E Business
E Business
UNIT 1
INTRODUCTION TO E-BUSINESS:
E-business, is the application of Information and Communication Technologies (ICT) in support of
all the activities of business. Commerce constitutes the exchange of products and services between
businesses, groups and individuals and can be seen as one of the essential activities of any business.
Electronic commerce focuses on the use of ICT(Information and Communication Technologies) to
enable the external activities and relationships of the business with individuals, groups and other
businesses or e business refers to business with help of internet (i.e.) doing business with the help of
internet network. The term "E-Business" was coined by IBM's marketing and Internet teams in 1996.
In 1997, IBM marketing, with its agency Ogilvy & Mather began to use its foundation in IT solutions
and expertise to market itself as a leader of conducting business on the Internet through the term "e-
business." Then CEO Louis V. Gerstner, Jr. was prepared to invest $1 billion to market this new
brand.
After conducting worldwide market research, in October 1997, IBM began with an eight-page piece
in the Wall Street Journal that would introduce the concept of "e-business" and advertise IBM's
expertise in this new field. IBM decided not to trademark the term "e-business" in the hopes that
other companies would use the term and create an entire new industry. However, this proved to be
too successful and by 2000, to differentiate itself, IBM launched a $300 million campaign about its
"e-business infrastructure" capabilities. Since that time, however, the terms, "e-business" and "E-
Commerce " have been loosely interchangeable and have become a part of the common vernacular
E-business includes E-Commerce, but also covers internal processes such as production, inventory
management, product development, risk management, finance, knowledge management and human
resources. E-business strategy is more complex, more focused on internal processes, and aimed at
cost savings and improvements in efficiency, productivity and cost savings.
Meaning of E-Business:
E-Business is the conduct of business on the Internet, not only buying and selling, but also servicing
the customers and collaborating with the business partners. E-Business includes customer service (e-
service) and intra-business tasks.
Example of E-Business:
• An online system that tracks the inventory and triggers alerts at specific levels is E-Business
Inventory Management is a business process. When it is facilitated electronically, it becomes part of
E-Business.
• An online induction program for new employees automates part or whole of its offline counterpart.
Meaning of E-Commerce:
(a) E-Commerce is defined as those commercial transactions carried out using the electronic means,
in which goods or services are delivered either electronically or in their tangible or intangible form.
Examples of E-Commerce:
(a) Online shopping:
Buying and selling goods on the internet is one of the most popular examples of ECommerce .
(b) Electronic payments:
When we are buying goods online, there needs to be a mechanism to pay online too. That is where
the payment processors and payment gateways come into the picture. Electronic payments reduce the
inefficiency associated with writing the Cheque books. It also does away with many of the safety
issues that arise due to the payments made in currency notes.
E-Business covers the online transactions, but E-Commerce refers to the online transactions
also extends to all the internet based transactions (i.e.) buying and selling of goods and/or services
with the business partners, suppliers and over the internet.
customers like: selling directly to the consumers,
manufacturers and suppliers; monitoring and
exchanging information; auctioning surplus
inventory; collaborative product design. These
online interactions are aimed at improving or
transforming the business processes and
efficiency. An E-Business status is received
when we handle the business using phone calls,
E-Mail orders, postal orders, and also the online
activities.
The following are some of the differences or relationship between an e-commerce and e-
business.
1. The terms e-business and e-commerce are often used interchangeably. When electronic
medium is used in all the day-to-day activities, then it may be termed as e-business. When
a commercial transaction takes place over electronic network, then it is termed as e-
commerce.
2. E-business is a very broad concept that involves a business organization to use electronic
medium to carry out all specialized or overall business activities. In e-business, information
and computing technologies are used to enhance one’s business. It includes any process that
a business organization conducts over electronic and computer enabled network.
3. E-business deals with recruiting, training employees and sharing any internal information
to enhance business process. In e-commerce, information and computing technologies are
used in inter business and intra-business transactions and in business to consumer
transactions.
4. Some experts consider when business is completely carried on through an electronic
medium, it may be referred to as e-business. E-business does not have physical presence in
a market. When a business organization physically owns an office and along with its
physical presence carries out a business transaction over internet, it may be referred as e-
commerce.
5. Amazon (Amazon.com) and ebay (ebay.com) are considered to be the world’s two
biggest e-business units. When Nalli Stores along with its physical presence sells textiles
through its web site (nalli.com), then it may be referred as e-commerce.
E-business and E-commerce both address the business processes, as well as a technology
infrastructure of databases, application servers, security tools, systems management and
legacy systems.
Nowadays e-commerce has become very popular among the people who want to buy and
sell different things because of the convenience it offers and the cost benefits to retailers
and the cost savings to the customers, and also the secrecy it offers.
Modern electronic commerce typically uses the World Wide Web at least at one point in the
transaction's life-cycle, although it may encompass a wider range of technologies such as e-
mail, mobile devices and telephones as well.
E-commerce is the purpose of internet and the web to conduct business but when we
concentrate on commercial deals among organizations and individuals demanding selective
information systems under the guarantee of the firm it accepts the form of e-business.
Nowadays, the word ‘e’ is hitting momentum.
Business to consumer is the first type of e-commerce that is also the most common one. It is
also known as B2C model. In this type online business selling is offered to individual
customers. This type started to expand after 1995 and now became one of the most common
e-commerce.
The B2C model works by retailers and marketers that use clear data in various marketing
tools so can sell their products to the internet users.
The internet users can use the shopping cart for everything they need. Payment is mostly
done through credit cards or by payment gateways like the PayPal.
Direct interaction with the customers is the main difference with other business model. B2C
normally deal with business that are related to the customer. The basic concept of this
model is to sell the product online to the consumers.
Business to business, known as B2B model, is the largest e-commerce model that is based
on revenue which involves trillions of dollars. In this both the buyers and sellers are
business entities. B2B describes commerce transactions between businesses, such as
between a manufacturer and a wholesaler, or between a wholesaler and a retailer.
The volume of B2B transactions is much higher than the volume of B2C transactions and
any other transaction.
The primary reason for this is that in a typical supply chain there will be many B2B
transactions involving sub components or raw materials, and only one B2C transaction,
specifically sale of the finished product to the end customer.
The sites are only intermediaries, just there to match consumers. They do not have to check
quality of the products being offered.
The C2C model facilitates online transactions of goods and services between the individual
net users. But in this both the web users or both the parties cannot carry out any transaction
without the platform that is provided by an online market maker such as the eBay.
There is also the Customer to Business (C2B) model which is relatively less common. It's a
complete reversal of the traditional sense of transaction, but could be found in
crowdsourcing based projects.
Peer to peer, peer-to-peer or usually said as P2P, is a communications model in which each
party has the same capabilities and either party can initiate a communication session.
This type that is a technology that helps their customers to share a computer resource and
computer files to anyone they require without the need of a central web server.
In recent usage, peer-to-peer has come to describe applications in which users can use the
internet to exchange files with each other directly or through a mediating server. In some
cases, peer-to-peer communications is implemented by giving each communication node
both server and client capabilities.
Those who are going to implement this model, both sides demand to install the expected
software so that they could convey on the mutual platform.
This kind of e-commerce has very low revenue propagation as from the starting it has been
tended to the release of use due to which it sometimes caught involved in cyber laws.
5. Mobile Commerce
Mobile commerce or m-commerce, uses mobile devices like the mobile phones as can carry
out online transactions. Nowadays, web designers are trying to optimize website so they can
easily view on mobile phones and to allow the use of this model.
Mobile Commerce conduct commerce using a mobile device, such as a mobile phone, a
Personal Digital Assistant (PDA), a smartphone, or other emerging mobile equipment such
as dashtop mobile devices.
Other Models
While e-commerce has encompass many transactions that are conducted online, there are
also lesser common types which include
These two can be found in education field, fiscal, social security, taxes, employment,
health, legal documents, registers, etc..
Both use B2A and C2A because the models are strongly associated to the idea of efficiency
and easy usability of the services, with the support of information and communication
technologies.
The value chain model, as originally demonstrated by Porter (1985), identifies nine strategically
relevant activities that create value and reduce cost in a specific business. These nine value-
creating activities consist of five primary activities and four support activities. The primary
activities represent the sequence of bringing materials into the business (inbound logistics),
converting them into final products (operations), shipping out final products (outbound logistics),
marketing, and service. The support activities include procurement, technology development,
human resource management, and firm infrastructure. This model is very helpful for identifying
specific activities in business where competitive strategies can be applied and where information
systems are most likely to have a strategic impact. Successful implementation of e-commerce in
an organization should be based on a thorough understanding of the areas in the value chain
where e-commerce can add value most. More importantly, to succeed in gaining competitive
advantage, e-commerce is to be based on the overall corporate strategy . Among a host of critical
areas/ factors in the value chain that major organizations have taken into consideration for
establishing a sound e-commerce strategy include role of intermediaries, value pricing,
logistics/purchasing, fulfilment, and value nets among others. Following sections present an
analysis of these areas.
1. Role of Intermediaries
Intermediaries may be more important now than ever before because most of the rapidly
growing Internet businesses are essentially middlemen . For example, companies such as
Amazon, CD-Now, Egghead.com, Cisco, and E*Trade can all be thought of as middlemen-
resellers of products provided by some other source. Intermediaries will continue to be important
because they provide consumers with selection, specialized distribution, and expertise . Some
internal disintermediation may take place, in which employees will be removed if they add little
value or even negative value to the distribution channel. For example, Dell, Cisco, and some
online brokerages have eliminated staff in an attempt to realize cost savings in certain areas.
Exhibit 1 illustrates an example of the role of intermediaries in the process of purchasing a book
online from Amazon.com.
2. Value Pricing
In addition to employing e-commerce technology to enhance distribution channels, this
technology is also used to redefine pricing strategies. Most companies pursuing a premium
pricing strategy, for example, can use the Internet to better understand their customers. The
Internet allows companies to price with far more precision than they can off-line and to create
enormous value in the process. Value pricing involves several approaches. One approach to
pricing involves businesses offering heavily discounted prices in an attempt to attract customers
to their web sites. Another approach involves businesses transferring their “off-line” prices to the
Internet. Neither of these approaches is very efficient because they do not maximize value. An
attractive alternative approach is to utilize the Internet to track customers buying habits and
adjust prices accordingly, thereby uncovering new market segments. The Internet allows
companies to test prices continually in real time and measure customer responses.
