E-Commerce Sia
E-Commerce Sia
* SPECTRC1M
RLL-IN-ONE
E-COMMERCE
B.Com (OU) III-Year Vl-Semester (Computers & Computer Applications)
Prepared by
SIA Team of Experts
MAIN BRANCH - PUTLI BOWLI KOTI S.R.NAGAR A.S. RAO NAGAR SHAIKPET ASHOK NAGAR VIJAYAWADA
94 BUS STOP, PUTLI BOWLI, Beside Gokul Chat, Beside HDFC Bank. Opp snarada Bus Stop, Opp. o.Mart Baside G Narayanamma G2, No. 1.10.213, Ground Floor, 28-5-1,1st Floor, Lalitha Complex.
Opp. Women’s Gajalaxmi Estates I 1st Floor Kalyan Plaza Bldg . | Engineering College for Women. R K Math lana, Eluru Road, Kuppavari Street.
Lane Opposite to ASHOK NAGAR SIGNAL
OSMANIA MEDICAL COLLEGE GprTE (HYD) College Road (HYD) <HYD) i Main Road (Sec-bad) I Gachlbowll Road-(HVO) Indrasagacity Apartments (HYD) Opp. Hotel Raj Towers, Arundaiper
Copyright Q Reserved Despite every effort taken to present the book without errors, some errors might have crept in. We
do not take any legal responsibility for such errors and omissions. However, if they are brought
with the Publisher to our notice, they will be corrected in the next edition.
E-commerce is mostly considered as a mean of carrying out business activities in such a way that the firm’s
value chain is greatly effected in positive manner. E-commerce provides potential benefits to organizations,
consumer and society. The other online businesses beside E-commerce are Online marketing, E-business,
Online trading, E-leaming and E-training.
Every concept is explained in a simple manner with sufficient number of examples so as to facilitate
better understanding and easy learning in a shorter span of time. Keeping in view the examination pattern
of B.Com students, this book provides the following features,
❖ Frequently Asked Questions are included to help the students to repare for Internal and External
Assessment.
❖ Every unit is structured into two main sections viz. Short Questions & Essay Questions with
? solutions along with Learning Objectives and Introduction.
❖ Three Model Papers are provided in order to help the students to understand the paper pattern in
the end examination.
An attempt has been made through this book to present theoretical knowledge of “E-Commerce”.
This book is especially prepared for undergraduate students.
The table below illustrates the complete idea about the subject, which will be helpful to plan and score
good marks in the end examinations.
Unit
Unit Name Description
No.
1. Introduction The unit covers the topics like E-Commerce: Meaning, Advantages and
2. Framework of E-Commerce This unit covers the topics like Framework of E-Commerce: Application
Certificates.
3. Consumer Oriented This units covers the topics like Introduction to Consumer Oriented
E-Commerce Applications
Applications, Mercantile Process Model : Consumers Perspective and
4. Electronic Data Interchange This units covers the topics like Introduction EDI, EDI Standards, Types of
of Digital Marketing.
It is sincerely hoped that this book will satisfy the expectations of students and at the same time helps
them to score maximum marks in exams.
Suggestions for improvement of the book from our esteemed readers will be highly appreciated and
incorporated in our forthcoming editions.
E-Commerce
CONTENTS —
Syllabus (As per (2016-17) Curriculum)
UNIT-II
FRAMEWORK OF E-COMMERCE
UNIT-III
CONSUMER ORIENTED E-COMMERCE APPLICATIONS
Introduction - Mercantile Process Model: Consumers Perspective and Merchant’s Perspective - Electronic
Payment Systems: Legal Issues and Digital Currency - E-Cash and E-Cheque - Electronic Fund Transfer
(EFT) - Advantages and Risks - Digital Token-based E-Payment System - Smart Cards.
* UNIT-IV
*
ELECTRONIC DATA INTERCHANGE
Introduction - EDI Standards - Types of EDI - EDI Applications in Business - Legal - Security and
Privacy Issues in EDI - EDI and E-Commerce - EDI Software Implementation.
UNIT-V
E-MARKETING TECHNIQUES
UNIT -1
1. E-commerce
E-commerce or electronic commerce is simply an ‘online business’ wherein the buying and selling of products and
services are carried out through Internet.
2. World Wide Web
The World Wide Web (WWW) or the web is a repository of information spread all over the world and linked together.
The WWW has a unique combination of flexibility, portability and user-friendly features that distinguish it from
other services provided by the Internet.
3. Internet
It is the network of networks, the Internet is massive, worldwide collection of networks connecting many subnetworks
and computing information resources located on these subnetworks.
4. Search Engine
Search engine is defined as a technique of finding data according to the user typed query without being concerned
about its location.
5. E-banking
Electronic banking is an Internet-based banking process in which users are allowed to connect to the legitimate
websites of their respective bank..
6. E-Learning
Education, training or knowledge management achieved through the content delivered via Internet is known as
E-leaming.
7. E-shopping
E-shopping or online shopping is a new form of shopping which enables the customers to purchase their desired
product from intended seller over the Internet.
8. Online Trading
E-trading/online trading is also known as E-broking. E-broking provides up-to-date and on-time information about
the stock exchange prices to everyone across the world.
9. M-Commerce
Mobile commerce or M-commerce refers to any business activity or transaction that is done through mobile devices
which are connected to wireless networks.
10. Relationship Marketing
Relationship marketing is a strategy where companies advertise their product in a selected market in such a way
that a good relationship is built up and maintained with their customers.
UNIT
. - II ■ ■ • ■ . . ;
1. Architectural Framework of E-Commerce
Architectural framework of E-commerce is a combination of different available resources such as DBMS, data
repository, communication protocols and computer languages.
2. SGML
SGML is Standard Generalized Markup Language used for text based documents.
3. HTML
HTML stands for Hypertext Markup Language used for documents like hypertext, multimedia etc.
The process wherein two entities can verify each other to know that they are the only users who claim to be called
authentication.
5. Authorization
It is the process of ensuring a person or a program that they have right to access particular resources.
6. Information Security
Information security refers to the process of protecting data or information from unauthorized user and to allow
legitimate users to access the data.
7. Computer Security
It refers to the branch of computer science that describes the application of ‘secure’ behaviour on the operation of
computers.
8. Network Security
Network security refers to the plans or arrangements made in the network infrastructure along with the various
techniques used by the network administrator.
9. HTTP
HTTP is a stateless protocol that is used for delivering the web pages over the Internet.
10. Cryptography
Cryptanalysis is a type of attack that makes certain attempts possible for obtaining the plaintext and the key used.
12. Cryptology
UNIT - III
1. E-cash
Electronic cash is a form of electronic payment system which provides high level of security and reduces the overhead
of paper cash.
2. Debit Card
A debit card is a card that is used instead of cash in shopping.
3. Electronic Payment
Electronic payment means paying the amount for purchased goods electronically.
4. EPS
Electronic Payment System (EPS) is a building block of E-commerce which refers to the online exchange of money.
5. Smart Cards
Smart cards store massive volume of customer’s information such as verification ID, health sector care, financial
banking.
SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD. ■
List of Important Definitions L.3
1. VAN
VAN is a network that makes communication possible among different business partners.
2. Intra-organizational E-commerce
Intra-organizational E-commerce refers to the activities that are performed within the organization so as to consistently
deliver superior quality service to consumers.
3. Electronic Data Interchange
Electronic Data Interchange (EDI) can be defined as a medium of transmitting business information in a standardized
format.
4. Electronic Mailbox
Electronic mailbox is a feature of software that stores EDI messages which user fetches depending on their needs.
5. Customization
Customization refers to the process of building the product according to the specifications given by the consumers.
UNIT - V
1. Spam Mail
Spam mail refers to the unwanted and unrequested on-line email called ‘junk mail’ which is repeatedly sent to
multiple recipients at a time.
2. E-Mail
Electronic mail is simply an information that is sent electronically from one computer user to another.
3. Digital Marketing
Digital marketing refers to the management and execution of marketing activities by using digital electronic
technologies and channels like digital TV, E-mails, web, wireless media and digital data concerning consumer
behavior and its attributes.
4. E-marketing
E-marketing is the achievement of marketing goals through the utilization of the Internet and the web based
technologies. E-marketing is also known as Internet marketing or marketing on the web or online marketing.
5. E-Advertisement
Online advertising is a marketing strategy that make use of Internet to fetch website traffic and target, deliver
marketing related information (in the form of messages) to the right customers.
6. Directory Services
Directories are new online advertising mechanism that helps in representing business functionalities. These
functionalities are represented in the index format that list and supplies links to the websites.
T - - ' .......... .... ‘ . ", '
C LEARNING OBJECTIVES )
»
After learning this unit, a student will have thorough understanding about the following key concepts,
❖ Types of E-commerce
E-business performs business activities such as designing of products, operating supply chain, managing
marketing and providing services through the use of electronic technology. The E-business can be divided
into six types i.e., business-to-business, business-to-consumer, consumer-to-business, consumer-to-consumer
Govt, to business and Govt, to consumer. When goods or services are purchased and sold through networks
like Internet then it is termed as E-commerce, which facilitates the companies to promote their sales inter-
f- nationally. It is even possible to carryout E-marketing globally across the world with the help of electronic
methods.
A business model involves basic process flow and linkages of various business functions. Information and
communication technology. Internet and World Wide Web (WWW) has a wide range of applications for
various business activities like E-auctions, E-banking, E-directories, E-manufacturing, E-govemance, etc.
In today’s competitive world of globalization, business is expanding quickly around the world without any
global regulations either at national or international level as well as delivery of products electronically has
become a competitive issue.
part-a
B
Q1. Define E-commerce.
E-commerce
SHORT QUESTIONS WITH SOLUT
OR
Model Paper-ll, Q1
E-commerce or electronic commerce is simply an ‘online business’ wherein the buying and selling of products and
services are carried out through Internet. It comprises of both the Business-to-Business (B2B) and Business-to-Consumer
(B2C) transactions. „.
In addition to buying and selling,'e-commerce also helps in marketing and servicing, as well as delivery and payment
of products through Internet, Extranets, Intranets or some other networks._______________________________________
02. What are the key components of E-commerce?
OR
Key Components of E-commerce
Answer : Sep./Oct.-15, Q1
The components of E-commerce vary based on the business and role of E-commerce in it. Generally, there are three
basic components of E-commerce. They are as follows.
1. Systematic Approach Requirement
To conduct business, a systematic approach is needed. Just.like traditional commerce, e- commerce should also deal
with all aspects of business. Some of these aspects are research and planning, operation and selling, customer service
marketing, budgeting and human resource management. Among all, some of them are performed using internet and
other electronic means.
2. Business Type
Even though e-commerce is treated as a special type of business but still it comes under the category of a business.
Just like any other traditional business, e-commerce businesses have been classified into different kinds. They are,
❖ Business- to-business e-commerce
❖ Business-to-consumer e-commerce
❖ Consumers-to-consumer e-commerce
❖ Consumpr-to-business e-commerce
❖ Govt, to Business
❖ Govt, to consumer
❖ Non-business e-commerce
❖ Intra-organizational e-commerce.
Thcf classification of e-commerce can also be done on the basis of products or services provided by businesses.
There are certain E-commerce businesses that sell concrete products like clothes, electronic devices etc. Whereas,
the other e-commerce business sells abstract products like reservations, e-leaming, etc.
-3____ Technology
A company in e-commerce can achieve its goals efficiently and effectively by making use of technologies for
conducting business. Hence, a company must always prefer to use latest technologies through which they can satisfy.
_____ the customer needs in the best possible ways. This intum will lead to the growth of the company...... ~~______ .
Q3. Write about World Wide Web. Model Paper-in, Q6
OR
WWW
Answer : March/April-15, Q2
The World Wide Web (WWW) or the web is a repository of information spread all over the world and linked together.
The WWW has a unique combination of flexibility, portability and user-friendly features that distinguish it from other
services provided by the Internet.
The WWW project was initiated by CERN (European Laboratory for Particle Physics) to create a system to handle
distributed resources necessary for scientific research. The WWW today is a distributed client-server service, in which a
client using a browser can access a service using a server. However, the service provided is distributed over many locations
called websites.
SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD. ______---------------------
UNIT-1 : Introduction 3
Internet is a massive world wide collection of networks connecting set of subnetwork and computing resources
which are located on these subnetworks. The growth of Internet is increasing drastically because.
1. It have no geographical bond.
2. It helps the user in finding out the required information within few minutes.
Internet came into existence in 1969 with the name ARPANET. It links together military, scientific, academic
researches into a single network. Due to the constant growth, the management of ARPANET became difficult. Later on
different networks such as USENET, BITNET, NSFNET came into existence.
The emergence of WWW had positive impact on many IT based organizations. These organizations were able to carryout
their transactions and operations online with no difficulty. Because of these potential benefits, WWW can be considered as a
mean for conducting many E-commerce based applications such as E-Marketing, E-Advertising and E-Banking.
Q5. What is Internet? Oct./Nov./16, Q6
OR
Internet
Answer : (March/April-12, Q1 | March-11, Q1)
It is the network of networks, the Internet is massive, worldwide collection of networks connecting many subnetworks
and computing information resources located on these subnetworks, including devices such as computers, servers and
directories. As a “network’, it provides a capability for communication to take place between research institutions, government
agencies, businesses, educational institutions, individuals and among all ‘Internet citizens’.
Q6. Define E-business. (Model Paper-n, Q6 i Oct./Nov.-12, Q7)
OR
E-Business
Answer : March/April-16, Q1
E-business involve carrying of business activities such as designing of products, operating supply chain, marketing
products and providing services to stakeholder using electronic technology. Under E-business, traditional business practices
and information system are integrated with World Wide Web (WWW).
Through E-business several online operations can be carried out such as,
(i) Buying and selling of goods and services.
(ii) Providing customer service.
(iii) z Providing E-leaming facilities
(iv) Joining with different partners to work together.
Q7. What are the limitations of E-commerce?
OR
Limitations of E-commerce
Answer : Oct/Nov.-13, Q7
Q8. What are the benefits of E-commerce to Organization, Consumers and Society? Model Paper-m, qi
OR
Benefits of E-commerce.
Answer : Oct.-14, Q6
Answer^: Oct./Nov.-H, Q2
Web plays an important role in providing required functionalities to e-commerce. It consists of various technologies
and concepts such as hypertext publishing, universal reader and client server concepts.
Hypertext publishing provides a mean of accessing and retrieving information online without taking into consideration
the environmental boundaries. Hypertext publishing in a simple way can be defined as a primary application of web that
concentrates on hypermedia. It is Eco-friendly and does not require storage space.
Q10. Write a short note on Search Engine.
Answer :
Search engine is defined as a technique of finding data according to the user typed query without being concerned
about its location. Search engines are replacing WAIS broadband search engines because of their highly developed and
complex behaviour. It is being used through web browsers. They provide minute to minute updated information.
Example
Topic is a search engine that is basically used in Lotus Notes, Adobe Acrobat applications. The searching done by
employing Topic Search engine is done using both keywords and information. The result of this search is a hit-list arranged
according to the preference assigned by the search engine.
SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD. --------------- -- -----
UNIT-1 : Introduction 5
OR
E-banking
Answer : (March/April-15, Q7 | March/April-13, Q1)
Electronic banking is an Internet-based banking process in which users are allowed to connect to the legitimate
websites of their respective bank. Once the connection has been established, the users can use the banking services by
using their user ID and password virtually from their home location. Therefore, E-banking is also known as home banking,
virtual banking and online banking. The major advantage of E-banking is that, it provides convenient and safe form of
anywhere, anytime banking. However, due to wide usage of internet, there is a risk that the confidential information being
transferred can be intercepted by an intruder. Hence, it is necessary to ensure that the security is not compromised. For
this reason, many financial institutions have adopted many security methods such as providing passwords, verifying the
customer’s authentication, etc.
Q12. Define E-learning.
OR
E-Learning
Answer : (March/April-17, Q1 | March/April-14, Q1)
Education, training or knowledge management achieved through the content delivered via Internet is known as
E-leaming. It comprises of all electronically supported and web-enabled systems that allow access to the information to
anyone, anytime and anywhere. E-leaming is highly efficient for both training and teaching purposes. Hence, it has been
adopted by many world class universities and organizations.
Q13. List the applications of E-commerce.
Answer : Oct./Nov.-12, Q2
E-shopping or online shopping is a new form of shopping which enables the customers to purchase their desired
product from intended seller over the Internet. It can also be referred as E-store, web store or virtual store.
The advantages of E-shopping are,
1. Customer can carryout shopping irrespective of time and location
2. Customer need not visit the store thereby saving time and effort.
3. Online stores provide the customer with a link that helps them is gaining information regarding the product such as
instructions, safety procedures manufactures specification as well as image of product.
4. Customer can perform online price comparison prior purchasing the product.
OR
Online Trading
E-trading/online trading is also known as E-broking. E-broking provides up-to-date and on-time information about
the stock exchange prices to everyone across the world. People can respond to the changes taking place in the stock market
by the information provided by E-broking. People having Internet bank account can buy and sell stocks online.
Before the Internet came into existence, buying and selling stock at the correct time relied upon the availability of
eminent brokers. These brokers used to be in shortage. Small investors always used to face difficulty in getting a broker.
Apart from brokers, the other sources from where the information about stock prices can be obtained were magazines,
newspapers, telecommunications and radios. These sources are cost consuming, slow and less comprehensive compared
to Internet.
Answer: Oct./Nov.-16, qi
Online advertising is a marketing strategy that makes use of Internet to fetch website traffic and target, deliver
marketing related information (in the form of messages) to the right customers. This strategy provides quick promotion of
product information irrespective of geographical boundaries.
1. Push-based advertising
2. Pull-based advertising.
OR
Online Trading
E-trading/online trading is also known as E-broking. E-broking provides up-to-date and on-time information about
the stock exchange prices to everyone across the world. People can respond to the changes taking place in the stock market
by the information provided by E-broking. People having Internet bank account can buy and sell stocks online.
Before the Internet came into existence, buying and selling stock at the correct time relied upon the availability of
eminent brokers. These brokers used to be in shortage. Small investors always used to face difficulty in getting a broker.
Apart from brokers, the other sources from where the information about stock prices can be obtained were magazines,
newspapers, telecommunications and radios. These sources are cost consuming, slow and less comprehensive compared
to Internet.
Answer: Oct./Nov.-16, Qi
Online advertising is a marketing strategy that makes use of Internet to fetch website traffic and target, deliver
marketing related information (in the form of messages) to the right customers. This strategy provides quick promotion of
product information irrespective of geographical boundaries.
1. Push-based advertising
2. Pull-based advertising.
PART-B
ESSAY QUESTIONS WITH SOLUTIONS
■ i .......................... . ............. — ■
OR
E-commerce
E-commerce or electronic commerce is simply an ‘online business’ wherein the buying and selling of products and
services are carried out through internet. It comprises of both the Business-to-Business (B2B) and Business-to-Consumer
(B2C) transactions.
