-face. On the other
hand, firms

that
market products and services that buyers willwant to see, use, or better understand
before

buying,
often rely on personalized sales. Expensive and durable goods-such as automobiles,
electronics,

or
furniture-benefit from personalized sales, as do legal services such as the
provision of insurance
policies or tax preparation.
D Finance
Finance involves the management of money. All businesses must have enough capital
on hand to
pay their bills, and for-profit businesses seek extra capital to expand their
operations. ln some
cases, they raise long-term capital by selling ownership in the company. Other
common financial
activities include granting, monitoring, and collecting on credit or loans and
ensuring that customers
pay bills on time.The financial division of any business must also establish a good
working relationship
with a bank. This is particularly important when a business wants to obtain a loan.
tr Human Resource Management
Businesses rely on effective human resource management (HRM) to ensure that they
hire and keep
GENERATING
E-COMMERCE / 1 67

good employees, and that they are able to respond to conflicts between workers and
management.
ilnV speciiists initially determine the number and type of employees that a
business will need over
its first few years of operation. They are then responsible for recruiting new
employees to replace
those who ieave and for filling newly created positions. A business's HRM division
also trains or
arranges for the training of its itaff to encourage worker productivity,
efficiency, and satisfaction' and
to prohote the overall iu".".. of the business. Finally, human resource managers
create workers'
compensation plans and benefit packages for employees.

5.18 Business in a Free )'larket Economy

to
The economy of the United States, as well as that of most developed nations,
operates according

countries,
the principles of the f ree market.This differs from the economies of socialist or
Communist
play strong role in deciding what goods and services
will be produced, how
where governments a -ost
they w'iil be distributed, and howhuch they will (seeSocialism;
Communism). Businesses in

people in f ree-market
free-market economies benef it lrom certain fundamental rights or f reedoms. All
societies have the right to own, use, buy, sell, or give away property, thus
permitting them to own

in free
and operate their own businesses as piivate, profit-seeking enterprises. Business
owners
their businesses however they like, within the
limits of other, mostly non-
markets may choose to run

invest
business-oriented laws. This right gives businesses the authority to hire and fire
employees,
and choose the markets where
they want to operate' ln
money, purclase machinery anO
"[uipment,
people'
doing-so, however, they miy not violate or infringe on the rights of other
businesses and
Free-market businesses also have the right to keep or reinvest their profits'

degree through
All free-market economies, however, keep the rights of businesses in check to some
laws and regulations that monitorbusiness activities. Such laws vary from country
to country, but

frorn being
they generally encourage competition by protecting small businesses and consumers

Antitrust
f'uri 5y more powerful, iarge enterprises. For example, in the United States the
Sherman

that impede
Act, enacted in 1g90, anO iire Clayton Antitrust Act of 1914lorbid business
agreements
merce' T Act also
protects against unfair

^l:?l;fl:
:TJi::h"ii?:il;:;l?J;ffi:

thepricecfitsproductsorservices,amongotherprovisions.
Other laws prohibit mergers that decrease competition within an industry and
require

large merging
companies io notify the FederalTrade Commission (FTC) for approval'

5,19 Business Activities r GUllGDt Trends

their operations into


Business activities are becoming increasingly global as numerous firms expand
tap emerging
markets by pursuing
overseas markets. frlany U.S. firms, for e-xiripte, attempt to

Multinational
business in China, nOi", ["tr America, and Russia and other
f
Eastern European
countries.
at once,
typically move operations to
o do the work
well. Production jobs

'JilHiffi
:;Tffi il?:;:iyJ:; keep

I['J

businesses
domestic division, and often work them longer and harder. Most U.S.
multinational
human
resources divisions
the majority of their upper-level managem6nt, marketing, finance, and
within the United Statbs. They employ some lower-level managers and q
ua:l-lltber of their
develofing
countries. MNCs based in the
;;;"ii"; *o*"r" in oiri."., factories, and warehouses in
to Central and
Latin America, China'
United States have moved many of their production operations
lndia, and Southeast Asia.
168 / ELECTRONIC COMMERCE

Mergers and acquisitions areals becoming more common than in the past. ln tn"
unit"o;;t]
R J Reynoiol iniust''ies
uougntlooJ
:i:Tll::t?:.T"S
Brands ?:"1,1J,11!
to form RJR Nabisco l?:g,T""ufacturer
Holdings corp. in r gss, and in r ggJine-
il;.iilffi;:,silnt Nabisco
electronics, and appliance manufaclurer westinghouse
n"n"r",orl
Electric corporation
purchased media
production company CBS lnc.
With large mergers and the development of ne
now wield more economic and political power
response, public pressure has increased for bu
operate according to higher levels of ethics. Fir
required by law to observe-nondiscriminatory polic
Some companies are also now more aware of t
local communities by sponsoring events and encouri
Businesses will continue to adjust their operations according to the competing
goals of earning
profits and responding to public pressures for
them to becomJ benelicial social
institutions.
As you set out to create your own e-commerce site, keep
in mind allthat we,ve
discussed here. with
planning, hard work, and careful observation, you
can build a .it" th"t,.
flexible enough to keep up
with the ever-changing needs of your customers. And
then you'll really be in e-
business.
5.20 E.Business
t
e-business is the integration of

6nology. apart
and
plication such as e-mail, news

revolutionizing
usiness is more than e-commerce,
of business.E_
ogy to connect extended terms; reach new
and existing

:ilffi ili"il:ffffi 3::1'f:JiY;llLi,X?


i["J$:.ff :,I:
sumer.
5.20.t lntra Business
The intra business phase begins with setting up simple networks
for e-mail and
messaging which
can be upscaled to a full intranet that enablJs work-group computing.
ln today,s
worh where skill
and customer service often become the true differentiJtor, peopleiocated
away from
each other need
towork noner u
gsolutionssuch
as Lotu st that. n
y the company,s
internal We ca t
this stage when
most if not allthe business processes have been b
5.20.2 Business.to.Business (BTB or B2B)
As the term suggests, business-to-business involves connecting
a company
with its associates
downstream (distributors and resellers), and upstream with its u"noor..

oLviolsly, toiirue benefits


to accrue, all these parties must have well automated processes
that have been
Net enabled. Then
routine transactions including placing of orders and scireduling
of production can
be automated, say
at predetermined recorder levels. This speeds up the process,
Ldu.". costs and
makes the company
more competitive.

5.20.5 Business.to-Consumer (BTC or BZC)


E-commerce is the final. act, so to say, of the goods or services
being fulfilled
for the agreed
consideration.This cycle is dominated by transactions between a company and

consumers at large.
GENERATING E-
COMMERCE / 1 69
Most companies in lndia today have static websites which are meant to offer
information but not for
online shopping. lndia's best known and perhaps the first electronic shopping mall
is the rediff.com
site where you can place orders for books and music. Culturally, this is a very big
first step as people
start feeling comfortable with shopping online and actually start enjoying the
convenience. For e-
commerce to proliferate, more people on the Net, the merrier. the response on the
Net should
improve, which is a function of network speed. And we need cyberlaws to recognize
and adequately
define elements of the electronic transaction including cross border issues,
taxation and validity of
the electronic signature.
e-Commerce is changing the boundaries of where the shopper is located. Local shops
now have the
power to offer their goods to the entire world market and compete with much larger
retailers. Leverage
your investment in information technology to automate all of your transactions
between your company
and your customers.
One of the firm ECTA provides retailers a complete technology solution for
business-to-consumer
electronic commerce. The complete solution covers software components, hardware
components,
implementation, maintenance and support services, and a complete training solution
from web
storef ront design to post implementation services. Using these tools, customers
can increase brand
equity, drive growth, and provide consistent customer tnteractions through all
sales, marketing and
customer service activities, to dramatically improve the customer shopping
experience across multiple
channels.

5.20.4 Government/Public-Consumer
Finally, to complete a Net transaction you need an online payment gateway that
links the lnternet to
the existing credit card processing/validation network. The good news is that, all
this will happen
very soon. The Central Government has reportedly announced plans to introduce
cyberlaw bills
during the winter session of the Parliament. There are also plans to build a high-
speed network
backbone capable of servicing millions of users expected to go the Net in lndia.
Companies like
Equifax are planning to set up provide the required degree of convenience and
security to Netizens
wiching to transact e-commerce
The public systems are largely Government run for the convenience of its citizens.
This could
involve setting up a large number of kiosks which may be purely for information
with the Government.
For instance, paying water or electricity bills property tax and so on. The
applications are endless
and can go a long way in bringing easier access and transparency to the
Government's workin$.
Already, several states such as Tamil Nadu have announced ambitious plans to set up
kiosks all
over the state.
The transition to electronic commerce/electronic data interchange (EC/EDl) in the
federal procurement
acquisition process is moving the federal government from a paper-based to an
electronically-based
procurement system. While the concept of EC/EDl is not new to business operations,
it does open a
new arena of processes, procedures and terminology to business owners/managers
unlamiliar with
and unaccustomed to using electronic commerce.

5.21 Staying in E.Business


To f ind the nrost cost-effective marketing for your site, experiment with your
advertising while keeping
a sharp eye on your sales.Try new things: lmplement innovative banner ads, play
around with things
like affiliaie marketing, consider sponsorships - and see how your sales are
affected.
And keep at it.Your online storefront, like your business itself, must continue to
grow and change to
accommodate the evolution of your customers and products'
170 / ELECTRONIC COMMERCE

l-his flexibility is key to keeping your e-busines


over the years, you need to consianily reevalua
gVgr-chanoinrr nalrrra
ever-changing nature ^{rh^lAr^A ^^- i-
of the web can )-.. ,.
be daunting out rt can arso bring
customers, connections,
opportunities that never wourd have been possibre
and
otherwise.
5.22 The lnternet and e.Business

5.23 Electronic Commerce


A startup bookstore with the name,,Am
that raises $54 million. Federal Expres
Proclamations are made about g biilion
surrounding each of these stories, in the articles,
the term "electronic commerce.,'
So what is it? Electronic commerce, ore-commerce,
refers to alltransactions
thattake place
for the purposes of this article, it is defined
electronically;
as goods and services that are
bought and sold

online.

5.23.1 Who is Using


E-commerce is still far f rom widespread, but it has
obviously caused enough of a
buzzfor us to
up and take notice. so who is using e-commerce
sit
torlay? wrrere is the buzz
coming from?
ine purchasing right
now. The ones who have
ir investment have been
direct mail companies
lfillorders. REl, J.
Crew, and a host of smaller

you configure

shops selling

roducts have

ne are
business_to_business. ln fact, the
$500 per month
online, compared to $150/
ably due to volume
and cost as much as
uters and equipment
online (including some
y personal purchases
are more likely to be
GENERATING
E.COMMERCE / 171

5-23.2 Security Concerns


Despite the fact that e-commerce technology has been around for a while, consumers
are only now
beginning to use it in large numbers. Of course, this is partly due to the fact
that most Americans do
not yet have regular access to the lnternet. With the number of people online
jumping by 50% every
six months, though, this won't remain an issue for long'
Another concern cited by lnternet users is security. Many people leelthat
submitting their credit card
numbers across unknown computers, routers, and cables on the lnternet is like
taking a shortcut,
alone, through an alley in downtown Manhattan, at night, with their wallet showing.
An interesting
article I recently read claimed, very plausibly, that the banks and software
companies that make
money on the royalties from encryption technology actually encouraged this fear,
through the nredia
and otherwise. Whether this is true or not, deep concerns about the security of the
lnternet have
certainly become prevalent.
ls there any reason for concern? Probably not. lf you enter sensitive information
into a secure Web
site, it would take enormous amounts of time and resources to pinpoint your data on
the cacophonous
Net, assemble it together, and decrypt it. Considering that this is the same
"sensitive" information
that we routinely give to an unknown waiters in a restaurants, who take it and
disappear for several
minutes, the level of concern hardly matches the threat.

5.23.3 llow it Works


To set up a Web site that allows customers to purchase a product or service,
special software needs
to be installed on the Web server that hosts the company's Web site. Large software
companies,
such as Microsoft and Oracle, offer high-end e-commerce server software. Many other
companies,
such as mine, have found it to be more cost-effective to build their own, more
easily configured
products. Either way, what the customer ends up interacting with as they are
browsing the site is an
online "shopping basket." ltems can be added to or taken away from the shopping
basket, and the
items in the basket are remembered by the Web site until the customer is ready to
"check out." At
that time, they are taken to an encrypted part of the site. Credit card information
is entered and the
product is delivered bY mail.
On the selling company's end, the process is much more familiar. Aside from
maintaining the Web
site, the f ulf illment department simply needs to wait for the orders to come in
by email or fax. Money
is simply deposited straight into their bank account.

5.23.4 The Future of Electronic Commerce


just
Some of the directions that the industry is moving are truly incredible. VISA and
MasterCard
released the specifications for a technology that will make online cash and smart
cards more viable.
Hewlett Packard just purchased VeriFone, the makers ol those boxes that your card
is swiped
through at the supermarket. We can'l be far from the day when new computers and
public Net

you
terminals are shipped with magnetic readers that let you swipe your credit card
through them if
want to buy something online.
More and more companies are positioning themselves to reap the profits when online
shopping malls
are as ubiquitous as traditionai shopping malls. Almost all of today's Web sites
seem to be selling

just a
something, even if it's just a T-shirt or bumper sticker instead of a full product
line. Far from
trendy buizword, e-commerce is fast becoming an integral part of the lnternet
experience.
would appear that allthe hype about lnternet security is not deterring users from
buying online, as
,'lt

many ."rket insiders had predicted it might. ln fact, approximately one of three
net surfers engages
172 I E\ECTRON|C CoMMERCE

s;':"s:[:whileonline,accordingtoaneWsuryeyfromthelnternetc
Results also showed that while one in three
web suders shops during his/her
browsing
home shoppers spend more than
sessions,
$50 on average per month; business shoppers
$500 per month; and cybershoppers ui.ii"n average
spend more than
of eight storefronts per
session.,,
5-24 An Integrative yiew 0f Erectronic Gommerce

The first consideration is what unifying


the various electronic support technoio
have gained some degree of currency,

the various segments of


electronic commerce

to

Further contributions are needed, and integration


of the many useful features of
existing models
needs to be achieved' on the basis of work undertaken
in the area during the last
few years, a five-
phase process moder of erectronic commerce
is suggested in Exhibit .1.
Exhibit 1: A Five-phase process Moder of Erectronic
commerce
O The pre-contractual phase, concerned wit
products or services being sought, and
tr The contractual phase, in which a formalthr
including the establishment of the terms an
contract;
hase orders are placed and
processed, the
and post-delivery functions
(e.g. inspection

yment authorisation, pa)/ment


and remittance

is
sathered and reported,
and the storase and anarysis or trade .,",i1?i:1,"#Jl'|,T::'""
GENERATING E-
COMMERCE / 173
Exhibit 2' aller Clarke (1992a), provides a schematic representation of these
phases.
Electronic commerce can have varying degrees of impact, and Exhibit 3 proposes

a classifications
scheme. Elements of electronic commerce can be used to simply automate existing
processes.The
opportunity can be taken, however, to rationalise procedures, perhaps v.rith
m'inor impacts

on
organisational structu.res, and thereby to reduce costs, and improveihe speed and
quality

of services.
Beyond this, the implementation of electronic sut
organisational structures and processes within t
can be described as'business transformation,; whe
it is'business re-engineering'. Because these s
business partners, automation, rationalisation, tra
to internal structures and processes, but may occur across organisational
boundaries and along the
industry value-chain.