3. Brand Differentiation/Loyalty
Pricing is just one of several ways for a company to differentiate itself from the competition.
Another way in which a company can differentiate itself is by promoting brand loyalty. Brand
loyalty encourages repeat customers and helps to create long-term profitability. A major benefit
of customer loyalty is that loyal customers often refer new customers to a supplier.
4. E-Procurement
E-commerce technology has provided organizations with the capabilities to improve the
effectiveness and efficiency of the logistics and purchasing functions. Firms such as Wal-Mart
and Amazon.com are currently outsourcing delivery, relying on logistics companies to deliver
the product to the customer. E-procurement is the term currently used to denote the process of
using the Internet to integrate supply chain partners through collaboration on key initiatives and
to improve the purchasing process within organizations. A major benefit of e-procurement is the
cost savings aspect. In fact, organizational costs of placing orders can be reduced by as much as
75% through utilization of the Internet. It also offers organizations the ability to use the Internet
to search for the best pricing available. The overall advantage of practising e-procurement is the
fact the more automation allows partners quicker access to information. E-procurement also
results in better communication among supply chain partners and consequently better supplier-
customer relationships. Organizations are able to maintain tighter control over the purchasing
process. Only those suppliers that organizations deem to be “preferred suppliers” will be able to
transact business with the organization. Currently, e-procurement is being utilized primarily for
the purchase of office supplies and items which are used for repair and maintenance of the
organization’s facilities (Smock, 2001).
5. E-Fulfilment
Today’s marketplace offers new challenges to organizations. A key initiative organizations have
undertaken to better compete is that of “E-fulfilment”. It can alter the way customers purchase as
well as the manner in which manufacturers deliver the product to consumers. Technology has
also allowed distributors and suppliers to focus on providing value-added services to
complement their product offering. E-Fulfilment contrasts with traditional fulfilment. Suppliers
are now capable of accepting order online via the Internet and having the information sent
directly into their order processing systems, something not possible via traditional fulfilment.
Orders placed via e-fulfilment tend to be smaller than those placed via traditional fulfilment
channels. The expected and actual lead times are shorter than those witnessed via traditional
fulfilment.
6. Value Nets
Firms are continually seeking out new ways to attract and maintain customers. A development
that has proven to be effective in attracting and servicing customers is that of the Value Net. A
value net is a network consisting of partnerships, which assists in the transfer of information
among supply chain partners on a regular basis. The main benefit of a value net is the
competitive advantage it offers to all participating organizations. The primary concept behind a
value net is its ability to allow firms to address and solve customer problems, rather than just
selling a product. A popular trend in the marketplace to address niche markets is that of the
online-service company. This form of business interacts directly with the customers primarily via
the Internet. The advantage of this form of business is that it provides enhanced service to the
customer in the form of direct door-to-door delivery for customers. This is a distinct competitive
advantage that firms are looking to exploit
In the world of e commerce companies can use the internet technology to improve the efficiency
and effectiveness of particular value chain activities.There are commercially available hardware
ad software specifically meant to address management problems associated with the supply and
distribution chain or the value chain system as a whole.
Specifically,the Internet technology benefits business organizations in the following ways:
1. It is a powerful tool for better supply chain management.
2. It is critical to internal operations such as just in time inventory,gear production schedules
and production quantities to buyer orders,more accurate monitoring of buyer preferences
and shifts in demand and
It is extremely useful for collaborative data sharing with distribution channel partners-online
systems reduce transactions costs.
E-commerce in India
Introduction
The e-commerce has transformed the way business is done in India. The Indian e-commerce
market is expected to grow to US$ 200 billion by 2026 from US$ 38.5 billion as of 2017. Much
growth of the industry has been triggered by increasing internet and smartphone penetration. The
ongoing digital transformation in the country is expected to increase India’s total internet user
base to 829 million by 2021 from 560.01 million as of September 2018. India’s internet economy
is expected to double from US$125 billion as of April 2017 to US$ 250 billion by 2020, majorly
backed by ecommerce. India’s E-commerce revenue is expected to jump from US$ 39 billion in
2017 to US$ 120 billion in 2020, growing at an annual rate of 51 per cent, the highest in the
world.
Market Size
Propelled by rising smartphone penetration, the launch of 4G networks and increasing consumer
wealth, the Indian e-commerce market is expected to grow to US$ 200 billion by 2026 from US$
38.5 billion in 2017 Online retail sales in India are expected to grow by 31 per cent to touch US$
32.70 billion in 2018, led by Flipkart, Amazon India and Paytm Mall.
During 2018, electronics is currently the biggest contributor to online retail sales in India with a
share of 48 per cent, followed closely by apparel at 29 per cent.
Investments/ Developments
Some of the major developments in the Indian e-commerce sector are as follows:
Flipkart, after getting acquired by Walmart for US$ 16 billion, is expected to launch more
offline retail stores in India to promote private labels in segments such as fashion and
electronics. In September 2018, Flipkart acquired Israel based analytics start-up
Upstream Commerce that will help the firm to price and position its products in an
efficient way.
Paytm has launched its bank - Paytm Payment Bank. Paytm bank is India's first bank
with zero charges on online transactions, no minimum balance requirement and free
virtual debit card
As of June 2018, Google is also planning to enter into the E-commerce space by
November 2018. India is expected to be its first market.
E-commerce industry in India witnessed 21 private equity and venture capital deals worth
US$ 2.1 billion in 2017 and 40 deals worth US$ 1,129 million in the first half of 2018.
Google and Tata Trust have collaborated for the project ‘Internet Saathi’ to improve
internet penetration among rural women in India
Government initiatives
Since 2014, the Government of India has announced various initiatives namely, Digital India,
Make in India, Start-up India, Skill India and Innovation Fund. The timely and effective
implementation of such programs will likely support the e-commerce growth in the country.
Some of the major initiatives taken by the government to promote the e-commerce sector in
India are as follows:
In order to increase the participation of foreign players in the e-commerce field, the
Indian Government hiked the limit of foreign direct investment (FDI) in the E-commerce
marketplace model for up to 100 per cent (in B2B models).
In the Union Budget of 2018-19, government has allocated Rs 8,000 crore (US$ 1.24
billion) to BharatNet Project, to provide broadband services to 150,000 gram panchayats
As of August 2018, the government is working on the second draft of e-commerce policy,
incorporating inputs from various industry stakeholders.
Achievements
Following are the achievements of the government in the past four years:
Under the Digital India movement, government launched various initiatives like Udaan,
Umang, Start-up India Portal etc.
Under the project ‘Internet Saathi’, the government has influenced over 16 million
women in India and reached 166,000 villages
Udaan, a B2B online trade platform that connect small and medium size manufacturers
and wholesalers with online retailers and also provide them logistics, payments and
technology support, has sellers in over 80 cities of India and delivers to over 500 cities.
According to the UN’s eGovernance index, India has jumped 11 positions to 107 in 2016
from 2018 in 2014.
The government introduced Bharat Interface for Money (BHIM), a simple mobile based
platform for digital payments.
Road Ahead
The e-commerce industry been directly impacting the micro, small & medium enterprises
(MSME) in India by providing means of financing, technology and training and has a favourable
cascading effect on other industries as well. The Indian e-commerce industry has been on an
upward growth trajectory and is expected to surpass the US to become the second largest e-
commerce market in the world by 2034. Technology enabled innovations like digital payments,
hyper-local logistics, analytics driven customer engagement and digital advertisements will
likely support the growth in the sector. The growth in e-commerce sector will also boost
employment, increase revenues from export, increase tax collection by ex-chequers, and provide
better products and services to customers in the long-term.
Influencing factors of successful E‐commerce
The crucial factors to be considered while launching an E‐commerce web site are
1. Website
Website must be easy to navigate since the surfer should not have to search for the product or
details he or she is looking for. The website should project its products in as provocative way so
the surfer wants to see more. Place testimonials or photos of the products.
2. Merchant Account
All major credit cards have to be accepted for an e‐commerce transaction. So there arises a need
for a merchant account.
3. Shopping cart and Secure server
The online shopping cart allows the customers to choose and place their chosen products in the
cart just as one would do in shopping mall. This cart will, at the end of the shopping, total the
products and give the total cost of the products chosen.
4. Payment gateway
This is the link from the credit card to the credit card processor. This gateway helps information
to pass from the website to the authorization centre where the credit card is verified and then
charged, after that the reply will come back into the website that the processing has been
successful. A payment gateway will always check for details in credit card information and reject
any discrepancy in the information.
5. Pricing
One of the main reasons why consumers buy online is to save money. besides convenience, the
internet has always been a place for the consumers to compare prices and buy what they are
looking for at the best possible price.
6. User Friendliness
The price is indeed important, but User- Friendliness and easy of use of store is really the
decisive factor.
7.Product Line
A niche product line is a vey good thing. The product that we offer is available with other sellers
like on Amazon, and then we should ask ourselves what we can offer as a value-add, such as
service ,information ,guarantees and possibly some entertainments.
8. Adequate stock level
A new Customer could defintely be turned-off by desiring a product that is in backorder.
9. Quickness
Websites should load quickly.Every component of the site should move fast in order to avoid
customers leaving the site.
10. Exhibit information clearly
It is important that all companies should post th contacts more visibly for easy access in the cas
of any problem to the customers
Reasons for the failure of E-commerce:
There are quite a few mistakes that unsuccessful e-commerce businesses have in common. The
important among them are the following.
1. Poor Management:
The main reason for failure of e-commerce is poor management. Many e-commerce business
starts without planning and in many cases business may not be suitable for an on-line market.
2. A poorly designed website:
A professional website needs to feature the items clearly with photos and descriptions. Another
issue is too much colour, flash animation or graphics that slowed down the downloading process.
3. Lack of marketing:
Marketing of the site is needed for both on-line and off-line. Firms have to identify their
competitive advantage, and to show the customers the best price that can be offer.
4. Selling the wrong product on-line:
There are products that are not suitable to be sold on-line. Products which are inexpensive, and
could be easily bought from the local store are not worth selling on the Internet. Products that
need trying would be difficult to sell.
5. Poor order fulfilment:
Information on the Internet spreads like anything. If words of unhappiness are being spread
around to potential customers, the reputation would be damaged. Therefore, create a good
impression on customers by fulfilling their orders according to their wishes.