In addition to buying and selling, e-commerce also helps in marketing and servicing, as well as delivery and payment
of products through internet, extranets, intranets or some other networks.
1. Communication Perspective
F.-commerce can be defined as the process of delivering products, services, information or payments through computer
networks or any other electronic medium.
2. Commercial Perspective
E-commerce can be defined as the process of buying and selling products, services and information through Internet
or any other online service.
3. Service Perspective
E-commerce is defined as a tool for dealing with the desires of government firms, management and consumers. Their
desire is to reduce the service cost, improve customer service quality, and increase service delivery speed.
E-commerce is defined as a process that performs electronic business through electronic networks.
5. Collaborative Perspective
E-commerce is defined as a framework that collaborates both the inter and intra organizations.
6. Community Perspective
E-commerce is defined as a place where all the community members can gather, learn, transact and collaborate.
OR
Answer :
Importance of E-Commerce
Widespread adoption of computerization in society are making businesses to become electronic. The following are
the significances of E-commerce.
E-commerce has drastically reduced the time required for creating and processing a business transaction. Additionally,
E-commerce avoids several errors like duplication of records and also reduces data entry and re-entry work. This
results in the improvement of overall productivity.
From the earlier experience of E-commerce adopters, a research has shown that using E-commerce in business has
resulted in 5% to 10% cost savings. This saving is due to quick and efficient communication and closer access to
markets and customers.
Computerizing and streamlining business processes involves further reduction in costs. If inventories are automated,
then business can use internet to share information like point-of-sale data and it can be used for forecasting sales.
An important advantage of E-commerce is that there is a direct and better communication with customers. The
feedback and suggestions of customers can be known quickly and respective changes in the product can be made.
Moreover, E-commerce allows customers to shop for 24 x 7 from any part of the world.
Since E-business is done over internet, it has access to a broad range of customers from several parts of the world.
Therefore, there is a greater chance of business expansion.
ffi’ addition to the above benefits, E-commerce also improves profit margins by automating supply chain managements.
We can efficiently forecast the needs of customers. Labour costs can be drastically reduced. Therefore, it can said
that E-commerce in the current business world has a greatest significance.
Q19. What are the three pillars of E-commerce? March/Aprii-15, Q9(a)
OR
1. Electronic information
2. Electronic relationship
3. Electronic transactions.
The electronic information pillar is about storing information. This pillar is constructed by assigning the information
in such a way that it is easily understood by the users. Before constructing the electronic pillar, the following rules need
to be considered.
(i) The content must be in web-readable format.
(ii) The webpage containing the required information should not hang up.
(iii) The links provided in the web page must navigate to correct location.
(iv) The user must easily find the necessary information.
2. Electronic Relationships
The central pillar i.e., electronic relationship pillar specify the way of constructing a web site such that a user viewing
the web site must revisit the same site in a positive manner. This pillar concentrates on establishing relationship with the
user in an electronic form. This relationship can be maintained if the constructed website consists of the following features.
(i) The website must be innovative and must contain certain new features that attracts the users.
(ii) The website must create forms for enabling the user to provide their valuable feedback.
(iii) This website must provide information and include interaction facility.
3. Electronic Transaction
The electronic transaction pillar is the third pillar which specifies the following two criteria.
(i) Ability to engage in meaningfill and sufficient negotiation process.
(ii) Ability to provide security of transaction data.
Traditional value chain shows the way of passing information between the suppliers and the customers in a sequential
manner. In this chain, the input/output are provided to the supplier at the back stage. That is, the information regarding
suppliers input/output are not revealed to the customer. Moreover, the input/output related to the customer are supplied
at the front end stage. This flow of information from supplier to customer is done via different processes such as inbond
logistics production and outbond logistics.
The major drawback of the value chain is that it fails to establish strong relationship between firm, cashier and
supplier.
Supplier
In this chain, it is very important that a supplier (who acts as a customer to another supplier) share its procurement
system with the information system of its supplier. This is required so that the supplier receives similar information that is
provided by him to his own customer.
OR
What are the benefits of E-commerce to the organization, consumer and society? Oct./Nov.-11, Q9(a)
OR
The revolution in e-commerce is same as the revolution in industries. The reasons being,
❖ Nature of technology.
❖ Reachable to millions of people within short span of time.
❖ Rapid growth in supporting infrastructures.
These three reasons mainly result in potential benefits to,
1. Organizations
2. Consumers
3. Society.
1. Benefits to Organization
The market place is expanded from a small region, town, city to national and international level. This makes the
companies to quickly and easily locate, best suppliers, most suitable business partners and more customers, with a
minimum investment. For expansions of market place, e-commerce provides a number of sites where companies
can even request for manufacturing of a subsystem.
The cost of creating, processing, distributing, storing and retrieving paper-based information is reduced due to the
introduction of e-procurement system.
(c) Creating Specialized Businesses
E-commerce helps the organizations in creating specialized businesses. An example is the website for purchasing
cat toys “www.cattoys.com”. In physical world, cat toys can be purchased at departmental or gallery stores, thus
incurring the cost of travelling to buy a toy.
(d) Reduction in Inventories and Overheads
“Pull” - type supply chain management offered by e-commerce helps in the reduction of inventories and overheads.
The pull-type system uses just-in-time manufacturing. The implementors of a pull-type system achieves expensive
services and customization of products. For example Dell Computer Corporation.
(e) Reduction in Time
The time between the outlay of capital and the receipt of products and services is reduced by e-commerce.
(f) initiating Business Process Reengineering Projects
Reengineering business projects was initiated by e-commerce. Because it helps in increasing productivity of sales
people, administrators and knowledge workers by at least 100% more.
(g) Reduction in Communication Cost
Air pollution and traffic on roads are reduced by doing shopping at home. E-commerce also enables customer to
work from home.
(b) Increase in Standard of Living
*.
Few merchandise are sold at a lower price so that customers from any urban/rural area can buy them and increase
their standard of living.
(c) Delivery of Public Services
Public services are delivered by using e-commerce at a cheaper rate but with improved quality. These services
include education, distribution of government social services, health-care etc.
Q22. Explain the global information distribution networks.
Global information distribution network is a new way of interconnecting different networks that cross various countries
and continents. The two technologies that are included in GIDN are,
1. Fiber optic long distance network
2. Satellite network.
1. Long Distance Network
This technology is used for establishing connection between the components bearing longer distance from each other.
This connection is made using coaxial or fiber cables which are owned by inter exchange carriers. Among these cables,
fibre cablets mostly preferred for carrying out international transmission. A part from this, submarine cables can even be
used for enabling transmission, when there is requirement for high communication capacity.
Whenever connection is to be established locally, the interexchange carriers are used. These carriers are getting
enhanced so as to reduce the cost and increase the transmission speed.
The different communication technologies used in US for serving long distance connectivity include, AT and T.
MCT, WilTel and LiTel telecommunication. The major objective of long distance carrier is to concentrate on acquiring
wireless technologies for performing the transmission. Using these technologies, it is possible to connect multiple cellular
users and also to develop a reasonable, local area network for reaching their own subscribers.
2. Satellite Network
A combination of nodes used for providing communication from one point to another point on the earth is called
satellite network. A node can be a satellite, an end-user terminal or an earth station. The reason why artificial satellites are
used instead of natural satellites (such as moon which can be used in the network as a relaying node) is that, if the signal
losses its energy during-its traversal, then it can be regenerated by installing certain electronic equipments on the satellite
which is not possible in case of natural satellites. Also, natural satellite is not preferable because of its long distance from
the earth which causes long delay in communication.
...... ... ............................................. SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD.
14 E-COMMERCE
The satellite networks are similar to that of cellular networks in which the planets are divided into cells. The satellites
provide the capability of transmission to and from any part on the earth irrespective of its remote location. Because of this,
even the undeveloped locations of the world can take the advantage of high-quality communication without investing on
ground base infrastructure.
Satellite Elevation Categories
These satellites are confined in the altitude range of (500 km to 1500 km). These are also referred to as Non-Geo-
Stationary Orbit (NGSO) satellites. These are operated in the frequency range of 1 GHz to 2.5 GHz. The main
advantage of LEO satellites is low value of path loss. Since, the LEO satellites are near to the earth, the distance
between this is low, hence the loss between the earth stations and space vehicles is very low compared to that of the
other high altitude orbit satellites.
Due to the less path loss, the specifications of the system like transmitting power, antenna size, weight are also
required to be less. The orbiting period of LEO satellites is above 90 minutes. These satellites are generally used
for communication purposes. For example, Motorola’s satellite based mobile telephone system called Iridium is a
LEO system. It has 67 satellites (forming a constellation) and it orbits approximately at 480 miles above the earth’s
surface.
(ii) Medium Earth Orbit or MEO Satellites
MEO satellites are at an altitude range of 6000 miles to 12000 miles. These are also called as Intermediate Circular
Orbit (ICO) because they are present in the space above the LEO satellites and below the GEO satellites. The orbital
period of MEO satellites is 2 to 24 hours.
These orbits are used for satellites that can serve for navigation applications, such as the Global Position System (GPS).
Examples
These orbits are above the equator, because they are parallel to it and are also called as equatorial orbits.
These are mostly circular in shape. The GEO satellites are at an altitude of 36000 km and above. The orbital period
of GEO satellites is same as that of the earth which is 24 hours.
These are used for communication purposes, climate conditions and study purposes. These.satellites appear to be
stationary, thus they alw'ays point a particular earth station. So, there is no necessity to adjust them from time to
time. They operate at the frequency range of 2 GHz to 18 GHz and are capable of covering large areas of earth’s
surface compared to LEO and MEO. But, the power involved is very high and also incur high path loss.
Examples
Internet is a massive world wide collection of networks connecting set of subnetwork and computing resources
which are located on these subnetworks. The growth of Internet is increasing drastically because.
1. It have no geographical bond.
2. It helps the user in finding out the required information within few minutes.
Internet came into existence in 1969 with the name ARPANET. It links together military, scientific, academic
researches into a single network. Due to the constant growth, the management of ARPANET became difficult. Later on
different networks such as USENET, BITNET, NSFNET came into existence.
These networks were dedicated to be used by academic community, but were later used by commercial organizations
as well.
With the advent of Internet, the business can now appear globally and make many international clients around the
world. The Internet has come up with various business models belonging to e-commerce. These business models utilize
the privileges facilitated by the Internet capabilities which include communication, community building etc. Moreover,
e-commerce make use of Internet to perform on-line transactions.
The World Wide Web (WWW), or the web, is a repository of information spread all over the world and linked
together. The www has a unique combination of flexibility, portability and user-friendly features that distinguish it from
other services provided by the Internet.
The www project was initiated by CERN (European Laboratory for Particle Physics) to create a system to handle
distributed resources necessary for scientific research. The WWW today is a distributed client-server service, in which a
client using a browser can access a service using a server. However, the service provided is distributed over many locations
called websites.
The web consists of many web pages that incorporates text, graphics, sound, animation and other multimedia
components. These web pages are connected to one another by hypertext. In a hypertext environment, the information is
stored using the concept of pointers. Hypertext is a page linking system that connects the text present on one page with
the text on other pages. Inclusion of hypertext in the internet allowed the users to get to the related information with ease.
WWW uses a concept of HTTP which allows to communicate between a web browser and web server. The web pages can
be created by using HTML (Hyper Text Markup Language). This language has some commands which are used to inform
the browser about the way of displaying the text, graphics and multimedia files. HTML also has some commands through
which links can be provided to the web pages.
If a »ser wants to get a page from the web, he should type URL (Uniform Resource Locator) for the desired page,
or otherwise he must click on a link that provides the URL. The URL specifies the internet address of the web server, the
directory and name of the desired page. If there is no directory or web page specified, then the web server w ill provide a
default home page.
The WWW today is a distributed client-server service, in which a client using a browser can access a service using
a server.
The emergence of WWW had positive impact on many IT based organizations. These organizations were able to carryout
their transactions and operations online with no difficulty. Because of these potential benefits, WWW can be considered as a
mean for conducting many E-commerce based applications such as E-Marketing, E-Advertising and E-Banking.
’ A
Thus, both Internet and WWW together has made a huge change in the world of commerce by reducing the traditional
way of performing business activities. They allow easy access to information on wide variety of products. Also, they help
the companies to service their clients around the world. Thereby, facilitating a world wide connectivity between the clients
and the businesses. By performing on-line communication with their clients, they can significantly add extra value to the
existing products and services to increase the profit. Also by making research and study, the organizations can launch new
products, brands and services. Furthermore, the Internet radically reduces the expense of creating, sending and storing of
information with which the companies are able to reach the untouched potential customer.
------ SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD.
16 E-COMMERCE
Answer:
The limitations of e-commerce can be either of technical type or non-technical type.
Technical Limitations
The technical limitations of e-commerce are given below. However, they can be reduced by appropriate planning
and implementation.
(a) Lack of communication protocols, system security, standards and reliability is the first limitation of e-commerce.
(b) The telecommunication bandwidth is not sufficient as their is an increase in number of consumers.
(c) Evolution and changes in software development tools are very rapid.
(d) Integration of e-commerce and internet software with few existing applications and databases is very difficult.
(e) In addition to the network servers, vendors need some special infrastructure and web servers.
(f) Few e-commerce software are not compatible with few operating systems and hardware.
Non-technical Limitations
Security and privacy issues are very important in B2C type of e-commerce. Security issues are a big concern even
after using good encryption. Privacy measures are improving at a constant rate. However, convincing customers
about secure on-line transactions and privacy in shopping is little difficult. As per the survey, 17.2% voted for security
and privacy as major concern.
In order to justify the system, intangible benefits like good customer service and advertisement should be dealt
carefully and appropriately. The cost incurred in in-house e-commerce development may be high. The reason being,
lack of experience, which results in delays. The percentage given to justification and cost was 34.8%.
Terms like “paperless transactions”, “e-money”, “unknown/faceless sellers” are difficult to catch-up in market as
customers can’t easily trust on faceless sellers. Switching from physical stores to virtual stores is a very slow process.
4.4% people voted for lack of trust and user resistance as one of the major limitations of e-commerce.
Other Limitations
❖ Lack of feel and touch plays an important role in stopping customers to switch from physical to virtual stores.
❖ There is a rapid change and evolution in e-commerce. But, customers look for stable areas before entering into it.
❖ The number of sellers and buyers in few applications is very less. Thus, no chance for profitable e-commerce
operations.
1 ❖ Inconvenient and expensive internet access, resist most of the potential users from e-shopping.
$ SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD. ------- ---------
’bf' ■
UNIT-1 : Introduction 17
Q25. What are the challenges facing the growth and spread of e-commerce in India?
Answer :
Limitations on the Growth of E-commerce
The factors such as internet speed, overall infrastructure etc., have their impact on the growth of e-commerce in
India. E-commerce is associated with some major limitations that must be overcome for its full-fledge development. They
are as follows,
1. Lack of trust
2. High prices of PCs
3. Computer illiteracy
4. Younger generation
5. Government negligence
6. Inadequate infrastructure.
1. Lack of Trust
For any transaction in e-commerce, both buyers and sellers are unknown to each other and the transaction between
the two takes place via electronic devices. The customers are aware of the issues associated with online trading so,
they cannot afford to trust any online website unless the following issues are resolved.
(a) Security
(b) Privacy
(c) Authenticity.
(a) Security
This issue is concerned with the integrity and confidentiality of the information being transmitted.
(b) Privacy
This issue deals with the privacy of personal information obtained as a result of electronic transaction.
E.g: Credit card number.
(c) Authenticity
The authenticity is concerned about the verification of business, customers and services offered. The authenticity
is provided with the help of user name, IDs, passwords, secret numbers etc.
If security measures are properly implemented, privacy of the customer’s information is preserved and proper
authentication is provided, the trust of the customer towards the e-commerce will ultimately grow.
2. Hi(jh Prices of PCs
In India, the cost of an ordinary PC is so high that a common man cannot afford it, this is also a major cause for the
slow growth in e-commerce.
If the price of the computer is brought under the affordable range of Indian customers, the significant growth in
e-commerce will be evident.
3. Computer Illiteracy
Most of the people in India are e-commerce/computer illiterate. This illiteracy is also responsible for the slow
pace in e-commerce development. Even the people in the top positions (like managers) are striving to adapt to this
continuous development in the internet technology and e-commerce.
In order to be competitive with the people of other countries, Indian people must undergo an appropriate training
on the use of computers and e-commerce applications.
4. Younger Generation
The Indian generation that can quickly adapt to the newer technologies is the younger generation but, in order to
make e-commerce successful, matured and reliable decision makers are needed which is not the case in India. So,
it will take some more time for viewing the true face of e-commerce growth.
—------------- -------- ------------- ---------- SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD.
UNIT-1 : Introduction 17
Q25. What are the challenges facing the growth and spread of e-commerce in India?
Answer:
Limitations on the Growth of E-commerce
The factors such as internet speed, overall infrastructure etc., have their impact on the growth of e-commerce in
India. E-commerce is associated with some major limitations that must be overcome for its full-fledge development. They
are as follows,
1. Lack of trust
2. High prices of PCs
3. Computer illiteracy
4. Younger generation
5. Government negligence
6. Inadequate infrastructure.
1. Lack of Trust
For any transaction in e-commerce, both buyers and sellers are unknown to each other and the transaction between
the two takes place via electronic devices. The customers are aware of the issues associated with online trading so,
they cannot afford to trust any online website unless the following issues are resolved.
(a) Security
(b) Privacy
(c) Authenticity. <
(a) Security
This issue is concerned with the integrity and confidentiality of the information being transmitted.
(b) Privacy
This issue deals with the privacy of personal information obtained as a result of electronic transaction.
E.g: Credit card number.
(c) Authenticity
The authenticity is concerned about the verification of business, customers and services offered. The authenticity
is provided with the help of user name, IDs, passwords, secret numbers etc.
If security measures are properly implemented, privacy of the customer’s information is preserved and proper
authentication is provided, the trust of the customer towards the e-commerce will ultimately grow.
2. Hi^h Prices of PCs
In India, the cost of an ordinary PC is so high that a common man cannot afford it, this is also a major cause for the
slow growth in e-commerce.
If the price of the computer is brought under the affordable range of Indian customers, the significant growth in
e-commerce will be evident.
3. Computer Illiteracy
Most of the people in India are e-commerce/computer illiterate. This illiteracy is also responsible for the slow
pace in e-commerce development. Even the people in the top positions (like managers) are striving to adapt to this
continuous development in the internet technology and e-commerce.
In order to be competitive with the people of other countries, Indian people must undergo an appropriate training
on the use of computers and e-commerce applications.
4. Younger Generation
The Indian generation that can quickly adapt to the newer technologies is the younger generation but, in order to
make e-commerce successful, matured and reliable decision makers are needed which is not the case in India. So,
it will take some more time for viewing the true face of e-commerce growth.
-------- ---- ------ - —______ SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD.
