You are on page 1of 13

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/233820093

E-Commerce Business Models: Part 1

Chapter · July 2010


DOI: 10.4018/978-1-61520-611-7.ch034

CITATION READS
1 16,515

1 author:

Khaled Ahmed Nagaty


The British University in Egypt
53 PUBLICATIONS   235 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Providing e-Passports and e-IDs with extra three security layers to prevent fraud View project

A novel approach to prevent fraud in ePassports and eIDs using biometrics Mapping View project

All content following this page was uploaded by Khaled Ahmed Nagaty on 28 May 2014.

The user has requested enhancement of the downloaded file.


347

Chapter 34
E-Commerce Business Models:
Part 1
Khaled Ahmed Nagaty
The British University in Egypt

ABSTARCT
In this article the author explained the classes of e-commerce business models and their advantages
and disadvantages. He discussed the important issues and problems facing e-commerce web sites and
how to build a successful e-commerce Web site using techniques of security, privacy and authentication,
guidelines of maintenance, collecting user’s information for personalization, using multi-tier architecture
to achieve high performance and high availability.

INTRODUCTION developed from being a plain text websites to


interactive e-commerce hubs that use Internet and
Internet and computers have revolutionized the mobile technologies to reach their current custom-
electronic transactions which involve the transaction ers and attract the potential customers. Some ser-
of ownership or right to use products or services vices and products can be delivered by the internet
online. E-commerce not only involves buying and while others do not. Services that can be delivered
selling over the Internet but also collaborating with through the internet include distance learning, fi-
business partners. It is not constrained by time nancial services, pension services, legal services,
or physical location it can be conducted at any news services, and advisory services, information
time from any place which opened unlimited new services such as information on travel flights, buses
markets. A business model is a framework of how and trains services.
an organization generates revenue. E-commerce However, services that cannot be delivered us-
business models use the Internet to carry on their ing the internet include police and law enforcement
activities and generate revenue. They have been treatment, fire brigade services, first aid, nursing,
physiotherapy, surgery operations, dental services,
DOI: 10.4018/978-1-61520-611-7.ch034 hairdressing, house cleaning, waste disposal and

Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
E-Commerce Business Models: Part 1

washing services, plumbing and hosing, ventilat- software running on a Web server that al-
ing and heating services, forensics, transportation, lows the Web server to respond to requests
freight and shipping services, building services, from Web clients. Each time a request is
wedding, childcare, security and warehousing. received the CGI analyzes the request and
Products that difficult to be delivered through the if it identifies a file stored on the server it
internet include jewels and timepieces, footwear, sends the file back to the user, and if it is
beauty care and cosmetics, furniture, frames of required to execute a command on an ap-
eyeglasses. All these products need to be tried out plication it runs the command and sends
and assessed by the customers. In jewels ladies the output back to the user.
want to try out different models of jewels to choose • Active Server Pages (ASP): is a develop-
a suitable one. In furniture it is hard to describe ment software tool which can be used to
the required design and colors through the Internet create and run dynamic and interactive
and customers need to touch and try the furniture Web server applications. When a client’s
before taking a decision. The same issue applied browser requests ASP file from a Web
for beauty care and cosmetics where ladies want server it is processed on the server and the
to compare between different colors on their faces output is in pure HTML code which is sent
before taking a decision. However, an e-commerce to the client’s browser to display it in a for-
business will not work well unless there is a well matted text. ASP is a Microsoft technology
equipped infrastructure which includes computers that was designed to run on Windows op-
that can connect to the Internet Service Provider erating system that runs Microsoft Internet
(ISP) through dial-up lines or dedicated lines that Information Server (IIS). The active con-
offer a high bit rates such as digital subscriber lines tent is written with a scripting language.
(DSL). DSL is recommended if a user wants a faster • Java: is a programming language used
access to the internet. ISPs provide the Internet to build interactive contents on the client
access to customers at their homes, business and computer thus saving considerable server
institutions. Berners-Lee in 1989-1991 and his load. A Java program is called applet when
associates developed the essential components of it runs from a Web page and called servlets
a Web site which are: HTML, HTTP, a Web server when it runs on server. A Java program is
and a browser. The HyperText Markup Language first translated into Java intermediate lan-
(HTML) which is a programming language can be guage (Bytecode) which is then executed on
used to build Web pages on a Web server. Remote an interpreter called Java Virtual Machine
client computers which are called Web clients (JVM). JVM interprets the intermediate
can access these Web pages using the HyperText code to machine code. Any computer that
Transfer Protocol (HTTP) to be displayed using runs JVM is able to interpret the interme-
Web browsers. Customers should easily interact diate code which gives the Java language
with their Web sites or they will be lost to com- the ability to run on any platform such as
petitors and discouraging return visits to this Web Linux, Mac OS X or Windows.
site which results in sales losses. Software tools • Java Server Pages (JSP): is a Java technol-
are required to achieve high levels of interactivity ogy that allows developers to create Web
with Web sites which may include: pages that contain dynamically generated
content. It can combine any document
• Common Gateway Interface (CGI): is a types such as HTML or Extensible Markup
standard protocol for communication be- Language (XML) tags to encapsulate the
tween Web clients’ browsers and application logic that generates the content for the