5.74.1 lmplications
It is contended that the use of an integrative model as a basis for discussions of
electronic commerce
will have important advantages. lt will be beneficialfor companies and government
agencies because
it brings into a common forum the various people who are applying computers and
iommunications
to support different phases of business processes. Discussions a-bout
prioritisation of, for example,
directory versus purchase order transmission, are provided with a context.
lndustry associations, regulators and policy-makers are also serued by the model,
because it becomes
much easierfor them to gain and retain perspective on the industry iectors and
segments involved,
and evaluate the contribution that each alternative initiative can make to
econ6mic, social and
political objectives.
Researchers are, in one sense, disadvantaged, because the model recognises the
inter-relatedness
of the many facets of industry and government activities, and hence makes it much
more difficult to
segregate areas and activities which can be readily submitted to the
conventionaltools of analytical
research. On the other hand, applied research must serve the needs of business and
government,
and must therefore reflect the real complexities of business organisation and
processes.

5.25 levels of Web Presence


There are four basic levels of Web presence. Each is more sophisticated than the
last and requires
more resources, but also produces more benefits
(1) Content Only
An electronic brochure publishes information about your company and products, but
has no interactive
ordering mechanism. lt's an easy and low-cost way to distribute information about
your business, but
customers have to log off to order, and the content becomes outdated quickly.
(2) Online commerce, but no integration with your business systems
You can create dynamic catalogs, your business can operate 24 hours a day, seven
days a week,
and you can take orders over the Web. But if it increases your business, you may
put a huge burden
on internal analog processes, particularly if orders have to be entered manually.
(3) lntegration of your Web site with your business's payment systems only
You can collect payments, but there is no easy way to build links, lor example,
between Web orders
and the inventory in your warehouse.
(4) Complete integration of your Web site with the rest of your business
17 4I ELECTRONIC COMMERCE
This requires the most planning
of your business-payment sys
3f V.our sVs
business functions_to make vorrr rtinirat "",,lrry."onrrot,
and all of your traditional
^,^:_::^::,1:.lif
*::::l::':::".:,;:::.Ti.":'o'gdo'*#;';,i;:iiff"":xiJ;3[x:1;:I:::ffi :x;
Your data center-web site
and back-end systems-shourd incrude.
a
D fi,il:'".#:ffi:r,H.?i1l^?31;:1,1::i,1?_.1web
Web server software for building s.tes and
perform orher rr funcrions
,"intoini
rntng your Web site,
such as

Lotus Domino Co
Webserverpro "nJ
o Merchant server software, such
as rBM,s award_winning Net.commerce
Domino.Merchant, which enabre
or Lotus,
furchase processing over the rnternet.

: :illJnf H:r:l"i"T ,;f ;Xn:#5, Nfi ii#l"o, ", . ".,,"'i"""


l,

ipt and d er ive ry


a Peripheralsoftwareior hanoling s;ipping, taxes, site analysis,
D A security firewallfor protectinriv"r? and
other information.
company,s network and
information.
o A high-speed telecommunicatiJn
connection iuch as it
or.
fractional r1 line.
"
n setting up a Web site.
deploying hardware an
chances are yourtime i
iness side of things.
Determine the level of your Web presence:
tr Content only
D Online commerce, but no integration
with your business systems
a lntegration with your businesjs
0 ;"6;;isystems
Comptete inregrarion with your b;"r;;;;ystems onty

5.25 Exactness of the Gontents

o identify what
entices them to patronize
g customers has
been to

offer purchasing
ograms _ direct
marketing and incentivE

5.27 E.com Web presence Xodels

on certain skits and wit entair a certain

set of responsibirities.
profit.you'il need to understand tne
type
oiwJ,ii"irn"rionarity
mponents can provide this capabiriiy,
so
that you can estimate
GENERATING
E.COMMERCE / 175
Let's examine the three most common Web business models:
tr Product sales (selling goods),
D Service sales (offering services),
O lnformation delivery (providing an informationalWeb site).
Here's an explanation of how that modelworks, along with information on the
responsibilities, costs,
and profits associated with it.
With research firms projecting e-commerce revenues totaling more than $100 billion
in 2003,
businesses large and small are considering jumping into the electronic commerce
marketplace.
The lnternet is quickly becoming a crucialfactor in many smallcompanies'growth
strategies. According
to an e-merchant study released earlier this year by lnternet market research.f irm
Keenan Vision, the
number of e-merchants will number 400,000 in 2006.
Yet, building an electronic storefront'may seem particularly daunting to small
businesses and retailers;
the maze of e-commerce products and services available makes it easy for a merchant
to get lost.
Many small companies find building and hosting a Web site on their own to be cost-
prohibitive, and
generating traffic to their sites can also prove to be a difficult undertaking.
Clearly, building the right foundation'for successful e-tailing takes careful
consideration and solid
strategy, but the step-by-step process that follows should help demystify the
process and provide an
easy{o-follow guide.
It's also important to note that a full-service transactionalWeb site may not
necessarily be the right
strategy for all merchants. lf the products or services you ofler do not lend
themselves to the Web,
or if selling online is not a key objective for your company, you may want to
consider a "brochure" site
that promotes your business and helps create foot traffic at your brick-and-mortar
office or shop. A
brochure site does not sell products or services online, but instead is meant to be
informational and
serve as an advertising/promotional tool.

5.28 Basic Steps for Conduting Business on Line


One of the most popular lnternet myths claims that building an online store is
easy: Allthe customer
has to do is point, click, and buy! But in reality, successful e-commerce is far
more complex and
unlike any other Web site project you may have tackled in the past. Before that
first cyberbuck f inds
its way into your bank account, you need to do considerable research and planning.
There are five basic steps to complete before transacting business on yourWeb
site.You may select
separate vendors to assist you in each step or look for a vendor that provides an
integrated solution.
Choosing one vendor that offers a suite of e-commerce seruices can simplify the
process (and save
time and money).
The consumer moves through the internet to the merchant's web site. From there, he
decides that he
wants to purchase something, so he is moved to the online transaction server, where
all of the
information he gives is encrypted. Once he has placed his order, the information
moves through a
private gateway to a Processing Network, where the issuing and acquiring banks
complete or deny
the transaction. This generally takes place in no more than 5-7 seconds.
There are many different payment systems available to accommodate the varied
processing needs
of merchants, f rom those who have a few orders a day to those who process
thousands of transactions
daily. With the addition of Secure Socket Layer technology, eCommerce is also a
very safe way to
complete transactions.
176 / ELECTRONIC COMMERCE
There are several basic steps involved in becoming commerce Enabled.
A Domain Name Registration
D Obtaining a DigitalCertificate
O Finding a Provider of Online Transactions
O Web Hosting
D Server Hosting
D Web Store Design
D Payment Solutions
A Creating or Purchasing a Shopping Cart Software
O Getting an lnternet Merchant Bank Account
5.28.1 Domain Xame Registration
As of not too long ago, you can now register domain names up to 67 characters in
length, including
the ".com" or ".net" or ".org" extensions. No longer will you be limited to the
previous 23 character
domain names! To protect a business it is necessary that domain names are not
copied and therefore
more are the characters more safe you are.

5.28.1.1 Tips for Registering Domain Xamds


D Register domain names that are "catchy" and in demand in the hope to sellthat
domain for
a large profit in the future (ie. bingo.com sold for 1 million dollars this
year!)
O Register domain names for your company and products that are over 23
characters long.
(For example, we registered "internetmarketingcenter.com" when before, this
was something
we could not do)
O Register a better domain name than what you have now (for example, if your
domain name
is difficult to remember, has a .net or.org extension... you can get a .com
address that will
much better suit your business)
D Register "KEYWORD RICH" domain names that are going to help skyrocket your
search
engine rankings! (That's right just by using keyword saturated domain names
you can
drastically improve your search engine rankings... really it's that easy!)
D Register your own name as a domain. For example, I registered
www.coreyrudl.com, and I
also registered a few domains for my family members as gifts!You can place
whatever you
want since www.yourname.com is unique to you. Not to mention how neat it is
to have your
own name on the lnternet.
About 5-6 years ago when the lnternet was still very new, a few people saw an
opportunity. Relying
on the idea that the lnternet was going to become massive, they started buying up
domain names.
Why? So when the lnternet did become huge and the large corporations decided it was
tirre to
capitalize on this new marketing medium, they could turn around and sellthese
domain names to the
big corporation for 1000 times the price they paid!
lmagine if you had purchased mp6 . com or gambring. com when they f irst became
available! You
would be a millionaire today with almost no work or investment on your part! Heck,
the domain
"business.com" was just sold for $7.5 million (that's right, $7,500,000)... I don't
know about you, but
most people could retire off of that quite comfortably! Bingo.com (a site a
personal friend of mine
owned) sold for $1,000,000. WallStreet.com also sold for 1 million dollars this
year... and the list goes
on and on.
GENERATING
E-COMMERCE I 177

Now don't get me wrong, this quality of domain names is no longer available'.. but
allowing domain
names up to OZ characters has completely expanded your opportunity to register
domain names that
would not have been available otherwise. All of the good one word ".com" domains
are still taken but
catchy phrases and longer company names over 23 characters are now available!There
are thousands
of domains.sold every day, some for tens of thousands of dollars, to corporations
that want the
domain you own.
To give you an idea, we were never able to register the domain name
"internetmarketingcenter'com"
because it was too long, but as of a few days ago, we were able to register it. lf
someone had
registered the name before us, we would have had to buy it lrom them at an elevated
cost. All they

that in
nad to do was register this domain for a mere 560 US and they could have charged
ten times
pure profit! (Fortunately we got to it before anyone else did!)

do this
Protect your own company names, product names, etc from people that ARE low enough
to
to you. Register your domains now! Protect yourself and your business interests'
This is also an opportunrty to get that domain name that really suits your
business'

suit your
lf you were one of the unfortunate ones that had to settle for a name that really
did not
lnternet Business or were even stuck with a .net or .org address, this is
your chance to get the
domain name that reflects your company and will be easily remembered!

a ".com"
There is a difference between .net and .com. lf you are only using a ".net" address
and not
hard earned visitors. Everyone remembers ".com"
before ".net", it's that
address, you are losing your
-bro*."rs,
if the extensio t is not entered, will default
to ".com"' So like I said
simple. Even most *"6

suited your
before, if you only have a .net address because and you could not find a 'com that
website or business... NOW lS YOUR CHANCE!
,,Keyword Phrases" are now a HOT Opportunity... a catch phrase alone can generate
a giant source of
traffic to your website. We just registered:
www . you-win-some-you-lose- some' com
rankings'
Not only are these phrases catchy but they can also boost your search engine
Search engines love url's that are saturated with keywordsl

put them in your


Think of all the keywords and keyphrases for your product/service/website and
get ranked higher in the
search engines'
URL. Load the domain name with your best keywords to
it redirect to your main
site or use it as a
Then submit that URL to the searih engines... and have
,,doorway,, page as we talk about in the course (to get a much higher ranking in
the search engines)
to forward traffic to You.

and only took a lew


Here are just a few of the exciting URI-s that will pull great in the search
engines
of
registering your first and last
minutes of brainstorming to com-e up with...The last two are example
name as a domain.
www . comPuter-networking- techni caI - support' cout
www . comPuterne tworkingt'echnical suppor t' corn

www .discount-christmas-gif ts' com


www .di s countctrri s tmasgif ts' cos
www. mp3-music-songs-artist ' com
www. mP3musicsongsartist ' co
www. pokenon-cartoon-game-toys' com
1 78 / ELECTRONIC COMMERCE

www. pokemoncartoongametoys . com


www . di s count- computer- srof tware- s tore . com
www. discountcomputersoftwarestore. com
www . eas ter-bi rthday- chri s tmas _wedding_ cards . com
www. easterbirthdaychristmaswedding.cards . com

wwlr. coreyrudl . com


www. hoperudl . com
It is that easy! lmagine if you spent a few hours racking your brain what you could
come up with.
You may have noticed that I gave examples with hyphens and without hyphens... it is
a litile known
fact that search engines prefer UREs with hyphens and visitor prefer them without
so make sure you
register both!
There are only a few companies that are registering the 67 character domain names,
and even fewer
that are reliable companies... so go to
http://www.marketingtips.com/domains.htmland start registering
your domain(s) now!
Start brainstorming and coming up with names right away and register as soon as you
can... for a
mere $60 you cannot go wrong.That is only $30 a yearfor 2 years... it does not get
any cheaper than
this!YOU CAN'T LOSE!
ln a time when a domain name is,registered every two seconds, it is becoming
increasingly difficult
to find that perfect domain name for your cause. ln such a situation, it has become
necessary to
devise a method to determine the best domain name for you.
Unfortunately, there is no straightforward method for this purpose. The best we can
do is to try to
achieve a balance between the different expectations and objectives you have about
your
domain name.

528.12 Sjectiyes
Objectives behind needing a domain name and expectations from it vary in different
degrees from
person to person. The important thing is that you have your objective per{ectly
clear in your mind.
Without a clear purpose, you may end up with a domain name that can actually hurt
your business
instead of helping it. lf you rush in, you may end up with the domain name good-
dealz4u.net instead
of ValueShopping.com when both were available. Be careful.
The question you have to ask yourself is, what are you trying to achieve with this
domain name? ls
it to develop a long-term online brand, is it supplementing an offline brand, is it
to work towards short-
term building of traffic or is it the best balance between all of these?
It is understandable to have more than one objective regarding the use of your
domain name. For
example you may want your domain name to work as a'traffic catcher'and also as an
online brand.
It is usually acceptable to have more than one objective, provided you understand
them both entirely,
clearly and separately.Yet, it is difficult to achieve all your objectives with one
domain name. lf in the
course of your search, you find the perfect balance, then consider yourself lucky.
ll not, then keep
each objective separate and work with them individually. lt is better to have two
domain names
pointing at the same site, than to have one that does more to confuse a visitor
than enlighten'him.
5.28.1.3 Your Domain Xameas a Brand
ln essence, a domain name is an lnternet address. The only technical purpose it
serves is to locate
a computer on the lnternet.Yet, taking a broader perspective, a good domain name
serves not only.
as a piece in a technical puzzle but more importantly, as your identity, brand and
personality online.
GENERATING
E.COMMERCE / 1 79

Feople may come across your domain name from an advertisement, through search
engines or
through word of mouth. ln any case, your domain name will work towards forming an
impression
abouiyour online presence. A good domain name will usually form a good first
impression in a
person's mind, but a bad domain name willalways form a bad one.
people are impressed more easily through value rather than products;characteristics
rather than
facts. lt is important to have a name that conveys what you do best, instead ol
just conveying what
you do. ln short, GreatBooks.com works better than WeSellBooks.com, and the reason
is obvious.
5.28.1.4 Your Domain Name as a Handlc
As I stated above, people encounter domain names in a variety of places, many ol
which will not
provide one with immediate lnternet access. This requires a domain name to not only
generate
interest in people, but also stay with them until they get the opportunity to use
the lnternet' Most
good domain names are eye-citchers, which me tns that it does not take more than a
glance f rom a
potential visitor for it to stick in their minds.
What's in a name? Plenty when you are an e-tailer. lt is not only your company's
brand name, it's also
your address in cyberspace. Once you've selected what that name will be, you must
register it with
interNlC, the agency that registers and maintains a database of domain names.You
can obtain a
domain name d-irect-ly from one of many providers - NetworkSolutions.com and
Register.com are
just two examples of these registrars. However, your lnternet Service Provider or
your e-commerce
service vendor(s) will often perlorm this task for you.

5.28.2 0btainingaDigitalCertificate
A digital certificate, also known as a SSL Server Certificate, enables SSL (Secure
Socket Layer
encr:yption) on the web server. SSL protects communications so you can take credit

card orders
cannot eavesdrop on you. Any egommerce
company will require
secuiely and ensure that hackers
you to have SSL before you can use their services.
Thankf ully, for most people obtaining a digital certificate is not a problem. For
a minimal

fee, one can


usually uie the certificaie owned by the web hosting company where your page
resides.