18 E-COMMERCE
5. Government Negligence
One more reason for the slow growth in e-commerce is the government’s negligence in implementing mandatory
rules and regulations. Since the taxation of e-commerce transactions has not yet been fully controlled, any step taken
by the government in this regard may have severe impact on the future of e-commerce.
If the rules and regulations laid down by the government are properly implemented and businesses follow those rules,
the e-commerce will view a rapid growth.
6. Inadequate Infrastructure
The infrastructure needed for the successful e-commerce transaction is not yet available. The introduction of broadband
networks have brought some hope to e-commerce development but, they are not fully implemented as a medium for
net access. This is also a major limitation in the growth of e-commerce. Significant changes or improvements have
to be made on broadband networks and other distribution media for providing a dominant access to the internet.
These improvements include the transmission speed, downloading capability, wider coverage etc.
If the above improvements are accomplished then, the success of e-commerce in India will be assured.
E-business
E-business involves carrying out of business activities such as designing of products, operating supply chain, mar
keting products and providing services to stakeholder using electronic technology. Under e-business, traditional business
practices and information system are integrated with World Wide Web (WWW).
Through e-business, several online operations can be carried out such as,
1. Buying and selling of goods and services.
2. Providing customer service.
3. Providing e-leaming facilities.
4. Joining with different partners towork together.
This type of business is used by different organization for the following reasons,
(i) Business Efficiency
Most of the companies use e-business because it is capable of providing efficiency in production and distribution.
There can be increase in efficiency throughout, from purchasing goods to servicing the customer.
(ii) transaction Management
Using e-business, the customers and suppliers are brought together, which will decrease the transaction cost of
purchasing. This kind of business is also a solution for the problem of time and distance.
(iii) Reaching New Markets and Segments
As e-business is based on internet, it helps in exploring different markets across the globe without any physical
presence.
(iv) A Better Customer Relationship
The data collected through internet help organizations in targeting right customers and providing them, their product
and services.
To perform e-business, the following four distinct phases must be carried out.
(a) Implement a website that will help the respective organization in online buying and selling of products and services.
(b) Link multiple suppliers with enterprise by use of extranets and intranets. This will make the supply chain
management processes online.
(c) The organization must find partners to deal with content, marketing and commerce.
(d) The convergence will then result in new product and services.
SB/A PUBLISHERS AND DISTRIBUTORS PVT. LTD. - ------ .-----------------------------------------
UNIT-1 : Introduction 19
Answer:
1. E-commerce is mainly concerned about purchasing and selling of products and services over internet using electronic
medium. The traditional or physical commerce involves a direct contact between the buyers and the sellers. For an
instance, if customers want to purchase some commoditiesthen, they need to directly approach a departmental store,
order goods, make payment and take the goods to home whereas in the pure e-commerce systems, if a customer
wishing to purchase a game offered by some software company then instead of making a direct approach to the
company, he/she can browse the company’s website to locate desired game and download it by paying via electronic
means such as credit cards, debit cards, e-checks, e-cash etc.
2. Although the traditional commerce systems and e-commerce systems follow different approaches, there are some
instances where both works concurrently. For example, with the existence of multiple online shopping stores, the
customer can purchase his/her daily commodities by sitting comfortably at his/her residence with just a click on
their mouse and the products are delivered to their doorsteps. In such a case, the payment is made electronically
while the products are delivered physically.
3. The study conducted by Schneider and Perry revealed that, e-commerce proves to be much feasible for the standard
products, low-value products, intangible products and digital products while, the traditional commerce is feasible
for nonstandard products, highly expensive products, very low-value products and perishable products. However,
e-commerce and traditional commerce must be combined when dealing with non-standard services and complex
products.
4. In traditional commerce, customers can verify the identity of the seller and their physical location whereas in
e-commerce, customers feel insecure because they cannot identify the seller and are also unaware of their physical
business location.
5. The face-to-face contact offered by traditional commerce is truly uncomparable in terms of convincing the customers.
6. In traditional commerce, the potential customers can directly get feedback about the merchant from other customers
whereas, in e-commerce, the feedback is posted by the company personnel themselves which may or may not be
correct.
7. Traditional commerce involves all the payments to be made in cash. Thus, customers do not need to worry about
transaction privacy whereas, the e-commerce transactions require customers to give their personal information.
Q28.. Distinguish between E-commerce and E-business.
E-business E-commerce
1. It focuses on customer services, collaboration of 1. It focuses on buying and selling products, services
partners, distributors and suppliers, with buying selling on internet.
and information exchange as its primary focus.
2. More generic than e-commerce. 2. Less generic than e-business.
3. It supports the business processes along the entire value 3. The support is only for buying and selling products,
chain. information exchange.
4. It enables companies to efficiently and flexibly link 4. Such a linking does not exist in e-commerce.
their back-office (internal) and front-office (external)
processes.
5. It places the key processes like CRM, SCM and ERP 5. CRM, SCM and ERP are not included in the selling
on web. process of e-commerce.
6. The scope of e-business is wider than e-commerce. 6. Its scope is limited.
Q29. Write about the major features of E-commerce and how is it different from E-Business.
Shopping (or) exchanging business data over web can be done 24 hours a day and 7 days a week. This is offered by
e-commerce to its consumer so that they can shop (or) do other transactions from any location at anytime.
2. Global Reach
The market place is expanded from a small region, town, city to national and international level in a cost-effective
and user-friendly environment.
3. Richness
E-commerce enables the use of text, video and audio to be delivered by the merchant to its consumers. This makes
the communication more attractive from the user’s point of view.
4. Reduced Costs
At the merchant’s point of view, the cost of creating, processing, distributing, storing and retrieving paper based
information is reduced. At the consumer’s point of view, the cost of products and services offered by e-commerce
to its customers is very less compared to other vendors.
5. Personalization and Customization
The data can be customized with the interests and past purchases of the individual customers. This helps in
understanding the user’s needs quickly.
6. Universal Standards
Unlike traditional e-commerce which carry different standards at different nations, e-commerce carry universal
standards that are shared globally.
Differences Between E-commerce and E-business
OR
What is the impact of E-commerce on business models? (Model Paper-n, Q9(b) | Oct./Nov.-16,09(b))
OR
E-commerce is a mean of carrying out business activities in such a way that the firms value chain is greatly effected
in positive manner. Generally, a management learning is required for viewing the market place by, crossing the physical
boundaries of the organization prior to the implementation of e-commerce application. However, it is very much essential
to innovate e-commerce application in accordance to business context, which would otherwise result in the failure of these
applications. Therefore, certain business models are to be developed, which have the capacity of integrating e-commerce
application with the overall business goals.
SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD. __—-----------
UNIT-1 : Introduction 21
Aligning Business Goals and E-commerce Strategy
The strategy of e-commerce must be laid in such a way that is very easy for a business organization to achieve
the predefined goals. The goals can mostly be effected because of certain environmental change such as arrival of new
competitors in the market and business trends. Therefore, it is necessary to have a strong relationship between the goals
of the organization and plan of web-based e-commerce. This relationship is illustrated in the following figure.
>
^formation, Communication, Transaction and Distribution (ICDT) model is the fundamental model developed by
Albert-Angehm for specifying the strategy of business. This model is based on the following virtual spaces.
1. Information virtual space
2. Distribution virtual space
3. Transaction virtual space
4. Communication virtual space.
1. Virtual Information Space
This space of an organization contains information regarding the company, their products and services. Inorder to
enter into virtual market place, it is necessary to initially enter this space. The major concern to be considered here are,
(i) Only accurate and up-to-date information must be displayed.
(ii) Only authorized users should be given privilege of accessing the information.
(iii) Customers must find the required site without any difficulty.
(iv) Customers must not be allowed to have longer waiting time for accessing the website.
In this type of e-commerce, transactions related to products or services are exchanged among organizations and
their employees. Here, the aim is to increase the productivity of employee with respect to their personal use. These
systems treat their employees as customers. With such systems, the organizations get their work done in a productive
way while minimizing the cost. An example of B2E system is training employees over intranets.
6. Non-business E-commerce
In contrast to other types of e-commerce, non-business e-commerce involves small scale organizations for carrying
out all the transactions.
7. Intra-organizational E-commerce
In this type of electronic commerce, various organizations make use of Internet services for conducting transactions.
1.
5 APPLICATIONS OF E-COMMERCE
Q32. Explain about the E-commerce applications. (March/April-12, Q9(a) | March-11, Q9(b»
OR
E-commerce Applications
1. Multimedia Content
Multimedia content is the most important element of E-commerce applications. The word multimedia itself specifies
that it is a combination of more than one media. In other words, combination of various kinds of information like graphics,
text, audio, video etc., is called multimedia. Accessing of multimedia content is based on the hardware capabilities of the
customer. In addition to it, a variety of multimedia content and the type of packaging used are the important factors for the
success of E-commerce applications.
Multimedia
Z -----1
z" 1
1
X.
X
Response
Request
( Presentation^ ( Multimedia X
X. logic / content J
Video servers are the fourth element of E-commerce applications. E-commerce applications involving transmission
of digital video information, require different processing methods like,
1. Telecommunicating method
2. Video conferencing method.
For storing large amounts of video information, some special devices are required. These devices are called video
servers. The main function of video server is that it acts as an interface between the information provider and transport
provider. The information can be available in multiple forms like entertainment information, multimedia related information
etc., and the transmission can be done through cable wires, wireless networks, etc.
The main advantage of video servers architecture over client server architecture is that the video servers have the
ability to transmit information to several people at the same time with the help of telecommunication or cable devices /
networks.
These providers include both long distance and local telephone lines. These providers only provide telephone line
services for transmission of information. It employs a technique called ‘Asymmetric Digital Subscriber Line’ (ADSL)
which cannot handle live transmissions and fails to display pictures clearly.
These providers provide only cable services for transmission of information through fibre optic coaxial cables.
These providers are used only to provide on-line services for transmission of information.
These providers are used exclusively for providing cellular and radio services for transmitting information.
Consumer access device'is the sixth element of E-commerce applications. This element focuses on two important
processes,
(i) Different types of customers.
1. Personal as well as Mobile Devices for Customers for Audio and Video Information: Examples of personal devices
are work stations, multimedia, personal computers etc. Examples of mobile devices are laptop device, note book
computers etc.
4. Pen Based Devices / Voice Driven Devices I Software Agents: For customers of PDA information.
SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD. -... .
UNIT-1 : Introduction 27
Voice
T
Systems that consist of both hardware and software are called multimedia servers. These servers are used for,
(i) Converting any irrelevant information into relevant information and distributing the information in such a way that
it can be accessed by users at any time and from any place.
(ii) Hand lines information of different formats like image audio, video etc.
(iii) Creating and modifying of multimedia documents.
(iv) Storing and retrieving multimedia documents.
(v) Sending as well as receiving multimedia documents.
For making an application interactive, a multimedia server must do the following,
(i) Handle large number of users simultaneously
(ii) Deliver the desired information to the customers at affordable costs.
Answer :
The different E-commerce organization applications are,
1. Variations in business environment
2. Marketing
3. Inventory Management
4. Supply Chain Management
5. Electronic Commerce and retail industry
1. Variations in Business Environment
Most of the companies today are adopting various ways to improve their business. Instead of working with the same
business partners, they are looking for new business partners to extend or globalise their business. The most surprising
thing is that companies are looking for business partners not only within their own fields but also in the other fields.
Most of the companies are forced to change their marketing strategies due to various pressures on the business. The
most common marketing strategies that are in use by various companies are,
(i) Target Marketing
(ii) Relationship Marketing
(iii) Event Marketing.
(i) Target Marketing
A marketing strategy where companies advertise their product in selected segments of the market for only a limited
set of people.
(ii) Relationship Marketing
It is a strategy where companies advertise their product in a selected market in such a way that a good relationship
is built up and maintained with their customers.
(iii) Event Marketing
A marketing strategy where companies are not interested in targeting any set of people or establishing any relationship
with them. In this strategy, companies advertise their product into the market in such a way that if people are interested,
they can buy the product.
One marketing strategy that can be used by various companies and is much better than the existing marketing
strategies is called interactive marketing. In this type of marketing strategy, companies can advertise their product to the
peopl^ by providing special graphics to the product with the help of multimedia like giving a logo to the product.
3. Inventory Management
In order to get globalized, companies are looking to try out various business methods. One business method used
by many companies for globalization is inventory management.
This method is known by different names in various industries. For instance,
(i) In manufacturing industry, inventory management is known as JIT (Just In Time) inventory systems.
(ii) In retail industry, inventory management method is known as Quick Response (QR) retailing systems.
(i) Just in Time ( JIT )
These systems can be defined as a collection of various management practices used by different production systems.
The working of JIT systems is based on two important laws,
(a) Removing unnecessary materials, devices required for production and avoid wastage of time in manufacturing
of products.
(b) Providing good working conditions to the workers of the different management practices. JIT Purchasing is
the most widely used management practice which helps in establishing a good relationship between suppliers
and customers.
SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD.
UNIT-1 : Introduction 29
(ii) Quick Response (QR) Systems
These systems are the advanced versions of JIT purchasing management practices. Whenever someone goes to a
shop and wants to purchase a particular item and he is informed that item is not available, it leads to frustration of
the customer and embarrassment to the shopkeeper.
In order to avoid getting embarrassed again in front of the customer, retailers use special type of systems called quick
response or QR systems. QR systems provide a network between customers, shopkeepers/retailers and vendors. So,
whenever customer wants to purchase a product, the vendors will be asking to the retailers whether there are any
new requirements from the customers side to be fulfilled.
4. Supply Chain Management
There were various disadvantages of using inventory management methods like JIT and Quick Response systems
which include,
(i) Cost of using these systems was very high.
(ii) These systems were not ideal for those companies where suppliers take a long time in delivering the products.
In order to overcome these drawbacks, a special type of management chain was used called as Supply Chain
Management.
This management system established a chain/link between partners (internal as well as external) involved in
supplying and processing the products so that the manufacturers get their desired raw materials and customers get their
desired products.
There are mainly seven different types/functions of supply chain management,
(i) Supplier Management
(ii) Inventory Management
(iii) Distribution Management
(iv) Channel Management
(v) Payment Management
(vi) Financial Management
(vii) Sales force Productivity.
5. Electronic Commerce and Retail Industry
There has been a lot of changes in the economy system of the retail industry. Customers are expecting a lot more from
their retailers. For instance, improved quality of products, more products at lower costs. As a result, retailers are looking
for suppliers from outside the country in order to decrease the cost of the product. One more reason is that the labour costs
outside the country are more cheaper.
Q34. Discuss the key factors affecting online entertainment industry.
Answer :
Online Entertainment Industry
The major sources of online entertainment are generally the music downloads, online games, films and sports. But
this does not make the customers to spend more time on music sites, because they usually download the music and store
it for the future. However, the usage of those sites that allow high participation and control of the customers is quite high.
Further, new versions of non-traditional entertainment are defined by the customers in the absence of TV and film on
the site. These versions do not include the traditional media, which consists of blogs and user-generated content on social
networking sites.
2. Content
There have been wide alterations in the packaging, distribution, marketing and sales of music tracks with the
introduction of the Internet. That is the users can search for any song in the online digital searchable music archives and
can mix one another so as to produce their own personalized library. Due to this service, the users are capable of creating
their own music packages and distributing them. Hence the online entertainment provides high control to the users over
program content as well as program focus.
Marketing model is used by most of the television and movie sites in order to publicize their products and for
increasing the number of customers. In case ofApple’s La-carte model, the customer can only pay for the downloading of
single music track which lead to an unexpected success. Furthermore, pay-per-view rental model and pay-for-download
model are used by most of the film sites which are also quite successful.
4. Convergence
The convergence in entertainment industry has been very slow because of technological and market forces. That is,
music systems have been converged from PC’s to handheld devices such as ipads and ipods etc. The PC’s behave as game
station competing with dedicated game stations. And on the other hand, most of the dedicated game stations are connected
with the web for the purpose of interactive play.
Answer:
Online Marketing
Online marketing is the achievement of marketing goals through the utilization of the internet and the web based
technologies. Online marketing is also known as internet marketing or marketing on the web. It is a part of e-business or
e-commerce. The Internet marketing has changed the way of working, buying and living of the people. It involves the
exchange of products, services, information and payments through the electronic medium of networks.
E-market is a virtual online market wherein, large number of buyers, suppliers, traders, sellers interact with each other
so as to perform information exchange. They try to build up a relationship with one another through content aggregation
created by different suppliers and member communications which are supported by collaboration tools. The major advantage
of e-rjfarket is that, it reduces the inefficiency by tightly coupling the relationship among customers and vendors and even
by increasing the reach of suppliers.
All the above services are generally needed by the trading members. All the operations of markets are carried out at
a single point referred to as trading hub. This hub is responsible for gathering relevant information from different suppliers
and then processing it in such a way that it becomes useful to all buyers.
2. Internet.
SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD. ...... .... , .
UNIT-1 : Introduction 31
..................................... ............................. - , ........ ................... — —.................. — —............................ ———---------
1. Commercial Online Services
Online services such as American online, CompuServe and Prodigy offer marketing services to subscribers that
pay a monthly fee. These services also provide information on education, sport, entertainment, shopping and the latest
international news.
2. Internet
This is a vast international network, connecting other computer networks as well as companies, universities, libraries
and so on. With the introduction of the world wide web, the usage of the internet increased very rapidly. The use of the
Internet itself is free. Users only need to pay for the services of a commercial provider that enables the user to access the
Internet.
Online Advertising
Online advertising is a marketing strategy that makes use of Internet to fetch website traffic and target, deliver
marketing related information (in the form of messaj. ) to the right customers. This strategy provides quick promotion of
product information irrespective of geographical boundaries.
1. Push-based advertising
2. Pull-based advertising.
1. Push-based Advertising
It is also known as active advertising. Push-based advertising is the most inefficient type of advertising. This is
because its does not convey relevant information to customers. In short it can be said that information sent through this
advertising is meaningless.
This is the first type of push-based advertising. Through broadcast advertising, different companies can advertise
their products to unlimited number of customers. One of the ways by which broadcast advertising can be done is
by using television. Doing broadcast advertising with television has benefits and drawbacks.
^The benefit is companies through television can visually explain the importance of their products.
Using television for advertising is expensive. The time duration allotted for showing advertisements on television
is usually thirty sec. Hence in such short span of time, customers cannot get the complete idea about the product.
Thus, product advertisement has to be displayed at periodic intervals of times in order to understand the customer.
To display the add more than once requires a lot of cost.
Another way in which companies can do broadcast advertising is by using news groups. In other words, company
can advertise their products through news groups.
This is the second type of push-based advertising. Direct mail advertising is the process in which companies advertise
their products by sending mails to different customers. The benefits of this advertising technique are,
(i) Through direct mail advertising, companies can target only those customers who seems interested in buying
their products.
(ii) Companies can send the product information in their own way. In other words, companies have full control
over presentation of the message.
SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD.