348
E-Commerce Business Models: Part 1

response page. In this way, JSP separates • VBScript: is programming language from
Web presentation from Web content. JSP Microsoft which is a subset of its Visual
pages are not restricted to a specific plat- Basic programming language designed
form or Web server. JSP is developed by for interpretation by Web browsers. It
Sun and it is like an ASP page and has a lot is designed to compete with JavaScript.
from ASP technology. The active content is VBScript can be used for server-side as
written in Java which allows writing com- well as client-side while JavaScript is used
plex logic with complex error handling that only for client-side. VBScript supports
may not possible in ASP. only the Internet Explorer browser while
• JavaScript: it is unrelated to the Java pro- JavaScript supports all browsers. VBScript
gramming language despite its name. It is is case insensitive while JavaScript is case
the Netscape-developed object scripting sensitive.
language that is used to control objects on • PHP: is an HTML embedded scripting lan-
an HTML page and handle interactions guage where much of its syntax is taken
with Web browsers. It is a script language from C, Java and Perl languages with some
used in millions of Web pages to create a unique features of PHP. This language al-
variety of special effects, add functionality lows web developers to write dynamic web
and to handle verification and validation of pages quickly.
input users’ forms. It detects the actions of • ColdFusion: is a product of Macromedia,
the user and reacts to them. You can run it is a popular, sophisticated and integrat-
client side JavaScript within ASP pages. ed set of products for building interactive
JavaScript can be used for more simple cli- Web applications. ColdFusion consists of
ent side such as filling forms while ASP is ColdFusion Studio to build a Web site and
used for more server sided validation, fetch ColdFusion Server to serve Web pages
data, generating pages,…etc. to users. ColdFusion is based on the stan-
• ActiveX: is an object oriented programming dard HTML in addition to the server-side
tool that is used to create a self-sufficient ColdFusion Markup Language (CFML).
program called ActiveX control which can CFML provides the capability of control-
be automatically downloaded and execut- ling the application behavior, the ability to
ed by Web browser. Active X controls are integrate multiple server technologies and
small applications written in common pro- dynamically generate the content returned
gramming languages like Visual Basic. If to the Web browser. When a Web browser
the required control is not one of the stan- requests a page in a ColdFusion applica-
dard controls in the Web browser a dialog tion it is automatically pre-processed by the
box prompts the user to download the cor- ColdFusion application server. The applica-
rect control. For example, when you open a tion server reads the client’s data and exe-
Web page using Internet Explorer that con- cutes the application logic that is written in
tains a video clips the pre-loaded ActiveX CFML in the page, the server interacts with
control allows Windows Media files to be database servers, file systems and mail serv-
played directly in the Web page without ers and dynamically generates the HTML
the need to run the Window Media Player Web page which is returned to the browser.
separately. ActiveX has full access to cli- ColdFusion can be used when real time ap-
ent’s resources such as printers, networks plication is required where live data can be
and hard drives. incorporated into dynamically Web pages.

