Professional Documents
Culture Documents
MODULE I
ELECTRONIC DATA INTERCHANGE: It is a standardised system for coding trade transactions so that
they can be communicated directly from one computer system to another without the need of
printed orders and invoices.
A fairly broad definition of Ecommerce is the process of doing business electronically. It involves the
automation of variety of business to business and business to consumer transaction through reliable
and secure connections.
FEATURES OF E COMMERCE:
UBIQUITY: Ubiquity means found everywhere. With E Commerce it is possible to shop from desktop,
home, phone traveling. There’s no need to visit market physically
GLOBAL REACH: E Commerce technology permits commercial transactions to cross the national
boundaries and it can reach to any corner of the globe.
UNIVERSAL STANDARDS: One unusual feature of E commerce is that the technical standards of the
internet are Universal Standards – they are shared by all the nations around the world.
RICHNESS: It refers to the richness in providing information to the consumer. Information about a
product is provided to the consumer using an audio or a video.
INTERACTIVITY: E Commerce allows two way communications between merchant and consumer.
Communication can be through Email or online Chatting etc.
INFORMATION DENSITY: Internet is making information more useful than ever. Information becomes
more plentiful, less expensive and of higher quality.
PERSONALISATION: Merchants can target their marketing messages to specific individuals by
adjusting the messages to a person’s name, interest and past purchases.
SOCIAL NETWORKING: Merchant can allow the user to create and share contents in the form of text,
videos, music or photos with worldwide community. Using these forms of communication, users are
able to create new social networks and strengthen existing ones.
Q2)ADVANTAGES OF E COMMERCE
DISADVANTAGES OF E COMMERCE
TYPES OF E COMMERCE
BUSINESS TO BUSINESS(B2B) It is a form of E commerce in which products or services are sold from a
firm to another firm. It is performed in much higher volume. For example Intel selling micro
processors to Dell or Reebok selling shoes to Flipkart
Business to Consumer(B2C): It is a form of E commerce in which products or services are sold from a
firm directly to consumers. For example DELL selling laptop to me
PEER TO PEER(P2P) It is a form of E Commerce in which user can share files and computer services
directly without having to go through a central web server. For example if I share a music track with
my friend or my friend is sharing a video clip with me. Website examples BitTorrent.com,gnutella
Q3)BUSINESS MODELS
ADVERTING REVENUE: A website that offers its users contents, services and/ or products also
provide a forum for advertisements and receives fees from advertisers . Websites those are able to
attract the greatest viewership are able to charge higher advertising rates. Number of people visiting
a website is known as hits. Ex yahoo.com, google.com
SUBSCRIPTION REVENUE: A website that offers its users contents or services charges a subscription
fee for access to some or all of its offerings. They may charge monthly /annual subscription fee. The
contents offered by such site must be a high value added with premium offering. Examples
Consumerreports.org,Dalalstreet.com
TRANSACTION FEE REVENUE: A company receives a fee for executing a transaction. For example
ebay,sharekhan.com provides an online auction marketplace and receives a small transaction fee
from the seller if the seller is successful in selling the item.
SALES REVENUE: Companies derive revenue by selling goods, information or services to consumers .
The percentage of people visiting the site and buy something is called a conversion rate.Website
examples Amazon, Flipkart
AFFILIATE REVENUE: Sites that steer business to an affiliate receive a referral fee or percentage of
the revenue from any resulting sales. Website example Mypoints
PORTAL: Portals offer users powerful web search tools as well as an integrated package of content
and services such as news,email, calendars, shopping, musicdownloads, videostraming and more.
Portals generate Revenue primarily by charging advertisers for ad placement, collecting referral fees
for steering customers to other sites and charging for premium services.
E-TAILER: It is an online retail store. Customer has to connect to the internet to check what is
available. With E Tailer and place an order. Some e-tailer are divisions of existing physical stores
whereas the others operate only in the virtual world.
CONTENT PROVIDER: Content providers distribute information contents, such as digital video, music
photos, text and artwork over the web. Content providers make money by charging a subscription
fee. The subscription fee can be monthly or yearly.
TRANSACTION BROKER: Sites that process transactions for consumers and earn revenue are called as
transaction broker.The largest industries using this model are financial services , travel services and
job placement services
MARKET CREATOR: Market creator build a digital environment in which buyers and sellers can meet,
display products and establish prices. They earn their revenue by charging for advertisement and
transaction fees
SERVICE PROVIDER: Service providers offer services online. Services offered are e-mail, photo
sharing video sharing and user generated contents. (blogs and social networking sites) are all
services provided to customers example google maps, gmail,orkut etc
They earn their revenue by charging for advertisement.
COMMUNITY PROVIDER: Community provider are sites that creates a digital online environment
where people with similar interests can transact (buy and sell goods) ; share intertests, photos and
videos, communicate with like minded people and receive interest related information .