5.28.3 Finding a Provider of Online Transactions

you
Before you start looking for a provider, you should stop for a moment and consid-
er what exactly
completing in a month?
How many products do
need. How many translctions do you expect to be
the software need to
be? How much are you
you have to put on your web site? How complex does
willing to spend?
There are a lot of online transaction providers out there, and they all have
varying packages. Deciding
on a provider's package that fits your needs is perhaps the most important aspect
in creating

an
eCommerce website.

5.28A Web Hosting

the
Web hosting is a very important step in this process, as this is how you gain a
presence on
internet in the first Place.
It is important that the web hosting company is capable ol providing you with the

level of service that


you need to maintain your web store. A few things to look for are:
o Good uptime
o Good technical suPPort
D Fast connection to the Net
180 / ELECTRONIC COMMERCE

tr Staff that is knowledgable about eCommerce


D Compatibility with major eCommerce providers
It is always good to spend some time when choosing a web hosting company, as there
are many'fly-
by-night' businesses out there. For the money you're spending, make sure that the
compahy is
reputable.

5.28.5 Server Hosting


Another major decision that businesses joining the electronic marketplace must face
is whether to
buy a server and host their Web site in-house, or to outsource the entire operation
to a service
provider. For many smaller businesses, outsourcing is the most viable and cost-
effective option.
Establishing your own operation is complicated and can take several months' setup
time, whereas
you can get set up in less than an hour if you use a hosting service. A hosting
service willalso speed
the time it takes customers to download pages on your Web site, improving the
customers'experience
on your site.

5.28.5 Web Store Design


The key decision at this step is to determihe whether you plan to build your site
yourself or have a
provider build it for you. lf you choose to build your site yourself (either by
purchasing a related
software package or using a "browser-based" store-building package that you
download from the
Web), keep in mind you will not only have the initial task of construction but also
the ongoing
responsibility of making modifications to the site.
With many Web-building services and software products available to assist
businesses in designing
a Web store, you do not have to take on this project by yourself. However, even
with a Web-building
service provider, you still must consider several critical issues to ensure that
the site you build
meets your vision and needs:
D What products/services do you want to sell?
O What do you want the look and feel of your logo and your site overall to be?
D What type of navigation tools do you want to use?
A By what forms of payment do you wish to transact business?
O How are you going to calculate tax and shipping charges?
tr YourGoal
What do you want out of the internet? On-line Sales? Customer Service? Electronic
Brochure?
Product Support lnformation? ln order to be successful, you must define your goal
upJront and work
towards it.
O YourTarget Market
Who are you trying to reach? Who are you selling to? Who are your prospective
clients? Along this
line, who is your competition?
tl DomainName(www.yourcompany.com)
What do you want for your internet address? Go to www.networksolutions.com and type
in an
address. ls it taken? lf not, you can register that domain name lor $70.
O Web Hosting/lnternet Access
Your internet site needs to be stored on a server so that everyone can see it on
the internet. Web
hosting can cost as little as $19.95 per month.
O Site Planning Outline
GENERATING
E.COMMERCE / 181

How many pages do you want? Which buttons should be accessible on the front
page?
ls there a
form? The navigation of your site has to be quick, clean and simple'
tr Design &Writing
you must go through and write out the content. Do you have a logo, pictures,
artwork? Think through
p"g-" you dlsignated above in site planning. Write the copy and the
associated artwork
"u"ry
required.
O Put Your Site "Live" on the lnternet
At this point, all the internet pages and graphics are copied to.the web hosting

provider. Now,
can type in your domain name (www.yourcompany.com) and see your site
on the internet'
everyone
O Register with Search Engines
with the top
search engines -
How will everyone find you? Your neW internet site must be registered
Yahoo, AltaVista, Excite, HotBot, Snap, GoTo and others'
O lnternet Marketing

people to find

for
This is where you get your people. You have to put little crumbs all over the
internet
you. These crLmUs inttuOe banner ads, E-mail marketing, guaranteed click-
through with GoTo'com,
links with other sites, etc.
UpdateYour Site
Every time there is a change, new product, new service, new price, new event

schedule' new press


release...Put it on the internet.
is the
Goal?" Many sites
The most important question to answer in developing your web site..'"What
don't receive any responses at all. Pretty
disappointing if you
lack any focus or direction and likely
were expecting instant fame and fortune.
Pick one of these common goals to build your site around:

Fig 5.1 Catalog


182 / ELECTRONIC COMMERCE

o lntroduce your company to everyone - outline of products/services,

contact inlormation,
brief info
o Detailed information about products/services - spec sheets, pictures,

answer questions
O Collect sales leads to follow-up
D Provide opportunity for quotes on the internet
O Sellproducts(E-Commerce)
To be able to get sales leads, information for quotes, requests
for catalogs, or
demographic information
about your customers, have them fill out a short form on the internet.
You have to get written a small script that will turn the information
in the form
into a legible E-mail that
you can then follow-up with.

It can be intimidating to write a whole web site from scratch. But,


many times you
already have
much of the copy sitting right in your office - brochures, pamphlets,
annual
reptrts,-newsletters,
customer testimonials, etc.
Take these items to start organizing the pages and content.
Then, go back and fill
in the holes with
new text' Keep in mind the web site should flow from page to page
with a
consistent, easy.to-read
writing style.
While the graphics, music, animation and flying images all nice; rarely
do
they communicate what
the web site is trying to say. People go to we-b m-ainly to get information,
piices, f roouct specs,
phone numbers, maps _ content. "ites
wh.gn possible, it's great to link up to a database to provide your customers
with
real-time access to
their personal information about orders, jobs in production, iccount balances,

etc. Another internet


service we can help you with.
We can definitely help you write some of the copy. We will sit down with you
and
really try and get to
know your business in order to get the right conie nt on your site.
O What does your business do?
D What are the main products/services?
O What does the customer need to know?
O What questions would the customer have?
O Does your business have a color identity?
lf you're company is a propane company, then you might want dark
blues and light
blues to look like
a propane flame. lf you're company is about gardening, you'llwant to use
a lot of
greens and bright
colors.
What colors make sense for your business? We will build your web site using colors
your

customers
can identify with.
Do you need special artwork drawn or created?
We can either convert existing graphics to GIF or JPEG al72 dpi. Or, we can draw

or create special
artwork that you don't currently have. lt costs extra but can have a very strong,
supporting

visual
impact.
GENERATING
E.COMMERCE /1S3

Do you need photos scanned?


We scan slides, transparencies, photos, line art _ anything up to 1 1x17,,. We
will convert these to
JPEG files at 72 dpi.

Besides using the internet as an advertising/brochure tool, it is also very


powerful in its ability to
retrieve data out of databases. Whether it be account balances, order siatus, or
simply finding
information from a search engine like Yahoo they all require data to be stored in
databases. We
- NT and Linux (Unix)
have experience in building databases for both servers.
Once you've made these decisions, you are ready to develop your product catalog.
you'll need to
provide necessary information on each product, such as description, color, size,
Lnd price. This
catalog is expandable, so that you may add to it as your business and product
offering grows.
After the product catalog is completed, your Web building vendor can publish your
Web site online.

5.28.7 PaymentSolutions
ln order to become truly e-commerce enabled, you must have the following:
D Payment software
tr A merchant account
A Payment processing services
D A gateway to connect all these elements of the payment process.
You also will need cash register software to help easily calculate sales tax and
shipping charges, and.
you may want to include a shopping cart function as well.
ln order to start transacting business and accepting payments, you must first open
an account with
a merchant bank. Once you have established an account, your merchant bank retains
the services
184 / ELECTRONIC COMMERCE

of a payment processing company to "acquire" transactions of your


customers,
secure the funds
from the customers'credit card issuer, and place that money
into your merchant
account. This is the
last part of the payment solutions equation

5.28.8 Shopping Cart Software


Shopping cart software is an operating system that can be used to
allow people
to purchase your
items, keep track of your accounls, and tie together all of the aspects
of your
ecommerce site into
one cohesive whole.
while there are many other types of software that you can use in it's place, such

as catalog software.
or a flat order form, shopping cart software is the most popular and
the most
widely known.
Many Online Transaction Providers will have shopping cart software
that comes
with their service,
but it can often be very expensive, so be warned. if you cannot afford
to spend
at least a couple of
hundred dollars on this software, you should b r looking for a package
that
offers it as a rental
included in the monthly service charge, or one that offers a simpie flat order

form.
5.28.9 Getting aR lnternet |lerchant Bank Account
ln order to be able to accept credit cards over the internet, you must apply to
your

bank for an
lnternet Merchant Bank Account. This can be reletively easy or somewhat oifficutt,

depencling on
which country you live in and what bank you are with.
U.S.A.:
ln the US, this is a fairly simple procedure. Many banks offer lnternet
Merchant
Accounts, and most
online Transaction Providers will support them. see your bank for details.
lnternational:
Since the vast majority of Online Transaction Providers are located in the US and

are restricted in
their ability to interact with banks outside their own country, international
merchants

have very litle


choice. An international merchant has to find a way to gei a US merchant account,
embark on the
equally difficult task of finding a local OnlineTransaction Provider, or utilise
one of the

few companies
that services the international market. Also, many banks outside the US have very
restrictive policies
regarding internet accounts. Luckily, the situation is improving, and most Online
Transaction providers
will help you with this if you get in touch with them.
ln the ratings section, I have included information on which providers give
internationalservice.
Here are some additional issues to keep in mind when you apply for a Merchant Bank

Account:
D A US merchant account can take up to a month to come through.
O lf you already have a merchant bank account, you will probably atso need to
upgrade it to
an lnternet account.
Ensure that your bank accepts lnternet merchant accounts and has credit card
processors

that can
connect to FDC, Paymentech or CyberCash.

5.28.t0 TrafficCoverage
"lf you build it they will come."
lf only it were that easy with e-tailing. However, no matter how great your Web
site is, no one will
come to it if they don't know you are there. This is where driving traffic and
transactions becomes an
essential element of your e-commerce plan.
GENERATING
E.COMMERCE / 1 85
The first step in building traffic is registering your site with search engines,
Again, there are vendors
that will do this for you. For registration, you will need to think ol "meta tags"
or keywords that will be
associated with your site.
ln addition, one old rule that still holds true in the virtual economy is
"Location, location, location."
Much like putting your store in a real shopping mall, having your storefront in a
shopping portal not
only gives higher visibility but helps draw in "window shoppers."
Another advantage of being a part of a virtual mall is the possibility of cross
promotions with other e-
stores. You can establish relationships with sites that reach a similar demographic
group and offer
premiums in exchange for links, referrals, and demographic information. For
instance,,you and another
e-merchant could include taglines about each other's stores in your purchase
confirmation
e-mails.

5.29 The Seven Deadly Sins of E-Commerce


The road to successful E-commerce can be iiddled with pitfalls. Armed with the
proper knowledge,
you can avoid the costly mistakes that have put many online merchants out of
business, even
before they really got siarted. ln this.article, the E-Commerce Times,identifies
ihe seven main
stumbling blocks to E-commerce and offers easy solutions to ensure the survival of
your crnline

I
store.
(1) Over-Engineering
,,, i

A common mistake is to attempt to develop a site that turns out to be too,complex


to ever be
implemented. Often, well-intentioned projects never get off the ground due to
unrealistic and convoluted
plans. ln many cases, the challenges created by new and unfamiliar technologies may
be too great
to overcome initially, and the new online store can be greatly delayed or abandoned
altogether, as
technical costs mount.
To avoid over-engineering your online store, start simply by identifying the most
basic goals of your
online store and f irst implement those. When the basic system is in place, you can
always add on all
the bells and whistles
(21 Biting off MoreThanYou Can Chew,
,
E-commerce can involve a highly complex combination ol equipment choices, Web site
building and
hosting issues, as well as security and billirtg,technologies... And the list goes
on. lt is easy to
attempt to resolve all these issues when seiting up shop, but the smarter strategy
may be different.
lnstead of biting off more than anyone can chbw, we recommend choosing hosting
services that
provide turnkey solutions.
For example, when starting, why not use a service like Yahoo! Store, which tal<es
care of all the "big
decisions" and highly technical issues? lnstead of trying to become an expert in
all thesd areas, let
Yahoo! Store, or any other high-qualitystcire-hosting service worry about fending
off lnternet hackers,
as well as hardware and software issues that only the top computer networking gurus
can handle. ln
this way, you can concentrate on selling your product while delegating much of the
technical chores
to others.
(3) Forcing a Square Peg into a Round Hole
Just because a particular product sells well in retail stores, it is easy to think
that it will, by necessity,
sell well online. Not so ... ln fact, many products cannot be sold easily over the
lnternet because of
factors like high shipping costs, high product liability issues or the n€ed for
personal salesmanship.
Before opening your online store to the public, evaluate your products' suitdbility
for online sales.

l
186 / ELECTRONIC COMMERCE
Ask yourself some questions like:
o would-your prices entice shoppers to purchase your product online rather than
from retail
stores?
(41 Neglecting Security lssues
lnternet hackers have become a household wor

specialized security software. lf you are a beginn


seruice take care of security issues.
(5) "Going lt" Alone
E-commerce pioneers generally share an innovative and entrepreneurialspirit, which
may

well be the
underlying secret of their success. However, when considering the vast complexity
of E-commerce
issues, it would be a mistake not to outsource some of the E-commerce setup tasks
as needed.
ln many cases, even when using a turnkey hosting service like Yahoo! Store or
GeoShops,

many
new E-commerce stores never succeed due-to a of iack of professionaldesign and
marketing

know-
how. Rather than undertaking a long and difficult process of planning, onty"to
stumble

on the final
design and presentation of the store, consider retaining an E-commerce-ori-enred
Web development
agency. Don't "go it" alone, if you have the option of having professional,
experienced backup.
(6) Design Faux Pas
To run an online store, sophisticated tec
or as it is
often termed, the "back-end." However,
sees the
'Tront-end," i.e., what is displayed in the sh

designed
interface is needed. Without a professional,
out, even
the most sophisticated back-end technologies wi
Likewise, cluttered Web pages that make it difficult to navigate your site or make
it difficult for the
shopper to know how to place an order, can cause an online store to fail. lf you
are serious about
building a successful E-commerce site, make sure that your site works to ybur
advantage, rather
than a cause of lost sales opportunities.
(71 Neglecting theTelephone Number
It is a little-known fact that for many online stores the point of sale is not
online, at all. Rather, a
typical scenario might be that the shopper browses through the site, researches and
compares
values, but then f inally places the actual purchase order over the phone. Yet many
sites fail to make
a phone number available for ordering.
To respond to shoppers'preferences, a phone number should be listed prominently on
every page of
the site.
By nature, the lnternet is a global medium and a toll-free telephone number would
be highly
recommendeded. lt helps convey to the shopper you are a reliable source, and helps
boost confidence
that you will be there to provide customer service, if necessary.

5.30 E-Commerce Software Example


How do you like to shop? Do you take all day and browse around until something
catches your eye?
Or do you march right up to the clerk and say, "l need a cheap widget with a
whoziwhatzit. Got one?"
GENERATING
E.COMMERCE / 187

It probably depends on what you're looking for, right? I rarely find myself
wandering through an auto
supply store, trying out different spark plugs and seeing which ones strike my
fancy. And only once
or twice have I gone to the checkout stand at Safeway and said, "l'm looking for a
brownish butter-
like substance made out of peanuts - perhaps something I could spread on bread with
jelly. You got
any of that?"
See, the product that you're seeking often defines how you shop for it. This is an
important concept
to remember when creating your online presence. What exactly is your product? Who
is your target
audience? How will they want to interact with your company, and how can your site
enhance this
interaction?
Many Web-based stores allow you to search through their stock by category or by
keyword' These
methods are, for the most part, derivatives of the technologies that make the
soltware work; databases
and file systems are quite effective at categorizing things. But are the customers
at your site going
to find shopping by category intuitive? ls that the best approach for you?
Let's take a look at the different kinds of products that are out there and how
actual companies are
custom-fitting their Web sites for maximum effectiveness.