349
E-Commerce Business Models: Part 1

• DreamWeaver: is a product of Macromedia selling to retailers or company providing services


that allows you to create Web pages both to other companies. Pricing is often negotiable
static and dynamic. It consists of an ap- to obtain lower prices on your supplies and with
plication server and ColdFusion Markup minimum human intervention due to businesses
Languages (CFML). Most ColdFusion systems integration. B2B is now growing in an
developers write their ColdFusion pages exponential rate where companies of all sizes
using DreamWeaver. DreamWeaver saves are buying and selling products and services
time by automatic closing HTML and over the Internet. Businesses can make real time
CFML tags, auto-generate some CFML transactions with other businesses to improve
code, providing auto-complete menus as their efficiency and productivity. Analysts expect
you type and color coding the text of your the revenue of B2B will exceed the B2C revenue
code to improve readability. in the near future despite early expectations for
B2C flourishing. An example of B2B e-commerce
model is e-procurement sites where a company
BACKGROUND purchasing agents can buy from suppliers, ask for
offers or bidding to purchase at a desired price.
E-commerce business model is important for com-
panies to survive in global economy. E-commerce • B2C (Business-to-Customer)
business model is a fertile ground for innovation
(Amit and Zott, 2000). When the Internet was B2C is the transactions that occur between
made available for the public in 1994, many ana- a businesses and customers. Businesses selling
lysts expected that e-commerce would be a major products or provide services to customers or the
economic sector in the near future. However, the retailing part of e-commerce on the Internet. B2C
major progress for e-commerce occurred when businesses had a major role in flourishing of e-
security protocols have sufficiently developed commerce where customers got large discount
and widely deployed which led to more secured on shopping and provided free online services.
transactions over the Internet. A substantial Businesses got its products to the market faster
number of primitive e-commerce web sites have with minimum costs and they were adapting more
been developed in late 20th century and the year quickly to customers demand. Many spectators
2000 and although many e-commerce web sites argue that the B2C was once flourished and now
were collapsed in the dot.com fall in 2000 and it is often seen unsuccessful, less frequently and
2001, many companies started to develop web will not thrive again. However, despite of disap-
sites with e-commerce capabilities. E-commerce pointments some analysts predict that B2C will
can be divided into four main classes: B2B, B2C, flourish again and continue to grow but not just
C2B, and C2C. easy and popular as initially expected. An example
of B2C e-commerce model is www.necx.com
• B2B (Business-to-Business) which provides access to materials purchased in
bulk and resell them to customers.
B2B is the exchange of products, services,
or information between businesses rather than • C2B (Customer-to-Business)
between businesses and consumers. Businesses
exchange products, services and information with C2B e-commerce is rare in practice but in
other businesses rather than customers such as theory it means a customer wants to sell a product
manufacturers selling to distributors, wholesalers or a service to a business. Customers naming their

