Professional Documents
Culture Documents
Unit-1 Introduction To E-Commerce 1
Unit-1 Introduction To E-Commerce 1
E-commerce
Unit-1 Introduction to E-commerce
-1-
BBA 7th Semester
Kasthmandap college of management
The history of ecommerce begins with the first ever online sale: on the
August 11, 1994 a man sold a CD by the band Sting to his friend through
his website Net Market, an American retail platform. This is the first
example of a consumer purchasing a product from a business through
the World Wide Web—or “ecommerce” as we commonly know it today.
Some Example of e-commerce are
Retail
Whole sale
Bropshipping
Crowdfunding
Subscription
Physical products
Digital products
Service
Advantages of e-commerce:
-2-
BBA 7th Semester
Kasthmandap college of management
-3-
BBA 7th Semester
Kasthmandap college of management
Disadvantages of e-commerce
1. Poor quality products: You don’t physically see and inspect
whatever you are paying for before it’s delivered. Customers,
therefore, run the risk of falling victim to false marketing and
buying poor quality products from the virtual shop.
-4-
BBA 7th Semester
Kasthmandap college of management
2. Elements of e-commerce
1. User Friendly
If your store is easy to navigate, you will have a greater chance of
making a sale from the start. The homepage should be inviting and
encourage visitors to click on products or categories of items they
are looking to purchase. Categories should be self-explanatory and
should be broken down into subcategories so visitors can quickly
find what they are looking for.
The search bar should be easy to find and quickly list all applicable
items that are currently available for sale once the user types in
their query.
Don't confuse users during checkout. Keep things basic and value
your customer's time. The shopper should feel confident shopping
on your website.
3. Mobile Compatibility
80% of all online adults own a Smartphone. Mobile visits, in many
cases now, outrank desktop use. Your e-commerce site needs to
be designed and built for all devices, not just a personal computer
or laptops.
-5-
BBA 7th Semester
Kasthmandap college of management
feel stupid because they not. If they are going to your website
they must be smart enough to buy from the best company out
there.
6. Customer Support
Some sort of customer support needs to be available in case of
any problems or questions. There are several different types of
customer support, such as 800 numbers, email support, and
online chat. Decide which is the best choice for your budget and
type of business. Keep in mind to always be friendly and respond
in a timely manner to resolve any issues to keep your customers
happy.
-6-
BBA 7th Semester
Kasthmandap college of management
3 It is difficult to establish and maintain A uniform strategy can be easily established and
standard practices in traditional maintain in e-commerce.
commerce.
6 No uniform platform for information sharing E-Commerce provides a universal platform to support
as it depends heavily on personal commercial / business activities across the globe.
communication.
-7-
BBA 7th Semester
Kasthmandap college of management
The first thing that comes to our mind when we talk about ecommerce is
that it is an online commercial or sales transaction that takes place
between the supplier and the customer. While the idea of the concept is
right, there are more specific factors involved that categorize
ecommerce into six major types. Each of these types has different
features and attributes.
Business-to-Business (B2B)
Business-to-Consumer (B2C)
Consumer-to-Consumer (C2C)
Consumer-to-Business (C2B)
Business-to-Administration (B2A)
Consumer-to-Administration (C2A)
Business-to-government (B2G)
Government-to-business(G2B)
-8-
BBA 7th Semester
Kasthmandap college of management
In this case, the customer has more info about the products in the form
of informative content and there is also a chance to buy products at
cheaper rates. Most times, quick delivery of the order is also maintained.
-9-
BBA 7th Semester
Kasthmandap college of management
- 10 -
BBA 7th Semester
Kasthmandap college of management
Government - to - Business
Governments use B2G model websites to approach business
organizations. Such websites support auctions, tenders, and application
submission functionalities.
- 11 -
BBA 7th Semester
Kasthmandap college of management
EDI has existed at least since the early 70s, and there are many EDI
standards (including X12, EDIFACT, ODETTE, etc.), some of which address
the needs of specific industries or regions. It also refers specifically to a
family of standards. In 1996, the National Institute of Standards and
Technology defined electronic data interchange as "the computer-to-
computer interchange of strictly formatted messages that represent
documents other than monetary instruments. EDI implies a sequence of
messages between two parties, either of whom may serve as originator
or recipient. The formatted data representing the documents may be
transmitted from originator to recipient via telecommunications or
physically transported on electronic storage media." It distinguished
mere electronic communication or data exchange, specifying that "in
EDI, the usual processing of received messages is by computer only.