5.30.1 Getting Started


Say you're working for Computer Chip Corporation, the world's leading supplier of
computer memory
prodlcts.Your CEb is catching up on the past several months of business journals,
when the light
bulb switches on. Those screaming headlines just can't be ignored: "Consumer E-
Commerce Will
Jump to $26 Billion by 2OO2" and "U.S. On-line Business Trade Will Soar To $1 .3
Trillion By 2006J'
More important, the competition is rumored to be working on its own e-business
plan. So the big
boss meets with the board of directors, and after a long, heated debate, they
callyou in to tellyou
they want to open CCC's cyberdoors in (gulp!) six weeks.That should be plenty of
time, they insist.
After all, the CEO's daughier (a sophomore at Berkeley) built her own online store
in a mere three
weeks, so she's selling enough Beanie Babies to put herself through college.
"Surely we can sell our
RAM computer memory chips for less? You know, direct to the customer?" the board
chimes in unison.
Don't panic. Six weeks may sound a bit tight, but it's still not a hellish 24-hour
turnarbund. With the
right planning and a little luck, you just might make it. So calmly say, "l'll get
right on it," and then
irimediately iegister the domain name ramforless.com with lnternic. (Actually,
you'll have to come
up with your own name since ramforless.com has already been grabbed for the
purposes of this
tutorial.)That done, take a deep breath and then read the rest of this tutorial in
its entirety. By looking
before leaping, you'll learn about allthe e-commerce gotchas that can hit you
unexpectedly' Planning
ahead witi noi only save you quite a bit of redevelopment time down the road, it
will also help you
make educated decisions as you choose the right e-business solution for your
company.

5.30.2 Adding Value


ln addition to the methods described on the preceding page, a number of companies
have taken
advantage of new technologies to deliver even better service and environments to
their customers.
These aien't storefront solutions in and of themselves, but they can work as
excellent supplements
to other systems.

magically
Brightware uses its 20 years of artificial intelligence knowledge to interpret
natural language,
allJwing its system to answer customer questions. Brightware claims that,
with some training, its
reply to 80 percent of common seruice and sales
inquiries, regardless of
system-can automatically
Brightware can then route the remainder
of the questions to your
hbw the questions are p-hrased.
customer service department for answering.
1 88 / ELECTRONIC COMMERCE

This technology has also been used by financial, mortgage, and health care
companies

to determine
their customers' needs and then actively recommend i piepareo solution. s"v
gooJbv"

Ln"" and for


all to door-to-door insurance salesmen.

of collaborative filtering, an
automated merchandising
omers with similar purchasing
histories. Say a customer
nture reading and buys 20,OOO Leagues
UnderThe Sea
buys Moby Dick and The Hunt for Red
October. These
nformation and recommend The Hunt for
Red October to
the first customer and 20,OOO Leagues Under the Sea to the other customer. By
using

this system,
you're basically letting your customers with similar interests make
recommendations

to each other.
And the more they buy, the more accurate the recommendations will become. pretty

cool, eh?
dd value to your site and stand
out in a possibly
and whistles, you may want to
begin simply and
front line knows a lot about
what your customers
icate with them. Find out
what your sales team is
. see how this method worked
for ramforless.com.
5.50.5 Transactions
So your custome;'s have shopping carts fullof your widgets. Congratulations! But
don,t

start counting
your chickens:You still have some work to do befo'e you make those sales.You

can't send customers


their products until you calculate the bottom lines. And more importantly, you
still need to determine
whether they have the funds to pay for their purchases. So before you accept those
orders, you'll
need to calculate tax, determine shipping costs, and securely process the
customers, preferred
methods of payment.
The good news is that a number'of software companies have been hard at work over
the past few
years, making thig part of the process as painless as possible. The bad news is
that it

may not be as
plug-and-play as you had hoped.
.
The key is to {igure out which solutions work well with your company and your
customeis and are
also compatible with whatever e-commerce package or tommon application programming
language
you'll be choosing in Lesson 4. Since you may have to make some compromises with
either

the e-
commerce package or the plug-in software solutions, your best bet is to examine all
the options
outlined in this lesson and Lesson 4 befdre unwrapping the cellophane on any
software.
Let's get started with a look at the dreaded taxes.

5.50.4 Don-t ).less with Taxes


ln California, certain "necessities" like food are generally not subject to tax.
Clothing, on the other
hand, is' lf you'ne doing business in New Jersey, however, and you're shipping a
piir of designer
jeans to the UpperWest Side, then there's no tax - in New Jersey, clothing is
conlidered

a neceisity
and therefore is not subject to tax. Keeping track of these rules andlxceptions is
an ongoing
challenge. But wait, thprels more. you stili have to figure out how much to cna?ge.

- -'
There are hundreds of different sales-tax rates within California alone. First you
have state tax.
Different counties also have additional rates. And then some cities add a perceni
or so on top of that!
ln San Franclsco, sales tax is 8.5 percent. Drive across the Golden Gate Bridge to
Marin and its 7.25
percent' Aorc,s the Bay Bridge in Berkeley it's 8.25 percent. And each state is
different.
lf you're doing business internationally, things are further complicated by
tariffs, customs fees, and
GENERATING
E.COMMERCE / 1 89
other potential charges. Did you know that in one part of Canada, even tax is
taxed? This must be
where the people who fled Boston after the Tea Party settled.
Besides dealing with wildly varying tax rates, you also have a little thing called
nexus to contend
with. Nexus is a legalterm meaning roughly, "where you have a presence doing
business." ln the
United States, you are obligated to collect, report, and pay sales tax in states
where you have a
nexus. The important thing is that nexus is a legal term, so you should seek the
advice of your tax
attorney on this issue.
You should also work with your attorney to develop a tax policy. Of course, you can
always do what
Apple did when it launched its first online store: Just say, "Applicable sales tax
will be added to your
orde/'and then let someone else, usually a lulfillment center, figure it out for
you using its preexisting
taxing systems. But to make sure your customers can pay the full amount of the
orders before you
process them, you'll need to calculate the tax yourself. There are several packages
and services
that automate your tax calculations.
Taxware offers tax calculations for domestic and internationaljurisdictions either
over the lnternet or
as an independent software module.
CyberSource integrates tax and other transaction features on an on-demand service-
bureau basis,
meaning that you tap into its software via the lnternet rather than installing the
software on your own
system.
Both of these solutions have advantages and disadvantages, and they're always being
improved
upon and updated. So you'll need to do a bit of research on which option is the
best fit for your e-
business. Check out theirWeb sites for the features they offer and the e-commerce
systems (covered
in Lesson 4) they're compatible with. See whether their clients offer products or
services similar to
yours. You may even want to send an email to people at the companies that use these
solutions to
inquire about how satisfied they are with the products.
However you decide to deal with the tax hurdle, your next challenge is to figure
out how to get your
product to your customer and what to charge for the service.

5.50.5 Shaping Up and Shipping Out


One of the most important things to remember about shipping is that the cost of
sending your
product isn't necessarily the amount you'll want to charge your customer.Your
actual costs may be
more related to delivering convenient customer service.
For example, Naturalfoods.com offers lree shipping on orders above a certain dollar
amount as a
tactic to increase the average size of orders.Yet other online grocers, such as
Peapod, charge extra
for the convenience of door-to-door delivery.
Many online merchants have adopted the best practices of the direct-mail catalog
industry by charging
fixed amounts for shipping and handling based upon the dollar size of the order and
limiting customers'
speed-of-delivery options to regular, faster, and fastest.
Which tactic should you use? Again, you'll have to research the approach that will
work best with
yaur customers.There are several packages and services you can review to help you
decide-
Tandata otfers shipping calculations based upon the shipping tables updated by
major parcel services'
And its Progistics Merchant product can be used with a variety of e-commerce
systems.
UPS and FedEx have opened up their interfaces to developers via the lnternet, and
off-the-shelf
storefront packages are available as ready-made plug-ins to these services. (Check
out each service's
Web site io teain more.) This means you can get real-time pricing as well as
shipment tracking
numbers for each order.
190 / ELECTRONIC COMMERCE

Another important thing to remember is that shipping costs vary by weight. lf


you're selling more
than one product, you must find a way to provide weight information about each
product for whatever
shipping solution the customers choose. So be sure your product database has a
place to store a
weight value.
You'll also need to provide the addresses the parcel is shipped from and shipped
to. Make sure you
let your customers know when P.O. boxes are going to be an issue, and don't forget
to ask for their
desired speed of the delivery. Your customers will appreciate that!

5.50.5 Back to Ramforless.com


The requirements for ramforless.com are pretty simple. Luckily, you decided to re-
key the orders into
the old-school mainframe system, which already calculated tax, added shipping
charges, and checked
credit cards. To keep your customers happy, however, you want to let them know
exactly hcw much
will be charged to their card.That means figuring out how to get the tax and
shipping totals out of the
creaky old mainframe and display them in real-time on the Web.
To make things more confusing, even though the Computer Chip Corporation is
headquartered in
Silicon Valley, the company has manufacturing facilities in California, NewYork,
and lowa, which is
where the chips are stored and shipped f iom. Terry, the tax attorney, says you'll
have to collect and
pay taxes on any orders shipped to those states, regardless of where you're
shipping from.
On the shipping and handling end of things, Frank in fulfillment wants to charge
handling fees in
addition to shipping costs. So he recommends that you keep things nice and simple
with a flatJee
charge on orders with a certain number of items that need to be packed and shipped.
Extra charges
would be added for express shipping: Shipping and Handling Charges

Fast Faster
Fastest
1 to 4 chips 5.00 8.00
20.00
5 to 8 chips 10.00 14.00
26.00
9+ chips 1s.00 18.00
32.00
Amy in accounting says that she can handle debiting the credit cards through her
existing system,
but you still need to find a way to make sure the credit card numbers coming in are
secure and
authentic.
So you have a variety of business rules to implement. Taxes need to be automated,
shipping is
totally custom-built, and credit cards only need to be partially processed. And you
need to find a way
to bring it all together. Most importantly, you need to do it for less than the
reported $100 million that
Barnes & Noble is putting into its Web site.
So you're in for a bit more work than simply opening up the latest e-commerce-in-a-
box solution.You
need to do additional research and then decide whether you should build, rent, or
buy an e-commerce
solution. Don't fret, though. l'll walk you through all of these options in Lesson
4. Soon enough, you'll
be up and running.

5.5;0.7 SelectingE-commercePackage
You've waded through your requirements fortaxes, payment, security, and
shipping.You've established
how your site will have to work in order to please everybody, f rom the CEO to the
legal department to
the design team to the customers. You finally have a clear idea of what needs to be
built and have
determined what software plug-ins (Taxware, Tandata, etc.) best meet your
requirements. Now you're
ready to shop around for an e-commerce package to juggle all of this for you.
GENERATING
E.COMMERCE / 1 91
ldeally, you'll find an e-commerce package that's compatible with the tax, payment,
security, and
shipping solutions you've decided to use. But you may not be so lucky. ln that
case, it would
probably be a good idea to take all of your various requirements for the operation
of your site and
rank them.What's the most important feature? What features could be compromised?
Does the site
have to automatically calculate state tax on the fly or can you get away with just
saying "applicable
state tax will be added"? You don't want to skimp on anything, of course, but you
should know where.
you have room to manuever. That way, if you find a solution that meets all but one
of your needs,
you'll know if you can live with it or if you'll have to go with your second
choice.This kind of planning
and flexibility will keep the potentially tricky experience of finding the perfect
e-business solution as
simple as possible.
So grab that inch{hick stack of e-commerce advertisements that have been cluttering
up your desk
for months. Look at those catchy slogans: "E-commerce in a box!" "lnstant
storefront!" "Try it; yott'll
like it!"Yikes! ls this software or a new kind of breakfast cereal that works with
that other breakfast
technology? Let's cut through the hype and break it down real simplelike.
Basically, you have three options:
D Buy a ready-made solution.
O Rent space in a network-based e-commerce solution.
O Build the system from scratch with components and parts.
It's sort of like buying a car. You could buy a new one and, depending on your
budget, get some
additionaloptions configured the way you like. But it could get outdated
eventually, and you'd have to
drop more cash for another one. Or you could lease one for a few years, but then
you couldn't paint
flames on the side since you don't own it. Or if you really wanted to, you could
build your own dream
hot rod, but you'd better be a good mechanic to get that fuel-injected machine to
run smoothly.
Let's take a closer look at your options and figure out which will work best for
you.

5.30.8 Buy, Lease, or Build?


Option 1 Buy a ready-made system that closely matches your specifications'
This approach will give you a standardized set of e-commerce features with a few
additional business
rules built in as a bonus (like the options on a new car). lf your business needs
closely match what
the package offers, buy it!This will save you money and a good deal of time. lf the
system is lacking
some of your prioritized features, however, you may want to think again. The
solution may be a good
fit right now, but will likely become obsolete as more and more features become
necessary later on
in development. Trying to add these new features may mean custom work and training
in the software
down the road. Be sure to budget for this ahead of time, if you're considering this
option.
Also count on shelling out additional bucks if you want to automate payments, tax,
and shipping.
You'll need to buy additional products and get them installed, conligured, and
integrated. Luckily, it's
fairly easy to install plug-ins into most of these types of systems. Ready-made
interfaces are often
included for payment, tax, and shipping applications such as CyberCash, Verifone,
Tandata, and
others. But always be sure to confirm that your required programs are supported.
Again, ranking your
features beforehand will help you at this stage.
Solutions to review
Take a look at lntershop 6.0, iCat Pro, and IBM Net.Commerce for starters.
Option 2 Rent space in a network-based, e-commerce solution.
192 / ELECTRONIC COMMERCE

These solutions are frequently inexpensive and include


many common
features.They,re fast because

Ii":i":"":llj:,': ::T,:':SI*I::gltl: yeb:y;,oon;i;; i; instal any


sortware;you just pick
some serting., pour in your product
inro'."'"ifl.iilil;r1;'#":fi:UX
ill?:fi...:ljf;? "ni

and feel that you want.

on and configuring, but

great if there's a good

ll end up frustrated and

A Solutions to review
Try lntershop ePages, icat commerce online, andYahoo
store for some plug-and-play
examples.
option 3 Build the system from scratch to your specifications.
need but will require
expertise, time, and a sizable
n build the features and
functions you need to be
you want to offer discounts
every second Tuesday

There are a series of application engines out there to help you


get these features,
but you can create
acommerce program

business interfaces
were created in perl

Microsoft's Active
Server Pages anO nt

sic has rereased a


new pratform based'

ctive Server Page


technology.
When taking this path, you'll need to design databases from
scratch and then
integrate tax, shipping,
and payment processing software modules with the maln application.
ASp and
coldFusion have
third-party sorutions to herp you streamrine
your transaction
that you're comfortabre deveroping
apprications on this rever.
rf
merce systems developer (like, ahem,
eMergingMedia)

to help

O Solutions to review
Check out Allaire coldFusion, lntershop Enterprise Edition, Microsoft
Site server
commerce Edition,
and Pandesic 6.0.