They earn their revenue by charging for advertisement and affiliate revenue
Integrity: It refers to the ability to ensure that information being displayed on a website or
transmitted or received over the internet has not been changed in any way by an unauthorized party
NON DENIAL( NON REPUDIATION) : Non denial refers to ensure that e commerce participants do not
deny their online actions
AUTHENTICITY: Authenticity refers to the ability to identify the identity of a person or entity with
whom you are dealing on the internet.
CONFIDENTIALITY( SECRECY) : Confidentiality refers to the ability to ensure that messages and data
are available only to those who are authorized to view them
PRIVACY: Privacy refers to the ability to control the use of information a customer has provided
about him/her self. The information should not be misused.
AVAILABILITY: Refers to the ability to ensure that an E commerce site continues to function as
intended.
E COMMERCE SECURITY IS DESIGNED TO PROTECT THE ABOVE SIX DIMENSIONS . WHEN ANY ONE
OF THEM IS COMPROMISED THERE IS A SECURITY ISSUE
Q5) ENCRYPTION:
DECRYPTION
● Decryption is the process of transforming cypher text into plain text or data
● Decryption is performed with the help of a key or cypher. A key is a method to transform
cypher text to plain text
● Without decryption the receiver cannot read the message
● Encryption key or Decryption key maybe the same (Symmetric) or it maybe
different( Asymmetric)
Q6 )Various Payment systems available in E commerce
Digital cash for this one has to open an account with paypal and deposit some amount in it.When
you make a payment using paypal you have to emailthe payment to merchant’s paypal account.
Issues with Paypal include high cost, fraud etc
Online stored value It isanother kind of stored value system based on credit card sized plastic cards
with embedded chips which store personal information. They cannot be used for home PC s but can
be used for ticketing and other smaller payments
Paypal For this one has to open an account with paypal and deposit some amount in it. When you
make a payment using paypal you have to email the payment to the merchant’s paypal account.
Paypal then transfers the amount from your account to the merchant.
But there are many issues , like highcost and lack of consumer protection
Smart cards It is another kind of stored value system based on credit card sized plastic cards with
embedded chips that store personal information that can be used to support e commerce payments.
They cant be used from home PC s to buy goods. They are generally small ticket items used by
swapping the smart card It also stores info regarding health insurance, personal identification, blood
group etc.
Smart card can hold 100 times more data than a credit card. It requires a password
Digital accumulating Balance payment These systems allow user to make micropayments and
purchases on the web, accumulating a credit balance for which they are billed at the end of the
month. Consumers are expected to the entire balance by cheque or credit card or cash. This is useful
for purchasing single music track, book, games,ringtones etc
Digital cheque payment system It is similar to normal cheque payment system of India.When a
consumer wants to pay by cheque at a merchant site that offers this service an online authorization
form appears that mimics the appearance of a paper cheque.
The user is prompted to fill in cheque information including a valid cheque number. Bank number
and bank account number. Digital cheque is not so successful in E commerce till today
● In Symmetric key Encryption both the sender and Receiver use the same key to encrypt and
decrypt the message
● It is also known as secret key encryption
● Generally in computer symmetric key encryption is not used but asymmetric (public) key
encryption is used
b)PUBLIC KEY ENCRYPTION(Asymetric)
● In this method, two mathematically related digital keys: a receiver’s public key and receiver’s
private key.
● The private key is kept secret by the owner and the public key is widely circulated.
● Encryption is done by sender using receivers public key
● Decryption is done by receiver with the help of private key
● However, once a public key is used to encrypt a message that same key cannot be used to
decrypt a message
● Public key encryption takes care of message integrity and message confidentiality
● Public key encryption lacks authenticity, theres no guarantee that that the sender really is a
sender
C)PUBLIC KEY ENCRYPTION USING DIGITAL SIGNATURES
● To overcome the problem of authentication and non-denial faced by public key encryption,
the public key encryption is done using digital signature
● To check the confidentiality of a message and ensure it has not been altered in transit, a
hash function is also used first to create a message
● The sender then encrypts both the hash result and the original message using the receivers
public key to produce a single block of cypher text
● Digital signature is unique and and when it is used with hash function is even more unique.
Digital signature changes for every document
● Public key encryption using digital signatures takes care of the four security concerns i.e.
Message Integrity, Non-denial, Authentication and
● The most common form of securing channels is through the secure Sockets layer of TCP/IP
● In SSL URL will change from HTTP to HTTPS
● A secure communication can be used only with HTTP and it cannot be used with non-HTTP
MESSAGES. Basically HTTPS tries to make HTTP more secure.
● Encryption is based on session key. Session key is unique and is different for each session.
● The SSL protocol provides data Encryption , server authentication, optional client
authentication and message integrity for TCP/IP connections.