Human intervention in the processing of a received message is typically
intended only for error conditions, for quality review, and for special
situations. For example, the transmission of binary or textual data is not
EDI as defined here unless the data are treated as one or more data
elements of an EDI message and are not normally intended for human
interpretation as part of online data processing."In short, EDI can be
defined as the transfer of structured data, by agreed message standards,
from one computer system to another without human intervention.
EDI can be transmitted using any methodology agreed to by the sender
and recipient, but as more trading partners began using the Internet for
transmission, standardized protocols have emerged.
This includes a variety of technologies, including:
mModem (asynchronous and synchronous)
FTP, SFTP and FTPS
Email
HTTP
AS1
- 12 -
BBA 7th Semester
Kasthmandap college of management
AS2
AS4
OFTP (and OFTP2)
Mobile EDI
And more technologies
Electronic data interchange (EDI) is the electronic transmission of
structured data by agreed message standards from one computer
system to another without human intervention. It is a system for
exchanging business documents with external entities.EDI refers to a
family of standards and does not specify transmission methods, which
are freely agreed upon by the trading partners. The wide adoption of EDI
in the business world facilitates efficiency and cost reduction. EDI is used
in such diverse business-to-business relationships as:
- Interchanges between health care providers and insurers
- Travel and hotel bookings
- Education
- Supply chain management
- Administration
- Tax reporting
1. Standard Language
Interchanging electronic information requires a standardized language
shared by sender and receiver to structure the messages. There are
different standards, such as X12, EDIFACT, XML.
2. EDI software:
Sender and receiver must have an EDI solution to construct and manage
the messages according to the standard in which the interchanges are to
take place.
3. Communications Network:
EDI interchanges call for secure communications systems adapted to the
peculiarities of this type of transaction. There are different options
available, although the most widespread are VANs or Value Added
Networks. These are private communications networks with high levels
of security, control and monitoring that guarantee the correct sending
and reception of the different messages.
It involves
- 13 -
BBA 7th Semester
Kasthmandap college of management
- 14 -
BBA 7th Semester
Kasthmandap college of management
Benefits of EDI
1. Better Speed:
EDI decreases the time it takes for an employee to make invoices and
handle purchase orders manually. Timing is crucial when it comes to
processing of an order. With EDI, businesses can speed up their cycles by
61% creating an allowance for more automation process that
significantly reduces, if not eliminated, time delays related to manual
processes that entail you to compare, enter, and file data. Records
management is reorganized and made more effective with simultaneous
data updates. Transferring documents electronically improves
transaction speed and perceptibility while reducing the cost involved in
manual approach. Stock levels are also kept regularly updated and
visible.
2. Business Efficiency.
For the reason that human error is lessened, businesses can profit from
improved levels of proficiency. Rather than place attention on common
and tedious activities, staffs can dedicate their attention to more
significant value-adding tasks. EDI transfer guarantees immediate
processing and eradicates time wasting related with manual entering,
receiving, and sending orders. Improved quality of data provided by EDI
lessens data entry errors, improves accounts activity times as
procedures become efficient and can be made available for forecasting.
3. Collective Productivity.
The EDI technology permits more business to take on more operations
with less human resources. Business teams can handle tasks with
advanced additional worth. With EDI, the whole process is completed in
a matter of seconds. This is due to the reason that automated process
allows for instant completion of tasks like registering and balancing
validation.
4. Cost Savings
This is amongst the most popular benefits of EDI. With EDI, the costs for
processing business documents get at least 35% cut, but it can be much
more remarkable in case of electronic invoices, with 90% savings a
possibility. Then again, this extreme economic saving is due to
transactions automation, and, also the less involvement of paper usage.
EDI reduces your operating outlay by removing the costs of document
retrieval, filing, mailing, paper, postage, printing, recycling, reproduction,
- 15 -
BBA 7th Semester
Kasthmandap college of management
6. Environment-Friendly Services.
The movement from paper-based services to the use of electronic
transactions available on EDI decreases CO2 discharges. Thus, the use of
EDI encourages corporate social accountability and help organization
achieve sustainable supply chain management.
8. Improved Accuracy
Apart from inadequacy, the manual approach is also highly susceptible
to error, usually ensuing from entering and re-keying errors,
indecipherable handwriting, and improper document management. EDI
considerably improves your business data quality and removes the
problem of re-working orders by bringing at least a 30% to 40% drop in
transactions errors. The use of ethics acknowledged by both parties
(receiver and sender) guarantee correct interpretation of data,
irrespective of activity sectors or nationalities.