5.30.9 Chart Your Course


when evaluating these various solutions, you should not only considerthe
cost
much it will cost to customize it to suit your individual needs. 6ften
what looks
lik
at the outset can end up eating away at your budget as you
try to add new featu
This diagram surveys the solutions we've mentioned so far, charting
them according
to initial cost
versus the additional expense of customizing them. Those products
in red are the
standardized off-
the-shelf solutions, those in green are the rented Web-based solutions,
and those
in blue are the
commercial application platforms for building your own system.
d icat commerce onrine are fairry cheap to
get going, there's
m to work and rook the way you want.
Meanwhire, something
penny upfront, is customizabre enough so
that hidden chargei
GENERATING
E.COMMERCE /193
5,50.10 Ramforless.Gon[ Buildin'lt 5o They-ll Come
Using your handy Requirements Document, you search high and low for an off-the-
shelf package'
that can meet ramforless.com's needs. But one thing is missing, a critical, top-
priority feature that
you gotta have: the configurator. This is the gizmo that will figure out what type
of RAM chips your
customers need once they plug in the kind of systems they have. No system has a
configurator as
part of its standard features, and you can't go forward without it. So like it or
not, it seems that
building an application from scratch is going to be the best way to go.

5.51 Cold Fusion : The Basic Software for e.Comerce


Applications
You talk to the MIS people about the technology they originally used to create the
configurator. lt
turns out that all of the configurator information is stored on a SQL Server 6.5
database. You dig
through your notes and discover that Allaire ColdFusion can pull data f rom any
ODBC data source.
That's a big plus, but you need to see how ColdFusion addresses your other
requirements.
O Displaying Products
Denise's design and Mark's configurator give you the information you need to drive
the front-end
experience. ColdFusion's ability to pull data means that you can leverage Mark's
past work with
Microsoft's SQL Server. And because you can easily place ColdFusion CFML tags
between HTML
tags, you can make the pages look exactly the way Denise wants.
O Order andTransaction Processing
ColdFusion does not come with a shopping cart, but the ColdFusion guidebook you
bought has some
shopping cart examples in it. Meanwhile, payments can be handled through
ColdFusion's ready-
made interface with CyberCash, and taxes can be handled with its intedace with
Taxware.You'll have
to come up with your own shipping algorithm, but with ColdFusion's extensive
application language,
that shouldn't be too big a deal.
O Attracting Customers
You shouldn't use ColdFusion to place your advertisements;there are other
productsout there that
do a better job of this. But you can use it to track people's responses to your
ads. You can embed
media codes in each ad and then use ColdFusion's application language to detect the
incoming
source codes and add them to customers'histories or even to the orders they
place.This rireans that
you can tie the source codes to the sales they generate and figure out which ads
are actually making
you money. (More about this can be' found in Lesson 5.)
O Fulfillment and Customer Service
You don't want to build a new fulfillment system:The one you have now works well
enough. lt runs on
that mainframe from the'7(js, and you don't want to get bogged down with that
thing. For now, the
fulfillment department will have to reenter orders manually and handle customer
inquiries about
orders through the company's 800 number. lt's not the slickest plan, but it'll work
for now, and
ColdFusion is flexible enough to accommodate improvements in the future.
D Software and Hosting
There are a bunch of toptier hosting services that support dedicated NT hosting
environments and
also offer leased line access. ColdFusion works great with NT, but it's also
availade for Solaris if you
decide to change over to a Unix OS at some point. lf you needed to scale, you could
set up a single
Unix database server that feeds a series of NT application servers. That way, you
could add additional
application servers and not worry so much about data replication.
1 94 / ELECTRONIC COMMERCE

Allaire's coldFusion application engine seems to be a solid


match. you can
set up the configurator
y'.t19't too many headaches, and it supports most of the extensions you need. With
Frank
fulfillment's "flat-rate" scheme , your shipping and handling is
in
covered - tor
tne time being, at teastl
You're saving the creation of a more flexible aid customizaoie
snrpping
solution forthe next redesign.
So you're set' All the planning ald research has finally paid off,
and you now
have a solution that
meets your needs with minimal compromise. The site's going
to iake some
significant work upf ront,
but you'll be happy in the long run when it continues to dJ all
in"i vo, require,
even as your company
grows and evolves.
Some time later, after the application of a lot of elbow grease, your
site goes
live. The industry is
abuzz, customers roll in, everyone gets a raise, rnd you-take oti
tora well-
deserved vacation.
bratty
Not so fast. lt ain't that simple. Like a rce site requires
ln order to attract customers and keep them need to have an
strategy and be able to monitor which advertisi are successful.
learn what you need to know about tracking your get your
busines
crowd.

5.31.1 Building Your Customer Base


So your online store is finally up and running. Good work! Unleash the
confetti
and champagne corks
- you deserve it' But once you're finished celebrating, there's
still work to be
done. Now you need to
get your customers to actually visit the site.
lf your company is willing to spend the big bucks, you can get the
word out
about your site by using
traditionaladvertising venues, such as billboards, bus ads, direct mail, radio

spots,'or even television


commercials. You can also place banner ads on other Web sites that cater

to'youi customer base. lf


money's an issue (as it so often is), there are ways to drum up Web
traffic
on the cheap. Some of
these advertising techniques will work better than others, depending on what you,re
selling and to
whom.
How do you know if your advertisements and marketing

oney)?
To be truly effective, your advertising needs to do mo

site: lt
needs to attract customers who buy your products. To

ics are
working and which aren't, take a look at your log files.

5.51.2 RequirementsDocument
Back at Computer Chip Corp., your CEo decides that it's better (read: more

realistic) to have the lirst


version of the project concentrate on building up the company's online customer

base via the promotion


of the wwwramforless'com service.Then once a minimum monthly order volume

is sustained, the
company will commit to putting resources toward automating the back office and

fulfillment systems.
"Until then, we'll just re-key orders," the employees are told. The f ulfillment

manager's eyes get large


and he jots down a note to open several new data entry job requisitions. And youi
you just

breathe a
sigh of relief, because, for now, you don't have to tap into that 1970s mainframe
monster

that
handles all of the current order entry and fulfillment processes.
The firm wants customers to be able to tell us what kind of computer equipment they
have.

Then we'll
tellthem what kind of memory chips work with their computers. lf we know the mike
and model

of
their equipment, then we can recommend chips in 8-MB, 16-MB, 32-MB, and 64-MB
flavors.
Sophisticated customers may already know the model number of the memory chip they
want,

but
these products are changing all the time. We'll need a tool where we can make
changes to the
products we offer in realtime.
GENERATING E-
COMMERCE / 195
5.51.3 Order and Transaction Processing
Customers will want to buy more than one item at a time, so we'll need to let them
build an order
before checking out. Then we'll need to accept major credit cards and calculate
tax, shipping, and
handling charges. Plus, we'll be shipping within 24 hours of the order, so we'll
need to verify the credit
card information before we accept the order.

5.31.4 Attracting Customers


We want to use a variety of lead-generating tactics, such as buying banner ads,
register:ing with
search engines, and sending direct emailto get qualified customers to the site.
We'll also want to
know which of these tactics gets the most customers to our site so that we can
figure out which
advertising investments make the most sense.

5.51.5 Fulfillment and Customer Service


Orders that arrive on the server need to be relayed to the fulfillment center
quickly so that we can
pick, pack, and ship the memory chips before the FedEx truck shows up at 5 p.m. We
also want to
be able to let customers get the status of their orders so that they don't have to
call us.

5.51.5 Software and Hosting


We want to host the site with a third party. Staying up 2417 monitoring servers is
not our idea of fun.
We've seen a number of e-commerce software packages on the market but are confused
about
which one is right for us. Help!
Once you've generated your own Requirements Document, you still have a lot of
details to iron out,
and there are many choices still lo be made before you can open your doors in
cyberspace. ln the
next lesson, we'lltackle the challenge of designing an effective sales and
merchandising environment.
Then we'lltake a look at some existing sites that use these techniques.

5.11.7 Use Those log Files


Log files can give you valuable information aboutthe shopping and surfing patterns
of yourcustomers,
telling you how they found your site, which pages they visited, and who bought
wllat. With careful
tracking of the data generated by your log files (especjally over the long{erm),
you can figure out
which advertising and marketing tactics are the most successful with your
customers. lnformation
like this is valuable because it can tell you where to reinvest and how to change
your media-investing
tactics based upon what's performing and what's not.
One popular way to determine what marketing leads customers to buy your products is
to track the
sources of your sales leads all the way through to the order. Direct marketers have
been doing this
for years, long before the Web came into being. You'll find source codes on almost
everything they
send out: postcards, coupons, the backs of the glossy catalogs, and that "address
your letter to
department ZX321"thing they do. By assigning a unique code to each coupon or
postcard, marketers
can keep track of which placement yielded the most customer interest. ("The coupons
we ran in
Young Miss did much better than those in Concrete Monthlyl')
You can do the same thing on your site. lf you know the source of the lead, the
customer-who
responded, and the orders that customer placed, then you have a gold mine of data
with which to
determine your ROI (return on investment). More important, you can improve upon it
by fine-tuning'
both your marketing and site design.
Do users stop clicking once they hit a certain page? Perhaps that page needs to be
simplified,
rewritten, or even repositioned to make it easier for your customers to get to the
key part ol your site:
the bottom line.
196 / ELECTRONIC COMMERCE

T9lake sure you're using the most


which ads are generating the most
that your direct-mail cAmnainn
ca.mpaign isic
anything' At the same time, J banne. -,,,,e,,,v q''trrus ur vrsrrors Io.your
site, but they,re not buying
your site via the banner ad tend to
iJ ir"v attract only a few
visitors, but those that do come
make purchases. Wni.n torm of
marketing to
To find out, take a closer root
is the most cost-
much money yori.it",.
mar<injario no*-rnu"n
3ffi1[T "ihJ*
you,re

5.31.8 Cost-EffectiveAdvertising
important, bur hey, the site is onrv three pages
ffiffiffTl:X: "r"
rong! Let,s focus on rear

O Number of
O Number of
0 Numberof
D Cost of dis
With this information you can determine:

I Cost of generating a lead for each inquiry source


A Cost of sales for each inquiry source

lf we e for the nexl release of the site, we'll


be
what company's investment in e-commerce and
online

able to show the top brass


then for the project next year.

marketing. And
o Mark
running your
reports' showing you how
your site du
lymakemonneedtofigureoutwhich
ow it rooks
" [ffjli:1,::i:'$T::lT;
5.31.9 lleeping Track of Everything
To track yourcustomers' you need to assign each.banner ad a
specific code and
use that code in the
referring URL that rinks your site to the ai. The
uRL in the rink rooks rike this:
http : / /www. ramforless . con/index. cfm?MC=ytMO01

customer places an order, that code is attached


unique media codes just like this in banner advert
At ramforless'com, all of the information about customers,
orders, and
advertisements is stored in a
GENERATING
E.COMMERCE / 197

single database designed to make it easy to report on different data that


management wants to
track.
Table 5.1 "Cost of Sales" RePort

Sources Sales Cost Sales/$1 Cost


7o of Sales
111111 2,176 1,000 2.18
45.96 %
2222?2 2,046 1,000 2.O5
48.88o/"
333333 3,160 1,000 6.16
31.65 %
444444 10,690 1,000 10.69 9.35
%
555555 3,150 1,000 6.15
31.751o
WMOOl 2,934 1,000 2.93
34.08o/"
direct 18,238 1,000 18.24
5.48"/"

This report shows total sales for orders placed as a result ol sources linked to
specific media codes
(111111 ,222222,WM001, etc.). Note that "Cost" refers to the amount of money (in
dollars) it takes
io place a banner ad, email, etc. "Sales/$1 Cost" is the Sales number divided by
the Cost. This tells
you how much revenue was generated for each dollar invested in a specific venue
with a specific
advertisemenl."o/o ol Sales" is the inverse of the Sales/$1 Cost; essentially it's
a summary of cost-
effectiveness expressed as a percentage'
So for every dollar earned in sales from ad "1 1 1 1 1;'45.96 cents went toward the
placement of the ad.
lf your cosiof sales is 45.96 percent, you'll probably have a hard time staying in
business. On the
other hand, advertiseme nl"44444" had a cost of sales of 9.35 percent of the
revenue it generated.
You can probably make a good profit continuing to advertise through that venue.
you can also track customers that come directly to the site without the help of any
specific ad' ln this
example, the media code "direct" shows that word of mouth is stillthe best resource
for

generating
low-cost sales.
But that doesn,t mean you should abandon all advertising and rely solely on word of
mouth

to keep
your online business thriving. One fatal flaw of using log liles to track user
activity js that they make
no allowances for customers who follow an ad sir ply to learn about your products
and then, after
will
doing some comparison shopping, return to your site to make a purchase. The
tracking system
adverlising failure and a word-of-mouth victory, and
that's just not ihe
,"poit this scenario as an

most cost-
case. When it comes to site promotion, things usually aren't all or nothing.
Usually, the
effective marketing for your site involves finding the right combination of a
variety of advertising
methods.

5.51.10 Staying in E-Business


To find the most cost-effective marketing for your site, experiment with
your
advertising while keeping
a sharp eye on your sales.Try new things: lmplement innovative banner ads,
play around with things.
like afiiliaie maiketing, consider sponsorships - and see how your sales are
affected.

grow and change to


And keep at it.your online storefront, like your business itself, must continue to
accommodate the evolution of your customers and products'

much
This flexibility is key to keeping your e-business viable. Even if your products
don't change

quick and
you
over the years, and update your online
presence. The
natu
ever-changing but it can also bring
customers, connections, and
opportunitiesthatn eotherwise'
198 / ELECTRONIC COMMERCE

As you set out to create your own e-commerce site, keep in mind all that we've
discussed

here. With
planning, hard work, and carefulobservation, you can build a site that's flexible

enough to keep up
with the ever-changing needs of your customers. And then you'll really be in e-
busine-ss.

5.51.1I Play by the "Business Rules- Document


At your D-Day, talk through all the steps that come before and after a transaction.
Gather ideas.
Discuss constraints and get the raw information you'll need to develop your e-
business plan.
To help keep the ideas flowing and your brain-storming on track, we've created a
Business Rules
document for you to use as you meet with your team.This isn't a check list - it's
simply a compilation
of the e-business issues that you should consider as you carefully lay plans for
your e-commerce
site. Print it out, put it on the OHP (overhead projector), stick it on the white
board, and then use it to
generate new ideas and spark innovations of your own.
After you have all the raw information you need, it's time to prioritize. lt is not
likely that you'll be able
to implement all the things you want in the first release of the store because of
constraints in budget
or time or because you're the only person working on this project and you haven't
slept for three
days. Rank each of the features you want with a one for "must have," a two for
"nice to have," and a
three for "pipe dream." With your priorities in line, you can create your
Requirements Document.