350
E-Commerce Business Models: Part 1

prices for various products or services. Companies pushing new products to current customers
review the consumer’s requirements and bid on the based on their past purchases, this increas-
request. The customer reviews the bids and selects es customer’s dependence on the company
the company they want. C2B enables customers to and decreases the probability a customer
pay for their bills online from any place with no switches to competitors.
need to come to the store. Examples of this type • Complementaries: a company can increase
of e-commerce model www.fotolia.com where its value creation by accompanying its
photographers and designers offer their works products with other products. Customers
for selling to companies. Other examples of C2B will buy more of the complementary prod-
model are online advertising sites like Google ucts regardless of their prices if they buy
Adsense, online surveys like www.surveyscout. more of the core products. Also, a compa-
com where individuals offer the service to reply ny can bundle its product by complemen-
to the company’s survey and companies pay in- tary products from other suppliers. Once
dividuals for this service. a selling occurs, an e-business model can
offer to the customer the complementary
• C2C (Customer-to-Customer) products associated with the purchased
product.
It is a person-to-person transactions which take • Customer lock-in: keeping the customer
place every day since 1995. It facilitates transac- dependent on the company a longer time
tions between customers through a third party. A by making the customer engage with the
good example of this e-commerce type is auctions company in repeated transactions.
web sites like eBay where consumers can buy and • Customer satisfaction: increasing the de-
sell using online payment systems like PayPal to gree to which online customers are accom-
send and receive money online with ease. modated by service offerings. It increases
the quality of service as well as the volume
Major Advantages of E-Commerce of transactions while decreasing the vol-
Business Models are ume of complaints.
[Knowledge@Wharton, 2008]: • Speed: advances in communications allow
transactions to be done almost instanta-
• Efficiency: e-business models increase neously. There is no need to wait weeks for
business efficiency in several ways. They a money transaction or catalogue to arrive
reduce search costs for online customers by post.
and provide them with detailed informa- • Availability: online services are available
tion along with their prices. They encour- any time of day or night and from any
age customers to do business by increasing place.
transaction efficiency, security and speed.
Also, it allows reverse marketing where In general, e-commerce business models
buyers put their desired purchases for bid- provide tools to handle large information masses
ding among sellers which is known as re- with improved security, reliability, user friendly,
verse auction. E-business models reduce low costs, accessibility and customizability which
both inventory and distributions costs for help flourishing e-commerce.
companies.
• Cross-selling: companies can increase their
value creation for their own products by

351
E-Commerce Business Models: Part 1

Major Disadvantages of due to hardware failure, computer viruses that


E-Commerce Business Models may corrupt data or applications operating on the
Web server or due to lack of maintenance which
• Feel and touch: websites allow customers makes the Web site unavailable. The failure to
to browse products but do not allow touch- achieve high availability and high performance
ing them which prevents many customers will cause the business to loose customers through
to make an accurate decision. frustration. Also, problems of integration of new
• Trust: customers are unwilling to accept versions of e-commerce software with existing
E-commerce due to privacy and security ones may also appear. Governments and busi-
concerns (Turban, 2004; Awad, 2003). nesses encourage e-Commerce but there is some
resistance by consumers due to concerns about
SUCCESSFUL E- COMMERCE security and privacy. Currently, e-commerce busi-
WEBSITES ness models require a customer to provide more
personal information than it is required. Many
Issues, Controversies, Problems people are concerned that this information will
then be re-used for another purpose or sold to
There are numerous studies reporting the fact that direct marketers. Some analysts argue that despite
e-commerce sites are failing in usability, ease of of the improvement in information encryption
use and general functionality (Tarafdar and Zhang, there still a danger that credit card information
2005; Aladwani and Palvia, 2002; Ranganathan may be stolen and used in an illegal purchasing
and Ganapathy, 2002; Yang et al., 2003; Long & on the Internet.
McMellon, 2004). Users often fail when they try to However, we argue that transmission of mes-
purchase products on an e-commerce site (Nielsen sages over the Internet was significantly improved
and Norman, 2000; Zona Research, 1999). It is not after using the Secure Socket Layer (SSL) protocol
just the customers’ failure but also the site fails which uses private and public key encryption and
to sell. However, chiefly for reasons of growing digital certificates. It is the customer’s responsibil-
importance of online transactions in business-to- ity to be careful not to disclose his card informa-
consumer (B2C) and business-to-business (B2B), tion to anybody or leaving his card in unsecured
e-business models need for development and sur- places. Other important issues for e-commerce
vival cannot be ignored for organizations working Web site is the loss of privacy which means loss
in complex operational environment coupled with of individual privacy when using the Internet.
the dynamism of technological environment that
principally unbounded and constantly evolving. Solutions and Recommendations
Security is also an important issue on the Inter-
net where sensitive payment details such as a Website Security
credit card number may be intercepted or stolen
which leads to the loss of customers’ confidence Organizations conducting business online have
especially if this information is used in an illegal many web applications in the form of shopping
transactions. Hackers may access customer files carts, submission forms, login pages, dynamic
and corrupting customers’ accounts. As customers content and customized application. In the B2C
are unseen you are not sure of the identity of online model Web applications allow Web client’s to ac-
visitors which arises the problem of authentication. cess the Web server to retrieve, submit or update
Achieving high availability and performance are data. These data may be sensitive such as user’s
important issues. Loss of availability may occur credit card data, user’s social number, user’s bank