6. Poor customer service:
Poor customer service would send our customers running away. Providing excellent service
would not only satisfy our customer, but also bring in potential customers.
7. Inadequate Resources:
A majority of these companies were expecting to experience tremendous growth in the
foreseeable future and when that did not happen they had no saved capital.
8. Poor Channel Integration:
A common mistake committed by firms is poor channel integration. Some companies may just
try to market their goods or services via the Internet and ignore the other channel such as
catalogues and physical stores.
9. Ignoring Customers:
Another common mistake that some of these companies have made is ignoring the customers.
Some companies did not focus on customer fulfilment or product availability.
10. High Cost:
Another major mistake is that some e-commerce companies did not pay attention to is costs.
Most of the companies that fail fun through an enormous amount of money in a relatively short
period of time.
11. Poor Planning:
Lastly, and greatest of all, mostly all failed e-commerce companies have done poor planning.
These companies have focused too much energy on low prices and not enough on product
diversification and good service.
Business documents – These are any of the documents that are typically exchanged
between businesses. The most common documents exchanged via EDI are purchase
orders, invoices and advance ship notices. But there are many, many others such as bill of
lading, customs documents, inventory documents, shipping status documents and
payment documents.
Standard format– Because EDI documents must be processed by computers rather than
humans, a standard format must be used so that the computer will be able to read and
understand the documents. A standard format describes what each piece of information is
and in what format (e.g., integer, decimal, mmddyy). Without a standard format, each
company would send documents using its company-specific format and, much as an
English-speaking person probably doesn’t understand Japanese, the receiver’s computer
system doesn’t understand the company-specific format of the sender’s format.
o There are several EDI standards in use today, including ANSI, EDIFACT,
TRADACOMS and ebXML. And, for each standard there are many different
versions, e.g., ANSI 5010 or EDIFACT version D12, Release A. When two
businesses decide to exchange EDI documents, they must agree on the specific
EDI standard and version.
o Businesses typically use an EDI translator – either as in-house software or via an
EDI service provider – to translate the EDI format so the data can be used by their
internal applications and thus enable straight through processing of documents.
Business partners – The exchange of EDI documents is typically between two different
companies, referred to as business partners or trading partners. For example, Company A
may buy goods from Company B. Company A sends orders to Company B. Company A
and Company B are business partners.
Electronic Data Interchange EDI – is the exchange of business documents between any two
trading partners in a standard or structured, machine readable form. EDI is used to electronically
transfer documents such as purchase orders, invoice, shipping bills, and communicate with one
another. A Specified format is set by both the parties to facilitate transmission of information.
Traders use Electronic Data Interchange EDI to exchange financial information in electronic
form.
Standard Document Format – A standard format agreed upon by both parties which do not
require complicated hardware or software to access information. Both parties communicate
directly through a business application.
Translator and Mapper – A translator is used to convert the raw data into meaningful
information according to specifications provided by a mapper. A mapper is used to create
conversion specification. It compiles the specification and then gives instructions to the
translator on how to convert the data.
Communication Network – A communication network provides a direct link between trading
partners who are will to exchange business documents through Electronic Data Interchange EDI.
Modem – It is a hardware device that transmits data from one computer to another.
VAN – A network that connect the computer system of one organization to another.
Point to Point link – A direct communication link between two computers.
Retail Sector – In the retail sector profit margins usually depend upon efficient inventory
management. EDI provides a structured way to maintain and replenish goods stocked at a retail
outlet. Retailers use a common model stock for each shop location and the point of sale stock
position is updated continuously and data in fed via EDI enabled SCM (supply chain
management) network. The EDI software monitors all the logistics and makes updates in the
original stock.
Manufacturing Sector – EDI ensures effective and efficient management of materials required
for production of a commodity. In manufacturing sector EDI facilitates Material requirement
planning and just in time manufacturing. The Inventory position of OEM is constantly updated
through EDI and the supplier is notified about shortage of materials. This helps the supplier to
plan and schedule supply according to requirements of the manufacturer. The suppliers respond
via EDI with an ASN to identify the parts/materials to be delivered and the approximate delivery
time and as soon as the shipment is delivered at the production plant the inventory is updated
again.
Automobile Sector – In automobile sector EDI is used to keep customers updated with the
current product and pricing information during the purchase cycle. An advance shipping notice is
transmitted through EDI to the customers to prepare a loading schedule and to ensure proper
receipt of the product. The customer may also make payment on receipt of goods via EDI to
speed up the payment process.
Financial Sector – In the financial sector EDI replaces the labour intensive activities of
collecting, processing and dispersing payments with an electronic system. It facilitates the flow
of payment between the bank accounts of trading partners without requiring any human
intervention. A payee`s bank account is electronically credited and the payer`s account is
electronically credited on the scheduled day of payment; such an exchange is known as
electronic fund transfer (EFT).
Threats to E-Commerce
E-Commerce refers to the activity of buying and selling things over the internet. Simply, it refers
to the commercial transactions which are conducted online. E-commerce can be drawn on many
technologies such as mobile commerce, Internet marketing, online transaction processing,
electronic funds transfer, supply chain management, electronic data interchange (EDI), inventory
management systems, and automated data collection systems.
E-commerce threat is occurring by using the internet for unfair means with the intention of
stealing, fraud and security breach. There are various types of e-commerce threats. Some are
accidental, some are purposeful, and some of them are due to human error. The most common
security threats are an electronic payments system, e-cash, data misuse, credit/debit card frauds,
etc.
Electronic payments system:
With the rapid development of the computer, mobile, and network technology, e-commerce has
become a routine part of human life. In e-commerce, the customer can order products at home
and save time for doing other things. There is no need of visiting a store or a shop. The customer
can select different stores on the Internet in a very short time and compare the products with
different characteristics such as price, colour, and quality.
The electronic payment systems have a very important role in e-commerce. E-commerce
organizations use electronic payment systems that refer to paperless monetary transactions. It
revolutionized the business processing by reducing paperwork, transaction costs, and labour cost.
E-commerce processing is user-friendly and less time consuming than manual processing.
Electronic commerce helps a business organization expand its market reach expansion. There is a
certain risk with the electronic payments system.
Some of them are:
The Risk of Fraud
An electronic payment system has a huge risk of fraud. The computing devices use an identity of
the person for authorizing a payment such as passwords and security questions. These
authentications are not full proof in determining the identity of a person. If the password and the
answers to the security questions are matched, the system doesn't care who is on the other side. If
someone has access to our password or the answers to our security question, he will gain access
to our money and can steal it from us.
The Risk of Tax Evasion
The Internal Revenue Service law requires that every business declare their financial transactions
and provide paper records so that tax compliance can be verified. The problem with electronic
systems is that they don't provide cleanly into this paradigm. It makes the process of tax
collection very frustrating for the Internal Revenue Service. It is at the business's choice to
disclose payments received or made via electronic payment systems. The IRS has no way to
know that it is telling the truth or not that makes it easy to evade taxation.
The Risk of Payment Conflicts
In electronic payment systems, the payments are handled by an automated electronic system, not
by humans. The system is prone to errors when it handles large amounts of payments on a
frequent basis with more than one recipients involved. It is essential to continually check our pay
slip after every pay period ends in order to ensure everything makes sense. If it is a failure to do
this, may result in conflicts of payment caused by technical glitches and anomalies.
E-cash
E-cash is a paperless cash system which facilitates the transfer of funds anonymously. E-cash is
free to the user while the sellers have paid a fee for this. The e-cash fund can be either stored on
a card itself or in an account which is associated with the card. The most common examples of e-
cash system are transit card, PayPal, GooglePay, Paytm, etc.
E-cash has four major components-
1. Issuers - They can be banks or a non-bank institution.
2. Customers - They are the users who spend the e-cash.
3. Merchants or Traders - They are the vendors who receive e-cash.
4. Regulators - They are related to authorities or state tax agencies.
In e-cash, we stored financial information on the computer, electronic device or on the internet
which is vulnerable to the hackers. Some of the major threats related to e-cash system are-
Backdoors Attacks
It is a type of attacks which gives an attacker to unauthorized access to a system by bypasses the
normal authentication mechanisms. It works in the background and hides itself from the user that
makes it difficult to detect and remove.
Denial of service attacks
A denial-of-service attack (DoS attack) is a security attack in which the attacker takes action that
prevents the legitimate (correct) users from accessing the electronic devices. It makes a network
resource unavailable to its intended users by temporarily disrupting services of a host connected
to the Internet.
Direct Access Attacks
Direct access attack is an attack in which an intruder gains physical access to the computer to
perform an unauthorized activity and installing various types of software to compromise
security. These types of software loaded with worms and download a huge amount of sensitive
data from the target victims.
Eavesdropping
This is an unauthorized way of listening to private communication over the network. It does not
interfere with the normal operations of the targeting system so that the sender and the recipient of
the messages are not aware that their conversation is tracking.
Credit/Debit card fraud
A credit card allows us to borrow money from a recipient bank to make purchases. The issuer of
the credit card has the condition that the cardholder will pay back the borrowed money with an
additional agreed-upon charge.
A debit card is of a plastic card which issued by the financial organization to account holder who
has a savings deposit account that can be used instead of cash to make purchases. The debit card
can be used only when the fund is available in the account.
Some of the important threats associated with the debit/credit card are-
ATM (Automated Teller Machine)-
It is the favourite place of the fraudster from there they can steal our card details. Some of the
important techniques which the criminals opt for getting hold of our card information is:
Skimming-
It is the process of attaching a data-skimming device in the card reader of the ATM. When the
customer swipes their card in the ATM card reader, the information is copied from the magnetic
strip to the device. By doing this, the criminals get to know the details of the Card number, name,
CVV number, expiry date of the card and other details.
Unwanted Presence-
It is a rule that not more than one user should use the ATM at a time. If we find more than one
people lurking around together, the intention behind this is to overlook our card details while we
were making our transaction.
Vishing/Phishing
Phishing is an activity in which an intruder obtained the sensitive information of a user such as
password, usernames, and credit card details, often for malicious reasons, etc.
Vishing is an activity in which an intruder obtained the sensitive information of a user via
sending SMS on mobiles. These SMS and Call appears to be from a reliable source, but in real
they are fake. The main objective of vishing and phishing is to get the customer's PIN, account
details, and passwords.