5.31.12 The ).lany Ways to Skin a Cat


Before you can select the right setup for your e-business, you must determine
exactly what you need
to be competitive online.
Most likely, you'll need some software to help you manage your products, your
promotions, your
customers, and their orders.You may also need some additional programs to handle
the tax, shipping,
and payment processing of your orders.
A number of popular off-the-shelf solutions have evolved overthe past few years
that give you these
core features and allow you to plug-in other software modules to handle the
complexities of taxation,
the varieties of shipping options, and many of the popular forms of payment. Each
option'offers its
own set of pros and cons.
Solutions like lntershop's ePages, iOat's Lemonade Stand, orYahoo's Stores provide
storefronts that
are ready to go. Just pick a design and pop in your products:You are ready for
business.
Other applications, such as lntershop 6.0 and iOat Professional, allow you to
change standard
templates that come with the packaged software so that you can customize the way
your storelront
will look and feel. These solutions also let you extend the standard features and
behaviors contained
in the templates - assuming you can "speak" their application languages.
And then there are solutions that act more like e-commerce application platforms.
These include
Microsoft's Site Server Enterprise, which relies on Microsoft's ASP (active server
page) technology;
Allaire's ColdFusion application engine and its popular CFML (ColdFusion markup
language); IBM;s
Net.Commerce solution;and Pandesic's new 6.0 product release, which provides robust
backend e-
business processes that can be accessed through a standardized application
interface.
Many of the above solutions rely on other e-commerce software f rom CyberOash or
OpenMarket for
payment processing, Taxware for tax calculations, and Tandata for: up-to-date
shipping information.
But which is the right solution for your e-business? To figure that out, you need a
plan.
GENERATING
E.COMMERCE / 199

5.12 Add Context.Sensitive Help to Your lE Applications


Many Web developers build lnternet Explorer (lE) applications that can be improved
by adding context-
."n.itiue help. Context-sensitive help can be added to these applications using
standard Windows
functionality. Many developers don't know that they can easily use the "What's
This" functionality
that is built into Windows in their own lE applications.
helpl.bmP = helPl.htn help2.bmp = heIP6.bnP
This 1O-Minute Solution consists'of two separate HTML files (help1'htm and
MainPage'htm). The

(MainPage.htm)'
first file (helpl.htm) is the main document.You will use it to callthe second
document
you coutd put the code that calls the second document anywhere, but by putting it
in the main body

you open or ref resh


of the page, it will run whenever the document loads. This means that whenever
open. Notice that the
showModalDialog function is
this page-, the second page will automatically
purposes, the most important of
these parameters is the
called with a number of pa-rameters. For our
,,help,, parameter. This parameter tells the diaiog box to display the "help"
button on the title bar
beside the "close" button.
<HTML>
<HEAD>
<TITLE>user HeIPcl tf tr,s>
</HEAD>
<BODY onload=rrOpenMainPage ( ) tr)

</BoDY>
</HTML>

<SCRIPT LAIIGUAGE= j avascriPt)


function OPenMainPage o
t
showModalDialog ( t'MainPage . htm'r , ItMyMainPager' ,

,,dialogpidth=62Opx;dia1ogftIeight=3lOpx;centery'es,'borde:thin,'hel;=yesr')
;
event . cancelBubble=true,'
)
</scnrpt>

Mainpage. htn

<IITML>
<HEAD>
<MErA name=Vl 5O_defaultclientscript
content=vBScript>
<TTTLE>Main Page</TTTLE>
</HUAD>
<BODY id=MyDocuuentBody style=TTBACKGROUND-COLOR:

silver,' FONT-
FAI'iILY: Aria].rt)
<SPAN style=!'LEFT: 5Opx,' POSITION: absolute" TOP: 1opx"
name=|,IntroText||id=IntroTexttitle=''Introductionlext|')
2OO / ELECTRONIC COMMERCE
click the help (Question Mark) button in the upper-right corner of this window then
click on any.
element in the client area of this window to see context-sensitive help for that
item.
</spax>
<P>
<rNPur style='TLEFT: 5Opx,. posrrroN: absolute," Top: 10opx',
titl.=""lick Me !'r type=rrcheckboxrt id=checkboxl name=checkboxl)
<f NPUT style=,'LEFT: 5opx; pOSITION: absolute,. TOp: 15Opx,,
titla=ttBnter your name herer id=textl nane=textl)
<INPUT style="LEFT : 5Opx,. pOSITION: absolute ,. TOp : 2OOpx,,
type=trbuttonrr warue=rrclosetr id=buttonl name=buttonl)
<P>
</BoDy>
</srvr>
<scRrPT rD=crientEventHandlersVBs LANGUAGE=vbscript)
Sub document_onhelp
ErrorMsg, = 'rNo infornation available for that itemrr
TextboxMsg = ItEnter your name hererr
ButtonMs€t = "CJ-ick here to close this windowfl
BodyMsg = t'Yes, even the body of this page can have herp text.rt
rntroTextMsg = 'rrhis is the description of what to do on the
Page. close this diarogr box and crick on sonething else. r'
CheckboxMsg' = 'rClick me (just for example) "

SourcefD = window.event. srcElenent.id


HelPMsg = SourcelD
Select Case UCase (SourcefD)
Case "CHECKBOXIw
HelPMsg = CheckboxMsg
Case I'INTROTEXTil
HeIPMsg = IntroTextMsg
Case I'MYDOCUMENTBODY'r
HelPMsg = BodyMsg
Case rrTEXTl rt
HeIPMsg = TextboxMsg
Case 'IBUTTONI t'
HelPMsg = ButtonMsg
Case EIse
tlelPMsg = ErrorMsg
End Select
Msgbox HelpMsg, vblnformation, ilyou! Help is Hererl
window. event. cancelBubble=true
End Sub
Sub buttonl onelick
GENERATING
E.COMMERCE / 201

window. close
End Sub

</scRrPt>
After the document is open, you will provide context-sensitive help through the
onhelp event. The
following code shows how you would detect which object was clicked, and how to
react, based on
that action. Note that an important line sets the value ol SourcelD equal to the id
property of the

page was
srcElement.You use a switch statement with this value to determine which element on
the

case' you
selected. You'll take different actions based upon the element that was selected'
ln this

message box.
simply set the value of the variable to a different text string and display that
string in a
Sub document onhelP
ErrorMsg = I'No information available for that iteu'rl
TextboxMsg = rrEnter your name trere ' tl
ButtonMs€t = trClick here to close this window'rl
BodyMsg=ltYes,eventhebodyofthisPagecanhave}relptext.ll
IntroTextMsg = rtThis is the description of what to rr E
-
"do on the page. Close this dialog box and 'r 6 -
trclick on sornething else' rr
CheckboxMsg = "Click me (just for examPle) ' "

SourcelD = window.event'srcElement'id
HelpMsg = SourcelD
Select Case UCase (SourcelD)
Case !TCHECKBOX1 I'
HeIpMsg = CheckboxMsg
Case 'TINTROTEXTTT
HelpMsg = IntroTextMsg
Case'IMYDOCUMENTBODYTI
HelPMsg = BodYMsg
Case ttTEXTlrr
HelpMsg = TextboxMsg
Case 'IBUTTONI t'
HeIPMsg = ButtonMsg
Case Else
HeIPMsg = ErrorMsg
End Se]-ect
Msgbox HelpMsg, vblnforuation, 'rYour HeIp is Hererr
window. event. cancelBubble=true
End Sub

help to your lE
As you can see in the previous code, it is very easy to add context-sensitive
with it, and
then use the onhelp
applications. Simply opei a window with the help-button associated
event to take some aciion.To try this example for yourself, open
helpl .htm and
follow the directions
that appear.
2O2 I ELECTRONIC COMMERCE
5,55 Prepare For Growth In E-Commerce Database Design
Creating a database for a Web-enabled or e-commerce application? Think generically
and look beyond
the application at hand.
lN THE BEGINNING, DESIGNING AND implementing an e-commerce database was just
another
data modeling exercise. Get the requirements from the users, design the normalized
database,
implement it using a suitable DBMS, and you were all set.

5.55.1 Design a useful Web.Enabled Database


Design the database generically to provide for functional growth....
However, due to the enormous growth and popularity of e-commerce, the job's not
that simple anymore.
When you design a modern e-commerce database, it's important to design the
structure of the
database generically enough to provide for future functional growth. Although the
database may
reside on your own Web server, under your own control, changing the structure of a
database under
a Web-enabled application is not a trivial task. You are going to suffer an hour or
two of downtime
while unloading and reloading, or restructuring the data.
The problem is much worse when an lnternet seruice provider hosts yourdatabase.
Some lSPs are
reluctant to implement changes, and one is always nervous that it may not implement
the desired
modifications correctly, especially when it has to preserve and manipulate existing
data. Obviously,
the code changes to the application to fit the new structures will also cost time,
employees, and
money to implement.
So how do you design a database generically? By using a technique called row-wise
design, instead
of the column-wise type of design one tends to use initially. With column-wise
design, one creates a
column for every aspect (or attribute) of each entity about which you want to store
data. For example,
with column-wise design, one would have (among others) the lollowing columns in a
table used to
represent customers:
.CUSTOMERS(CustlD, Name,
Surname,'HomeTelephone, WorkTelephone, WorkFaxNumber,
PagerNumber, _).
Over the last few years, this table would have had to be changed a few times to
add:
*MobilePhoneNumber,
HomeEMail-Address, WorkEMailAddress, Personal-WebSite,
WorkWebSite,
and maybe even more contact details.
With row-wise design, one would have had a master table for the entity, a master-
detail table for the
contact details, and a lookup table for the contact types. This structure is
depicted in Table 1. With
this kind of database design, one can add a new type of contact detail, such as
SatellitePhone-
Number, to all new and existing customers by merely adding a row in the lookup
table.
As you can expect, such a generic design has its price, too.lt requires
additionalselects to retrieve
the lookup data (the list of valid contact types in our example); it consumes more
storage space than
a column-wise design; and if the lookup data's "description" is not used in the
master-detail table, it
requires an additionaljoin to display this data (the contact types, in our
example).
The last point is the classical trade-off you often find with these types of
designs. Either the text of
the lookup data is repeated often, which then consumes more storage space, or you
have to use a
surrogate code for the lookup data, in which case you f requently require the
additional join operation
in the application code. With storage space becoming more affordable and available,
most people
use the type of design where the actual lookup data description is carried in the
master-detailtable,
and the lookup table is merely kept to display the list of valid values.
GENERATING
E.COMMERCE / 203
As for implementation trouble and costs, this style of application is not too
complex to implement.
Developers quickly get used to this style of coding, and tend to prefer the
slighfly more challenging
coding to doing post-implementation extensions to the code_especially someone
else's code.

5.33.2 DeployAnyrtime
An added advantage of such a generic design is that you can develop the application
once and
deploy it many times. For example, with a correct generic design, you can store
information about
clothes (size and color), lood (pizzatoppings), and autos (colors and options) in
the same product
tables.
The big problem with generic row-wise designs is to watch out for overkill. You can
over-generalize
the structures, and as a result suffer from performance and growth problems, for
functionality that is
never used. Contact types and product types are good examples for generic designs,
especially for
products with different attributes, such as sizes, colors, languages, shipment
sizes, etc. However, it
is hardly ever necessary to code customers'addresses, accounts, and transaction
details in such a
generic way.

5.3t-3 0ther Database Design lssues


Apart f rom generic database designs, other aspects to consider are pri- mary keys,
complex datatypes,
and denormalization.
Make sure you have unique lDs for allthe entities, such as products and customers,
that are stored
in the database. lt is best if these are system-maintained, unique, small, numeric
lDs. Not only do
they consume less storage space, and often result in faster join operations, but
it's best if they
cannot be changed by the business users, regardless of any changes in the business.
We have seen
too many times that product codes, Social Security numbers, tax numbers, etc., are
altered due to
changes in the business world. Numeric keys are also easier to store in cookies, il
those are used in
yourWeb applications.
One must take great care when using complex datatypes in an e-commerce database
design. Although
one requires multimedia data in most Web applications, you must make sure that the
data can be
rendered in a useful form in the application when it runs in a Web browser. Some
browsers support
only certain datatypes, and it may be too limiting to transform the data between
lormats to suit only
a handfulof browsers.
Denormalization is a concept often considered in query databases and data
warehouses, but it is
also considered for e-commerce databases. For example, where an invoice is directly
related to an
order, it may make sense to denormalize the order number in the invoice, too,
together with the
foreign key of the order. This often saves the extra join to retrieve the order
number f rom the orders
table, to display it on the Web application. Howevel if-the denormalized data can
be changed through
the application, this may not be such a good approach.
The designs of e-commerce database applications can also alfect database
administrators. With
most e-commerce systems, it has to be thin-client applications that can be run over
Web browsers.
This requires a lot of the functionality to be built into the database or into
application servers, but not
every lT group has the skills to code complex logic in application servers hosted
in multi-tier
architectures. As a result, a lot ol the business logic finds its way into the
database, in the form of
stored procedures, triggers, and views.
CRM When designing any Web-enabled database, consider customer relationship
marketing issues.
Examples of these include recording and storing customer profiles and customer
preferences.These
are necessary to personalize the Web pages on subsequent visits of these customers,
based on
2O4 I ELECTRONIC COMMERCE
what they were interested in on previous visits. ln this way, you can cross-sellto

them and guide


them-without their knowing_to products and services that'nriy interest them.

]o make this possible, store a history of the pages each customer visited,
keywords they searched
for, and products they ordered. ldeally, howevei let customers tailor their own
p;oflL;.
I once ordered a cD lrom a well-known online store as a gift for
my sister. lt was
the first cD I ordered
from that particular store, but it differed totally from my-own musical
preferences. ioilowing

tnat, t
had.to fill in lengthy questionnaires and evaluations to try and alter my profile.
weeJiess

to say, I
don't use that store anymore. But with a store such as CD illow, it is trivially
easy to atier your profile,
and thus get good CD recommendations from the site.
CRM data can also be a very valuable commodity. Some marketing companies will pay
top

dollarfor
customer profile data. So, in addition to collecting valuable cross--elling data
for yorio*n use, you
may also collect a valuable asset. Be aware, of the privacy-and
security issues of the
'owever,
country you operate in, as well as where your customers are from. Many customers
wilitake exception
if their personal profiles are sold to organizations of which they may not approve.
Two of the big issues with customer relationship marketing are for how long to
store the data

and how
heavy to influence subsequent visits based on the hiJtory of previoui visits. The
first issue is
direc e, but the second issue is muih more subjective.
Some people follow
links ided anywhere, while other users take greit
exception to'Ueing guided
offth ally wanted to access the particular w-ebsite. The
issue of whJther a
person wants to be guided around is one you need to record.

5.33.4 Supply Chain ianagement


E-commerce databases are very closely related to supply chain management. An e-
commerce
database can provide extremely useful information for stock control. Suppliers can
analyze the sales
of their products and provide just-in-time delivery. ldeally, this information
should be provided online
to the suppliers, without an excessive burden on your lT, operational, and
administrative staffs.
Closely related to the supply chain is the payment chain. One should allow for
transaction switching
directly through to the major banks and f inancial institutions. To provide this,
one needs to know the
various interfaces to the.available switching systems, which differ from country to
country, as well
as the data required for these interfaces. With such direct payment systems, it is
also necessary to
keep journals of allthe payments made and received in analfzable format in the
database.

5.55.5 Security
Security is a concept one cannot work into the design after a breach. Nor should
one purely rely on
the underlying DBMS's security mechanisms. lnstead, analyzethe security
requirements related to
the data and the applications beforehand, and design it into the database irom
scratch. lf you have
to allow per-user password-controlled access, per-user visibility of the data, and
provide the safe re-
use of protected information, security becomes part of the data requirements of the
system.you also
have to consider the privacy of personal information, if that type of data is
maintaineO ih tne database.

5.55.5 Availability
Think about the backup and restore strategy to be used with the e-commerce
database, and how it
will influence the design. Although backup and restore is a database administration
issue, the 24-7
requirement of most e-commerce databases may make it become a database design issue
as well.
It may force you to design and use partitioned tables to reduce the possible
downtimes of the active
operational tables. lt may a.lso lorce you to use alternate backup and hot stand-by
strategies, such
as data replication, which in turn may influence the database design, as some
replicators can function
only with pure third normalform database designs.
GENERATING
E.COMMERCE /205
5-33.7 Yolume Growth
Even if one starts off small, it is important to think of volume growth. One of the
best examples is
eBay. Pierre Omidyar started the company in September 1995 as a site where his wile
could trade
the Pez candy dispensers she collected.Today eBay hosts the world's largest
personal online trading
community through a new market_with efficient one-to-one trading in an online
auction format.
lndividuals use eBay to buy and sell items in more than 1,600 categories. As a
result, eBay provides
more lhan two million new auctions, and 250,000 new items every day from which
users may choose.
Even though your database may not have to grow f rom 400 items per day to 250,000
in less than f ive
years, consider various techniques used for very large databases, such as
partitioned tables and
union views.