352
E-Commerce Business Models: Part 1

account details or even user’s medical record. 3. Remove any unneeded programs that load
To maintain high availability on the cyberspace automatically when setting up the server,
the business web site should be available 24 x 7 they may provide a hacker with the access
which invites hackers to launch attacks on the desired.
backend corporate database. In case of a hacker
gained access to the organization’s sensitive data Other essential elements of Web site security
and got use of it then the organization’s business are firewalls and protection against worms and
will be in a serious trouble. The business will lose viruses. Fire walls protect the web Site’s servers
clients’ and stakeholders’ trust and eventually may against hackers and the latest version of anti-
be closed down. Business Web sites receive and viruses protects data files from being corrupted
send sensitive information to their clients and it by worms or viruses.
is important to guarantee information integrity
which means that this information has not been Website Privacy
changed during its transmission.
E-commerce Web sites use the Secure Socket In the B2C models, companies collect informa-
Layer (SSL) protocol to protect their sensitive tion about visiting clients such as user prefer-
information. This technology makes it easier and ences, shopping cart contents to use it later in
safer for online customers to trust Web sites in marketing purposes or in running promotions.
three essential ways (VeriSign, 2008): An e-commerce Web site should keep products
placed in a shopping cart by customers otherwise
1. Enables encryption of sensitive information they will be deleted when these customers log
during online transactions. out. E-commerce Web sites use cookies to iden-
2. Each SSL Certificate contains unique, au- tify users and prepare customized Web pages for
thenticated information about the certificate them. A cookie is a piece of information that a
owner. website server sends to a user’s browser when
3. A Certificate Authority verifies the identity he accesses that site. They can be placed on a
of the certificate owner when it is issued. user’s machine to collect information about this
user without changing any configurations of the
The SSL protocol is well designed with respect user’s computer. When your browser receives the
to preventing eavesdropping and avoiding suc- information it saves it on your hard-disk unless
cessful man in the middle attacks. However, it is your browser doesn’t support cookies. Each time
less concerned with the processes and procedures you access this web site using this computer, the
that a person or organization must go through to information that was previously received is sent
acquire a certificate. back to the website server by your browser. Most
Additional methods of Web security include commonly used Web browsers support the use
(Hoffer, et al., 2007): of cookies. Cookies indicate to a website that a
customer had been previously there and tell what
1. Restrict the number of users accessing the parts of the website a customer had visited. It also
Web server as much as possible and limit records customer’s habits and what he is interested
the number of users with administrative in. This information can be used to tailor adver-
rights. tisements that suit customer’s interests. Cookies
2. Keep a minimum number of open ports on can be prevented by allowing the computer to
the Web server. delete them when a browser starts up or a browser
must notify the user or take permission whenever