W kUUl IU wuu a V^aozi a i—-»~-_i_ u a ok op po
This type of online advertising is also called as passive advertising. Companies by using pull-based advertising can
have a better customer response than through push-based advertising. This is because with the help of pull-based advertising
paradigm, a feedback loop which directly connects a company and customer is established thereby providing meaningful
information to the customers.
Pull-based advertising can be classified into three types or forms,
(a) Bill board advertising
(b) Advertising through yellow pages
(c) Advertising through endorsements.
(a) Bill Board Advertising
This is the first type of pull-based advertising. It is also known as world wide web advertising. In this type of
advertising, one company has to take the help of other company for promotion of its products online. In other words,
one company promotes its products through other company’s online services.
Advantages
Disadvantage
Most of the customers don’t browse through one site for a long period of time. They constantly switch from one
site to another. So the product information provided by the company should be in such a format that it is simple and
short so that the customers can easily understand.
(b) Advertising through Yellow Pages or Yellow Pages Advertising
In this type of pull-based advertising, companies can promote their products by using yellow pages directory services.
Advantages
In this type of pull-based advertising, companies ask different celebrities, famous personalities, etc., to promote
their products. But in case of online endorsement advertising, a company asks the customers to give feedback for
its products. In other words company ask the customers to endorse its products.
Advertising on Internet has its own advantages and disadvantages. The advantages of advertising over
internet are,
(i) Through Internet advertising, companies can promote their products more efficiently.
(ii) By advertising through Internet, companies can satisfy the needs of different customers.
(iii) Customers get to know about the latest products available in the market.
(iv) Income of companies will increase as a result of advertising on Internet.
»
The disadvantages of advertising over Internet are,
(i) Customers sometimes receive unwanted messages in their mailbox.
(ii) No specific rules have been defined till date that describe how advertising should be done.
(i) E-banking
Answer :
(i) E-Banking
Electronic banking is an Internet-based banking process in which users are allowed to connect to the legitimate
websites of their respective bank. Once the connection has been established, the users can use the banking services virtually
from their home location. Therefore, E-banking is also known as home banking, virtual banking and online banking. The
major advantage of E-banking is that, it provides convenient and safe form of anywhere, anytime banking. However, due
to wide usage of internet, there is a risk that the confidential information being transferred be intercepted by an intruder.
Hence, it is necessary to ensure that the security is not compromised. For this reason, many financial institutions have
adopted many security methods such as providing passwords, verifying the customer’s authentication, etc.
(ii) M-Commerce ,
X
Mobile commerce or M-commerce refers to any business activity or transaction that is done through mobile devices
which are connected to wireless networks. Here, the mobile or wireless devices like cell phones, Personal Digital Assistants
(PDAs), tablet PCs, laptops etc., are used. All these devices are required to have internet connection via the wireless networks
like GSM, CDMA, GPRS etc. The internet connectivity provided by these networks can be used to access information
stored on several providers and web servers.
Limitations of M-Commerce
(i) Mobile devices are battery operated handheld devices with limited hardware and software capability.
(ii) They have a small microprocessor, which cannot perform heavy computations.
(iii) They offer a small screen whose resolution is less and hence rich user experience like web browsing is not possible
on mobile devices.
(iv) Due to less computing power, they cannot run complex application and encryption services.
(v) The wireless networks provide limited bandwidth which is insufficient for supporting multimedia and other advanced
m-commerce applications. However, with the advent of 3G networks, the bandwidth of wireless networks has
improved a lot.
(vi) Mobile devices cannot fully handle HTML. Hence, to support web in mobile devices, two different standards were
developed (by two different organization), they are Wireless Mark up Language (WML) and CHTML needs to be
used.
Q37. Explain the applications of mobile commerce.
Applications of M-commerce
M-commerce applications were introduced in order to serve time critical services. These applications enable the
users to accomplish their tasks more efficiently. Some of the M-commerce applications and services are given below,
1. Location-based Services
M-commerce helps the user in determining the location of nearby restaurants, food courts, ATMs, Petrol pumps,
theatres etc., using certain applications like zomato, smarter agents. Along with the locations, the user is also provided
with a map showing the way to reach the desired location.
2. Banking and Financial Services
With the emergence of M-commerce, several banks have become participants of mobile banking wherein, a user
can check his/her account balance, transfer amount, pay utility bills etc., via a cell phone.
3. Advertisement Over a Mobile
The mobile service providers have a complete record of their subscriber’s locations, their age, name, games and
other services they frequently use on their cell phones. This information is very essential for marketers. It helps
them to find millions of potential customers with an ease. Mobile marketing will certainly result in higher success
rate if done at the right time and in the right way.
4. Entertainment
Now-a-days, mobile phones serve as a portable platform for entertainment with their ability to play videos, audio,
3D games, movies etc. The service providers offer different forms of digital games, music, ringtones, news clips,
weather reports, mobile TV etc., with a minimal surcharge. Therefore, many companies are developing and selling
it mobile compatible softwares and games.
5. Mobile Brokerage
M-commerce enables the subscriber to have up-to-date information regarding the marketing developments irrespective
of physical location.
6. Mobile Purchase
M-commerce enables the customer to perform their shopping online irrespective of the time and location.
1.5.4 E-Trading, E-Learning, E-Shopping
Q38. Discuss in brief about online trading.
Answer:
E-trading/Online Trading
E-trading/online trading is also known as E-broking. E-broking provides up-to-date and on-time information about
the stock prices to everyone across the world. People can respond to the changes taking place in the stock market by the
information provided by E-broking. People having Internet bank account, can buy and sell stocks online.
SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD. -. ---------- .
UNIT-1 : Introduction 35
Before the Internet came into existence, buying and Apart from students, e-training application is even
selling stock at the correct time relied upon the availability employed in many business-oriented organizations, where in
of eminent brokers. These brokers used to be in shortage. the higher level management spend large amount of money
Small investors always used to face difficulty in getting a in engaging their employees in using internet-based training
broker. A part from brokers, the other sources from where programmers. This training provides the employees with
the information about stock prices can be obtained were complete knowledge about the newer enhanced technology.
magazines, newspapers, telecommunications and radios. The software technologies of e-training made it possible
These sources are cost consuming, slow and less compre for educator, administrator and learning service provider in
hensive compared to Internet. creating, launching and evaluating the process of learning
over Internet using the student Internet browser. Before
Online-trading/E-trading is the best solution to the
selecting this learning management system, it is necessary
requirements of investors. All the problems which investors
to ensure that the system is capable of offering a wide range
used to face before the introduction on Internet will be sorted
of features and can update and build the site with advanced
out by E-trading.
educational features.
Advantages
The following are the two primary models of
1. The transaction cost is reduced by carrying out auto e-training using which instructions are delivered.
mating process.
(i) Asynchronous model
2. The transactions are executed quickly since there is
(ii) Synchronous model.
no paper work document involved.
(i) Asynchronous
3. The market efficiency is increased since there is a
possibility of achieving greater liquidity i.e., more In this type of model, the instruction is self-directed
number of buyers and sellers. and self-paced.
4. The information regarding the price is transparent i.e., Example
the user can have information regarding price of the
E-mail, Newsgroup, Webforums (bulletein boards).
stock, currencies etc., which was opaque earlier.
(ii) Synchronous Model
5. The level ofcompletion has increased to maximum level.
In this type of model, an instructor is provided that
Q39. Discuss in detail about,
trains the user in understanding the required concept.
(a) E-training
Example
(b) E-shopping.
ChatRooms, ShareWhiteBoards, Teleconferencing,
OR Video Conferencing.
Explain about E-Shopping? List out the Advantages
advantages and disadvantages of it.
1. There is no travel costs.
(Refer Only Topic: E-Shopping)
Answer : March/April-16, Q9(b) 2. There is no time spent commuting to class.
3. The user can learn at his/her own convenience location.
(a) E-training
4. It reduces the cost ofboth provider and organization
E-training is an application provided by e-commerce that require training.
and is defined as any where, any time training delivered
over the Internet. It is an effordable and easy-to-use 5. It is effective for learners who are shy and language
learning management system based on Internet. Learning challenged.
management system provides a trainer who is responsible Disadvantages
for monitoring the student’s participation and for calculating
student’s performance. The purpose of providing this 1. The instructor needs to be an effective online
application is to help students in, instructor.
(i) Accessing the knowledge remotely. 2. It consumes huge amount of instructors time when
individual feedback is required.
(ii) Making immediate assessment of their
understanding. 3. It requires students and providers to have prior
knowledge about the technologies and equipments
(iii) Providing peer-guidance. being used.
SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD.
36 E-COMMERCE
(b) E-shopping
E-shopping or online shopping is a new form of shopping which enables the customer to purchase their desired
product from intended seller over the Internet. It can also be referred as E-store, web store, virtual store.
Advantages
Answer :
E-learning
Education, training, or knowledge management achieved through the content delivered via the Internet is known as
E-leaming. It comprises of all electronically supported and web-enabled systems that allow access to the information to
anyone, anytime and anywhere. E-leaming is highly efficient for both training and teaching purposes, hence, it has been
adopted by many world class universities and organizations.
Benefits of E-learning
It cuts down the amount of time required for teaching or training purposes to almost half.
f-
2. Large Volume and Diversity
It can offer training to a large number of employees with different cultural and educational backgrounds at the same
time, even if they are at different geographical locations in different time zones.
3. Reduction in Expenses
When used as an alternative to classroom lectures, E-leaming reduces the total expenditure on the education to SO
TO percent.
4. Higher Content Retention
In contrast to the students that opt for traditional classroom learning, the student’s of e-leaming retain the content
of the course upto 60% more. This is because, such students are self-initiated and self-paced and their motive for
obtaining more knowledge could be to increase their scope of view, or enhance career skills.
5. Flexibility
It offers a high level of flexibility to the students in learning, as it allows them to choose the time, locations, content
and speed of learning according to their convenience.
OR
What are the different approaches of E-learning?
Answer: Oct./Nov.-13, Q9(t>)
E-learning Approaches
There are many pedagogical approaches which are used for creating content that can be used for performing.
1. Computer based learning.
2. Computer based training
3. Technology based learning.
----------------- SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD.
38 E-COMMERCE
Pedagogical Approaches
The content for e-leaming can be gathered by performing social meeting where in discussion can be made regarding
the required concept. This approach is generally used by different online communities like forums, wiki articles,
blogs etc.
2. Laurillord’s Conversational Approach
This approach is used for conducting higher learning processes in which the student can practically observe the
world. General conclusion even can acknowledge other peoples experiences. The content creation for e-leaming via
this approach is done using message boards and forums. Wherein users unite themselves to share their knowledge
and information.
3. The Cognitive Perspective Approach
This is a new approach that concentrates on the working of a human brain that is how learner’s brain work is considered
as an effective tool for gathering, conceptualizing, organizing the information. This way helps in creation of home
lessons and other type of e-leaming content.
4. The Emotional Perspective Approach
This approach gives importance to name learners as it focuses on emotional factors like, fun, motivation and
memorability.
INTERNAL ASSESSMENT
I. Multiple Choice
1. is a goal of e-commerce. [ 1
(a) B2B
(b) B2C
(c) C2C
(d) B2E
5. ________ e-commerce involves small scale organizations for carrying out all transactions.
(a) B2C
(b) B2E
(c) Non-business
(d) Intra-organizational
(b) E-shopping
(c) E-leaming
X-
(d) All the above
4. In_________ chain, the information system of respective firm links all the phases of the process together.
7. Education, training or knowledge management achieved through the content delivered via the Internet is known as
10. _________ e-commerce involves retail-based transaction exchange among organizations and customers where
organization acts as retailer.
KEY
I. Multiple Choice
1. (d)
2. (b)
3- (a)
4. (a)
5- (c)
6. (d)
7. (a)
8- (b)
9. (a)
10. (b)
2. Electronic information
3. Traditional value
6. Mobile commerce
7. E-leaming
8. E-trading
9. E-banking
10. Business-to-consumer
Answer :
The central pillar i.e., electronic relationship pillar specify the way of constructing a web site such that a user viewing
the web site must revisit the same site in a positive manner. This pillar concentrates on establishing relationship with the
user in an electronic form.
Answer :
The authenticity is concerned about the verification of business, customers and services offered. The authenticity is
provided with the help of user name, IDs, passwords, secret numbers etc.
Answer :
Relationship marketing is a strategy where companies advertise their product in a selected market in such a way
that a good relationship is built up and maintained with their customers.
Answer :
Online advertising is a marketing strategy that makes use of Internet to fetch website traffic and target, deliver
marketing related information (in the form of messages) to the right customers. This strategy provides quick promotion of
product information irrespective of geographical boundaries.
Answer :
This type of online advertising is also called as passive advertising. Companies by using pull-based advertising can
have a better customer response than push-based advertising.
2 FRAMEWORK OF E-COMMERCE
c LEARNING OBJECTIVES J
After learning this unit, a student will have thorough understanding about the following key concepts,
C INTRODUCTION )
data repository, communication protocols and computer languages. Some of the functionalities in this
framework are application services, brokerage services, interface and support layers and middleware
services. Each of these services have their own significance. For instance, the application services
determine the type of E-commerce application to be implemented. Whereas, the brokerage services and
data management govern and manage massive amount of data on Internet. Since data is transferred over
the Internet, it is necessary to carry out this transmission in a secured manner. This can be done using
different security protocols like FTP, SMTP and HTTP. Apart from this, there are various messaging
protocols which are used for performing data transfer. One way of ensuring data security is through the
concept of encryption. Encryption ensures that the data being transferred is in the form of cipher text
that cannot be intercepted by any intruder. The various encryption techniques include symmetric and
asymmetric techniques.
' ■■ . .■ •■■ ■ V
» ...................................
SHORT QUESTIONS WITH SOLUTIONS
Q1. List the types of application services in e-commerce.
OR
Application Services (March/April-15, Q6 | March/April-13, Q7)
I
Answer :
The different types of e-commerce applications available are as follows,
1. Business-to-business e-commerce
2. Business-to-consumer e-commerce
3. Consumer-to-business e-commerce
4. Consumer-to-consumer e-commerce
5. Business-to-employee e-commerce
6. Non-business e-commerce
7, Intra-organizational e-commerce.
Q2. Write about interface and support services. Model Paper-i, Q2
OR
Interface layers.
Answer : March/April-16, Q2
The functions of this layer is to provide interface for e-commerce applications which include,
(i) Interactive Catalogs
These are the customized interfaces for applications such as web based shopping. They are an extension to the
paper-based catalogs which possess additional characteristics like graphics and video for making the advertisement
much attractive.
(ii) Directory Support Services
Directory services help the user in searching and accessing the information by making data appear as local irrespective
of its remote locations. They usually work in the background and try to manage the huge amount of information and
transaction that are generated to ease electronic commerce.
The basic difference among interactive catalogs and directory services is that the former handles the people, whereas
the latter interacts directly with software applications.
Q3. Write a short note on web security.
OR
Web Security
Answer : Oct./Nov.-13, Q6
Web security services ensure reliable and secure electronic transmission or communication. There may be several
web security issues.
1. Auditing
2. Authentication
3. Authorization
4. Confidentially
5. Non-repudiation
6. Availability
7. Integrity.
Slia PUBLISHERS AND DISTRIBUTORS PVT. LTD. -
UNIT-2 : Framework of E-Commerce 45
Q4. What is HTML? Oct./Nov.-16, Q7 HTTP transaction consists of the following stages,
OR
❖ Connection: The client establishes a connection with
HTML March/April-15, Q5
the web server.
Answer :
HTML stands for HyperText Markup Language and ❖ Request: The client sends a request message to the
is immensely used in developing web pages. Here the word web server.
“markup” in real sense refers to highlighted instance of a
❖ Response: The web server sends a response (for
given aspect i.e., an author can highlight a particular word
example, HTML document) to the client.
of his written document to grab attention of readers. In the
similar way, the Hyper Text Markup Language highlights ❖ Close: The connection is closed by the web server.
different views of a given web page in terms of headers,
titles, plain text, images, sounds etc. Q7. Write a short note on S-HTTP.
It does these things by taking into consideration its OR
numerous inbuilt tags. A tag is nothing but a special keyword
supported by HTML, inscribed under gulliments “<” t “>”. S-HTTP
Q5. What is the TCP/IP reference model?
Answer : March/April-13, Q2
Model Paper-ll, Q2
Transport layer
FTP stands for File Transfer Protocol. It is a standard
Internet layer
protocol used to exchange files over internet. FTP runs on
Host-to-network layer port 21 i.e., the client establishes a TCP connection on port
number 21 of the server machine. It has been developed for
Figure: TCP/IP Reference Model the client/server architecture wherein the FTP server allows
Q6. What is HTTP? Model Paper-Ill, Q7 people located at remote locations over the internet to login
and download the required files located on the FTP sever.
OR
HTTP. FTP operates in two modes, active or passive modes.
Answer : (March/April-12, Q2 | March-11, Q2) In active mode, the client sends the IP address along with the
port number on which the client listen, to the server machine
HTTP is a stateless protocol that is used for delivering
the web pages over the Internet. It defines how clients which then establishes the TCP connection. In passive mode,
and server communicate. Moreover, it even provides the the client can’t accept the incoming TCP connection as it is
structures of the communication. It generally follows the behind the firewall. Here, the IP address and port number
request-response paradigm wherein the client sends a request are received in response to the PASV command sent by the
and the server acknowledge with a response. client to the server machine.
___________ SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD.
46 E-COMMERCE
OR
SMTP March/April-14, Q3
Answer :
SMTP is a simple ASCII protocol. After establishing the TCP connection to port 25, the sending machine (operating
as the client) waits for the receiving machine (operating as the server) to respond.
The server starts by sending a line of text giving its identity and telling whether or not it is prepared to receive
mail. If it is not, the client releases the connection and tries again later. If the server is willing to accept e-mail, the client
announces from whom the e-mail is coming and to whom it is going. If such a recipient exists at the destination, the server
gives the client the go-ahead message. Then the client sends the message and the server acknowledges it. Checksums are
generally not needed because TCP provides a reliable byte-stream.
When all the e-mails have been exchanged in both directions, the connection is released. The exchange of mail using
TCP/IP is performed by a Message Transfer Agent (MTA). Users normally do not deal with MTA. The system administrator
is responsible to set-up the local MTA.
Q10. What is menat by NNTP?
OR
NNTP
Answer : (Oct.-14, Q2 | Sep./Oct.-15, Q2)
NNTP stands for “Network News Transfer Protocol”. It is an application protocol that uses reliable stream like TCP
for distributing, retrieving and posting news articles on web. The main idea behind designing this protocol is, to store news
article on single server host'and allow subscribers residing on the network of other host to read it by establishing reliable
connection. NNTP uses interactive mechanism in order to make decision regarding the transmission.