5.55.8 Usage Growth


With an e-commerce database, the usage and visits can be minimal, or they can
explode. This is
mostly related to the company's marketing effort, website popularity and ease of
use, and products
offered.To prepare for high-usage patterns, design an architecture that willscale
wellto a multitude
of users; a database that can grow well, and split the data and information into
online operational and
ofl-line informational content.
The latter is done best with data mart technology. Create a data mart that contains
all the information
that suppliers, managers, customers, and other interested parties need to access.
By duplicating
the information on the database in a query-friendly form in a data mart, one
removes the query
processing load from the operational database, freeing it for faster
processing.This results in faster
response times and allows database administrators to lune the operational database
for online
transactions, while the data mart is tuned for informational and statistical type
queries. Such a data
mart can provide for a wide variety of applications, including market tendency
analysis, product
viability studies, order status requests lrom customers, and product supply
information.
By considering the issues described above, you should be able to design and
implement an e-
commerce database that should be usefullor a while.
A common mistake when creating a Web site is to neglect accessibility. Accessing
the Web
rflatters_and not just for those with limited vision, hearing, or mobility. Many
other groups have
trouble going online, and these groups may number among your organization's
customers or employees.
Making your Web site more accessible can improve customer experience with your site
and might
also give you a competitive advantage when bidding on contracts.
For example, accessibility matters to people using their sight or hands for other
tasks, as well as
those working in a loud environment who can't hear Web content. Accessibility also
matters to
people using PDA browsers, cell phone browsers, and WebTV technologies that
sometimes make
getting online difficult. At the other end of the technology spectrum,
accessibility is an issue for
those with slow connections, poor phone lines, or older browsers that don't handle
tables and f rames.
Accessibility even matters to search robots as they attempt to index and abstract
your Web site'
Accessibility is also important to a rapidly growing segment of lnternet users-
seniors. ln December
1998, people over age 55 bought 23 percent of all consumer PCs in North America.
Seniors using the
lnternet spend more time online than any other age group. Accessibility is a
significant issue for
seniors because, by age 65, most people have a harder time focusing and resolving
images,
distinguishing colors, and adapting to changes in light. Some hearing loss is
common by age 65, and
arthritis and joint stiffening may make using a keyboard or mouse more difficult'
Accessibility may even be a legal matter. A visually impaired public-transit
customer recently filed a
206 / ELECTRONIC COMMERCE

complaint claiming the San Francisco Metropolitan Transportation Commission Web


site violates the
Americans with Disabilities Act (ADA) because the commission's Web site is
inaccessible to his
screen reader, which translates text from Web sites. Similarly, in November 1g99,
the National
Federation of the Blind filed suit against American Online (AOL), stating AOL
violates rhe ADA
because AOL has "failed to remove communications'barriers presented by its designs,
thus denying
the blind independent access to this service."

Selection From theWeb Accessibility tnitiatiue (WAI) Guidelines for lJniversal


Access toWeb

The ADA applies to many people-about 35 million people in the U.S. have
disabilities, according to
government statistics. The Wodd Health Organization estimates disabilities at 750
million people
worldwide. Your organization must take accessibility into account.

5.34 Guidelines for Universal Access


Fortunately, making your Web site legal is easy. The Web Accessibility lnitiative
(WAl) offers
comprehensive guidelines for making your Web content accessible to everyone
(www.w6.org/TR/
WAI-WEBCONTENT).TheWorldwideWeb Consortium (W3C) recommended adopting these
guidelines
in May 1999.Tap into these resources so you understand what to do and what to avoid
as you design
your Web site.
Each of the 14 WAI guidelines includes a prioritized and cross-referenced set of
checkpoints, and
each checkpoint links to a set of techniques you can implement (see Figure 1 ).
Designing your Web
site appropriately for each checkpoint often benefits multiple disability groups,
as well as the Web
community as a whole. For example, when providing a series of related links,
provide introductory
information in the first link, and then add distinguishing information in the
following links. This helpi
auditory users, such as the blind, visually impaired, or those who use devices with
small or no
displays-basically, people who can't scan the page quickly with their eyes. By
handling the links this
way, these users get a good sense of the related links as they "scan" by tabbing
from one link to
the next.
Before you begin to feel overwhelmed at the thought of assessing your Web site
against 1 4 guidelines
that specify 65 checkpoints, you'll be glad to know the WAI prioritizes the
checkpoints, so you can
locus on what's critical:
Priority 1. A Web content developer must satisfy this checkpoint. Othenruise, one
or more groups will
find accessing information in the document impossible. Satisfying this checkpoint
is a basic
requirement for some groups to be able to use Web documents.
GENERATING E-COMMERCE I 2O7
Priority 2. A Web content developer should satisfy this checkpoint. Otherwise, one
or more groups
will find it difficult to access information in the document. Satisfying this
checkpoint can remove
significant barriers to accessing Web documents.
Priority 6. AWeb content developer may address this checkpoint. Otherwise, one or
more groups will
find it somewhat difficult to access information in the document. Satisfying this
checkpoint can
improve access to Web documents.
Use these priorities when you plan to enhance your existing Web site. Make certain
any new pages
you develop comply with priority 1 and2 checkpoints. As you revise pages, make sure
they at least
comply with priority 1 checkpoints. lVtake sure critical pages, such as high
traffic and important
content, also comply with priority 2 checkpoints. Comply with priority 3
checkpoints after you've
upgraded your site to meet all priority 1 and 2 checkpoints.

5.34.1 Testing Your Web Site


Several products enable you to test your Web site for accessibility compliance. One
easy way is to
use Bobby, a Web-based tool that checks your Web site's accessibility. Created by
the Center for
Applied SpecialTechnology, Bobby is free on its Web site (Cast.org). Enter yourWeb
site's URL and
Bobby tests the entire site against the WAI guidelines. As an added benefit, Bobby
also tests your
site for browser compatibility. Bobby checks every line of the site and creates a
detailed report of
any access problems (see Figure 5.1).

on tfie €rnor m€ssagee betow to find out morG information.

ris pa{l€ dEg rpt yet rneet the requir€rEe4ts ior Sobby Approved
statuE. Belot", ts e ltst of
EaasEslblllty prcblenn that shoutd be fixed tn ordsr to make Ehis
paqe Eoaes€ible to Fe{pli

sc-"/im€q€dgeneral./sear$b, giF'><br> <Ad>


Line 877: <br><tt{FtlT SORD€R='"G'TYF[="lp'1461't
N4ME="voteA(ticn-' VALUE="Votea
src='tirnage#v
9l?:'<irrp
Lirre rE€S"
6liEn="middl€'- borser="o"
value*'\*dste' t.qif'>
Fig.5.2: Here's Bobby, Cast.org'sTool to EvaluateWeb Accessibility
Two products f rom The Productivity Works (ProdWorks.com) enable you to test your
Web site design
by listening to how the site sounds when converted to speech. One product,
pwWebSpeak PLUS, is
a nonvisualWeb browserthat reads Web pages to you.The other product, pwTelephone,
enables you
to browse yourWeb site overthe telephone.Test yourWeb site with either of these
tools to experience
your site as people with reading and sight problems will hear it.
All is not lost if yourWeb site depends on Java. Sun Microsystems lnc. has
develbped an accessibility
API for Java applications (Java.sun.com/products/jfc). The Java Accessibility API
helps you create
208 / ELECTRONIC COMMERCE
assistive technologies to interact and communicate with Java Foundation Classes and
AWT Abstracl
Windowing Toolkit components. Typrcal technologies include screen reading, screen
magnification,
and speech recognition. Both people with and without disabilities can use
accessibility-enabled Java
applications.

5.34.2 Web Accessibility lnitiative (WAl) Guidelines for Universal


lccess to Web
Content
lf your interest is piqued, you definitely want to explore theTrace Research and
Development Center
Web site (TraceCenter.org). Trace. a research center at the University of
Wisconsin, Madison, focuses
on making technology more accessible for everyone.Trace hosts Designing a More
Usable World for
All, a Web site devoted to encouraging the princrples of universal design (see
sidebar, "Principles of
Universal Design"). This Web site provides many useful resources, rncluding a
variety of articles,
research results, and links on topics such as Web-access tools, multimedia, and
virtual-reality
access.This site also provides information about organizations, projects, and
technologies addressing
Web-access issues and forums for discussing accessibility issues. A good way to
start is by reading
an article about the major disability groups and some specific barriers to
accessibility they encounler,
and then browsing through the rest of the material.
As the world becomes increasingly interconnected through a myriad of new devices,
Web accessibility
matters more and more-to everyone. By following the principles and guidelines here
and on the Web,
you can make your Web site accessible to all and give your organization the
competitive edge it
needs.
Web Accessibility lnitiative (WAl) Guidelines for Universal Access to Web Content
O Provide equivalent alternatives to auditory and visual content.
tr Don't rely on color alone.
C Use markup and styie sheets, and do so properly.
D Clarity natural language use.
D Create tables that transform gracefully.
D Ensure pages featuring new technologies transform gracef ully.
D Ensure user control of time-sensitive content changes.
O Ensure direct accessibility of embedded user interfaces.
O Design for device-independence.
D Use interim solutions.
D Use W3C technologies and guidelines.
tl Provide context and orientation information.
O Provide clear navigational mechanisms.
O Ensure documents are clear and simple.
5.34.3 Principles of Universal Design
D Equitable Use. The design is usef ul and marketable to people with diverse
abilities.
D Flexibility in Use. The design accommodates a wide range of individual
preferences and
abilities.
D Simple and lntuitive Use. Use of the design is easy-to-understand, regardless
of the user's
experience, knowledge, language skills, or current concentration level.
D Perceptible lnformation.The design communicates necessary information
effectively to the
user, regardless of ambient conditions or the user's sensory abilities.
D Tolerance for Error. The design minimizes hazards and the adverse consequences
of
accidental or unintencied actions.
GENERATING
E-COMMERCE /209
D Low-Physical Effort. The design can be used eff iciently and
comtortably, and with a minimum
of fatigue.
Size and Space for Approach and Use. Appropriate size and space is provided
for approach,
reach, manipulation, and use, regardless of user's body size, posture, or
mobility.

5.55 General Agreement on Tariffs and Trade (GATT).


GATT is a treaty and internationaltrade organization in existence f rom 1948 to
1995. GATT members,
known as contracting parties, worked to minimize tariffs, quotas, preferential
trade agreements
between countries, and other barriers to internatronaltrade. ln 1995 GATT's
functions were taken
over by the World Trade Organizatron (WTO), an international body that administers
trade laws and
provides a forum for settling trade disputes among nations.
GATT was founded on the principle of nondiscrimination. Member nations were bound
by the treaty's
most-favored-nation clause, which required members to treat all other contracting
parties equally.
Once a member reduced a tariff for another member country, that reduction applied
to all member
countries. However. an escape clause allowed a nation to withdraw its tariff
reduction if it seriously
harmed the country's domestic producers.
GATT members sponsored eight specially organized rounds ol trade negotiations.The
last round ol
negotiations, called the Uruguay Round, began in 1986 and ended in 1994. At the end
of the negotiations,
the members of GATT, as well as representatives from seven other nations, signed a
trade pact that
will eventually cut tariffs overall by about one-third and reduce or eliminate
other obstacles to trade.
The pact also took steps toward opening trade in investments and services among
member nations
and strengthening protectron for intellectual property-that is, creative works that
can be protected
legally. The 1994 trade agreement officially took effect in January 1995, but it
will be years before its
pro'visions are lully implemented.
The 1 994 GATT pact aiso provided for establishment of the WTO. Throughout 1 995,
GATT and the
WTO coexisted while GATT members sought their governments'approval for WTO
membership.
After the transition period, GATT ceased to exist. As of 1996 almost all of the 123
nations that had
ratiJied the 1 994 GATT agreement had transferred membershrp to the WTO.
Althoughihe WTO operates
a dispute settlement process similar to the one under GATT, it nas stronger power
to enforce
agreements, including authority to issue trade sanctions against a country that
refuses to revoke an
offending law or practice.
The 1994 GATT treaty was one of the most ambitious international trade agreements
to be signed by
such a large number of nations. ln the United States, supporters of the agreement
said it would
create jobs and improve business. Opponents claimed that the new GATT treaty would
lead to
massive losses of jobs in manufacturing and that the powerful WTO would threaten
American
independence. A number of groups, including environmentalists, human-rights
activists, and labor
organizations in the United States and other countries, argued against the treaty,
claiming that it
failed to link lrade preferences to protections for the environment and
workers'rights.The Congress
of the United States approved U.S. participation in the treaty-including membership
in the WTO-in
December 1 994.
GATT originated after World War ll (1939-1 945) as a charter for the lnternational
Trade Organization
(lTO), a proposed specialized agency of the United Nations. GATT was signed by 23
nations at a
trade conference in 1947 and became effective in January 1948. Although the ITO
failed to win
ratification by the United States Congress in 1950 and never came into being, the
GATT remained in
use to govern international trade.
210 / ELECTRONIC COMMERCE

5.36 World Trade 0rganization (WTO)


WTO is an international body that promotes and e
The World Trade Organization has the authority t
agreements, to oversee world trade practices, a
The WTO was established in 1994 when the mem
(GATT), a treaty and international trade organization,
signed a new trade pact.
The WTO was created
to replace GATT.
The wTo began operation on January 1, 1995. GATT and
the WTo coexisted until
December 1995,
when the members of GATT met for the last tir e. Although the
WTo replaced GATT,
the trade

and computer programs.The WTO is also aform


binding on its member states. The organization
I

Members can refer trade disputes to the wTo where a dispute panel
composed
of wTo officials
serves as arbitrator' Members can appealthis panel's rulings to awio
appellate
body whose decisions
are final. Disputes must be resolved within the tir e limit-s set by
wro rules.
As of 1996 almost all of the 123 nations that had signed the new
GATT pact had
transferred membership
to the WTo, including the United States. About 30 other nations
had also
applied for membership.
The WTO is based in Geneva, Switzerland, and is controlled by general
a council
made up of member
states'ambassadors who also serve on various subsidiary ani sp.'ecialist

committees. The ministerial


conference, which meets every two years and appoints the wio's
director-
general, oversees the
General council. Renato Ruggiero, a former ltalian trade minister, became
the
first full-time director-
general of the WTO in May 1995.
The agreements that the WTO will administer are expected to increase
annual world
trade by at least
$755 billion by the year 2002.