353
E-Commerce Business Models: Part 1

a cookie is to be written to the computer’s hard is extracted form his profile provided when the
disk. Software products that can reject or manage user logged into the Website. The Website retrieval
cookies such as Cookie Crusher, Cookie Cruncher system can use this information to pursue one or
or Cookie Pal are now available. more of the goals posed by the user. The informa-
tion provided by the user is a list of attribute-value
Website Authentication pairs where each attribute is assigned a proper
value depending upon each user. Attributes can
Authentication is the process of verifying the iden- be divided into (Abbattista et al., 2002):
tity of the user as a pre-requisite to allowing him
to accesses system’s resources. With the growing 1. Explicit where values are given by the
number of online customers e-commerce authen- user.
tication becomes more and more important issue 2. Existing where values can be collected
in e-commerce security. All e-commerce systems from existing applications, such as register
should apply an authentication methodology to al- systems (e.g., ADDRESS, JOB).
low user’s access to sensitive data and preventing 3. Implicit where values are collected from
malicious access. Passwords are the most common the user behavior and history of his
methods to identify an e-commerce Web site visi- navigation.
tor. A visitor is able to log into the Website as long
as he supplied the correct password. The major Personalization builds credibility especially
drawback of using this method is that a password when it traces user’s behavior and selects new
may be compromised by someone. Passwords stories according to customer’s preferences.
should not be shared by others or written down Ads can be personalized where a Web site gains
where others may find them. They should not credibility when ads match the topic a customer
be sent over networks without being encrypted is reading about (Fogg, 2003).
because they can be easily compromised if they
are intercepted. Website Maintenance
Non-repudiation is an important issue in e-
commerce where a user should not be able to Maintenance solutions prevent Website problems
repudiate having signed a contract or sent the such as broken links or navigational disconnects.
message. By using a digital signature a signer Maintenance includes operational tasks such as
cannot claim that he did not sign a message. Some installing the latest software patches, the latest
schemes of non-repudiation use time stamps with anti-virus software, performing frequent backups,
the digital signature. de-fragmenting the storage and system upgrading
to keep system performance at optimum and im-
Website Personalization prove its scalability to cope with business growth
(Turban, 2004; Awad, 2003). Regular backups may
Websites personalize services to their customers be impractical for e-commerce Web sites as it is
according to their preferences, needs, interests, must be always remain available so a cold backup
tastes and wishes and organizes them to be in easy where a Web site server is totally shutdown is not
reach. This brings the vendor and end customer practical. A hot backup is used where a selected
closer than ever before and improves access to part of the database which contains dynamic data
relevant products. A vendor can now personalize is shutdown for backup. Incremental backup for
product message for individual customers on mas- the information that changed since the last backup
sive scale (Mobasher, 2004). User’s information is suitable for e-commerce Web sites. It does not

354
E-Commerce Business Models: Part 1

Figure 1. Three tier architecture for e-commerce web site

take much time to complete and allow for long 3. Good administrative tools and policies for
time between full backups (Hoffer et al., 2007). system maintenance
Differential backup is a cumulative backup of 4. Support for online administrative activities
all changes made since the last full backup. It is where possible
useful for Web sites in their fast recovery from
failures as it requires only a full backup and the To fulfill the requirements of high availability
latest differential backup to restore the site. The and high performance hardware and software
disadvantage is that as more days elapsed since components must be assembled in redundancy
the last full backup more data needs to be backed whenever possible. Redundant equipment at ev-
up, especially if a significant proportion of the ery level of the multi-tier architecture provides a
data has been changed. The more frequent the Web site some degree from failure and scalable
backups are the faster the Web site recovers when processing to handle traffic surges. As an example
a failure occurs. So, it is important to maintain a redundancy of database servers enables one server
good policy for backups. to take over requests for another server in case
of failure. Also, if an application server fails, the
Website Architecture load balancers can direct requests to other serv-
ers. Clustering software manages an automated
E-commerce Web sites using multi-tier architec- failover to clustered equipment when necessary.
ture are flexible, scalable, and responsive to the Allowing fast recovery from logical errors such
expectations of clients. This is because the func- as database corruptions is an important aspect of
tionality of the application is divided into logical maintaining high availability for e-commerce web
components that are associated with a tier. Each sites. The most frequently techniques that are used
component is a service that is built and maintained are disk mirroring and stripping techniques. To be
independently of other services. Services commu- able to switch to an existing copy of the database
nicate with each other using protocol that enables it must be mirrored, that means two copies of
a service to receive and send information from database are kept and simultaneously updated.
and to other services (The Complete Reference, Redundant Array of Independent Disks (RAID)
2002). Figure 1 shows an example of multi-tier system that implements mirroring is a technology
architecture e-commerce Web site. The require- employs the simultaneous use of two or more
ments for high availability which include: hard disks to achieve high levels of performance,
availability, and larger data volume sizes. Critical
1. A high mean time between failures for all data gains protection from disk failures if stored
hardware components in RAID or mirrored configurations. A disk fail-
2. Fast recovery from failures when they do ure can be quickly recovered from the mirrored
occur disk with no interruption in service to the user.