9. Operations Automation.
The benefits of EDI tool considerably lighten the burden on
management. Several tasks, like enveloping, franking or registering,
printing out business documents, would fade entirely. EDI’s
- 16 -
BBA 7th Semester
Kasthmandap college of management
11. Security
EDI boosts the level of protection for any transactions by strongly
allocation data across a more extensive variation of communicating
protocols and safety standards, hence, reducing supply chain risks. Your
trading partners would profit from the seamless movement of data and
accessibility to the technology creates prospects for newer business
breaks.
Limitations/Drawbacks of EDI
While countless businesses enjoy the benefits of EDI, some companies
are still cautious to try it out due to the following limitations of EDI.
1. Cost of Implementation.
It is true that EDI provides massive cost savings benefits but for small
businesses re-designing and implementing software applications to fit in
EDI into current applications can be quite costly. Such limitations of EDI
must be considered if you plan on implementing such system.
- 17 -
BBA 7th Semester
Kasthmandap college of management
- 18 -
BBA 7th Semester
Kasthmandap college of management
Network security/Firewalls
In computing, a firewall is a network security system that monitors and
controls incoming and outgoing network traffic based on predetermined
security rules. A firewall typically establishes a barrier between a trusted
internal network and un trusted external network, such as the Internet.
- 19 -
BBA 7th Semester
Kasthmandap college of management
- 20 -
BBA 7th Semester
Kasthmandap college of management
- 21 -
BBA 7th Semester
Kasthmandap college of management
Firewall types
2. Circuit-level gateway
Using another relatively quick way to identify malicious content, circuit-
level gateways monitor TCP handshakes and other network protocol
session initiation messages across the network as they are established
between the local and remote hosts to determine whether the session
being initiated is legitimate -- whether the remote system is considered
trusted. They don't inspect the packets themselves, however.
4. Application-level gateway
This kind of device -- technically a proxy and sometimes referred to as a
proxy firewall -- combines some of the attributes of packet filtering
firewalls with those of circuit-level gateways. They filter packets not only
according to the service for which they are intended -- as specified by
the destination port -- but also by certain other characteristics, such as
the HTTP request string. While gateways that filter at the application
layer provide considerable data security, they can dramatically affect
network performance.
5. Next-generation firewall
A typical NGFW combines packet inspection with stateful inspection and
also includes some variety of deep packet inspection, as well as other
- 22 -
BBA 7th Semester
Kasthmandap college of management
- 23 -
BBA 7th Semester
Kasthmandap college of management
- 24 -
BBA 7th Semester
Kasthmandap college of management
One of the major problems with secret key cryptography is the logistical
issue of how to get the key from one party to the other without allowing
access to an attacker. If Alice and Bob are securing their data with secret
key cryptography, and if Charlie gains access to their key, Charlie can
understand any secret messages he intercepts between Alice and Bob.
Not only can Charlie decrypt Alice's and Bob's messages, but he can also
pretend that he is Alice and send encrypted data to Bob. Bob will not
know that the message came from Charlie, not Alice.
Secret key cryptography is also called symmetric cryptography because
the same key is used to both encrypt and decrypt the data. Well-known
secret key cryptographic algorithms include the Data Encryption
Standard (DES), triple-strength DES (3DES), Rivest Cipher 2 (RC2), and
Rivest Cipher 4 (RC4).
Let's assume that Bob wants to send a secret message to Alice using
public key cryptography. Alice has both a public key and a private key, so
she keeps her private key in a safe place and sends her public key to Bob.
- 25 -
BBA 7th Semester
Kasthmandap college of management
Bob encrypts the secret message to Alice using Alice's public key. Alice
can later decrypt the message with her private key.
If Alice encrypts a message using her private key and sends the
encrypted message to Bob, Bob can be sure that the data he receives
comes from Alice; if Bob can decrypt the data with Alice's public key, the
message must have been encrypted by Alice with her private key, and
only Alice has Alice's private key. The problem is that anybody else can
read the message as well because Alice's public key is public. While this
scenario does not allow for secure data communication, it does provide
the basis for digital signatures. A digital signature is one of the
components of a public key certificate, and is used in SSL to authenticate
a client or a server. Public key certificates and digital signatures are
described in later sections.