Q11. Define Encryption. Model Paper-n, Q7
OR
Encryption. (March/April-13, Q6 | March/April-17, Q6)
Answer :
Encryption
Encryption is a method of converting plain text into cipher text. Using this method, security of data can be achieved
effectively. An encrypted file can be decrypted if the user has the capability of accessing a secret key or password. In this
context, unencrypted data is referred to as plain text whereas encrypted data is referred to as cipher text.
Secret key C= E (KT)
|k
P Encryption
Plain text Cipher text
Algorithm
Input Transmitted
A digital signature is one of the methods of encryption used to provide authentication. The main idea of the digital
signature is to protect the message or data from modifications. Digital signature is very popular in the world of network
security. Basically, it is a kind of asymmetric cryptography used to support the security properties of a handwritten signature
on paper. The digital signature scheme provides two algorithms where one algorithm is for signing, which requires the
user’s secret or private-key, and the other algorithm is for verifying signatures which requires the user’s public-key. The
result of the signature process is called the “digital signature”.
SIIA PUBLISHERS AND DISTRIBUTORS PVT. LTD. ..... ... .........
UNIT-2 : Framework of E-Commerce 47
OR
OR
Answer :
Architectural Framework of E-Commerce
Architectural framework of E-commerce is a combination of different available resources such as DBMS, data
repository, communication protocols and computer languages. These resources allow the unification of data and software,
for generation of superior applications.
1. Application services.
5. Middleware services.
1. Application Services
This layer of framework determines the type of E-commerce application which is to be implemented. The different
types of ^commerce applications available are as follows,
For remaining answer refer Unit-I, Page No. 22, Q.No. 31.
It is an information handling layer of the framework that governs and manages huge amounts of data on the network.
It acts as a broker, or mediator that offers service integration between customers and information providers when provided
with some constraints like, low price, fast service, or profit maximization for a client. For instance, a customer looking to
purchase a specific book from the web goes through the sites of different publications. But, for this he/she wdll have to be
aware of the URL’s of these sites. In addition, the customer has to feed the details of the book repeatedly on different sites
to search the services at best prices. However, if the customer finds an information brokerage site which can provide the
book as per the need, then huge amount of time and effort is saved.
(ii) It offers tools to achieve much better, updates for future-compensating transactions.
__________ __ _—..... 5IIA PUBLISHERS AND DISTRIBUTORS PVT. LTD.
48 _________________ ' _______ E-COMMERCE
3. Interface and Support Layers 6. Network Infrastructure of Basic Communication
Services
The functions of this layer is to provide interface for
e-commerce applications which include, This layer of the framework is responsible for
(i) Interactive Catalogs providing a network infrastructure that creates an effective
and efficient linkage between the customer and the supplier.
These are the customized interfaces for applications Initially, telephone companies were the medium of creating
such as web based shopping. They are an extension the computer networks. But, advancements in computer
to the paper-based catalogs which possess additional connections led to the development of centrally-controlled
characteristics like graphics and video for making the single connection model known as circuit-switching.
advertisement much attractive.
But, this was not suitable in case of large networks,
(ii) Directory Support Services
hence another technique was introduced in the Internet which
Directory services help the user in searching and could send data efficiently across large networks and was
accessing the information by making data from any known as packet switching.
server to appear as local file. They usually work in
the background and try to manage the huge amount Q14. What are the different middleware services?
of information and transactions that are generated to
Answer : March/April-13, QlO(b)
ease electronic commerce.
The basic difference among interactive catalogs Middleware Services
and directory services is that the former handles the
For answer refer Unit-II, Page No. 48, Q.No. 13,
people, whereas the latter interacts directly with software
Topic: Middle Ware Services.
applications.
4. Secure Messaging and Structured Document Documents of Middle Ware Services
Interchange Services
The different documents of middleware services are,
This layer of the framework deals with the secure
transmission of messages by using an appropriate messaging 1. Structured documents
system. The messaging systems usually used in transmission 2. Compound documents.
of messages are fax, post, courier and phone. However, none
of these is totally dependable and expectedly fast. This is 1. Structured Document
because, anything can go wrong in their transmission and
these mechanisms consume time, depending on the distance This type of digital documents are more flexible than
between the source and destination. Therefore, enhanced the image documents. The reason is, they focus on different
electronic messaging systems like e-mail, enhanced fax document formats like audio, video etc.
and Electronic Data Interchange (EDI) are adopted in this Apart from this, structured documents have a solution
layer to overcome this problem. The primary advantages of
for documents whose content is too long and difficult to
using these systems are security, privacy and confidentiality,
understand. Structured documents use a technique called
which ar£ obtained by using encryption and authentication Table of Contents (TOC). It categorizes the book into various
techniques.
chapters, subtopics of the chapters, along with their page
Furthermore, this messaging systems are a form numbers. This makes searching of particular information
of structural documents which consist of the automated easy. Similar procedure is followed for different document
interchange of standardized and approved messages between formats.
computer applications.
Standards
5. Middle Ware Services
Different standards used in structured document are,
This layer of the framework is very important as it
brings together the different components of the architecture (i) SGML
such as, networks systems, software programs and acts as
a mediator among them to make them communicate with (ii) HTML.
each other. Also, these services shift the computing from
(i) SGML
application centric to data centric. The advantage with this
shift is that the application can be controlled by the remote The full form of SGML is Standard Generalized
data in the network instead of applications controlling the Markup Language. This standard is only used for text
data. based documents because,
5IIA PUBLISHERS AND DISTRIBUTORS PVT. LTD. ______ ___ ______ ■ __ —
UNIT-2 : Framework of E-Commerce 49
❖ It defines how these documents can be Q15. Explain the applications of information technol
transmitted properly. ogy infrastructure.
Answer : March/April-15, Q10(b)
❖ It defines how text based documents can be
formatted more than once. Information technology is considered as the backbone
of e-commerce. It mainly relates to the authorization and
In addition to this, SGML also describes the verification of the identities of all its associated merchants
structure of text documents. This standard and customers. If a problem arises with respect to security
was developed by ISO (International Standards and authentication, it uses second-site mirroring system
Organization). with increase in the development of e-commerce, advanced
(ii) HTML multimedia with high security including firewalls,
encryptions and decryptions.
HTML stands for Hypertext Markup Language. This Applications of IT Infrastructure Services
standard was created under W3C consortium. HTML
standard is mainly used for documents like hypertext, ❖ They are needed to manage network services for
multimedia etc. uninterrupted communications over the organization.
❖ They provide standards for various components such
2. Compound Documents
as operating system, data, hardware etc., of the IT
Compound documents consist of data structures architecture.
that include data types like text, audio and video. This ❖ They provide help and support services.
document is a collection of user interfaces. This interface
❖ They provide services related to security and disaster
helps in creating single integrated perceptual environment.
recovery of the business and applications.
Compound documents also create application environment
by defining program object so as to interlink and interact ❖ They are required to provide multimedia support for
with users. various operations such as video conferencing.
❖ They can implement security services including di
Standards
saster management for individual business units of
Different standards used in compound documents are, the infrastructure.
❖ They manage messaging services associated with a
(i) Object Linking and Embedding (OLE)
group, business-unit (or) entire organization.
(ii) OPEN DOC. ❖ They can enforce certain architecture for the organiza
(i) Object Linking and Embedding (OLE) tion.
OLE is a technology that integrates several 2.2 SITE SECURITY - FIREWALLS AND
applications and multimedia data types within an NETWORK SECURITY
active document framework. It was developed on Q16. Discuss the security issues faced by
top of DDE which is a technique of Interprocess e-commerce site. Model Paper-I, Q10(a)
Communications (IPC). Here various applications are OR
allowed to interact with each other during execution.
Explain the security services of E-commerce.
But, the links between applications were found to be
easily disconnected while moving a file or updating Oct.-14, Q10(b)
(ii) OPEN DOC Explain the issues related to security, when us
ing Web. March/Aprll-16, Q10(b)
OpenDoc contains document parts as its basic OR
building blocks. Here, each document part comprises
Explain about the various issues involved in
of data. The data can be,
web security.
❖ Text containing characters. Answer : Sep./Oct.-15, Qio(b)
❖ Spreadsheet containing spread sheet cells with Web security services ensure reliable and secure
formulas. electronic transmission or communication. There may be
several web security issues. The major security issues faced
❖ Multimedia containing digitized videos. by e-commerce site are,
SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD.
50 E-COMMERCE
1. Auditing
According to e-commerce, it refers to the process of gathering information about usage of privileges, accessing of
specific resources, performing of security actions etc. It helps in re-development of particular actions taken and also
lets the IT personnel to determine the actions performed by the person or program.
2. Authentication
The process wherein two entities can verify each other to know that they are the only users who claim to be called
authentication. This ensures different types of users that their transaction or data will be secured.
In e-commerce content, it ensures the web page viewer that the site is not fraudulent and the sender is a correct
person etc. It is carried out through some types of credentials like, password, smart card and signature.
3. Authorization
It is the process of ensuring a person or a program that they have right to access particular resources. It is determined
by comparing access control information associated with the resource being accessed with a person or a program
information.
4. Confidentiality
Confidentiality refers to the process of protecting the data being transmitted, from all types of passive-attacks. In case
of the release of message contents, higher levels of protection can be provided. All the data which is transmitting
between the two systems for some specific period of time can be protected in case of broader forms of this service.
For example, in case of virtual connection between the two systems, any user data is prevented from its release over
the virtual circuit. Confidentiality can also be applied in a narrower form which protects a single message or some
fields within the message but this approach is more complex and expensive to implement.
5. Non-repudiation
This provides protection against the denial by one of the entities involved in communication. Thus, once a message
is sent, the receiver assures that the message was sent by an intended sender and upon reception, the sender assures
that the message is received by the correct receiver.
6. Availability
The availability can be significantly affected by a variety of attacks which are susceptible to authentication, encryption,
etc., whereas some attacks require physical action for preventing and recovering from the loss of availability.
7. Integrity
Integrity can be applied to a single message within a stream or to an entire stream. It can also be applied to some
specific fields within a message. Two types of integrity services are available,
(i) Connection-oriented integrity service
(ii) Connectionless integrity service.
A^connection-oriented integrity service is concerned with the message streams. It ensures that the messages are
received in the order in which they are sent with no alterations, insertions, deletions, duplications, reordering or replays.
It also deals with the destruction of data. Hence, it attends to both message-stream modification and denial of service.
A connectionless integrity service tackles only the individual messages irrespective of any context thereby providing
protection against the message alterations only.
An integrity service can be applied with or without recovery. As these services are related to active-attacks, the
major concern is to detect them rather than preventing them. If the integrity is violated and detected, then the service must
simply notify its violation and find out the ways of recovering from it.
Q17. Discuss in detail about firewalls.
Answer :
A firewall can be viewed as an information security program located at a network gateway server. It protects the
confidential information present in the network against attacks or by other insecure networks. It acts as a barrier that
allows only the authorized network traffic to pass through and stops the unauthorized traffic. In simple terms, firewalls are
designed to function either as a filter or as a security device. It is installed on a system so as to prevent the unauthorized
users to access the secure networks. In case of mobiles, firewalls use secure procedures and authentication keys to allow
remote access into the secure network.
SIIA PUBLISHERS AND DISTRIBUTORS PVT. LTD. ..
UNIT-2 : Framework of E-Commerce 51
Most organizations use firewalls to protect their private networks and communication facilities. These organizations
develop firewall programs that include features like remote logging and reporting, computerized alarms and a graphical
user interface to control firewall. As most of the applications are placed on the internet, they are inherently insecure. This
can lead to mishandling of information that can be a risk to the organization. Therefore, to avoid such type of offensive
activities, organizations use firewall to protect a public network that is connected to an insecure network.
Firewall
1. Sometimes, the authorized users use their granted access permissions for doing malicious operations. In such situations,
the firewall stops functioning properly hence, cannot protect the network from such type of attacks.
2. Firewalls cannot fix the problems related to poorly designed security features.
3. Firewalls cannot prevent the attacks made on those packets that do not pass through them.
4. Firewall reduces its effectiveness if permissive rules (easy going) are frequently used during its configuration.
5. Firewall cannot stop the attacks made against the authorized networks when the network itself is insecure or faulty.
—————-----________ SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD.
52 E-COMMERCE
6. It is impossible for the firewalls to scan the malicious (iii) Network Security
code like incoming messages, attachment files etc.
Network security refers to the plans or arrangements
There are various operating systems and applications
made in the network infrastructure along with the various
present in the internal boundary network.
techniques used by the network administrator. This is done
7. When an internal user unknowingly interacts with for protecting network and its resources from unauthorized
an external attacker, then firewall does not protect access. As a result, the distributed systems were introduced
the internal network against the threats of an external that provide various networks and communication facilities
network. for transmitting data between two computers or between a
terminal user and a computer.
8. When the firewalls are configured incorrectly, they Need for Network Security
may block the incoming authorized users from
Network security is needed for the following reasons,
accessing the network resources. This may result in
huge losses. 1. It is basically needed to secure the network from at
tackers and hackers.
9. Huge costs are incurred in firewall installations.
2. It is needed to eliminate transmission delays.
Q18. Describe the terms, 3. It is needed to perform secure information transfer
by eliminating unwanted editings.
(i) Information security
4. It is needed to protect organization assets.
(ii) Computer security
5. . It is needed to protect the data from unintentionally
(iii) Network security and its need. or intentionally accessed by unauthorized users.
6. It protects the network against passive and active attacks.
Answer : . „
7. It is also required to prevent data from getting mis-
(i) Information Security sused.
8. It is also required to recover the system from failures
Information security refers to the process of protecting
and data losses by applying various policies and pro
data or information from unauthorized user and to allow
cedures.
legitimate users to access the data. Hence, it prevents the
data from unauthorized access, revelation, alteration or 9. It is also required to protect the data from threats
disruption. It usually deals with the confidentiality, integrity which occur due to change technology infrastructure.
and availability regardless of the existential form of the data. 10. It is also required to avoid modification, exploitation
and refusal of the network and resources.
The major changes in the information security
requirements occur before the advancement in the use of data 11. It is also required to deliver accurate data to its des
processing equipment. Security to the valuable information tination.
in any organization was provided either by physical or by 12. It is also required to protect the data against cyber
administrative means. An example of physical security is the crime.
usage of rugged filling cabinets along with the proper locking Q19. Write short notes on threats.
facility for preserving sensitive documents. An example of
Answer :
the administrative approach is personnel screening process
employed during recruitment process. Threats
A threat violates the security that arises upon the oc
(ii) Computer Security
currence of an event, action or a circumstance. It affects the
network security and causes damage to it. In short, a threat
It refers to the branch of computer science that
is an expected danger that may lead to vulnerability. The
describes the application of ‘secure’ behaviour on the
possible threats to network security are discussed as follows,
operation of computers. Hence, with the advancements
in computer science, the requirement for protecting and 1. Insecure Network Architecture
securing files and other useful information by using a variety A network which is not configured in a proper manner
of automated tools have become necessary. This type of becomes an easier entry point for intruders. When a
security is more prevalent in case of shared systems such trust-based local network opens an insecure connec
as time-sharing systems. Thus, the technique of employing tion, it ultimately causes someone to make use of this
a wide variety of tools for protecting data and preventing opportunity to enter the network in an unauthorized
hackers from accessing the data is called ‘computer security’. way.
SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD,- ........
UNIT-2 : Framework of E-Commerce 53
IP Internet layer
Figure (1): TCP/IP Reference Model
ARPANET SATNET Packet LAN
Host-to-network layer
1. Host-to-Network Layer radio
(a) FTP
FTP stands for File Transfer Protocol. It is a standard protocol used to exchange files over Internet. FTP runs on
port 21 i.e., the client establishes a TCP connection on port number 21 of the server machine. It has been developed for the
client/server architecture wherein the FTP server allows people located at remote locations over the Internet to login and
download the required files located on the FTP sever.
Objectives of FTP
The following are the main objectives of FTP.
(i) To transfer data in a reliable and efficient manner.
(ii) To allow sharing of files and other computer resources.
(iii) To permit implicit or indirect usage of remote computers.
(iv) To protect the users from the variations in the file storage systems.
FTP operates in two modes, active or passive modes. In active mode, the client sends the IP address along with the
port number on which the client listen, to the server machine which then establishes the TCP connection. In passive mode,
the client can’t accept the incoming TCP connection as it is behind the firewall. Here, the IP address and port number are
received in response to the PASV command sent by the client to the server machine.
Drawback
FTP is not a secure protocol. It is susceptible to spoof attacks, brute force attacks, packet sniffing, etc.
(b) HTTP
HTTP is a stateless protocol that is used for delivering the web pages over the Internet. It defines how clients and
server communicate. Moreover, it even provides the structures of the communication. It generally follows the request
response paradigm wherein the client sends a request and the server acknowledges with a response.
Stages
HTTP transaction consists c f the following stages,
❖ Connection: The client establishes a connection with the web server.
❖ Request: The client sends a request message to the web server.
❖ Response: The web server sends a response (for example, an HTML document) to the client.
❖ Close: The connection is closed by the web server.
Request line x
Header ine 1 x
Header ine k v
56 E-COMMERCE
Http Request
Example
GET/servlet/index.jsp HTTP/1.1
Host: www.sia.com
Connection : close
User-agent: Mozilla/5.0
Accept-language : en-us
The first line of HTTP request message is called the request line and the subsequent lines are called header lines till
a blank line. The request line has three fields separated by a space.
1. The method field also called request type indicates the action to be performed (GET, POST, DELETE, PUT>.
2. The URL field indicates the page to be accessed.
3. HEAD - Similar to GET, but forces the server to return only HTTP header instead of response data.
2007 09:27:02 GMT The server starts by sending a line of text giving its
identity and telling whether or not it is prepared to receive
body {data for the client} mail. If it is not, the client releases the connection and try
again later. If the server is willing to accept e-mail, the client
The first line of HTTP response message is called announces from whom the e-mail is coming and to whom it is
status line, /* Blank line does not store anything, hence it is going. If such a recipient exists at the destination, the server
blank or empty*/ the subsequent lines till the blank line are gives the client the go-ahead message. Then the client sends
called header lines. The entity body contains the requested the message and the server acknowledges it. Checksums are
object itself. The status line has three fields separated by generally not needed because TCP provides a reliable byte
space. stream.
1. The protocol version field (HTTP/1.1). When all the e-mails have been exchanged in both
directions, the connection is released. The exchange of mail
2. The status code which is a 3-digit integer result using TCP/IP is performed by a Message Transfer Agent
code indicates success or failure (200). (MTA). Users normally do not deal with MTA. The system
administrator is responsible to set-up the local MTA.
3. The phrase is intended to give a short textual
description of the status code, hence it is The SMTP protocol describes how two MTAs
intended for the human (OK). communicate with each other using a single TCP connection.
The SMTP standard is one of the most widely used upper
The first digit of the status code defines the class of layer protocols in the Internet Protocol Stack. As its name
'espouse. The last two digits do not have any categorization implies, it is a protocol that defines h.ow to transmit messages
rOl®. There are 5 values for the first digit. They are, (mail) between two users.