355
E-Commerce Business Models: Part 1

Figure 2. Data stripped on four disks as adapted from Hoffer et al., 2007

Another technique that can be used with RAID means that a strong need for more effective
is stripping. Stripping is a way of “slicing” data password mechanisms is required. Two factors
and storing it across multiple devices to improve authentication require two types of identifica-
access performance by distributing I/O among tion to access a Website online. A combination
many devices. Figure 2 shows data stripped on of something you know such as passwords and
four hard disks (Hoffer et al., 2007) something you have such as fingerprints, iris and
face is some sort of two factor authentication. Also
using dynamic authentication may be a useful
FUTURE RESEARCH DIRECTIONS addition as a part of a wider, integrated suite of
authentication services. GLS token device displays
There are an increasing number of legitimate Web a unique 6 digit number that changes every 60
sites being attacked throughout 2008 by being seconds called a token code provides a more secure
compromised or used as a host to deliver malware way of accessing government online services. To
to their unsuspecting visitors. There are many Web logon a user must provide his username, password
threats trends such as (Symantec, 2009): and token code (E-government, 2007).
Although cryptography industry developed en-
1) Viral attacks are dynamically changing hanced algorithms to enhance privacy and protect
making traditional antivirus solutions personal data developments in research, design
ineffective. and technology around security are still needed
2) Attacks targeting browser plug-ins instead to reduce risks of privacy violation.
of only the browser itself.
3) Increasing number of users being infected
by misleading applications. CONCLUSION
4) Using SQL injection to infect the main stream
Web sites. In this chapter we discussed the main classes of
5) Spam and spyware threats. e-commerce business models and their advantages
and disadvantages. We discussed the problems
It is a vicious cycle after every security risk and issues facing e-commerce Web sites such as
solution a new security hole is discovered. This security, authentication, privacy, performance and
makes the need for more intelligent security solu- availability and their possible solutions. Finally,
tions are critical. we introduced some of the future research trends
In Website authentication using regular pass- in Web site security and authentication.
words is a weak protection mechanism which

356
E-Commerce Business Models: Part 1

REFERENCES Long, M., & McMellon, C. (2004). Exploring


the determinants of retail service quality on the
Abbattista, F., Degemmis, M., Fanizzi, N., Lic- internet. Journal of Services Marketing, 18(1),
chelli, O., Lops, P., Semeraro, G., & Zambetta, F. 78–90. doi:10.1108/08876040410520726
(2002). Learning User Profiles for Content-Based
Filtering in e-Commerce. In Atti del Workshop Mobasher, B. (2004). Web Usage Mining and
AI*IA su Apprendimento Automatico: Metodi e Personalization. Retrieved on February 5, 2009,
Applicazioni, Siena, Settembre 6-11, 2002. from http://maya.cs.depaul.edu/~mobasher/pa-
pers/IC-Handbook-04.pdf
Aladwani, A. M., & Palvia, P. C. (2002). Devel-
oping and validating an instrument for measur- Nielsen, J., & Norman, D. A. (2000). Web-site
ing user-perceived web quality. Information usability: usability on the web isn’t a luxury.
& Management, 39(6), 467–476. doi:10.1016/ Retrieved March 28, 2000, from http://www.
S0378-7206(01)00113-6 informationweek.com/773/web.htm