Online Transaction
Online transaction can be made by the customer to do shopping and pay their bills over the
internet. It is as easy as for the customer, also easy for the customer to hack into our system and
steal our sensitive information. Some important ways to steal our confidential information during
an online transaction are-
o By downloading software which scans our keystroke and steals our password and card
details.
o By redirecting a customer to a fake website which looks like original and steals our
sensitive information.
o By using public Wi-Fi
POS Theft
It is commonly done at merchant stores at the time of POS transaction. In this, the salesperson
takes the customer card for processing payment and illegally copies the card details for later use.
Encryption Key
Encryption is a type of security that converts data, programs, images or other information into
unreadable cipher. This is done by using a collection of complex algorithms to the original
content meant for encryption.
Symmetric forms of encryption systems make use of a single password to serve as both
decryptor and encryptor. Symmetric types use algorithms that are very safe. One of such type
was adopted by the US Government as Advanced Encryption Standard (AES) to store classified
information. However, one drawback is that since a single key is shared, it can be leaked or
stolen. As part of key management, it is very important to change the key often to enhance
security.
Public asymmetric encryption systems make use of highly secure algorithms as well, but using a
different strategy for encryption and decryption. The asymmetric encryption method uses two
keys, referred to as a key pair. One is a public key, and the other one is a private key. The public
key can be freely shared among various users as it is only meant for encryption. The private key
is not shared, and is used to decrypt anything that was encrypted by the public key.
The algorithms used in the encryption process depends on the key pair. In order to reverse the
encryption process, only the private key of that particular key pair can be used. The message or
mail is then delivered to the public key owner. When the mail is received, the private key
requests a passphrase before the decryption process. In order to maintain optimal security, this
passphrase must be delivered manually; however, the software lets a user locally store the
passphrase so that messages may be automatically decrypted.
Since the key that causes decryption is not shared, asymmetric encryption is believed to be more
reliable when compared with symmetric encryption.
Cryptography
Cryptography is the practice and study of techniques for securing communication and data in the
presence of adversaries.
Alright, now that you know ” what is cryptography ” let’s see how cryptography can help secure
the connection between Andy and Sam.
So, to protect his message, Andy first convert his readable message to unreadable form. Here, he
converts the message to some random numbers. After that, he uses a key to encrypt his message,
in Cryptography, we call this ciphertext.
Andy sends this ciphertext or encrypted message over the communication channel, he won’t have
to worry about somebody in the middle of discovering his private messages. Suppose, Eaves here
discover the message and he somehow manages to alter it before it reaches Sam.
Now, Sam would need a key to decrypt the message to recover the original plaintext. In order to
convert the ciphertext into plain text, Sam would need to use the decryption key. Using the key
he would convert the ciphertext or the numerical value to the corresponding plain text.
After using the key for decryption what will come out is the original plaintext message, is
an error. Now, this error is very important. It is the way Sam knows that message sent by Andy is
not the same as the message that he received. Thus, we can say that encryption is important to
communicate or share information over the network.
Now, based on the type of keys and encryption algorithms, cryptography is classified under the
following categories:
Encryption Algorithms
Cryptography is broadly classified into two categories: Symmetric key
Cryptography and Asymmetric key Cryptography (popularly known as public key
cryptography).
Now Symmetric key Cryptography is further categorized as Classical Cryptography and Modern
Cryptography.
Further drilling down, Classical Cryptography is divided into Transposition Cipher and
Substitution Cipher. On the other hand, Modern Cryptography is divided into Stream Cipher and
Block Cipher.
So, let’s understand these algorithms with examples.
How various Cryptographic Algorithms Works?
Let’s start with the Symmetric key encryption
Symmetric Key Cryptography
An encryption system in which the sender and receiver of a message share a single,
common key that is used to encrypt and decrypt the message. The most popular symmetric–
key system is the Data Encryption Standard (DES)
Transposition Ciphers
In Cryptography, a transposition cipher is a method of encryption by which the positions held by
units of plaintext (which are commonly characters or groups of characters) are shifted
according to a regular system, so that the ciphertext constitutes a permutation of the plaintext.
That is, the order of the units is changed (the plaintext is reordered). Mathematically, a bijective
function is used on the characters’ positions to encrypt and an inverse function to decrypt.
Example:
Substitution Cipher
Method of encryption by which units of plaintext are replaced with ciphertext, according to a
fixed system; the “units” may be single letters (the most common), pairs of letters, triplets of
letters, mixtures of the above, and so forth.
Example:
Consider this example shown on the slide: Using the system just discussed, the keyword
“zebras” gives us the following alphabets:
Stream Cipher
Symmetric or secret-key encryption algorithm that encrypts a single bit at a time. With a Stream
Cipher, the same plaintext bit or byte will encrypt to a different bit or byte every time it is
encrypted.
Block Cipher
An encryption method that applies a deterministic algorithm along with a symmetric key to
encrypt a block of text, rather than encrypting one bit at a time as in stream ciphers
Example: A common block cipher, AES, encrypts 128-bit blocks with a key of predetermined
length: 128, 192, or 256 bits. Block ciphers are pseudorandom permutation (PRP) families that
operate on the fixed size block of bits. PRPs are functions that cannot be differentiated from
completely random permutations and thus, are considered reliable until proven unreliable.
Asymmetric Key Encryption (or Public Key Cryptography)
The encryption process where different keys are used for encrypting and decrypting the
information. Keys are different but are mathematically related, such that retrieving the plain text
by decrypting ciphertext is
feasible.
Digital Signature
A digital signature is a mathematical technique used to validate the authenticity and integrity of a
message, software or digital document.
1. Key Generation Algorithms : Digital signature are electronic signatures, which assures
that the message was sent by a particular sender. While performing digital transactions
authenticity and integrity should be assured, otherwise the data can be altered or someone
can also act as if he was the sender and expect a reply.
2. Signing Algorithms: To create a digital signature, signing algorithms like email
programs create a one-way hash of the electronic data which is to be signed. The signing
algorithm then encrypts the hash value using the private key (signature key). This
encrypted hash along with other information like the hashing algorithm is the digital
signature. This digital signature is appended with the data and sent to the verifier. The
reason for encrypting the hash instead of the entire message or document is that a hash
function converts any arbitrary input into a much shorter fixed length value. This saves
time as now instead of signing a long message a shorter hash value has to be signed and
moreover hashing is much faster than signing.
3. Signature Verification Algorithms : Verifier receives Digital Signature along with the
data. It then uses Verification algorithm to process on the digital signature and the public
key (verification key) and generates some value. It also applies the same hash function on
the received data and generates a hash value. Then the hash value and the output of the
verification algorithm are compared. If they both are equal, then the digital signature is
valid else it is invalid.
The steps followed in creating digital signature are :
1. Message digest is computed by applying hash function on the message and then message
digest is encrypted using private key of sender to form the digital signature. (digital
signature = encryption (private key of sender, message digest) and message digest =
message digest algorithm(message)).
2. Digital signature is then transmitted with the message.(message + digital signature is
transmitted)
3. Receiver decrypts the digital signature using the public key of sender.(This assures
authenticity,as only sender has his private key so only sender can encrypt using his
private key which can thus be decrypted by sender’s public key).
4. The receiver now has the message digest.
5. The receiver can compute the message digest from the message (actual message is sent
with the digital signature).
6. The message digest computed by receiver and the message digest (got by decryption on
digital signature) need to be same for ensuring integrity.
Message digest is computed using one-way hash function, i.e. a hash fucntion in which
computation of hash value of a is easy but computation of a from hash value of a is very difficult.
Digital Certificate
Digital certificate is issued by a trusted third party which proves sender's identity to the receiver
and receiver’s identity to the sender.
A digital certificate is a certificate issued by a Certificate Authority (CA) to verify the identity of
the certificate holder. The CA issues an encrypted digital certificate containing the applicant’s
public key and a variety of other identification information. Digital signature is used to attach
public key with a particular individual or an entity.
Security Protocols
Network security protocols are primarily designed to prevent any unauthorized user, application,
service or device from accessing network data. This applies to virtually all data types regardless
of the network medium used.
Firewall Security
As cybercrime continues to increase and threaten businesses across the world, you probably
know that your organization needs firewall security; in fact, you may even already have a
firewall management program in place. But what exactly is firewall security, and what does
firewall management entail?
The word firewall originally referred literally to a wall, which was constructed to halt the spread
of a fire. In the world of computer firewall protection, a firewall refers to a network device which
blocks certain kinds of network traffic, forming a barrier between a trusted and an untrusted
network. It is analogous to a physical firewall in the sense that firewall security attempts to block
the spread of computer attacks.
Electronic Payment system is a financial exchange that takes place online between buyers and
sellers. The content of this exchange is usually some form of digital financial instrument {such
as encrypted credit card numbers, electronic cheques or digital cash) that is backed by a bank or
an intermediary, or by a legal tender. The various factors that have leaded the financial
institutions to make use of electronic payments are:‐
1. Decreased technology cost
2. Reduced operational and processing cost
3. Increasing online commerce
The Internet Payment Processing System
The participants in an online electronic payment transaction include the following:‐
1. The Customer:‐Customer in an e‐commerce may be the holder of a payment card such as
credit card or debit card from an issuer
2. The issuer:‐The issuer means a financial institution such as bank that provides the customer
with a payment card .The issuer is responsible for the card holder’s debt payment.
3. The Merchant – The person or organizations that sells goods or services to the cardholder via a
website is the merchant. The merchant that accepts payment cards must have an Internet
Merchant account with the acquirer
4. The acquirer – is a financial institution that establishes an account with the merchant and
processes payment card authorizations and payments. The acquirer provides authorization to the
merchant that given card account is active and that the proposed purchase doesn’t exceed the
customer’s credit limit. The acquirer also provides electronic transfer of payments to the
merchant’s account, and is then reimbursed by the issuer via the transfer of electronic funds over
a payment network.
5. The Processor – The Processor is a large data centre that processes credit card transactions and
settles funds to merchants, connected to the merchant on behalf of an acquirer via a payment
gateway.