—■- ---------- SIA PUBLISHER^ANDDISTRIBUTORS PVT. LTD.
58 E-COMMERCE
It is a passive method, that enables a server to send 127 ■ 255 - 255 - 255
only those messages that are specified by client.
All the 8-bits are 1, therefore the decimal value is
Q26. State the security protocols. Discuss. 255. To determine any byte value, subtract that zero position
March/April-15, Q10(a) value from 255.
OR .'. For class A, the ‘0’ bit is in 27 position
Explain security protocols. .-. 27= 128 =>255- 128= 127
Answer : (March/April-12, Q10(b) | March/April-17, 010(b)) => 127.255.255.255
The different security protocols include, But 127 network address is reserved for loop back
(i) FTP test.
For answer refer Unit-II, Page No. 55, Q.No. 22(a). .'.Class A maximum network address is
126.255.255.255
(ii) HTTP
.'.Range of class A network addresses are
For answer refer Unit-II, Page No. 55, Q.No. 22(b). 1.0.0.0......126.255.255.255
——————- - ___ _ SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD.
'<■» si
E-COMMERCE
60 ___
Class B Network Address
In this addressing method, 2 bytes are reserved for a network address and 2 bytes are reserved for a host address.
■<— 2 byte x 2 bytes ->■
Net id Host id
In this network address, 3 bytes are reserved for net id and 1 byte for host id. The first 3 bits are reserved as 110.
----- 3------ X----- 1------ >-
110 Net id Host id
OR
Explain two security techniques of encryption.
Oct./Nov.-13, Q10(b)
OR
Briefly explain the encryption techniques. (Oct./Nov.-n, Qio(a) | Model Paper-m, Qio(a)j
OR
Encryption
Encryption is a method of converting plain text into cipher text. Using this method, security of data can be achieved
effectively. An encrypted file can be decrypted if the user has the capability of accessing a secret key or password. In this
context, unencrypted data is referred to as plain text whereas encrypted data is referred to as cipher text.
Secret key C= E (K,P)
|k
P Encryption
—>
Algorithm
Input Transmitted
A public key cryptography/encryption consists of the following five elements. They are,
(i) Textdata/Message
(ii) Encryption algorithm
(iii) Public key and private key
(iv) Cipher Text/Unreadable text
(v) Decryption algorithm.
(i) Textdata/Message
This can be any input data, such as textdata or message.
For example, Johny is a user of computer and wants to send his message, M = “Hello” securely to his friend Sunny,
who is also a user of computer.
(ii) Encryption Algorithm
To encrypt the message, an encryption algorithm performs certain transformations on it.
There are various encryption algorithms but the RSA public key encryption algorithm is mostly used to perform
certain transformations or calculations on the textdata or message.
For example, Johny uses the public key of Sunny and encrypted his message by using RSA algorithm.
(iii) Public Key and Private Key
These pair of keys are used to encrypt and decrypt the message respectively. The private key is always kept secret,
whereas public key is widely distributed.
For example, Johny uses a public key of Sunny to encrypt his message, whereas Sunny uses his private key to decrypt
the Johny’s message as shown in the figure.
(iv) Cipher Text/Unreadable Text
Once the encryption is done on the textdata, it is in unreadable format means it cannot be read by human beings.
For example, Johny’s message has converted into unreadable form so that nobody except Sunny can read his message,
as he has a corresponding private key for that message.
(v) Decryption Algorithm
A decryption algorithm takes the unreadable text and its corresponding key to convert this text into original text.
Hence, we it can be said that the decryption algorithm is the reverse of encryption algorithm.
^For example, decryption algorithm takes the unreadable text of Johny and also takes the Sunny’s private key to
decrypt that message and convert the unreadable text into readable form i.e., original text sent by Johny as shown in the
below figure.
Cryptography
For answer refer Unit-n, Page No-bir Q-No.28<a).
Classification of Cryptographic Attacks
Cryptographic attacks can be classified into two types. They are,
1. Cryptanalytic attacks
2. Non-cryptanalytic attacks.
1. Cryptanalytic Attack
This attack can be referred as a group of statistical and algebraic techniques. It exploits the mathematical features
to capture the secret key. They focus on the distinguishes that exist in the output distribution of algorithms. The main role
of this attack is to determine the cipher properties which are not found in random function. This scenario is generally
referred to as “distinguishes”. Typically all attacks are called as distinguishes. Now the attacker estimates or guesses the
key and searches the distinguishing property. An attack can be considered as correct if the guessed key matches any of the
distinguishes. If not, it is considered as incorrect and the hacking is continued.
To minimize the complexity of guessing, divide and conquer method is used. This method is used in the brute force
search method to generate efficient results.
2. Non-cryptographic Attacks
Non-cryptographic attacks focus on the three major goals of security. These goals include,
(i) Confidentiality
(ii) Integrity
(iii) Availability.
Different attacks can be calssified based on these three goals as follows,
(a) Modification
Modification refers to the alteration of a specific portion of authorized information. It also refers to the deletion or
reordering of information to generate an unauthorized effect. An example for this type of attack is changing the
account number of banking transaction.
(b) Masquerading
Masquerading refers to the attack in which the attacker pretend to be some other person (authorized). Consider an
example where an attacker obtains customer ID and password of an online banking user. The obtained credentials
can be used by the attacker to pretend like the authorized user. Such an attack is referred to as masquerading.
(c) Replaying
Replaying refers to the process of capturing a particular information and retransmitting or resending it later for
causing an unauthorized effect. An example of such an attack is replaying an already completed transaction.
(d) Repudiation
Repudiation refers to the attack in which either sender (or) receiver denies the action it performed. For example,
receiver already received the message but denies.
Denial of Service «
This type of attack interrupts the normal usage of various facilities provided by system (or) network. It attacks a
specific target so that the messages destined to it can be destroyed. In some other situations, the attacker sends messages
continuously until the system (or) network becomes unavailable. Also, the attacker can crash down the server by sending
bogus messages.
All these attacks can also be categorized into passive and active attacks. Attacks on confidentiality i.e., snooping
and traffic analysis falls under passive attacks. All the other attacks belong to the category of active attacks.
It refers to the process of monitoring or wiretapping of ongoing transmission. Here, the goal of opponent is to capture
the transmitting information but not to alter (or) harm the system. These types of attacks can be easily avoided by
using encryption techniques.
in this types of attacks, attacker can alter the information (or) include some fraudulent information into the network.
These attacks harm the system and can easily be detected. However, they are difficult to prevent.
Answer :
Digital Signatures
A digital signature is one of the methods of encryption used to provide authentication. The main idea of the digital
signature is to protect the message or data from modifications. Digital signature is very popular in the world of network
security. Basically, it is a kind of asymmetric cryptography used to support the security properties of a handwritten signature
on paper. The digital signature scheme provides two algorithms where one algorithm is for signing, which requires the
user’s secret or private-key, and the other algorithm is for verifying signatures which requires the user’s public-key. The
result of the signature process is called the “digital signature”.
.... —----------- . SIA PUBLISHERSAND DISTRIBUTORS PVT. LTD.
66 E-COMMERCE
Digital Certificates
Digital certificates are the certificates that are used to verify one’s identity when he/she is doing any business or
transactions on the Internet. These certificates are issued by a trusted third party called as Certificate Authority or Certification
Authority (CA). A digital certificate contains the user’s name, a serial number, a copy of the certificate holder’s public key
(which is useful for message encryption and digital signature generation), expiration data and also the digital signatures
of the CA (so as to verify the identity of CA).
Role of Digital Signatures in Network Security
Digital signatures are used to provide authentication of any electronic information. For instance, assume that, there
are two users of the internet say, A and B. User A wants to send some confidential message to user B assuring that the
message is unmodified and is sent by him only.
The sender?! writes his message into an e-mail and applies a special function known as hash function on the message.
This creates the checksum i.e., a value that checks the authenticity during data transmission of the information. Then, A uses
its private-key that he has previously obtained from public-private key authority to encrypt the checksum. The encrypted
message becomes the A’s digital signature of the message. The checksum and the message is then sent to the receiver.
At the other end, the receiver B receives the message and the checksum. In order to make sure that, the message is
complete and unmodified from sender^, the receiver B applies the same hash function on the received message to produce
checksum. It also uses A’s public-key to decrypt the checksum it received with message. The two checksums are then
compared. If they are matched then the received message is complete and signature is valid. Otherwise, the message is
modified and signature is considered invalid.
The below figure shows the role or operation of a digital signature,
Sender A Receiver B
Private-key of Public-key of
Sender “A” Receiver “B”
Figure: Role of Digital Signature
Properties of Digital Signature
1. It must authenticate the contents when the signature is being done.
2. It must be responsible for verifying the author as well as date and time of the signature.
3. It must be verifiable by third party.
Requirements for Digital Signature
1. A digital signature must be in the form of bit pattern that is dependent on the message being signed.
/
2. The process of producing the digital signature must be easy.
3. A copy of digital signature must always be preserved.
4. A digital signature must be both easily recognizable and verifiable.
5. It must include some unique information to prevent forgery and denial by the sender.
6. It must be highly impractical for hacker to forge a digital signature by any means which may include creation of a
new message for the already existing digital signature. It may also include an attempt to replace the original digital
signature with duplicate signature for a given message.
SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD. ------------------ ——------------------ —
UNIT-2 : Framework of E-Commerce 67
INTERNAL ASSESSMENT
I. Multiple Choice
1. E-commerce framework has__________ layers. [ 1
(a) OLE
(c) SGML
(d) HTML
4. _________ in e-commerce refers to the process of gathering information about usage of privileges accessing of
specific resources. [ ]
(a) Confidentiality
(b) Authorization
(c) Authentication
(d) Auditing
__________ is the process of ensuring a person or a program that they have right to access particular resources.
[ 1
(a) Confidentiality
(b) Authentication
(c) Authorization
(d) Availability
6. __________ refers to the plans or arrangements made in the network infrastructure along with the various techniques
used by network administrator. [ ]
refers to the ability of restricting and controlling the access to the host systems and applications through
various communication links. [ 1
10. __________ is an application protocol that uses reliable stream like TCP for distributing, retrieving and posting
news articles on web. [ ]
2. ________ is an information handling layer that governs and manages huge amounts of data on the networks.
5. _________ is a technology that integrates several applications and multimedia data types within an active document
framework.
7. ______ refers to the process of protecting the data being transmitted from all types of passive-attacks.
8. _________ refers to the branch of computer science that describes the application of ‘secure’ behaviour on the
operation of computers.
9. __ _______ violates the security that arises upon the occurrence of an event, action or a circumstance.
10. , is, a service that enhances the security of a data processing system and the information flow within an
organization.
1% c T
I. Multiple Choice
1- (c)
2. (a)
3- (b)
4. (d)
5. (c)
6. (a)
7. (b)
8- (a)
9. (c)
10. (b)
5. OLE
6. Information Technology
7. Confidentiality
9. Threat
Answer :
A firewall can be viewed as an information security program located at a network gateway server. It protects the
confidential information present in the network against attacks or by other insecure networks.
Q2. Define security service.
Answer :
A security service is a service that enhances the security of a data processing system and the information flow within
an organization. They are meant to tackle security attacks by employing one or more security mechanisms.
Q3. Write a note on symmetric encryption.
Answer :
Symmetric encryption is also known as private key or secret key encryption. In this, only one secret key is required
for encryption and decryption of the message. This key shared is by both sender and recipient.
Q4. What is cryptanalysis?
Answer :
Cryptanalysis is a type of attack that makes certain attempts possible for obtaining the plaintext and the key used. If it
is able to determine the key, the effect is disastrous and all the encrypted messages, which are already transmitted and those
that are ready to be transmitted in future are damaged.
Q5. What do you mean by snooping?
Answer :
Snooping is the process of accessing the confidential information in an unauthorized way. Interrupting the transmission
and accessing the confidential data over the internet is an example of snooping. Different encryption mechanisms can be
applied on the information to avoid snooping attack.
CONSUMER ORIENTED
3 E-COMMERCE APPLICATIONS
SIA GROUP
____ J
c
After learning this unit, a student will have thorough understanding about the following key concepts,
( INTRODUCTION )
Consumer Oriented E-commerce applications have been widely accepted around the world because of
its easy and simple applications like electronic shopping, online stores etc. Online shopping is similar
to general shopping. The only difference is that instead of going to a shop and selecting the item, the
customer can sit at home and carry out his/her shopping online. However, the problem with this mode of
shopping is that detailed information of the product is not provided. There are four types of Consumer
Oriented applications that are widely used,
E-cash
Electronic cash is a form of electronic payment system which provides high level of security and reduces the overhead
of paper cash. Because of its adaptable and flexible nature, it opened a way for new markets and applications. Inspite of
that, there are several reasons due to which paper currency is still superior over e-cash.
(i) Lack of belief or confidence in banking system.
(ii) Inadequate clearing and agreement of non-cash transactions.
(iii) Negative rate of real interest paid on all the bank deposits.
Due to its superior, dominant nature, business practises can be changed in order to improve the process of purchasing.
In order to replace cash, e-cash should possess some features of paper cash.
Q2. Write about E-Checks. Model Paper-ll, Q8
OR
E-checks
Answer : Oct./Nov.-12, Q3
Electronic check is another form of electronic payment system. These checks are preferred when a customer is willing
to make a payment without using paper cash. The e-cash system is generally an electronic implementation of paper check
system. These checks make use of digital signature for signing and endorsing and use digital certificates to authenticate
the buyer, the buyer’s financial institution and the buyer’s account. Digital signature authentication is provided by using
public key cryptography.
Online services provided by electronic checks allow,
1. The seller to verify if the buyer has sufficient funds in his/her account.
2, Improved security at each step of transaction processing.
Q3. What is a debit card?
OR
it
Debit Cards
Answer : March/April-15, Q3
A debit card is a card that is used instead of cash in shopping. Debit cards can be used for e-commerce transactions
in the same way as a credit card. The only difference in the credit card is the way to pay later, where as a debit card is a way
to pay then and there itself. Debit cards are also known as cash cards. When ever the buyer uses debit card for shopping,
his account will be instantly debited (i.e., the amount is immediately deducted from his savings account). The debit cards
can be used anywhere. It is mostly accepted by grocery stores, retail outlets, gasoline stations, restaurants etc.
Q4. Define EPS. Model Paper-I, Q3
OR
EPS
Answer : March/April-13, Q3
Electronic Payment System (EPS) is a building block of E-commerce which refers to the online exchange of money.
This exchange is carried out over different platforms such as E-cash, E-check, credit cards etc. The widespread adoption
of these methods is due to the fact that it reduces cost and time of a transaction.
SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD. —
UNIT-3 : Consumer Oriented E-Commerce Applications 73
Electronic payment typically refers to paying the amount for purchased goods electronically. It is also referred as
Electronic Funds Transfer (EFT). This sort of process involves, transferring of funds electronically from one financial
institution to another. This type of electronic transfer started using different electronic devices like computers, telephone
devices, electronic terminals, telecommunication devices etc.
OR
Home Banking
Answer : March/April-12, qs
E-banking/online banking made the life of individuals and companies easy. Today customers are no more required to
rush to banks for making deposits, withdrawals and payment of bills. All these can be done online; customers can withdraw
money by using Automated Teller Machine (ATM). Both individual and companies can save their money and time through
E-banking. E-banking is one among the very successful online businesses.
With the help of e-commerce, various banking transactions can be done online. For instance, if a user wants to know
the current status of his/her bank account, he/she just needs to go to the respective bank’s website and login through the
username and password. Once log in is done successfully, the user is asked to enter the account number. After entering the
account number, account balance will be displayed in the message box.
Q6. List out the risk involved in E-payments. (Oct./Nov.-11, Q3 | Model Paper-I, Q8)
OR
OR
Answer : Oct./Nov.-16, Q4
The risks that are associated with electronic payment system are,
OR
Answer : March/April-14, Q8
The banking and financial payment system is again classified into three types. They are,
EFT
Retailing payment
Online payment
Financial payment
Debit card
Credit
Token
card
based
based
OR
Credit Card . *
Credit card is a card that is used instead of cash in shopping. It can be used for processing transaction. There are
smart cards with which purchase of goods and services is done first, then the customer pays for it later.
Credit card based payments can be processed by using the following three methods,
Z
1. Using plain unencrypted credit card features for payment
OR
Advantages of E-cash
Answer : March/April-16, Q3
1. E-cash provides shopping convenience to the customers, hence they are free to choose from a variety of products
available globally.
OR
Answer : Sep./Oct.-15, Q3
There are numerous benefits of using smart cards. Some of them are mentioned below.
1. Highly Secure
2. Safely Portable
It is lightweight and can be easily carried. Hence, a person can carry smart card instead of carrying money with him,
and to access its stored amount, he just have to know the pin number.
3. Double as an ID Card
It provides complete identification, and therefore it can be used for identifying an individual. For example, incase of
home-banking, it can be used as a secure token for authenticating the person over an internet between the systems
of the person and the bank.
4. Prohibit Fraud
It can be used by government to ensure that the benefits and social welfare are received by the right person.
f-
Q11. Discuss in detail about consumer-oriented E-commerce application and its role in E-commerce.
March/April-15, Q11(b)
OR
Explain about consumer-oriented E-commerce applications. (Model Paper-n, on(b) | Oct.-14, QH(b»
OR
Answer :
Consumer-Oriented Electronic Commerce Applications
There are mainly four types of consumer-oriented applications that are widely used,
1. Personal finance/home banking ' . ■*
2. Home shopping
3. Home entertainment
4. Micro transactions of information.
1. Personal Finance/Home Banking
This is the first consumer-oriented application in e-commerce. With the help of e-commerce, various banking
transactions can be done online. For instance, if a user wants to know the current status of his/her bank account, he/she jus:
needs to go to the respective bank’s website and login through the username and password. Once log in is done successfull}.
the user is asked to enter the account number. After entering the account number, account balance will be displayed in the
message box.
Services that are provided by home banking application can be classified into three types,
(a) Basic services
(b) Intermediate services
fc)' Advanced services.
j[a)> Basic Services
This fe the SfifiQhd type of service of home banking application. Like basic services, intermediate services also!
prov«l'e®R.'ices like paymentof bills, transfer of money etc. Only difference here is that basic services are used b} I
those cWomeiSVfio aw ffijt having enough knowledge about computers. In other words, customers have only basic!
knowledge of computers. Here, such customers use simple packages or software for accessing the basic services I
Whereas, intermediate services are used by those customers who have more knowledge than the customers of basic I
services. Therefore, these customers require more sophisticated software for accessing the intermediate services.
SiA Publishers and distributors pvt. ltd. I
WVIERCE
UNIT-3 : Consumer Oriented E-Commerce Applications 77
D
One of the software used by intermediate service customers is called Quick and Dirty Personal Money Management
(QDPMM). This software is used for payment of bills, money transfer etc. Moreover it allows the data to move
from/to the bank in standard format. Initially, QDPMM sends a request to the bank for displaying the image of a
cheque. Within few minutes, the image will be displayed on the screen.