Amit, R., & Zott, C. (2000). Value Drivers of Ranganathan, C., & Ganapathy, S. (2002). Key
E-commerce Business models. In The Wharton dimensions of business-to-consumer web sites.
Conference on Winners and Losers in the E- Information & Management, 39(6), 457–465.
Commerce Shakeout, October 20, 2000. doi:10.1016/S0378-7206(01)00112-4

Awad, E. M. (2003). Electronic Commerce: from Symantec. (2009). Internet Security Threats Re-
vision to fulfillment. Upper Saddle River, NJ: port. Retrieved on March 15, 2009, from http://
Prentice Hall. www.symantec.com

E-government. (2007). Online Authentication Tarafdar, M., & Zhang, J. (2007). Determinants of
Trends 2007. Retrieved on March 17, 2009, from reach and loyalty–a study of website performance
http://www.e.govt.nz/services/authentication/ and implications for website design. Journal of
library/docs/authtrends-2007 Computer Information Systems, 48(2), 16–24.

Fogg, B. J. (2003). Persuasive Technology: Using The Complete Reference. (2002). J2EE Multi-tier
Computers to Change What We Think and Do. Architecture. Retrieved on January 14, 2009, from
San Francisco: Morgan Kaufmann. http://searchwebservices.techtarget.com/search-
WebServices/downloads/J2EE_TCRCH02.pdf
Hoffer, J. A., Prescott, M. B., & McFadden, F. R.
(2007). Modern Database Management (8th Ed.). Turban, E., King, D., Lee, J., & Viehland, D.
Upper Saddle River, NJ: Prentice Hall. (2004). Electronic Commerce: A Managerial
Perspective. Upper Saddle River, NJ: Pearson
Kambil, A., Ari Ginsberg, A., & Bloch, M. (1998). Prentice Hall.
Reinventing Value Propositions [Working Paper].
NYU Center for Research on Information Systems. VeriSign. (2008). Secure Sockets Layer (SSL). How
Knowledge@Wharton. (n.d.). Creating Value It Works. Retrieved January 24, 2009, from http://
through E-Commerce Business Models. Retrieved www.verisign.com/ssl/ssl-information-center/
December 25, 2008, from http://knowledge.whar- how-ssl-security-works
ton.upenn.edu/article.cfm?articleid=254

357
E-Commerce Business Models: Part 1

Yang, Z., Peterson, R., & Cai, S. (2003). separated from each other. Each layer interacts
Service quality dimensions of internet pur- with only the layer directly above or below it,
chasing: an exploratory analysis. Journal and has specific functions to do.
of Services Marketing, 17(7), 685–698. Website Authentication: it is any process by
doi:10.1108/08876040310501241 which a Website verifies that someone is who he
claims he is.
Zona Research. (1999). Zona research’s online
Website Maintenance: it is the process of
shopping report. Retrieved April 4, 2000 from
updating the elements of a Website.
http://www.zonaresearch.com/info/press/pre-
Website Personalization: it is a process with
leases99.htm
which an online user customizes a Website to its
preferences, wishes and interests.
Website Privacy: it is the process with which
KEY TERMS AND DEFINITIONS a Website protects its information from being
disclosed to unauthorized online users.
E-Commerce: it is the process of buying and Website Security: it is an application that
selling products or services over the Internet. restricts access to certain areas within the user’s
Multi-Tier Architecture: is the architecture website.
of an application that has at least three layers

358

View publication stats

You might also like