Basic steps of an online payment
The basic steps of an online payment transaction include the following:‐
The customer places an order online by selecting items from the merchant’s Website and
sending the merchant a list. The merchant often replies with an order summary of the items, their
price, a total, and an order number
The customer places an order along with their credit card information and sends it to the
business. The payment information is usually encrypted by an SSL pipeline set up between the
customer’s web browser and the merchant’s web server SSL certificate.
The merchant confirms the order and supplies the goods or services to the customer. The
business sends the consumer an invoice, their certificate and their bank’s certificate.
The business then generates an authorization request for customer’s credit card and sends it to
their bank
The business’s bank then sends the authorization request to the acquirer
The acquirer sends an acknowledgement back to the business’s bank after receiving an
acknowledgement from the customer’s Bank.
Once the consumer’s bank authorizes payment, the business’s bank sends an
acknowledgement back to the business with an authorization number
Various Online Payment Systems
1. Electronic Tokens
An Electronic token is a digital analog of various forms of payment backed by a bank or
financial institution. There are two types of tokens:‐
1] Real Time (or Pre‐paid tokens) – These are exchanged between buyer and seller, their users
pre‐pay for tokens that serve as currency. Transactions are settled with the exchange of these
tokens. Eg. Digicash , Debit Cards, Electronic Purse etc.
2] Post Paid Tokens – are used with fund transfer instructions between the buyer and seller. Eg.
Electronic Cheques, Credit card data etc.
2 Electronic or Digital Cash
This combines computerized convenience with security and privacy that improve upon paper
cash. Cash is still the dominant form of payment as : The consumer still mistrusts the banks. The
non cash transactions are inefficiently cleared. The properties of Digital cash are :‐
• Must have a monetary value
• It must be backed by cash [currency],bank authorized credit or a bank certified cashier’s check
• Digital cash is based on cryptographic systems called “Digital Signatures” similar to the
signatures used by banks on paper cheques to authenticate a customer.
• Maintenance of sufficient money in the account is required to back any purchase.
• Must be interoperable or exchangeable as payment for other digital cash, paper cash, goods or
services, lines of credit, bank notes or obligations, electronic benefit transfers and the like.
3. Electronic Cheques
The electronic cheques are modeled on paper checks, except that they are initiated electronically.
They use digital signatures for signing and endorsing and require the use of digital certificates to
authenticate the payer, the payer’s bank and bank account. They are delivered either by direct
transmission using telephone lines or by public networks such as the Internet. Integration of the
banking and the information technology industry has benefitted the consumers in many aspects
with respect to time, cost and operational efficiency
PREPAID AND POST PAID PAYMENT SYSTEMS
Electronic payment systems are broadly classified in to prepaid and post paid payment Systems:
A] Prepaid payment systems
It provides a service that is paid prior to usage. Here the customer is allowed to spend only up to
the amount that have pre‐determined into the account. This type of payment system is highly
useful to those customers who would like to control overspending. E.g. Prepaid debit cards or
prepaid credit cards. Prepaid payment system is taken by the customer by depositing money with
the credit given company. It can be deposited in the savings account or the current account. Once
the money is deposited, the card is used as a regular credit card. It is very effective card as it
doesn’t put in to debt. nce the money is exhausted in the account, the credit card cannot be used.
There is no interest charges related to this card.
Benefits of the pre‐paid payment system
1. It is accepted at the entire merchant establishment worldwide according to the affiliation of the
credit given company.
2. It can be used to withdraw cash from the ATMs
3. Reloadable anytime anywhere
4. It can be used to withdraw cash in any international currency
5. It is usually backed up by personal accident insurance cover
6. Customer has the facility to get online and track spending , check balance, change pin
Post paid Payment System
This system is like a credit card used to make incremental purchases through the web site. As
purchases are made, the accumulated debt on the post paid credit instrument increase until a
credit Limit is reached, or until an arrangement has made to settle the debt such as monthly
payment.
Normally all credit cards are post paid cards. The customer gets the eligibility of spending
through the income statement and credit history produced before the credit card company. The
customer gets a credit limit and a credit period by which the customer is supposed to pay back
the money to the credit card company.
Features of Post paid payment system
Global acceptance – accepted by all the merchant establishments according to the network set
by the credit card company.
Balance transfer option – It is possible to transfer outstanding funds from one card to other
cards with low interest rates.
Revolver facility – Customer can pay only a small amount of the total outstanding and
revolve the rest for the payment o the next month.
Cash advance facility – Customer can withdraw around 30% of the credit limit at any ATM
connected to the credit card company
Teledraft – These facilities are available at the door steps of the customer
Other services – Credit card can be used for railway tickets and airline ticket purchase
Convenience – as the customer is not required to carry cash for any purchase
Easy availability – holder can load prepaid credit cards at anytime they need.
E‐Cash or Electronic cash
E‐Cash or Electronic Cash is a new concept to execute cash payment using computers connected
with network. E‐cash is an electronic medium for making payments. The primary function of e ‐
cash is to facilitate transactions on the Internet. Many of these transactions may be small in size
and would not be cost efficient through other payment medium such as credit cards.
Electronic money [also known as e‐currency, e‐money, electronic cash, electronic currency,
digital money, digital cash or digital currency] refers to money or scrip which is exchanged only
electronically. Typically, this involves the use of computer networks, the internet and digital
stored value systems. Electronic Fund Transfer and direct Deposit are all examples of electronic
money.
E‐cash is a system of purchasing cash credits in relatively small amounts, storing the credits in
our computer, and then spending them when making electronic purchases over the Internet. The
e‐cash is the creation of electronic money or tokens, usually by a bank, which buyers and sellers
trade for goods and services. It consists of a token, which may be authenticated independently of
the issuer. This is commonly achieved through the use of self‐authenticating tokens or tamper
proof hardware. It includes credit cards, smart cards, debit cards, electronic fund transfer etc.
An e‐cash system must have the following properties:‐
• Digital cash must have a monetary value. It must be backed by cash
• Digital cash must be exchangeable.
• It should be storable and retrievable
• It should not be easy to copy or tamper with while it is being exchanged
E‐cash can be used for making or receiving payments between buyer and seller. The bank’s
server computer sends a secure e‐cash packet to the customer effect the network currency server
of the bank is issuing a bank note with a serial number for a specified amount. The bank uses its
private key to digitally sign such a bank note.
2. Electronic Cheque
E‐cheques are a mode of electronic payments. Integration of the banking and the information
technology industry has benefitted the customers in many aspects with respect to time, cost and
operational efficiency. Cheque is the most widely accepted negotiable instrument to settle
transactions in the world. Paper cheques provide consumers an important payments mechanism.
This technology was developed by a consortium of Silicon Valley IT Researchers and merchant
bankers and since then has been promoted by many of the financial bodies. E‐cheques work the
same way as paper cheques and are a legally binding promise to pay. Electronic cheques are
gathered by banks and cleared through existing banking channels, such as automated clearing
houses.
The advantages of Electronic cheques are :‐
1. The online merchants could receive payments instantly
2. Similar to traditional cheques and eliminates need for customer education
3. Much faster
4. Less chance for cheque bouncing
5. Cost – effective manner
3. Credit Cards
They are the convenient method of making online payment. Credit cards work around the globe
regardless of the location of country of the issuing bank. They also handle multiple currencies
through a series of clearing houses. The credit card holders can purchase goods and services
either offline or online without making immediate payment. Payment to the merchant’s will be
made by the customer’s Bank. The credit card is a financial instrument which can be used more
than once to borrow money or buy products and services on credit. It also contains a validity
period and other important particulars.
To accept a credit card for payment, we have to open a merchant account with our bank. A
merchant account allows sellers to accept and process credit card transactions. In these
transactions, the card number and transaction details are processed with no identification of the
buyer. To implement the payments over the internet, the web merchant needs some form of
secure and encrypted line using the Secure sockets Layer [SSL] that is standard on Netscape and
Microsoft browsers. The merchant server needs an encryption key for the purpose.
4. Smart Card
A smart card is a plastic card about the size of a credit card, with an embedded microchip that
can be loaded with data, used for telephone calling, electronic cash payments, and other
applications and then periodically refreshed for additional use. A smart card, chip card, or
integrated circuit card [ICC] is any pocket sized card with embedded integrated circuits which
can process data. The card connects to a reader with direct physical contact or with a remote
contactless radio frequency interface.
Smart card technology conforms to international standards and is available in a variety of form
factors, including plastic cards, fobs, subscriber identification modules [SIMs] used in GSM
Mobile phones and USB based tokens.
These cards can be used to purchase goods and services. Smart cards are very useful to
merchants and consumers to settle the transaction between them. Smart card provides a lot of
benefits to consumers. It helps to manage expenditures more effectively, reduce the paper work
and ability to access multiple services and the Internet. A multiple application card can support
services like health care, travel and financial data access.
The benefits of smart cards for the consumer are the following:‐
a. Security – unauthorized access is prevented by a lock function
b. Convenience
c. Flexibility
d. Control
e. International use
f. Interest free loan
5. Debit Cards
It is a popular method of making payment. Banks issue debit cards to their customers who have
maintained an account in the balance with sufficient credit balance. Each time the customer
makes a purchase, an equal amount of the purchase is debited in his account.
The transaction works much like a credit card transaction. For Eg. A customer gives an ATM
card to the seller for the purchase. The merchant read the card through a transaction terminal and
the customer enters his personal identification number. Then the terminal route the transaction
through the ATM networks back to the customer’s bank for authorization against customer’s
deposit account. The funds, are approved, are transferred from the customer’s bank to the sellers
bank.
6. Electronic Purse
Electronic Purse is a card with a microchip that can be used instead of cash and coins for
everything from vending machines to public transportation. The Electronic Purse would consist
of micro‐ chip embedded in a credit card, debit card, or stand alone card to store value
electronically. The card would replace cash and coins for small ticket purchases such as gasoline
stations, pay phones, road/bridge tolls, video games, school cafeterias, fast food restaurants,
convenience stores, and cash lanes at supermarkets. Cardholders can “reload” the microchip and
control the amount of value stored in the card’s memory. The Electronic Purse provides
cardholders with the security and convenience of carrying less cash and coins, eliminating the
need for exact change.
Electronic purse is a term applied to a number of formats, each with different applications. At the
moment, smart card based systems are used as a direct replacement for money that the user
would have in his pocket and software based systems are used for online purchases. The e ‐ purse
is an electronic / cash less payment option for making small purchases within the campus.