Another type of software used by customers of intermediate services is called “check-free” software. Through this
B.
software, payment of cheques is done online. In order to download this software, high speed modem is required.
5, Q11(b) Suppose to issue the cheque to someone, click on the software and then a picture of cheque will be displayed on the
screen. Write all the details which are generally required to be filled in a cheque (like name of the person to whom
the cheque is to be paid, amount to be paid to the person, on what date amount should be paid to the person). After
writing all the details, press enter. The amount will be transmitted in either of the following two ways,
■ Q11(b))
, Q11(b) (ii) The system on which “check-free” software is installed transfers the cheque information to a special type of
board called Federal Reserve Board through the modem.
Federal Reserve Board in turn transfers the amount to the other person’s bank account.
iking
sjust
fully,
n the
A
Payer Payee
Customer at
home
Suppose a customer visits a TV showroom to buy a TV but fails to find the desired TV, as he/she is not able to
explain the type of TV that is required to the shopkeeper. In such situation, the shopkeeper provides the customer
with a catalog which has detailed explanation of various models of TV. This may lead to the possibility of finding
the desired TV.
Benefits of Paper-based Catalogs
❖ This type of catalog is easy to develop and are less expensive.
❖ It doesn’t require computer for accessing them.
❖ It is relatively flexible than online catalogs.
Drawbacks of Paper-based Catalogs
❖ It is not possible to perform any sort of change in these catalogs.
❖ It displays the product information only in the form of text or photograph and doesn’t include any form of
video. • ,
It’limits the number of products to be displayed.
SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD. __
UNIT-3 : Consumer Oriented E-Commerce Applications 79
(ii) Catalog Based Shopping through Online 3. Home Entertainment
Catalogs
This type of consumer-oriented application in
The procedure for catalog-based shopping through E-commerce has become more popular. A classic example
on-line catalogs is almost similar to paper-based of home entertainment application is home video service.
catalogs. Only difference is that these catalogs are Home video service is a type of service where latest movie
provided online. The online catalog that is mostly releases are converted or recorded in the form of DVD/VCD
used is CD-ROM catalogs. These catalog contains and are sold. Factors influencing the popularity of home
detailed information of the product provided by video are as follows,
the website of that particular product which can be
❖ In most cases, people don’t get enough time to go to
viewed just by inserting the CD.
theatres to watch movies.
Benefits of Online Catalogs ❖ Cost of watching a movie in theatres can be expensive.
The price of the ticket varies in every theatre. In some
❖ It is possible to perform changes in online
theatres, the ticket can cost around TSO. In some
catalogs.
theatres, the ticket price can be around T100.
❖ It helps the customer to easily search for the
Now, in addition to provide movies in CD/VCD
desired product.
format, even the latest television shows are also recorded
❖ It provides current and relevant product on CD as well as in DVD format and sold.
information.
Instead of going to a particular movie store and buying
a CD/DVD, customer can order it through Internet. For
❖ It displays the product information in the form
example, there is a site called www.moserbear. homevideo.
UNIT-3 : Consumer Oriented E-Commerce Applications 79
(ii) Catalog Based Shopping through Online 3. Home Entertainment
Catalogs
This type of consumer-oriented application in
The procedure for catalog-based shopping through E-commerce has become more popular. A classic example
on-line catalogs is almost similar to paper-based of home entertainment application is home video service.
catalogs. Only difference is that these catalogs are Home video service is a type of service where latest movie
provided online. The online catalog that is mostly releases are converted or recorded in the form of DVD/VCD
used is CD-ROM catalogs. These catalog contains and are sold. Factors influencing the popularity of home
detailed information of the product provided by video are as follows,
the website of that particular product which can be ❖ In most cases, people don’t get enough time to go to
viewed just by inserting the CD. theatres to watch movies.
Benefits of Online Catalogs ❖ Cost of watching a movie in theatres can be expensive.
The price of the ticket varies in every theatre. In some
❖ It is possible to perform changes in online
theatres, the ticket can cost around ?50. In some
catalogs.
theatres, the ticket price can be around ?100.
❖ It helps the customer to easily search for the
Now, in addition to provide movies in CD/VCD
desired product.
format, even the latest television shows are also recorded
❖ It provides current and relevant product on CD as well as in DVD format and sold.
information. Instead of going to a particular movie store and buying
a CD/DVD, customer can order it through Internet. For
❖ It displays the product information in the form
example, there is a site called www.moserbear. homevideo,
of text, audio, video etc.
com. Through this site, a user can order different types of
❖ It enables the customer to perform comparative Indian movies like Telugu, Hindi, Gujrati, Bengali etc.
shopping. Other entertainment services are as follows,
❖ It doesn’t restrict on the number of products to (a) Pay per view service
be displayed.
(a) Game on demand service.
Drawbacks of Online Catalogs
(a) Pay Per View Service
❖ It is costly to build. It is a special type of service provided by cable
operators. In this service, in order to watch a particular
❖ It becomes necessary for the customer to have
programme on TV, a user has to pay for it.
the knowledge of computers as well as the
Internet. (b) Game on Demand Service
Tire figure for different types of home shopping is as With the help of this service, a user can order and play
follows, desired games, which may include sports games, car
racing games, mind games or action games.
4. Microtransactions of Information
There are some websites which charges the user An electronic market place having more number of
for usage of a particular software. This category of suppliers and less number of customers.
software is called shareware software.
Example
(b) Freeware Software
Covisint electronic market place and exostar
There are some websites which don’t charge the electronic market place.
user for usage of a particular software. This type of
(c) Independent Industry Electronic Market Place
software is called freeware software.
The biggest advantage of this category of software A market place where there are equal number of
is that it is cost free. The problem that might occur suppliers and equal number of customers.
in shareware software category is the fraudulent use Example
of your credit card. In freeware category, no such
problem exists. Chem connect electronic market place.
Following is the diagrammatic representation of micro (d) Customer Portals Electronic Market Place
transactions of information application.
This market place is just the opposite of consortia
sponsored electronic market place. Instead of more
number of suppliers and less number of customers,
there are more number of customers and less number
of suppliers.
Example
Example
Answer :
There are five different types of electronic market Cisco electronic market place and Dell electronic
places which are as follows, marketplace.
(a) Private company electronic market place The diagrammatic representation ofthe five electronic
market places in e-commerce is shown below,
(b) Consortia sponsored electronic market place
(c) Independent industry electronic market place
(d) Customer portals electronic market place
(e) Private stores on supplier’s site electronic market
place.
(a) Private Company Electronic Market Place
Harley-Davidson supply net electronic market place. Figure: Five Electronic Market Places
SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD. '
UNIT-3 : Consumer Oriented E-Commerce Applications 81
OR
Discuss about mercantile process model from consumer’s perspective.
Answer: (Model Paper-I, Q11(a) | Oci./Nov.-16, 011(b))
o
/\
Delivers Pays amount
The product To purchase product (i)
To the customer
Bank sends
(iv) enc*or Customer’s
Monthly
Document
(v)
Sends
Message
Vendor sends the
Saying
payment to the bank
Payment
for validation (ii)
Is valid
(iii)
L
□ □□
□ □□ -------
Bank
This is the third phase of the process model. This phase describes how to deal with various issues/disputes that takes
place between the customer and a company. For Example, disputes regarding the quality of the product.
However, there are certain issues that are not completely solved. The issues are as follows,
(a) Inventory issues
(b) Database access and compatibility issues
(c) Customer service issues.
(a) Inventory Issues
One of the issues that needs to be dealt is inventory issues. Suppose, a customer needs a particular product and that
product is not available in the company. In such situations, the company should immediately inform the customer
about the unavailability of the product rather than sending a notice after several days thinking that the customer
won’t mind.
Companies should not take their customers for granted. On the contrary, if the particular product the customer needs
is available, then the company must instantly deliver that product to the customer. By doing this, good relationship
with the customer can be maintained.
(b) Database Access and Compatibility Issues
Another issue that needs to be dealt is database access and compatibility issues. Only if the customer is able to have
information or access to those sellers who more often or not use the same software for marketing their products and
that too on Information Superhighway (I-way), only then the customer can have access to the kind of service that
is required.
(c) Customer Service Issues
Other than the above issues, there is another issue that needs to be resolved which is customer service issue. Suppose,
a customer has bought a particular product from a company and is facing certain problems regarding it. Then the
customer contacts the customer service section of the company for product enquiry. In such cases, the customer
service operator must respond immediately to the customer rather than making the customer wait.
SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD________ ___________
UNIT-3 : Consumer Oriented E-Commerce Applications 83
The diagrammatic representation of all the three phases of the process model from consumer’s perspective is provided
below,
Pre purchase determination phase
The diagrammatic representation of all the three phases of the process model from consumer’s perspective is provided
below,
Pre purchase determination phase
The diagrammatic representation of all the three phases of the process model from consumer’s perspective is provided
below,
Pre purchase determination phase
It is a passive method, that enables a server to send 127 255 255 255
only those messages that are specified by client.
All the 8-bits are 1, therefore the decimal value is
Q26. State the security protocols. Discuss. 255. To determine any byte value, subtract that zero position
March/April-15, Q10(a) value from 255.
OR .-. For class A, the ‘0’ bit is in 2 position
Explain security protocols. .-. 27 = 128 => 255 - 128 = 127
Answer : (March/April-12, Q10(b) | March/April-17, 010(b)) => 127.255.255.255
The different security protocols include, But 127 network address is reserved for loop back
(i) FTP test.
For answer refer Unit-II, Page No. 55, Q.No. 22(a). .-.Class A maximum network address is
126.255.255.255
(ii) HTTP
.-.Range of class A network addresses are
For answer refer Unit-II, Page No. 55, Q.No. 22(b). 1.0.0.0..... 126.255.255.255
_SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD.
60 E-CQMMERCE
In this addressing method, 2 bytes are reserved for a network address and 2 bytes are reserved for a host address.
■<— 2 byte x 2 bytes
10 Net id Host id
In this network address, 3 bytes are reserved for net id and 1 byte for host id. The first 3 bits are reserved as 110.
*----- 3------ --------- 1------
110 Net id Host id
It is used for multicasting and indicating the multicast group address. It doesn’t contain any net id or host id. It
contains only a group id which specifies the group to which the packet belongs.
The first 4 bits are reserved as 1110.
OR
Explain two security techniques of encryption.
Oct./Nov.-13,Q10(b)
OR
Briefly explain the encryption techniques. (Oct./Nov.-n, Qio(a) | Model Paper-in, Qio(a»
OR
Encryption
Encryption is a method of converting plain text into cipher text. Using this method, security of data can be achieved
effectively. An encrypted file can be decrypted if the user has the capability of accessing a secret key or password. In this
context, unencrypted data is referred to as plain text whereas encrypted data is referred to as cipher text.
Secret key c= E (KT)
fK
p Encryption
Plain text —> Algorithm
> Cipher text
Input Transmitted
A public key cryptography/encryption consists of the following five elements. They are,
(i) Textdata/Message
(ii) Encryption algorithm
(iii) Public key and private key
(iv) Cipher Text/Unreadable text
(v) Decryption algorithm.
(i) Textdata/Message
This can be any input data, such as textdata or message.
For example, Johny is a user of computer and wants to send his message, M = “Hello” securely to his friend Sunny,
who is also a user of computer.
(ii) Encryption Algorithm
To encrypt the message, an encryption algorithm performs certain transformations on it.
There are various encryption algorithms but the RSA public key encryption algorithm is mostly used to perform
certain transformations or calculations on the textdata or message.
For example, Johny uses the public key of Sunny and encrypted his message by using RSA algorithm.
(iii) Public Key and Private Key
These pair of keys are used to encrypt and decrypt the message respectively. The private key is always kept secret,
whereas public key is widely distributed.
For example, Johny uses a public key of Sunny to encrypt his message, whereas Sunny uses his private key to decrypt
the Johny’s message as shown in the figure.
(iv) Cipher Text/Unreadable Text
Once the encryption is done on the textdata, it is in unreadable format means it cannot be read by human beings.
For example, Johny’s message has converted into unreadable form so that nobody except Sunny can read his message,
as he has a corresponding private key for that message.
(v) Decryption Algorithm
A decryption algorithm takes the unreadable text and its corresponding key to convert this text into original text.
Hence, we it can be said that the decryption algorithm is the reverse of encryption algorithm.
£ For example, decryption algorithm takes the unreadable text of Johny and also takes the Sunny’s private key to
decrypt that message and convert the unreadable text into readable form i.e., original text sent by Johny as shown in the
below figure.
Cryptography
Tor answer refer Unit-IT, page No. 6L Q-No. 28<a).
Classification of Cryptographic Attacks
Cryptographic attacks can be classified into two types. They are,
1. Cryptanalytic attacks
2. Non-cryptanalytic attacks.
1. Cryptanalytic Attack
This attack can be referred as a group of statistical and algebraic techniques. It exploits the mathematical features
to capture the secret key. They focus on the distinguishes that exist in the output distribution of algorithms. The main role
of this attack is to determine the cipher properties which are not found in random function. This scenario is generally
referred to as “distinguishes”. Typically all attacks are called as distinguishes. Now the attacker estimates or guesses the
key and searches the distinguishing property. An attack can be considered as correct if the guessed key matches any of the
distinguishes. If not, it is considered as incorrect and the hacking is continued.
To minimize the complexity of guessing, divide and conquer method is used. This method is used in the brute force
search method to generate efficient results.
2. Non-cryptographic Attacks
Non-cryptographic attacks focus on the three major goals of security. These goals include,
(i) Confidentiality
(ii) Integrity
(iii) Availability.
Different attacks can be calssified based on these three goals as follows,
(a) Modification
Modification refers to the alteration of a specific portion of authorized information. It also refers to the deletion or
reordering of information to generate an unauthorized effect. An example for this type of attack is changing the
account number of banking transaction.
(b) Masquerading
Masquerading refers to the attack in which the attacker pretend to be some other person (authorized). Consider an
example where an attacker obtains customer ID and password of an online banking user. The obtained credentials
can be used by the attacker to pretend like the authorized user. Such an attack is referred to as masquerading.
(c) Replaying
UNIT-2 : Framework of E-Commerce 65
CE
(a) Modification
4
Kb) Modification refers to the alteration of a specific portion of authorized information. It also refers to the deletion or
reordering of information to generate an unauthorized effect. An example for this type of attack is changing the
account number of banking transaction.
(b) Masquerading
Masquerading refers to the attack in which the attacker pretend to be some other person (authorized). Consider an
example where an attacker obtains customer ID and password of an online banking user. The obtained credentials
can be used by the attacker to pretend like the authorized user. Such an attack is referred to as masquerading.
(c) Replaying
4
Kb) Modification refers to the alteration of a specific portion of authorized information. It also refers to the deletion or
reordering of information to generate an unauthorized effect. An example for this type of attack is changing the
account number of banking transaction.
(b) Masquerading
Masquerading refers to the attack in which the attacker pretend to be some other person (authorized). Consider an
example where an attacker obtains customer ID and password of an online banking user. The obtained credentials
can be used by the attacker to pretend like the authorized user. Such an attack is referred to as masquerading.
(c) Replaying
res Replaying refers to the process of capturing a ^articular information and retransmitting or resending it later for
UNIT-2 : Framework of E-Commerce 65
(a) Modification
Modification refers to the alteration of a specific portion of authorized information. It also refers to the deletion or
reordering of information to generate an unauthorized effect. An example for this type of attack is changing the
account number of banking transaction.
(b) Masquerading
Masquerading refers to the attack in which the attacker pretend to be some other person (authorized). Consider an
example where an attacker obtains customer ID and password of an online banking user. The obtained credentials
can be used by the attacker to pretend like the authorized user. Such an attack is referred to as masquerading.
(c) Replaying
Replaying refers to the process of capturing a particular information and retransmitting or resending it later for
causing an unauthorized effect. An example of such an attack is replaying an already completed transaction.
(d) Repudiation
Repudiation refers to the attack in which either sender (or) receiver denies the action it performed. For example,
receiver already received the message but denies.
Denial of Service (
This type of attack interrupts the normal usage of various facilities provided by system (or) network. It attacks a
specific target so that the messages destined to it can be destroyed. In some other situations, the attacker sends messages
continuously until the system (or) network becomes unavailable. Also, the attacker can crash down the server by sending
bogus messages.
All these attacks can also be categorized into passive and active attacks. Attacks on confidentiality i.e., snooping
and traffic analysis falls under passive attacks. All the other attacks belong to the category of active attacks.
It refers to the process of monitoring or wiretapping of ongoing transmission. Here, the goal of opponent is to capture
the transmitting information but not to alter (or) harm the system. These types of attacks can be easily avoided by
using encryption techniques.
In this types of attacks, attacker can alter the information (or) include some fraudulent information into the network.
These attacks harm the system and can easily be detected. However, they are difficult to prevent.
Answer :
Digital Signatures
A digital signature is one of the methods of encryption used to provide authentication. The main idea of the digital
signature is to protect the message or data from modifications. Digital signature is very popular in the world of network
security. Basically, it is a kind of asymmetric cryptography used to support the security properties of a handwritten signature
on paper. The digital signature scheme provides two algorithms where one algorithm is for signing, which requires the
user’s secret or private-key, and the other algorithm is for verifying signatures which requires the user’s public-key. The
result of the signature process is called the “digital signature”.
—_ SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD.
66 so aw E-COMMERCE
Digital Certificates
Digital certificates are the certificates that are used to verify one’s identity when he/she is doing any business or
transactions on the Internet. These certificates are issued by a trusted third party called as Certificate Authority or Certification
Authority (CA). A digital certificate contains the user’s name, a serial number, a copy of the certificate holder’s public key
(which is useful for message encryption and digital signature generation), expiration data and also the digital signatures
of the CA (so as to verify the identity of CA).
Role of Digital Signatures in Network Security1
Digital signatures are used to provide authentication of any electronic information. For instance, assume that, there
are two users of the internet say, A and B. User A wants to send some confidential message to user B assuring that the
message is unmodified and is sent by him only.
The sender A writes his message into an e-mail and applies a special function known as hash function on the message.
This creates the checksum i.e., a value that checks the authenticity during data transmission of the information. Then, A uses
its private-key that he has previously obtained from public-private key authority to encrypt the checksum. The encrypted
message becomes the A’s digital signature of the message. The checksum and the message is then sent to the receiver.
At the other end, the receiver B receives the message and the checksum. In order to make sure that, the message is
complete and unmodified from sender J, the receiver B applies the same hash function on the received message to produce
checksum. It also uses A’s public-key to decrypt the checksum it received with message. The two checksums are then
compared. If they are matched then the received message is complete and signature is valid. Otherwise, the message is
modified and signature is considered invalid.