Public key cryptography is also called asymmetric cryptography
because different keys are used to encrypt and decrypt the data. A well
known public key cryptographic algorithm often used with SSL is the
Rivest Shamir Adleman (RSA) algorithm. Another public key algorithm
used with SSL that is designed specifically for secret key exchange is the
Diffie-Hellman (DH) algorithm. Public key cryptography requires
extensive computations, making it very slow. It is therefore typically
used only for encrypting small pieces of data, such as secret keys,
rather than for the bulk of encrypted data communications.
- 26 -
BBA 7th Semester
Kasthmandap college of management
Digital Signature
A digital signature is a mathematical scheme for verifying the
authenticity of digital messages or documents. A valid digital signature,
where the prerequisites are satisfied, gives a recipient very strong
reason to believe that the message was created by a known sender
(authentication), and that the message was not altered in transit
(integrity).
Digital certificate
A Digital Certificate is used to encrypt online data/information
communications between an end-users browser and a website. After
verifying that a company owns a website, certificate authority will sign
their certificate so it is trusted by internet browsers.
A Digital Certificate is an electronic "password" that allows a person,
organization to exchange data securely over the Internet using the public
key infrastructure (PKI). Digital Certificate is also known as a public key
certificate or identity certificate.
- 27 -
BBA 7th Semester
Kasthmandap college of management
Certificate authority
In cryptography, a certificate authority or certification authority (CA) is
an entity that issues digital certificates. A digital certificate certifies the
ownership of a public key by the named subject of the certificate. This
allows others (relying parties) to rely upon signatures or on assertions
made about the private key that corresponds to the certified public key.
A CA acts as a trusted third party—trusted both by the subject (owner)
of the certificate and by the party relying upon the certificate.
The digital certificate certifies the ownership of a public key by the
named subject of the certificate. This allows others (relying parties) to
rely upon signatures or assertions made by the private key that
corresponds to the public key that is certified.
- 28 -
BBA 7th Semester
Kasthmandap college of management
During the checkout process, you bring out your credit card and swipe it
or enter your number, the money is transferred, and you are on your
way. People make payments, online and in-person, every day without
thinking twice about the electronic payment systems that run
everything. An electronic payment system is a way of making
transactions or paying for goods and services electronically without
using cash or checks. In order to accept funding and meet customer
needs, companies are accepting payments in many more forms than
cash or checks.
The digital token based payment system is a new form of electronic
payment system which is based on electronic tokens rather than e-
cheque or e-cash. The electronic tokens are generated by the bank or
some financial institutions. Hence we can say that the electronic tokens
are equivalent to the cash which are to be made by the bank.
Digital tokens have come to the fore recently, firstly with excitement
about cryptocurrencies such as bitcoin, then with digital tokens being
used to represent different assets on a blockchain.
E-cash
eCash is an internet-based system that facilitates the transfer of funds
anonymously. Similar to credit cards, eCash historically has been free to
users, while sellers have paid a fee. Due to certain security concerns,
however, eCash remains more of an idea and less of a fully realized,
widespread payment system. Ecash was conceived by David Chaum as
an anonymous cryptographic electronic money or electronic cash system
- 29 -
BBA 7th Semester
Kasthmandap college of management
Reliability:-
Users and businesses want a payment system that is reliable because
the availability of services and smooth running of an enterprise will
depend on the availability and successful operation of the payment
infrastructure.
Security:-
Digital currency should be stored in a form that is resistant to
replication, double-spending, and tampering. At the same time, it should
offer protection from the intruders trying to tap it to unauthorized use,
when transmitted over the internet.
Usability:-
The user of the payment mechanism should be able to use it as easily as
real currency. This requires that the payment system should be well
integrated with the existing applications and processes that acquire the
role of transacting parties in e-commerce.
- 30 -
BBA 7th Semester
Kasthmandap college of management
Scalability:-
The payment system infrastructure should be scalable, to be able to
handle the addition of new users and merchants, so that systems will
perform normally without performance degradation and maintain the
quality of service.
It should be able to offer the same performance and cost per transaction
overheads with a growing number of customers and transactions.
Anonymity, privacy:-
This characteristic refers to the desire of users to protect their privacy,
identity and personal information. In some transactions, the identities of
the parties could be protected by anonym it.
Applicability:-
Applicability of a payment system is defined as the extent to which it is
accepted for payments at points of sale, or at online e-commerce sites.
Debit cards and credit cards have high applicability, as one can pay with
them in a variety of places. The applicability of a payment system may
vary from country to country.
Authorization type:-
Authorization type is defined as the form of control over the validity of
transactions. The authorization type can be offline. Offline authorization
means that users of the system can exchange money while not
connected to a network, without a third party mediating the transaction.