To load an electronic purse, the user must be able to operate an ATM or card loading machine.
Usually this requires the user to be able to read a visual display, but methods for alleviating this
problem have been developed. To use the electronic purse, the user hands the card to the shop
assistant who inserts the card in a terminal and keys in the amount of the transaction. This is
displayed visually to the customer. Once again, the person must be able to read a display screen.
The customer confirms that the amount is correct, and the money is transferred from the card to
the terminal. In some systems the customer need to key in their PIN [Personal Identification
Number] before the transaction can be completed.
INFRASTRUCTURE ISSUES IN EPS
Infrastructure is necessary for the successful implementation of electronic payments. Proper
Infrastructure for electronic payments is a challenge.
1. For electronic payments to be successful, there is the need to have reliable and cost
effective infrastructure that can be accessed by majority of the population.
2. Electronic payments communication infrastructure includes computer network. such as
the internet and mobile network used for mobile phone.
3. In addition, banking activities and operations need to be automated. A network that links
banks and other financial institutions for clearing and payment confirmation is a pre-
requisite for electronic payment systems. mobile network and Internet are readily
available in the developed world and users usually do not have problems with
communication infrastructure.
4. In developing countries, many of the rural areas are unbanked and lack access to critical
infrastructure that drives electronic payments.
5. Some of the debit cards technologies like Automated Teller Machines (ATMs) are still
seen by many as unreliable for financial transactions as stories told by people suggested
that they could lose their money through fraudulent deductions, debits and other lapses
for which the technology had been associated with by many over the last few years.
6. Telecommunication and electricity are not available throughout the country, which
negatively affect the development of e-payments. The development of information and
communication technology is a major challenge for e-payments development. Since ICT
is in its infant stages in Nepal, the country faces difficulty promoting e-payment
development.
ELECTRONIC FUND TRANSFER
Electronic Funds Transfer (EFT) is the electronic transfer of money from one bank account to
another, either within a single financial institution or across
multiple institutions, via computer-based systems, without the direct intervention of bank staff.
EFT transactions are known by a number of names. In the United States, they may be referred to
as electronic checks or e-checks.
Types
The term covers a number of different payment systems, for example:
Cardholder-initiated transactions, using a payment card such as a credit or debit card
Direct deposit payment initiated by the payer
Direct debit payments for which a business debits the consumer’s bank accounts for
payment for goods or services
Wire transfer via an international banking network such as SWIFT
Electronic bill payment in online banking, which may be delivered by EFT or paper
check
Transactions involving stored value of electronic money, possibly in a private currency.
HOW IT WORKS ?
EFTs include direct-debit transactions, wire transfers, direct deposits, ATM withdrawals and
online bill pay services. Transactions are processed through the Automated Clearing House
(ACH) network, the secure transfer system of the Federal Reserve that connects all U.S. banks,
credit unions and other financial institutions.
For example, when you use your debit card to make a purchase at a store or online, the
transaction is processed using an EFT system. The transaction is very similar to an ATM
withdrawal, with near-instantaneous payment to the merchant and deduction from your checking
account.
Direct deposit is another form of an electronic funds transfer. In this case, funds from your
employer’s bank account are transferred electronically to your bank account, with no need for
paper-based payment systems.
Types of EFT payments
There are many ways to transfer money electronically. Below are descriptions of common EFT
payments you might use for your business.
Direct deposit lets you electronically pay employees. After you run payroll, you will tell your
direct deposit service provider how much to deposit in each employee’s bank account. Then, the
direct deposit provider will put that money in employee accounts on payday. Not all employers
can make direct deposit mandatory, so make sure you brush up on direct deposit laws.
Wire transfers are a fast way to send money. They are typically used for large, infrequent
payments. You might use wire transfers to pay vendors or to make a large down payment on a
building or equipment.
ATMs let you bank without going inside a bank and talking to a teller. You can withdraw cash,
make deposits, or transfer funds between your accounts.
Debit cards allow you to make EFT transactions. You can use the debit card to move money
from your business bank account. Use your debit card to make purchases or pay bills online, in
person, or over the phone.
Electronic checks are similar to paper checks, but used electronically. You will enter your bank
account number and routing number to make a payment.
Pay-by-phone systems let you pay bills or transfer money between accounts over the phone.
Personal computer banking lets you make banking transactions with your computer or mobile
device. You can use your computer or mobile device to move money between accounts.
Unit 4
E-Business Applications and Strategies
Business Models Of The Internet
Unlike traditional models of running a business in the bricks-and-mortar world, techniques to
generating revenue online continue to evolve and be defined. After over 15 years of witnessing,
working with and corroborating on various methods of online business effectiveness, I have
categorized the approaches into six basic business models of the Internet.
These website business models are as follows: the Ad Units Revenue model, the Subscription
Revenue model, the Commission model, the Data Distribution Revenue model, eCommerce, and
Build to Sell. Below are my descriptions of each model with some examples and advantages.
The Ad Unit Revenue Model
Displaying ads on a website is one of the most popular approaches to generating revenue. The
Ad Unit Revenue model works best when the volume of traffic is high or very targeted. With this
model the assumption is that visitors to a website will be attracted by the related advertisements.
Both contextual and/or image based banner ads are displayed on top, beside, under, and in
between articles, services, search results, or other published materials. Many of the earliest
websites employed this method and it continues to be popular today.
The Subscription Revenue Model
This model generates revenue through subscriptions to a website's premium content such as
articles, videos, audio, software, tools, and applications or service. The offering is information or
service that cannot otherwise be easily acquired. This model works off of economies of scale.
Once a break-even point of memberships is reached, every additional subscription is strictly
profit. An example of a "pay as you go" version of this approach would be Slashdot.com. The
Subscription Revenue Model is sometimes combined with the Ad Units model. However, if the
subscription is a paid one, ads are less likely to be presented. National newspapers or magazines
in print often use this model to establish their online presence.
The Commission Model
This website business model is based on generating revenue by taking a percentage of a sale.
eBay, PayPal, and Priceline.com are best examples of the Commission Model, where the item
being sold is not owned by the website administrator but available via referral. This approach
relies on the advantage of offering a hassle-free way of selling personal items and products
through a website that promotes and brings in the right prospects. As a pay-per-performance
approach the affiliate pays commission only after a sale is made. Arbitrage is another form of
this model that has to do with buying of traffic in bulk and reselling it and/or making profit using
other business models. Here's a scenario of this approach in practice. You bid on pay-per-click
keywords for a word that directs the visitor to a landing page with multiple advertisements.
Instead of paying on your own for each click, in this manner you share the expense and still have
fewer competitors to fight for attention. With enough clients, the re-seller of the bulk purchase
can make profit on each keyword.
The Data Distribution Revenue Model
This approach is exemplified by websites that sell their network contacts or data about its
consumers and their habits. The Data Distribution revenue model is about providing valuable
material for target marketing initiatives. Online business directories, like the Yellow Pages, and
newsletter distributors like the Apple store that sells audio files, and Amazon’s Kindle are
perfect examples of this approach.
eCommerce
This most recognizes model is employed by websites that sell products and services online, and
are referred to as ecommerce websites. Selling products online is a lot less expensive then
selling in a traditional retail store. Advantages of eCommerce include less overhead, more
efficiency, and the ability to track visitors' experiences. This approach is a natural progression for
a typical retail store that wants to expand its market reach into the online world. Amazon is the
most renowned example of this business model. Online stores will continue to grow in popularity
as people become more comfortable buying through the web and as more different products and
services become available.
Build to Sell
If a business model's success is measured by a track record of sales, this model could be the most
valuable to a purchaser. The Build to Sell approach refers to a website's approach that builds a
strong online presence with the goal of selling it to another company that can capitalize on its
online value. The website's value is established either with its domain, value in its website
application, content, number of members, or high position in the search engine results, and/or all
of the above. Mostly used during the 2000 Internet boom, this model still has a lot of potential.
It's difficult to say if one approach is more effective than another in generating greater return. As
with traditional business models the success equally dependents on the value of the proposition
being offered. It's important to keep in mind that none of the methods are exclusively
independent. Variations of the basic website business models can create levels of effectiveness
that are as unique as each business - with the objective of healthy revenue growth, of course.
Mobile Commerce
Mobile commerce, also called m-commerce or mcommerce, includes any monetary transaction
completed using a mobile device.
It is an advancement of ecommerce, enabling people to buy and sell goods or services from
almost anywhere, simply using a mobile phone or tablet device.
But mobile commerce is more than just a simple evolution of ecommerce.
It has also served as a trigger for new industries and services, or helped existing ones grow,
including:
Mobile money transfers.
Electronic tickets and boarding passes.
Digital content purchases and delivery.
Mobile banking.
Contactless payments and in-app payments.
Location-based services.
Mobile marketing, coupons, and loyalty cards.
Types Of Mobile Commerce
While m-commerce covers a wide variety of transactions, they can all be categorized as one of
three types:
1. Mobile shopping.
Mostly similar to ecommerce, but accessible via a mobile device. Mobile shopping is now
possible through mobile optimized websites, dedicated apps, and even social media platforms.
2. Mobile banking.
Not too different to online banking, though you may find some transaction types are limited or
restricted on mobile devices. Mobile banking usually involves a dedicated app, though some
banks have started experimenting with the use of chatbots and messaging apps.
3. Mobile payments.
There are so many diverse mobile payment options that we have chosen to cover them in detail
further in this article.
As a business owner, and user of BigCommerce, your exposure and interest in mobile commerce
would mostly relate to shopping and payments, which is what the rest of this article will focus
on.
Advantages (and Disadvantages) of Mobile Commerce
There are disadvantages to many forms of doing business, but this should never be viewed as a
significant hindrance.
The advantages usually outnumber the disadvantages, and there are ways to overcome many of
the pitfalls, especially when you know what some of them are.
Let’s start with the good, first.
Common Benefits of Mobile Commerce
1. Better overall experience for customers.
Ecommerce already made shopping more convenient.
Consumers were given access to:
A wider variety of products.
More competitive pricing.
All without ever having to step away from their computer.
With mobile commerce, they still have these benefits, but now they don’t even need a desktop
computer.
As long as they have a mobile device, they can shop whenever they want, wherever they are.