5.37 writing Software slprograms for Business


Applications
This section provides a brief history of software applications and an
overview of
the technologies
used to build intranet business applications. lt is rimed at the
technical
professional who desires to
understand the technology and the tradeoffs required as software systems
migrate to
Web-based
tools and infrastructure"

5.37.1 Traditional BusinessApplications


Many early business applications were written for a single dumb terminal

connected to a process
running the program on the computer.These applications iypically
shared data with
other applications
through the file system or database. Each user required a sepaiate process,
and
that process ran a
copy of the entire program. This implementation was relaiively simple to

construci. However, it
became inefficient as the number of users increased, and it posed problems
in
scaling beyond a
single computer.
Toincre many systems insert a transaction
monitor, which allows
develop on inio i number of servers. These servers
can then be
distribut e user can run a smaller program than
could be run without
the transaction monitor, while the program shares servers with
oiher users on the
system, thereby
promoting efficient use of system resources.
GENERATING E.COMMERCE /211

Tffitdfldl

Fig. 5.3. Process per User Model


The transaction monitor is also responsible for coordinating database updates
across the servers
used in a transaction. For instance, when a CSR creates a new customer account, the
application
might use multiple servers to update the database. One server may handle the
customer information,
and another server may handle the products and services purchased on the
account.The transaction
monitor ensures that all servers complete their update successfully; if one fails,
the other servers roll
back the update, leaving the database unchanged. This action maintains consistency
within the
database.

t*fiteffi

SnrFrom

oilE*A fillsfrrE

Fig. 5.4.Transacti o n Mo n itor Model


21 2 I ELECTRONIC COMMERCE
Along the way' the dumb terminals became
more intelligent. These newer smart
terminals

could
riiJ,
requiremenrs thatr the

rne Keyeo-

keyed_
iJ::,,:#:l*:".1^"1"0,:11",.^,1,::.,^"^r.^.:Tl|:*g
in data be numeric or alpha, for instance. "".n collected
some terminals "nior."ins
an entire
screen of data before
sending it to the program, thereby minimizing
communication traffic with the
computer.
As the personal computer (pC) proliferated in
th
to the PC was a naturalextension. pCs disp
simply using terminal emulators to run the sa
applications followed the modelof running a
sing
or file system to share information.
ln the 1 990s it became common to connect
PCs to a LAN. The LAN enabled pc-
based programs
follow a model similar to the transaction monitor.
to
ln this model. the work is
split between a client,
program running on the PC that is responsible
a
for display and data entry and a
server that

is responsible
for the business logic and database storage. This
architecture is commonly
called client-server. one
challenge introduced with client-server applicatic ns
is that of keeping the
software versions on the
numerous clients in sync with the software versions
on the server. when
the server software is
updated, allthe clients must also receive an update.
To improve the performance and scalability of
these client-server systems,
three-tier architecture
became popular' ln this architecture, a tier is a layer
of software. Three-tier
architecture can be
defined in many ways, but the most common
logic in the middle tier, and the database serve
of the system with clear interfaces between th
implemented on one or more machines. A co
multiprocessor machine in the bottom tier as a
machines in the middle tier as business servers, and a large
number of pcs (one
per user) in the top

The PC also brou into the mainstream:the GUl.


ftre cur significanfly
Ratherthan
ln event-driven
script
changed both how

sy

fl#Jru:"TitTHfl:"1*:""t'$jjiSil,Ti
dictate the next action for the user;
instead, the user
selects the next action by a mouse gesture such as
clicking a button, choosing
from a pull-down
menu' or double-clicking on an object. This approach
allows more flexibility for
the user but requires
more complex software that cannot make the same
limiting assumptions that
scripted applications
employ.
For example, a scripted application might force the
csR, when creating a new
account, to get the
service address, customer information, services, rnd installation
appointment in
exactly that order
and validate the data along the way. A GUI would allow
the csR flexibility in
the order that the
information is gathered to match the flow of conversation
with the customer. The
GUI must then
validate not only the data but also the assumptions that
used to be handled by the
scripting. For
instance, because the seruice address may be ertered after
the services
desired, is the service
available at the customer,s address?
Viable software architectures have many variations. This
brief overview only
discusses the basic
concepts as they relate to a few of the viable lntranet software
architectures.
GENERATING E.COMMERCE / 213

Lfa. kibrls,ttsa.fdon tryt

er.lE lrC{o

Fig. 5.5. Th ree-Tier Architecture

5.37.2 lntranet Business lpplications


lntranet business applications use the local-area network (LAN) infrastructure
within a company
along with lnternet Web technology to provide high-performance software solutions.
Such solutions
go beyond Web publishing, or Web-based forms, to provide f ront-office-grade
software suitable for
the customer service representative (CSR) speaking directly with customers. They
have a network
user interface (NUl) that resembles a graphical user inierface (GUl) but that runs
in a Web browser.

5.37.3 Top Tier: The Web Browser as a User lnterface


ln some ways, we can compare a Web browser to the smart terminal. The primary
purpose of the
browser is data presentation and data entry; the browser itself knows nothing about
the business
application. Through the use of scripting languages and control components
displayed on the Web
page, however, the developer can perform field-level validation before the browser
returns data to the
host. The developer can create sophisticated presentation and screen navigation
mechanisms that
begin to match the capabilities of a GUl, leading to the name network user
interface (NUl).
Like a GUl, an lntranet application must pay carefulattention to usability
issues.The users must be
well understood. What is their experience level? How much training will they
receive? How f requently
willthey use the program and for how long? A successfulapplication also requires
careful analysis of
the intended user's common business scenarios. The designer must be aware of how
frequently
program features will be used so the most frequently used will be easy and quick.
Current Web
iectinology lacks the robust features found in Windows environments. Hence,
designers must make
careful compromises to create usability goals that are achievable within the
constraints of the
technology, budget, and schedule.
The term thin client is often applied to browser-based user interfaces (see Figure
4).Thin clients are
contrasted with fat clients, which contain a significant amount of business logic
on the PC (see
21 4 I ELECTRONIC COMMERCE
Figure 5)' while it is true that the browser is free of the application's
business
logic, it is easy to
underestimate the real cost of the browser both in size and performance.
one
popular browser, when
100 megabytes of disk space. lt
can also consume
disk reads and writes on the pC.
When optimizing
can represent a significant
portion of the overall
afairly powerful machine is
required to run these

Fig.5.6.Thin Client

Fig.5.7. Fat Client


GENERATING E-COMMERCE / 21 5

The browser as a user interface specifies a uniform resource locator (URL)


requesting a page from
the Web server. URLs typically consist of at least four parts separated by
punctuation (e'9., http://
www.webproforu m.com/wpf . html) :

D Protocol
The name of the protocol that tells the browser how to handle the file; in this
case http indicates to
use the hypertext transfer protocol.
O Server Address
Location The location of the Web site.The www indicates that this site is on the
World Wide Web.
Name_The name of the organization responsible for the site. ln this example
webproforum is the
responsible organization.
O OrganizationTYPe
The .com suffix indicates that this is a commercial organization. Other common
suffixes include
.edu for educational, .org for noncommercial, and .net for a network service
provider.
tr File Paths and Name
Page Name-The name of the Web page to find; wpf in this URL'
page Type_The formatting of the page; in this case html indicates that the page has
hypertext
markup language (HTML) encoding.
The network uses the information in the uRL to find the right web server. lf the
page name and type
are omitted, theWeb serverwill return the default page forthe site.This is often a
shortcut

forfinding
a starting point on the Web.

form the
Using URLs, one page may make references to other pages. These references, or
links,

such as
basis-for navigation rruitnin tn" application. Links tc other pages may be attached
to_ controls,

with Wtndows-
buttons, givin-g the application a'GUl appearance. Because many users are lamiliar
based aipticitions in'the olfice environment, a GUI appearance provides a
familiar and intuitive
interface to the aPPlication.
ln the above example, the page contained embedded HTML tags to specify
formatting.
The following
is a simple sample showing-the tags for a heading followed by a couple of
paragraphs. The first
paragraph contains a word that will be displayed n bold print'
(hl)The Heading</h1)
This is some <b>bold</b> text
<P>
This is the next ParagraPh'
Along with the HTML, most browsers allow th
s' such as push buttons'
key-i"n fields, and drop-Jown-list boxes within

e component embedded

is not already present


on the Web page can also stipulate a location

f it
on the pC. lt is also p-ssiOle to detect that the component on the PC is
out of date, notify the user
the user would like to
download and install the new
that a newer version is available, and ask whethe r

vers ion automaticallY"

the capabilities of the


Developers can also design and use custom components. Often these extend
application either for information
display or data entry'
browser to meet a speciaineed of the

along with the HTML


Most browsers allow code written in Java or other languages to be embedded

by the user
tags. The code can execute when the page is loaded or in response to events
triggered
216 / ELECTRONIC COMMERCE

such as a mouse click'This code can provide components such as graphs or data
tables

and sort or
filter actions on the data, allwithout interaction with the server.

5.37.4 ).liddle Tier: The Web Servel and Business logic


The middle tier contains two key components: the Web server and the business
logic. The Web
server is an application that handles requests lrom the Web browsers. The Web
serve-r delivers

the
page to the browser over the network. lt sends some pages without any
modification,

but in a
business application, the Web server uses the business logic to modify pages
before sending

them
to the browser.
Business applications must implement security beyond the anonymous browse common
for most
Web sites. Security requires the cooperation of components at the top and middle
tiers to authenticate
the user and authorize application services. A common approach is the use of a
Cialog window
through the browser to enter the user name and password. The middle tier
authenticates the user and
establishes a sesslon. All messages between the browser and the Web server use a
session identifier
to maintain a logicaiconnection between the tiers.
Once the session is established, the Web server has a mechanism to store the
transacfion state.
The state of the transaction reflects the most recent data input by the user that
has not been
committed to the database. For instance, when creating a customer account,
inforrnation is gathered
about the customer and services, and perhaps an appointment is set to install the
new service. As
the user inputs these pieces of information, they are not usually committed to the
database right
away. lnstead they are held in memory somewhere until the complete order is ready.
Then the order
can be validated for consistency and integrity before committing it to the
database.
A critical factor in the performance and integrity of a system is where the
transaction state is held.
Opinions vary on this issue, but the software-engineering principles of the three-
tier architecture
apply to lntranet applications as well. With a thin-client approach, the state does
not belong in the
client because by definition the business logic is in the middle tier. lt is also
desirable to keep the
accesses to the database stateless to allow for maximum flexibility and
scalability. Keeping the
state at the middle tier associated with the user's session helps minimize lraftic
between tiers,
promotes good performance, and makes good use of the technology.
The Web server can use various ways to access the business logic and place the
results into a Web
page. Some Web server vendors allow the developer to embed code directly in the Web
page. This
code, written in a programming language such as Java or Visual Basic, can directly
access the
business logic. Often this code either produces information that is embedded
directly into the Web
page before sending it to the browser or generates code that is used to populate a
visual control,
such as a data table, with the information when the browser loads the page.This
method can lead to
complex Web pages that contain, in addition to the normal text and HTML, code that
the Web server
executes in the middle tier and code that the Web browser executes in the top tier.
lt is important to
develop and follow programming standards that address managing this complexity.
An early scheme used to couple business logic to Web pages is the common gateway
interface
(CGl). CGI involves the use of scripts or programs that Web pages call to process
user inputs or
build output data.This technique is generally being replaced by embedding
programming languages
such as Java in the Web page.
An important technology emerged during 1998 known as extensible markup language
(XML). Although
it is related to HTML, XML allows the developer to define new tags instead of the
fixed set used by
HTML. This simple but powedul extension enables a strong mechanism for data
exchange between
the Web server and browser. The Web server can use XML to provide data as a series
of tag and
GENERATING
E.COMMERCE I 217
value pairs, as shown in the lollowing example.
(custoner)
(1as t-nane)Doe(/ Ias t-name)
(f irs t-name)Sarah( / f irs t-name)
(phone)1 23 - 123 - L23 4( /phone>
(/ custorner)
Using XML to provide the data in this way, in conjunction with some client-side
script, means that the
data is sent only once to the client, and the client can provide multiple views of
the data using
different sorting or filtering as required. Components for use on browsers are now
being built with
XML awareness, and they can parse and display the data directly.
Physically, multiple computers can be used at the middle tier. These computers are
implemented as
peers, each with an identicalWeb server. A user can establish a session with any of
the computers
and will stay with the computer for the duration of the session. Providing a
central URL that redirects
the initial session request to one of the peer Web servers to spread the load
across the available
systems can leverage the use of a single computer.This implementation provides some
redundancy
in case of a failure. Careful attention here can prevent the failure of any one of
these computers f rom
taking down the system. The user of a computer that fails can connect to one of the
peers and would
only lose the work for the current transaction. More elaborate schemes can be
implemented to
prevent even this loss.

5.37.5 Bottom Tier: The Database Server


The foundation for lntranet business applications is the database. The database is
responsible for
storing information until the system requires it. ln particular, it stores the
persistent state of all
aspects of the business system. Among the different types of databases, two
important types are
the relationaldatabase and the object-oriented database.The relationaldatabase
stores data elements
in a table that has rows and columns. Each table has a column or columns that serve
as the key to
locate the data, for instance a customer's account number.The object-oriented
database uses arbitrary
pointers to relate objects to each other.This more abstract approach offers a
performance advantage
for some applications. However, object-oriented databases tend to be less f lexible
for ad hoc reporting.
Skillful design of the database through the process of normalization allows the
database to handle
data requests and reports not anticipated during the initial design of the system.
Normalization within
a relational database involves breaking the grouping of data elements from what may
seem like
natural groups into smaller groups that can be reassembled in various ways, as
required by the
applications using the database. There is a natural tension between normalization
of data and
perfo rmance optimization.
Many lntranet business applications use a transaction monitor to partition access
to the database to
enhance pedormance and scalability.The transaction monitor provides an information
highway that
can span multiple computers. Servers publish the services they offerthrough the
transaction monitor.
Cirents can request a service without knowing where the server runs.The transaction
monitor provides
transparency of location.
To enhance performance, it is possible to have many servers, each offering the same
set of services,
but through a single queue managed by the transaction monitor. Requests are
submitted to the
queue, and tne transaction monitor routes the requests in order to the next
available server. This is
comparable to the single line in a bank with multiple tellers serving the line.
Unlike the supermarket
model of one line per clerk, the user does not risk getting stuck behind someone
with a large request.
218 / ELECTRONIC COMMERCE

System operators can start additional servers to handle the load


if required or
shut down servers as
the workload mix changes.
An important attribute of these servers is that they must provide
context-free
services or stateless
services. Just as in the
which e
e to
provide the same serv
servers must be desis
information along with t
:fi;"Jt
ilfl
required to handle the request.
access
tion

5.55.5 lnternationalizationandplatformlndependence
A number of factors increase the complexity of developing and deploying
these
lntranet software
applications. Each of them not only expandi the scope ofihe work,
but also
increases the cost to
write and maintain these applications.
O lnternationalization
ages and in
different countries is typically
.
lnternationalization involves making the
locales. This
involves externalizing the
ages include labels
forfields and buttons,
e, on-line help.
lnternationalization also involves.
supporting the different formats for data, time, and currency for both
display and
daia entry. The
collating sequence, or sort order, must also be addressed toiisptay
menu'itehs
and data properly.
Localization is the process of adapting the software to a locale or country.
This
can involve translating
the externalized message into the language of the target locale. ouring
internationalization,

the
controls are usually made aware of the locale so that the controls will
iutomatically

adjust date,
time, and money formats to the user's setting. Localization may also involve
rewriting part of the
software for localtax laws and other regulatory requirements.
ln the Americas and most European countries, a
characters and punctuation used. A single byte
number of graphical languages, such as Chinese,
to represent the working set of characters and
special visual components for display and data
may also require a special version of the operat
Specialcoding techniques are employed to handle
O Platformlndependence
Often it is desirable to allow some flexibility in the hardware platforms for the

different tierS in the


architedture. Selection of a database at the-bottom tier that runs across multiple

hardware platforms
can significantly reduce the effort to achieve platform independence.The
tuning
and operation of the
database changes on different hardware platforms.
At the middle tier, the selection of the object middleware, Web server, and
programming

languages
have a significant effect on the complexity of platform independence. lf true
plitform

injependence
is desired, compromises must often be made to keep the business logic portable

enough to run
across multiple platforms' Of the three tiers, the middle tier poses the biglesi
chailenge

to achieving
platform independence.
The top tierfaces two significant independence issues: (1) hardware/operating

system independence,
and (2) Web browser independence. Some Web browsers run across multiple
hardware platforms.
GENERATING
E.COMMERCE / 219
However, care must be exercised to ensure that the features of the Web browser that
an application
requires are available across the platforms of interest. Some Web browsers do not
support all of their
features on all platforms they claim to support.
Web browser independence requires a'significant elfort in both design and testing.
The major Web
browsers continue to leapf rog over each other in features, each implementing the
successful features
of the other. lf developers limit themselves to the commonly implemented features
across the target
browsers, Web browser independence is achievable, but at the expense of the latest
features available
on the browsers. Within the lntranet it is often possible for a company to
standardize on one Web
browser and eliminate the need for this independence.

You might also like