Paper cheques are the example of offline authorization.
Convertibility:-
Funds represented by one payment system should be easily convertible
into funds represented by other payment systems. Users should be able
to transfer money from electronic payment systems.
- 31 -
BBA 7th Semester
Kasthmandap college of management
Interoperability:-
A payment system in interoperable if it is not dependent on one
company, but it is open and allows other interested parties to join. This
can be achieved by means of open standards for data transmission
protocols and infrastructure.
An interoperable system can faster gain the necessary customer base for
future development and will have a higher level of applicability.
Multi-currency:-
Effective and efficient payment systems between countries are possible
when a system allows processing multiple currencies, as it is currently
done with credit cards.
Traceability:-
Traceability indicates how easy it is to trace money flows and sources of
funds that are going through a payment system and used for purchases.
In electronic payment systems, money can be traced by records that are
kept of payment activity.
Linkability:-
Linkability of an electronic payment system implies that payments can
be associated with a particular user, or that it is possible to recognize
several payments originating from some user.
Users can be linked to their spending even if the system they use is
anonymous. A relation between the user and his payments can be
established.
Trust:-
- 32 -
BBA 7th Semester
Kasthmandap college of management
Trust refers to the degree of customers confidence that their money and
personal information will be safe, and that all parties involved will not
act against users’ interests. Users need to trust that payments will be bot
be stolen or misused.
Flexibility:-
Payment systems should be in a position to accept several forms of
payment rather than limiting the users to a single form of currency.
Efficiency:-
Efficiency here refers mainly to the cost overheads involved in the
operation of digital payments. The cost of payment per transaction
should be negligible.
E-Cheque
An electronic check, or e-check, is a form of payment made via the
Internet, or another data network, designed to perform the same
function as a conventional paper check. Since the check is in an
electronic format, it can be processed in fewer steps. Additionally, it has
more security features than standard paper checks including
authentication, public key cryptography, digital signatures, and
encryption, among others.
An electronic check is a form of payment made via the internet
that is designed to perform the same function as a
conventional paper check.
One of the more frequently used versions of the electronic
check is the direct deposit system offered by many employers.
Generally, the costs associated with issuing an electronic check
are notably lower than those associated with paper checks.
An electronic check has more security features than standard
paper checks.
- 33 -
BBA 7th Semester
Kasthmandap college of management
Smart card
A smart card, chip card, or integrated circuit card (ICC) is a physical
electronic authorization device, used to control access to a resource. It is
typically a plastic credit card-sized card with an embedded integrated
circuit (IC) chip. Many smart cards include a pattern of metal contacts to
electrically connect to the internal chip. Others are contactless, and
some are both. Smart cards can provide personal identification,
authentication, data storage, and application processing. Applications
include identification, financial, mobile phones (SIM), public transit,
computer security, schools, and healthcare. Smart cards may provide
strong security authentication for single sign-on (SSO) within
organizations. Numerous nations have deployed smart cards throughout
their populations.
- 34 -
BBA 7th Semester
Kasthmandap college of management
don’t want any unauthorized usage of their credit cards and any
modification to the transaction amount by a third party. These security
issues have deterred many potential consumers from purchasing online.
- 35 -
BBA 7th Semester
Kasthmandap college of management
Unit-6 E-marketing
There are several ways in which companies can use internet for
marketing. Some ways of e-marketing are:
1. Article marketing
2. Affiliate marketing
3. Video marketing
4. Email marketing
5. Blogging
- 36 -
BBA 7th Semester
Kasthmandap college of management
Traditional Marketing
- 37 -
BBA 7th Semester
Kasthmandap college of management
Growth in potential
Reduced expenses
Elegant communications
Better control
Improved customer service
Competitive advantage
Online marketing is also known as internet marketing, web marketing,
digital marketing and search engine marketing (SEM).
- 38 -
BBA 7th Semester
Kasthmandap college of management
- 39 -
BBA 7th Semester
Kasthmandap college of management
E-advertising
Electronic advertising is advertising that uses the Internet and other
forms of digital media to help a business promote and sell goods and
services. The purpose of using Electronic advertising is to reach a wider
range of potential customers by connecting with them over the web. It is
also a lot more cost effective as you can fund your advertising within the
boundaries of your own budget. Another luxury of Electronic advertising
is ‘Target Marketing’. This means that you can target your desired group
of customers based on a wide range of criteria such as age, location,
gender and religion.