New mobile commerce applications that enhance the customer experience even further include:
Augmented reality, with Ikea and Sephora among top retailers using augmented reality
apps to complement their mobile commerce business
Chatbots and messenger apps which making it easier for businesses to interact with their
customers using apps and services their customers already use and love.
2. Phenomenal growth potential.
eMarketer expects global ecommerce sales to reach $4.058 trillion by 2020, representing 15% of
total retail sales.
And the percentage of that belonging to m-commerce will also continue to grow, as more online
retailers see more than 50% of traffic coming from mobile devices.
This suggests that retailers investing more in mobile commerce can ultimately expect a higher
conversion rate and ROI.
3. A true omni-channel experience.
An omni-channel experience is when stores sell both online and offline — likely also selling
through multiple online channels (i.e. on Amazon, eBay, Facebook, B2B).
We’ve also been referencing the importance of listing your product wherever consumers are
already spending their time. This is increasingly known as contextual commerce, a more
strategic take on the overarching omni-channel term.
Omni-channel is about being where your customers are, and making it possible for them to buy
what they want.
11 Essential Marketing Strategies for Your eCommerce Business
Whether your company is just starting up or has reached the point of maintaining a well-
established customer base, it’s important to stay up to date with the most current marketing
trends and techniques for your eCommerce business. Structuring and finally launching an
eCommerce website is a milestone achievement for your brand. Therefore, it’s crucial to invest
in an effective website structure and marketing strategy.
1. Produce Original Content
The first step in setting up an eCommerce website is creating the content for it. Creating high-
quality and original content will set you up for success because it will resonate with your
customers in a way that makes them want to interact with you, purchase from you, and maintain
a following.
Be creative. Be original.
Promoting original content is a great way to make a statement, strike a compelling idea, and
make a mark on the user’s mind. There is a fine line between content that engages users and
content that deters them. Why not take an extra step, put in a little effort, and create something
that will be genuinely compelling?
2. Optimize your website layout
After launching your e-commerce site, it’s important to test your website’s layout, language, and
placement of conversion elements. When customers visit your website, you want to make sure
it’s easy and simple to check out -- that they feel naturally inclined to purchase your products
and that it’s abundantly clear how to do so.
3. Content Marketing
Proper content marketing can attract more positive attention, interaction, and sustainable
conversions in a way no other marketing method can. By creating and promoting original
content, you are ensuring that your audience is receiving new information that matters to them on
a continual basis.
Brainstorm with your team to create a list of the different types of content you wish to create,
such as blog posts, videos, and newsletters. Also, make sure you are utilizing your marketing
budget by consulting with experts, outsourcing work when necessary, and investing in high-
quality software, subscriptions, employees, and training for your team. You will also find that if
you work with the right people, many of the things you’ve paid for in the past can be done
internally. Create diversity within your team and listen to everyone’s ideas.
We also suggest that you create content based on Pareto’s 80/20 rule, which means that your
promotions should comprise of 80% informational content, and 20% promotional content. All of
the content you publish should be relevant, interesting, and unique.
4. Social Media Marketing
Social media marketing is a very powerful tool that allows you to communicate with your
industry, customers, and market in a personal way. You can utilize social media to generate
engagement and interaction, boost traffic to your website, and develop a larger base of
customers. Utilizing different social media platforms for different purposes also creates a rich
presence for your company that diversifies your abilities, efforts, and will ultimately help you
cater to your customers’ needs in a way that grows your business over time.
Maintaining a solid tone and personality of your company through social media is very important
because consistency is what will create trust within your audience. In order to develop and
maintain brand recognition and authority, make sure your outreach efforts are unified by
ensuring your team is on the same page with your company’s communication style.
5. Email Marketing
One of the most effective forms of reaching out to your customer base is through email
marketing. Although you have to be very careful about the content within your emails and who is
included in your outreach, the reason email marketing has been around for so long is because it
works.
In order to reach your audience most effectively, provide useful content within your emails.
Make them as personal as you can, offer valuable promotions, and use it as an opportunity to
socialize. Open up about what your business is doing, any events you are attending, new features
or products, and be transparent about your company. You want to relate to your customers on a
level that gauges their interest and keeps them engaging with your emails.
As always, make sure you are monitoring the analytics of your email marketing efforts. One
great tool that can help you with this is the Google Analytics Dashboard, which is a free solution
that gives you useful data about your email marketing efforts.
6. Search Engine Optimization
One of the most important and manual methods of optimizing a successful eCommerce website
is making sure it’s optimized for search engines. With today’s Search Engine Optimization
(SEO) standards, it’s now more important than ever to make sure your website is constantly
updated with rich and relevant content, promotes a good user experience (UX), and is optimized
to be as error-free as possible.
The content within your website should be rich, reliable, and provide information to the public
that is useful and relevant to what they’re looking for. For example, if you have an eCommerce
store selling camping supplies, it’s wise to provide detailed product information and possibly
even host sections of your website that offer generous amounts of content that elaborates on the
topics of camping, supplies, or related subjects. Using keywords within your content in a genuine
way will also flag your website as a matching result in search engines when users are looking for
something specific.
7. Pay-Per-Click Marketing
There are three basic elements to any pay-per-click marketing campaign: the ad, the offer, and
the landing page.
All three must be in good harmony and synchronization if you want to maintain the interest of
the lead. The landing page must be a continuation of your ad, delivering what was promised as
the reward of clicking on the ad, in order to take the visitor through your conversion funnel. It
must also be customized for keywords to appear somewhere near the top of search engine results.
Keep the landing page free of distractions and unnecessary bells and whistles. Also, keep in
mind that your landing page is the most appropriate place to boast your product benefits to the
customer.
In Conclusion
Staying current with the latest marketing trends and techniques is crucial for any successful
eCommerce website. It’s important to deliver relevant, interesting and valuable content and
products that truly suite the needs of your target market. Reach out to your customers in a variety
of ways and make sure you are working with a team of experts with varying skill sets. If you
listen to everyone’s ideas, you may find new ways of improving your current campaigns and
outreach methods. And, as always, make sure you are monitoring your website analytics to
examine trends, keep your website optimized, and track your results!
With the right mix of marketing techniques, you can improve your conversion rate and attract
sustainable business that will continue growing over time.
An Internet service provider (ISP) is a company that provides customers with Internet access.
Data may be transmitted using several technologies, including dial-up, DSL, cable modem,
wireless or dedicated high-speed interconnects.
Typically, ISPs also provide their customers with the ability to communicate with one another by
providing Internet email accounts, usually with numerous email addresses at the customer’s
discretion. Other services, such as telephone and television services, may be provided as well.
The services and service combinations may be unique to each ISP.
An Internet service provider is also known as an Internet access provider (IAP).
The Internet began as a closed network between government research laboratories and
universities and colleges. As universities and colleges began giving Internet access to their
faculty and other employees, ISPs were created to provide Internet access to those employees at
home and elsewhere. The first ISP began in 1990 as The World, based in Brookline,
Massachusetts.
Individual customers and businesses pay ISPs for Internet Access. ISPs are interconnected to one
another at network access points. In turn, ISPs pay other, larger ISPs for their Internet access,
which in turn pay still other ISPs. This cascades multiple times until transmissions reach a Tier 1
carrier, which is an ISP capable of reaching every other network on the Internet without
purchasing IP transit or paying settlements. However, it is difficult to determine the status of a
network because the business agreements to pay settlements are not made public.
However, the situation is more complex than simply a single connection established to an
upstream ISP. ISPs may have more than one point of presence (PoP), which is an access point to
the Internet comprised of a physical location housing servers, routers, ATM switches and
digital/analog call aggregators. Some ISPs have thousands of PoPs. Multiple PoPs may have
separate connections to an upstream ISP. And each ISP may have upstream ISPs and connections
to each one of them at one or multiple PoPs.
E-Marketing
E-marketing is referred to those strategies and techniques which utilized online ways to reach
target customers. There are millions of Internet users that daily access different websites using a
variety of tools like computers, laptops, tablet and smart or android phone devices, and the
number of internet users are increasing very rapidly. So every business seems to be jumping on
the internet marketing bandwagon. The internet is most powerful tool that can put any business
on solid footing with market leaders companies. There are many free as well as economical way
on internet to promote your business. Successful companies must ask themselves some tough
questions about how they will promote their business online? What their company expectations
are? And what will be their plan to meet those expectations? After answer all these questions a
company should design an effective marketing plan.
Definition
E marketing also known as online or internet advertising which uses the internet technology to
promote online message to customer. E-marketing examples are email or social media
advertising, web banners and mobile advertising.
Disadvantages of E-Marketing
1. If you want a strong online advertising campaign you have to spend money. The cost of
web site design, software, hardware, maintenance of your business site, online
distribution costs and invested time, all must be factored into the cost of providing your
service or product online.
2. Almost over 60% of households now a day shop online. While that numbers are
continuously growing, your company needs to reach maximum people.
3. Some people prefer the live interaction when they buy any product. And if your company
has a small business with one location, this may also deter customers from buying who
lives on long distances.
4. Your company should have updated information on your site. This requires research and
skills and thus timing of updates is also critical.
5. Is your company web site secure? There are many incorrect stereotypes about the security
of the internet. As a result, many visitors of your business web site will not want to use
their credit card to make a purchase. So there is a fear in the minds of your visitors of
having their credit card info stolen.
Types of e-marketing
There are several ways in which companies can use internet for marketing. Some ways of e-
marketing are:
1. Article marketing
2. Affiliate marketing
3. Video marketing
4. Email marketing
5. Blogging
All these and other methods help a company or brand in e-marketing and reaching customer
through the internet..
E-marketing strategy
The importance of developing an effective e-marketing strategy is indicated by Michael Porter
(2001) who has said:
‘The key question is not whether to deploy Internet technology – companies have no choice if
they want to stay competitive – but how to deploy it.’
An e-marketing strategy is needed to provide consistent direction for an organisation’s e-
marketing activities that integrates with its other marketing activities and supports the overall
objectives of the business.
Emarketing trends.
For many companies, the first forays into e-marketing or Internet marketing are not the result of
a well-defined, integrated Internet strategy; rather, they are a response to competitors activities or
customers demand.
After a site has been in existence for a year or so, marketing staff and senior managers in a
company will naturally question its effectiveness. This is often the point at which the need for a
coherent Internet marketing strategy becomes apparent. As a result, the starting point used in this
summary of approaches to e-marketing strategy, is when a company that has an existing site and
it is reviewing the current site and its effectiveness with a view to future improvements.
The e-marketing strategy process
There is no evidence to suggest that the approach to developing and implementing a strategy
should be significantly different for e-marketing. Established frameworks for corporate strategy
development or strategic marketing planning should still be followed.
These frameworks provided a logical sequence to follow which ensures inclusion of all key
activities of strategy development. It can be argued, however, that with e-marketing there is an
even greater need for a highly responsive strategy process model where rapid reaction can occur
to events in the marketplace. The use of Soviet-style 5 year planning does not seem appropriate,
a preferable approach is an emergent e-marketing strategy process that is part of a continuous
improvement.
Chaffey (2012) notes that e-business or e-marketing strategy process models tend to share the
following characteristics:
Continuous internal and external environment scanning or analysis are required.
Clear statement of vision and objectives is required.
Strategy development can be broken down into formulation and selection.
After strategy development, enactment of the strategy occurs as strategy implementation.
Control is required to detect problems and adjust the strategy accordingly.
They must be responsive to changes in the marketplace.
In this article, we will use a four stage model for e-marketing strategy development. The four
stages are:
1. Strategic analysis. Continuous scanning of the micro and macro-environment of an
organization are required with particular emphasis on the changing needs of customers, actions
and business models of competitor and opportunities afforded by new technologies. Techniques
include resource analysis, demand analysis and competitor analysis, applications portfolio
analysis, SWOT analysis and competitive environment analysis.
2. Strategic objectives. Organisations must have a clear vision on whether digital media will
complement or replace other media and their capacity for change. Clear objectives must be
defined and in particular goals for the online revenue contribution should be set.
3. Strategy definition. We will discuss strategy definition by asking eight questions. These will
be considered in next month’s article:
Decision 1. Target market strategies.
Decision 2. Positioning and differentiation strategies.
Decision 3. Resourcing - Internet marketing priorities – significance to organization.
Decision 4. CRM focus and financial control
Decision 5. Market and product development strategies.
Decision 6. Business and revenue models including product development and pricing
strategies.
Decision 7 Organisational restructuring required.
Decision 8. Channel structure modifications.
4. Strategy implementation
Includes devising and executing the tactics needed to achieve strategic objectives. This includes
relaunching a web site, campaigns associated with promoting the site and monitoring the
effectiveness of the site. These issues have been dealt with in other articles.
We will now examine specific issues of strategic analysis and objective setting that are related to
e-marketing.
1. Strategic analysis.
In common with traditional marketing strategy, strategic analysis or situation analysis for e-
marketing involves review of the:
- internal resources and processes of the company and a review of its activity in the marketplace;
- immediate competitive environment (micro-environment) including customer demand and
behaviour, competitor activity, marketplace structure and relationships with suppliers and
partners.
- wider environment (macro-environment) in which a company operates including the social,
legal, economic, political and technological factors.
In this section we will highlight the key aspects of the internal and external environment that
need to be assessed when developing an e-marketing strategy.
Internal resources
These are of particular importance for e-marketing:
- Portfolio analysis and stage models – Considers the sophistication of online services offered to
prospects and customers. From basic ‘brochureware’ sites with no interaction through those
offering online catalogues to fully transactional sites offering full support for all stages of the
customer lifecycle from acquisition, retention to extension and all stages of the buying process.
- E-marketing effectiveness – How effective is the organisation at converting browsers to visitors
and visitors to prospects and buyers? Analysis of web logs using diagnostics such as those
available from www.marketing-insights.co.uk is important here.
- Financial resources and cost/benefit – in particular the breakdown for costs of running the
online presence between site development, promotion and maintenance. Many organisations still
do not have good visibility of these costs and the benefits such as those described in the objective
setting section.
- Service quality – human resources and software assistance for answering customer queries and
dispatching goods.
- Technology infrastructure resources – availability and performance (speed) of web site and
service level agreements with the ISP.
- Structure – what are the responsibilities and control mechanisms used to co-ordinate Internet
marketing across different departments and business units. We return to this topic next month.
- Strengths and Weaknesses – SWOT analysis can be readily applied to e-marketing specific
issues.
The Internet micro-environment
Pertinent factors for the Internet include demand analysis, competitor analysis intermediary
analysis, channel structure. Porter (2001) has written extensively about how the Internet has
changed the dynamic of the marketplace and has reinterpreted his often-quoted five forces model
in the Internet era.
Demand analysis or online customer activity is a key factor driving e-marketing and e-business
strategy objectives. It assesses the current level and future projections of customer demand for e-
commerce services in different market segments. In a B2B context customer activity can be
determined by asking for each market:
- What % of customer businesses have access to the Internet?
- What % of members of the buying decision in these businesses have access to the Internet?
- What % of customers are prepared to purchase your particular product online?
- What % of customers with access to the Internet are not prepared to purchase online, but
choose or are influenced by web-based information to buy products offline?
- What are the barriers to adoption and the facilitators amongst customers and how can we
encourage adoption?
Qualitative research is important to informing strategy since it identifies the differences in
psychographics between current online customers and those that are not offline.
Resources for assessing the ratio of ‘Access : Choose : Buy’ online have been reviewed in
WNIM 5 and 6.
Competitor analysis or the monitoring of competitor use of e-commerce to acquire and retain
customers is especially important in the e-marketplace due to the dynamic nature of the Internet
medium. Chaffey (2002) suggests comparing the activity of an organisation and its competitors
for their different channels by trying to answer these questions:
1. Business contribution
How does Internet marketing contribute to the bottom line? What is the online revenue
contribution (direct and indirect), costs and profitability?
2. Marketing outcomes
How many marketing outcomes are achieved online? For example, what proportion of leads,
sales, service contacts occur online? How effective is online marketing at acquiring, converting
and retaining customers?
3. Customer satisfaction
What are the customers’ opinions of the online experience and how does this affect their loyalty?
4. Customer behaviour (Web analytics)
This assesses how different customer segments interact with web site content and assesses how
the actions they take are influenced by usability, design, content, promotions and services.
5. Site promotion
How effective are the different promotional tools such as search engines, e-mail, direct
marketing and advertising at driving quality traffic to the web site? Measures include attraction
efficiency, referrer efficiency, cost of acquisition, reach and the integration between tools.
Analysis of the use of intermediaries to build and service business is also important here.
The Internet macro-environment
It can be suggested that of the different Social, Legal, Economic, Political and Technological
characteristics of the macro-environment, the three most significant factors described in more
depth in chapter 3 are legal constraints – What are the legal limitations to online promotion and
trade such as data protection and taxation, ethical constraints such as privacy and technological
constraints – what is the current availability and usage of technology to access the Internet and
offer distinctive services and how is this likely to vary in the future?
2. Strategic objectives.
Smith and Chaffey (2001) suggest there are five broad benefits, reasons or objectives of e-
marketing. This framework is useful since it presents a comprehensive range of objectives.
Marketers will decide whether all or only some will drive e-marketing:
Sell – Grow sales (through wider distribution to customers you can’t service offline or
perhaps through a wider product range than in-store, or better prices)
Serve – Add value (give customers extra benefits online: or inform product development
through online dialogue and feedback)
Speak – Get closer to customers by tracking them, asking them questions, conducting
online interviews, creating a dialogue, monitoring chat rooms, learning about them
Save – Save costs - of service, sales transactions and administration, print and post. Can
you reduce transaction costs and therefore either make online sales more profitable? Or
use cost-savings to enable you to cut prices, which in turn could enable you to generate
greater market share?
Sizzle – Extend the brand online. Reinforce brand values in a totally new medium. The
Web scores very highly as a medium for creating brand awareness, recognition and
involvement.
Specific objectives should be created for each of the 5Ss. Consider Sales – a typical objective
might be:
‘To grow the business with online sales e.g. to generate at least 10% of sales online. Within 6
months.’
or
‘To generate an extra £100,000 worth of sales online by December’.
These objectives can be further broken down according to CRM objectives of acquisition,
conversion and retention, e.g. to achieve £100,000 of online sales means you have to generate
1,000 online customers spending on average £100 in the time period. If, say, your conversion
rate of visitors to customers was 1% then this means you have to generate 100,000 visitors to
your site. Achieving repeat visits and sales would form further objectives.
The online revenue contribution
The key objective for e-marketing is the online revenue contribution. This is a measure of the
extent to which a companies online presence directly impacts the sales revenue of an
organisation. Online revenue contribution objectives can be specified for different types of
products, customer segments and geographic markets.
Companies that can set a high online revenue contribution objective of say 25% for 2 years time
will need to provide more resource allocation to the Internet than those companies who anticipate
a contribution of 2.5%. Cisco Systems Inc (www.cisco.com) maker of computer networking
gear, is now selling around 90% of its 20 billion dollars sales online. This was achieved since
senior executives at Cisco identified the significance of the medium, setting aggressive targets
for the online revenue contribution and resourcing the e-commerce initiative accordingly.
A further example is provided by Sandvik Steel. The Financial Times reported in June 2001 that
around 20 per cent of all orders from Denmark are online and 31 per cent of those from Sweden.
The proportion in the US, however, is only 3 per cent, since most business goes through
distributors and is conducted by EDI (electronic data interchange), the pre-internet means of e-
commerce. Over the next six months, the company hopes to raise the US figure to 40 per cent.
Mr Fredriksson hopes that in two years, between 40 and 50 per cent of total orders will come via
the web.
However, for some companies such as an FMCG manufacturer, it is unrealistic to expect a high
direct online revenue contribution. In this case, an indirect online contribution can be stated. This
considers the Internet as part of the promotional mix and its role in reaching and influencing a
proportion of customers to purchase the product or in building the brand. In this case a company
could set an online promotion contribution of 5% of its target market visiting the web site and
interacting with the brand. Where sales achieved offline are a consequence of online selection of
products this is referred to as the indirect revenue contribution.
Summary - E-marketing strategy
We have looked at the first two parts of a strategy process, key issues for these are:
1. Situation analysis. Internal audit including review of services/portfolio analysis, cost/benefit
analysis, e-marketing effectiveness analysis. External audit of which the macro-economic factors
of demand analysis and competitor analysis are arguably most important.
2. Objectives setting. The 5 S s of Sell, Speak, Serve, Save and Sizzle. The direct and indirect
online revenue contribution.