Online advertising, also known as online marketing, Internet advertising,
digital advertising or web advertising, is a form of marketing and
- 40 -
BBA 7th Semester
Kasthmandap college of management
Browsing behaviour
Customer Behaviour analytics analyze customer behaviour based on
three different aspects (browsing behaviour, purchase behaviour &
email behaviour) and identify the actionable insights that drive Valuable
Outcomes.
1. Browsing Behaviour in Retail ecommerce
The objective of analysing On-site or Browsing behaviour of customers
can be understood by these three words:
“Know Thy Customers”
Analyzing the browsing behaviour of customers is the most important
aspect of modern retail e-commerce. It focuses upon tracking and
understanding the finest details of customer’s on-site activity.
- 41 -
BBA 7th Semester
Kasthmandap college of management
The more information an online store has about the customer, better
it’ll be able to serve them. When every behavioural aspect of the
customer is wholly understood, the site can offer personalized on-site
experience to the customer.
Once a visitor lands upon a page, his browsing or on-site behaviour is the
first information which is used for providing more relevant information
to him. Based upon his searches and interest shown in specific products,
more similar products are suggested. For example: If a visitor is looking
at a product, then he is interested in such products, so more of such
similar products can be recommended to him.
Also note that depending upon all the products a visitor or customer
looked at, other customers with similar interests can be found.
Therefore, all the products of a similar customer base become
‘Recommendations Based on Browsing’ for the primary customer.
- 42 -
BBA 7th Semester
Kasthmandap college of management
Unit-7 M-Commerce
Definition of M-Commerce
M-commerce is the buying, selling, and ordering of goods and services
using a mobile phone or other mobile equipment. Mobile commerce,
also known as m-commerce or m-commerce, is the use of wireless
handheld devices like cell phones and tablets to conduct commercial
transactions online, including the purchase and sale of products, online
banking, and paying bills. The use of m-commerce activity is on the rise.
Mobile commerce refers to business or purchases conducted
over mobile devices like cell phones or tablets.
Mobile commerce has increased rapidly as security issues have
been resolved.
Companies like Apple and Google have introduced their own
mobile commerce services.
Mobile commerce is an increasingly large subset of electronic
commerce, a model where firms or individuals conduct business over
the internet. The rapid growth of mobile commerce has been driven by a
number of factors, including increased wireless handheld device
computing power, a proliferation of m-commerce applications, and the
broad resolution of security issues. Electronic commerce (e-commerce)
transacted over mobile communication devices such as cell phones or
personal digital assistants (PDA). The term refers to the purchasing and
selling of products and services using mobile phones and other wireless
handheld devices. PDA’s (personal digital assistants), for example, are
handheld wireless devices. The emergence of mobile commerce
triggered many new online businesses. Below is a list of the most
popular ones today:
Mobile banking.
Information services such as stock quotes, sports scores, news, traffic
reporting, and emergency alerts.
Location-based services.
Electronic boarding passes.
Mobile ticketing.
Mobile money transfers.
In-app payments.
Contactless payments.
Loyalty cards, coupons, and other mobile marketing features.
Digital content purchases.
Digital content delivery.
- 43 -
BBA 7th Semester
Kasthmandap college of management
Application of m-commerce
Mobile Banking: Using a mobile website or application to
perform all your banking functions. It is one step ahead of
online banking and has become commonplace these days. For
example, in Nigeria, the majority of banking transactions
happen on mobile phones.
Mobile Ticketing and Booking: Making bookings and receiving
your tickets on the mobile. The digital ticket or boarding pass is
sent directly to your phone after you make the payment from
it.
E-bills: This includes mobile vouchers, mobile coupons to be
redeemed and even loyalty points or cards system.
- 44 -
BBA 7th Semester
Kasthmandap college of management
Advantages of M-commerce
It provides a very convenient and easy to use the system to
conduct business transactions.
Mobile commerce has a very wide reach. A huge part of the
world’s population has a mobile phone in their pocket. So the
sheer size of the market is tremendous.
M-commerce also helps businesses target customers according
to their location, service provider, the type of device they use
and various other criteria. This can be a good marketing tool.
The costs of the company also reduced. This is due to the
streamlined processes, now transaction cost, low carrying cost
and low order processing cost as well.
Disadvantages of M-commerce
The existing technology to set up an m-commerce business is
very expensive. It has great start-up costs and many
complications arise.
In developing countries, the networks and service providers are
not reliable. It is not most suitable for data transfer.
Then there is the issue of security. There are many concerns
about the safety of the customer’s private information. And
the possibility of a data leak is very daunting.
The END.
- 45 -