The below figure shows the role or operation of a digital signature,
Sender A Receiver B
Private-key of Public-key of
Sender “A” Receiver “B”
I. Multiple Choice
1. E-commerce framework has__________ layers. [ 1
(a) OLE
(c) SGML
(d) HTML
4. ________ in e-commerce refers to the process of gathering information about usage of privileges accessing of
specific resources. [ ]
(a) Confidentiality
(b) Authorization
(c) Authentication
(d) Auditing
5. __________ is the process of ensuring a person or a program that they have right to access particular resources.
[ J
(a) Confidentiality
(b) Authentication
(c) Authorization
(d) Availability
6. __________ refers to the plans or arrangements made in the network infrastructure along with the various techniques
used by network administrator. [ ]
________refers to the ability of restricting and controlling the access to the host systems and applications through
various communication links. [ ]
•
(a) Availability (b) Access control
10. __________is an application protocol that uses reliable stream like TCP for distributing, retrieving and posting
news articles on web. [ ]
2. ________ is an information handling layer that governs and manages huge amounts of data on the networks.
5. _________ is a technology that integrates several applications and multimedia data types within an active document
framework.
7. __________refers to the process of protecting the data being transmitted from all types of passive-attacks.
8. _________refers to the branch of computer science that describes the application of ‘secure’ behaviour on the
operation of computers.
9. __________violates the security that arises upon the occurrence of an event, action or a circumstance.
10. _____ . is, a service that enhances the security of a data processing system and the information flow within an
organization.
I. Multiple Choice
1- (c)
2. (a)
3- (b)
4. (d)
5. (c)
6- (a)
7. (b)
8- (a)
9- (c)
10. (b)
5. OLE
6. Information Technology
7. Confidentiality
. 8. Computer Security
9. Threat
Answer :
A firewall can be viewed as an information security program located at a network gateway server. It protects the
confidential information present in the network against attacks or by other insecure networks.
Q2. Define security service.
Answer :
A security service is a service that enhances the security of a data processing system and the information flow within
an organization. They are meant to tackle security attacks by employing one or more security mechanisms.
Q3. Write a note on symmetric encryption.
Answer :
Symmetric encryption is also known as private key or secret key encryption. In this, only one secret key is required
for encryption and decryption of the message. This key shared is by both sender and recipient.
Q4. What is cryptanalysis?
Answer :
Cryptanalysis is a type of attack that makes certain attempts possible for obtaining the plaintext and the key used. If it
is able to determine the key, the effect is disastrous and all the encrypted messages, which are already transmitted and those
that are ready to be transmitted in future are damaged.
Q5. What do you mean by snooping?
Answer :
Snooping is the process of accessing the confidential information in an unauthorized way. Interrupting the transmission
and accessing the confidential data over the internet is an example of snooping. Different encryption mechanisms can be
applied on the information to avoid snooping attack.
( LEARNING OBJECTIVES J
After learning this unit, a student will have thorough understanding about the following key concepts,
c INTRODUCTION
Consumer Oriented E-commerce applications have been widely accepted around the world because of
its easy and simple applications like electronic shopping, online stores etc. Online shopping is similar
to general shopping. The only difference is that instead of going to a shop and selecting the item, the
customer can sit at home and carry out his/her shopping online. However, the problem with this mode of
shopping is that detailed information of the product is not provided. There are four types of Consumer
Orientedapplications that are widely used,
PART-A
■
-
SHORT QUESTIONS WITH SOLUTIONS
Q1. What is E-cash? Model Paper-Ill, Q3
OR
E-cash
Electronic cash is a form of electronic payment system which provides high level of security and reduces the overhead
of paper cash. Because of its adaptable and flexible nature, it opened a way for new markets and applications. Inspite of
that, there are several reasons due to which paper currency is still superior over e-cash.
(i) Lack of belief or confidence in banking system.
(ii) Inadequate clearing and agreement of non-cash transactions.
(iii) Negative rate of real interest paid on all the bank deposits.
Due to its superior, dominant nature, business practises can be changed in order to improve the process of purchasing.
In order to replace cash, e-cash should possess some features of paper cash.
Q2. Write about E-Checks. Model Paper-ll, Q8
OR
E-checks
Answer : Oct./Nov.-12, Q3
Electronic check is another form of electronic payment system. These checks are preferred when a customer is willing
to make a payment without using paper cash. The e-cash system is generally an electronic implementation of paper check
system. These checks make use of digital signature for signing and endorsing and use digital certificates to authenticate
the buyer, the buyer’s financial institution and the buyer’s account. Digital signature authentication is provided by using
public key cryptography.
Online services provided by electronic checks allow,
1. The seller to verify if the buyer has sufficient funds in his/her account.
2. Improved security at each step of transaction processing.
Q3. What is a debit card?
/f OR
Debit Cards
Answer : March/April-15, Q3
A debit card is a card that is used instead of cash in shopping. Debit cards can be used for e-commerce transactions
in the same way as a credit card. The only difference in the credit card is the way to pay later, where as a debit card is a way
to pay then and there itself. Debit cards are also known as cash cards. When ever the buyer uses debit card for shopping,
his account will be instantly debited (i.e., the amount is immediately deducted from his savings account). The debit cards
can be used anywhere. It is mostly accepted by grocery stores, retail outlets, gasoline stations, restaurants etc.
Q4. Define EPS. Model Paper-I, Q3
OR
EPS
Answer : March/Aprii-13, Q3
Electronic Payment System (EPS) is a building block of E-commerce which refers to the online exchange of money.
This exchange is carried out over different platforms such as E-cash, E-check, credit cards etc. The widespread adoption
of these methods is due to the fact that it reduces cost and time of a transaction.
SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD. _______ ____ ___________________
UNIT-3 : Consumer Oriented E-Commerce Applications 73
Electronic payment typically refers to paying the amount for purchased goods electronically. It is also referred as
Electronic Funds Transfer (EFT). This sort of process involves, transferring of funds electronically from one financial
institution to another. This type of electronic transfer started using different electronic devices like computers, telephone
devices, electronic terminals, telecommunication devices etc.
OR
Home Banking
Answer : March/April-12, Q5
E-banking/online banking made the life of individuals and companies easy. Today customers are no more required to
rush to banks for making deposits, withdrawals and payment of bills. All these can be done online; customers can withdraw
money by using Automated Teller Machine (ATM). Both individual and companies can save their money and time through
E-banking. E-banking is one among the very successful online businesses.
With the help of e-commerce, various banking transactions can be done online. For instance, if a user wants to know
UNIT-3 : Consumer Oriented E-Commerce Applications 73
Electronic payment typically refers to paying the amount for purchased goods electronically. It is also referred as
Electronic Funds Transfer (EFT). This sort of process involves, transferring of funds electronically from one financial
institution to another. This type of electronic transfer started using different electronic devices like computers, telephone
devices, electronic terminals, telecommunication devices etc.
OR
Home Banking
Answer : March/Aprii-12, qs
E-banking/online banking made the life of individuals and companies easy. Today customers are no more required to
rush to banks for making deposits, withdrawals and payment of bills. All these can be done online; customers can withdraw
money by using Automated Teller Machine (ATM). Both individual and companies can save their money and time through
E-banking. E-banking is one among the very successful online businesses.
With the help of e-commerce, various banking transactions can be done online. For instance, if a user wants to know
the current status of his/her bank account, he/she just needs to go to the respective bank’s website and login through the
username and password. Once log in is done successfully, the user is asked to enter the account number. After entering the
AVI
UNIT-3 : Consumer Oriented E-Commerce Applications__________ ___ _________ 73
Electronic payment typically refers to paying the amount for purchased goods electronically. It is also referred as
Electronic Funds Transfer (EFT). This sort of process involves, transferring of funds electronically from one financial
institution to another. This type of electronic transfer started using different electronic devices like computers, telephone
devices, electronic terminals, telecommunication devices etc.
OR
Home Banking
Answer : March/April-12, Q5
E-banking/online banking made the life of individuals and companies easy. Today customers are no more required to
rush to banks for making deposits, withdrawals and payment of bills. All these can be done online; customers can withdraw
money by using Automated Teller Machine (ATM). Both individual and companies can save their money and time through
E-banking. E-banking is one among the very successful online businesses.
With the help of e-commerce, various banking transactions can be done online. For instance, if a user wants to know
the current status of his/her bank account, he/she just needs to go to the respective bank’s website and login through the
username and password. Once log in is done successfully, the user is asked to enter the account number. After entering the
account number, account balance will be displayed in the message box.
Q6. List out the risk involved in E-payments. (Oct./Nov.-11, Q3 | Model Paper-I, Q8)
OR
OR
Answer : Oct./Nov.-16, Q4
The risks that are associated with electronic payment system are,
OR
Answer : March/April-14, Q8
The banking and financial payment system is again classified into three types. They are,
EFT
Retailing payment
Online payment
Financial payment
OR
Credit Card
Credit card is a card that is used instead of cash in shopping. It can be used for processing transaction. There are
smart cards with which purchase of goods and services is done first, then the customer pays for it later.
Credit card based payments can be processed by using the following three methods,
F
1. Using plain unencrypted credit card features for payment
OR
Advantages of E-cash
Answer : March/April-16, Q3
1. E-cash provides shopping convenience to the customers, hence they are free to choose from a variety of products
available globally.
OR
Answer : Sep./Oct.-15, Q3
There are numerous benefits of using smart cards. Some of them are mentioned below.
1. Highly Secure
2. Safely Portable
It is lightweight and can be easily carried. Hence, a person can carry smart card instead of carrying money with him,
and to access its stored amount, he just have to know the pin number.
3. Double as an ID Card
It provides complete identification, and therefore it can be used for identifying an individual. For example, incase of
home-banking, it can be used as a secure token for authenticating the person over an internet between the systems
of the person and the bank.
4. Prohibit Fraud
It can be used by government to ensure that the benefits and social welfare are received by the right person.
3/1 INTRODUCTION
Q11. Discuss in detail about consumer-oriented E-commerce application and its role in E-commerce.
March/April-15, Q11(b)
OR
Explain about consumer-oriented E-commerce applications. (Model Paper-n, qh(b) | Oct.-14, QH(b))
OR
Answer :
Consumer-Oriented Electronic Commerce Applications
There are mainly four types of consumer-oriented applications that are widely used,
1. Personal finance/home banking *
2. Home shopping
3. Home entertainment
4. Micro transactions of information.
1. Personal Finance/Home Banking
This is the first consumer-oriented application in e-commerce. With the help of e-commerce, various banking
transactions can be done online. For instance, if a user wants to know the current status of his/her bank account, he/she just
needs to go to the respective bank’s website and login through the username and password. Once log in is done successfully,
the user is asked to enter the account number. After entering the account number, account balance will be displayed in the
message box.
Services that are provided by home banking application can be classified into three types,
(a) Basic services
(b) Intermediate services
(£)■ Advanced services.
(a) Basic Services
Another type of software used by customers of intermediate services is called “check-free” software. Through this
software, payment of cheques is done online. In order to download this software, high speed modem is required.
Suppose to issue the cheque to someone, click on the software and then a picture of cheque will be displayed on the
screen. Write all the details which are generally required to be filled in a cheque (like name of the person to whom
the cheque is to be paid, amount to be paid to the person, on what date amount should be paid to the person). After
writing all the details, press enter. The amount will be transmitted in either of the following two ways,
(ii) The system on which “check-free” software is installed transfers the cheque information to a special type of
board called Federal Reserve Board through the modem.
Federal Reserve Board in turn transfers the amount to the other person’s bank account.
This is the third type of service of home banking application. Due to many technological advancements, banks will
not only provide banking transaction services, but also provide online shopping services to the customers. The most
striking feature is that customers living anywhere in the world can access these services.
_ SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD.
78 E-COMMERCE
The diagrammatic representation of these advanced services is shown in the following figure.
Customer at
home
Suppose a customer visits a TV showroom to buy a TV but fails to find the desired TV, as he/she is not able to
explain the type of TV that is required to the shopkeeper. In such situation, the shopkeeper provides the customer
with a catalog which has detailed explanation of various models of TV. This may lead to the possibility of finding
the desired TV.
Benefits of Paper-based Catalogs
❖ This type of catalog is easy to develop and are less expensive.
❖ It doesn’t require computer for accessing them.
❖ It is relatively flexible than online catalogs.
Drawbacks of Paper-based Catalogs
❖ It is not possible to perform any sort of change in these catalogs.
❖ It displays the product information only in the form of text or photograph and doesn’t include any form of
video. ,
❖ It'limits the number of products to be displayed.
SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD. -
VIERCE UNIT-3 : Consumer Oriented E-Commerce Applications 79
(ii) Catalog Based Shopping through Online 3. Home Entertainment
Catalogs
This type of consumer-oriented application in
The procedure for catalog-based shopping through E-commerce has become more popular. A classic example
on-line catalogs is almost similar to paper-based of home entertainment application is home video service.
catalogs. Only difference is that these catalogs are Home video service is a type of service where latest movie
provided online. The online catalog that is mostly releases are converted or recorded in the form of DVDINCD
used is CD-ROM catalogs. These catalog contains and are sold. Factors influencing the popularity of home
detailed information of the product provided by video are as follows,
the website of that particular product which can be
❖ In most cases, people don’t get enough time to go to
viewed just by inserting the CD.
theatres to watch movies.
Benefits of Online Catalogs ❖ Cost of watching a movie in theatres can be expensive.
The price of the ticket varies in every theatre. In some
❖ It is possible to perform changes in online
theatres, the ticket can cost around ?50. In some
catalogs.
theatres, the ticket price can be around ?100.
UNIT-3 : Consumer Oriented E-Commerce Applications 79
(ii) Catalog Based Shopping through Online 3. Home Entertainment
Catalogs
This type of consumer-oriented application in
The procedure for catalog-based shopping through E-commerce has become more popular. A classic example
on-line catalogs is almost similar to paper-based of home entertainment application is home video service.
catalogs. Only difference is that these catalogs are Home video service is a type of service where latest movie
provided online. The online catalog that is mostly releases are converted or recorded in the form of DVDINCD
used is CD-ROM catalogs. These catalog contains and are sold. Factors influencing the popularity of home
detailed information of the product provided by video are as follows,
the website of that particular product which can be
❖ In most cases, people don’t get enough time to go to
viewed just by inserting the CD. theatres to watch movies.
Benefits of Online Catalogs ❖ Cost of watching a movie in theatres can be expensive.
The price of the ticket varies in every theatre. In some
❖ It is possible to perform changes in online
theatres, the ticket can cost around ?50. In some
catalogs.
theatres, the ticket price can be around ?100.
❖ It helps the customer to easily search for the
Now, in addition to provide movies in CD/VCD
desired product.
format, even the latest television shows are also recorded
❖ It provides current and relevant product on CD as well as in DVD format and sold.
information. Instead of going to a particular movie store and buying
a CD/DVD, customer can order it through Internet. For
❖ It displays the product information in the form
example, there is a site called www.moserbear. homevideo,
of text, audio, video etc.
com. Through this site, a user can order different types of
❖ It enables the customer to perform comparative Indian movies like Telugu, Hindi, Gujrati, Bengali etc.
shopping. Other entertainment services are as follows,
❖ It doesn’t restrict on the number of products to (a) Pay per view service
be displayed.
(a) Game on demand service.
Drawbacks of Online Catalogs
(a) Pay Per View Service
❖ It is costly to build. It is a special type of sendee provided by cable
operators. In this service, in order to watch a particular
❖ It becomes necessary for the customer to have
programme on TV, a user has to pay for it.
the knowledge of computers as well as the
Internet. (b) Game on Demand Service
Hie figure for different types of home shopping is as With the help ofthis service, a user can order and play
follows, desired games, which may include sports games, car
racing games, mind games or action games.
4. Microtransactions of Information
There are some websites which charges the user An electronic market place having more number of
for usage of a particular software. This category of suppliers and less number of customers.
software is called shareware software.
Example
(b) Freeware Software
Covisint electronic market place and exostar
There are some websites which don’t charge the electronic market place.
user for usage of a particular software. This type of
(c) Independent Industry Electronic Market Place
software is called freeware software.
The biggest advantage of this category of software A market place where there are equal number of
is that it is cost free. The problem that might occur suppliers and equal number of customers.
in shareware software category is the fraudulent use Example
of your credit card. In freeware category, no such
problem exists. Chem connect electronic market place.
Following is the diagrammatic representation of micro (d) Customer Portals Electronic Market Place
transactions of information application.
This market place is just the opposite of consortia
sponsored electronic market place. Instead of more
number of suppliers and less number of customers,
there are more number of customers and less number
of suppliers.
Example
Example
Answer :
. There are five different types of electronic market Cisco electronic market place and Dell electronic
places which are as follows, market place.
(a) Private company electronic market place The diagrammatic representation of the five electronic
market places in e-commerce is shown below,
(b) Consortia sponsored electronic market place
(c) Independent industry electronic market place
(d) Customer portals electronic market place
(e) Private stores on supplier’s site electronic market
place.
(a) Private Company Electronic Market Place
Harley-Davidson supply net electronic market place. Figure: Five Electronic Market Places
SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD.
UNIT-3 : Consumer Oriented E-Commerce Applications 81
OR
Discuss about mercantile process model from consumer’s perspective.
Answer : (Model Paper-I, Q11(a) | Oct./Nov.-16, 011(b))
o->
This is the third phase of the process model. This phase describes how to deal with various issues/disputes that takes
place between the customer and a company. For Example, disputes regarding the quality of the product.
However, there are certain issues that are not completely solved. The issues are as follows,
(a) Inventory issues
(b) Database access and compatibility issues
(c) Customer service issues.
(a) Inventory Issues
One of the issues that needs to be dealt is inventory issues. Suppose, a customer needs a particular product and that
product is not available in the company. In such situations, the company should immediately inform the customer
about the unavailability of the product rather than sending a notice after several days thinking that the customer
won’t mind.
Companies should not take their customers for granted. On the contrary, if the particular product the customer needs
is available, then the company must instantly deliver that product to the customer. By doing this, good relationship
with the customer can be maintained.
(b) Database Access and Compatibility Issues
Another issue that needs to be dealt is database access and compatibility issues. Only if the customer is able to have
information or access to those sellers who more often or not use the same software for marketing their products and
that too on Information Superhighway . (I-way), only then the customer can have access to the kind of service that
is required.
(c) Customer Service Issues
Other than the above issues, there is another issue that needs to be resolved which is customer service issue. Suppose,
a customer has bought a particular product from a company and is facing certain problems regarding it. Then the
customer contacts the customer service section of the company for product enquiry. In such cases, the customer
service operator must respond immediately to the customer rather than making the customer wait.
SIA PUBLISHERSAND DISTRIBUTORS PVT. LTD___________ __________________ ___
UNIT-3 : Consumer Oriented E-Commerce Applications 83
The diagrammatic representation of all the three phases of the process model from consumer’s perspective is provided
below,
v
Post purchase interaction phase
To solve
Disputes between
company and customer
Based on mode of payment used, interaction/transaction between customer and vendor (also known as mercantile
process) varies. There are two forms of payment used in purchase consummation phase. They are,
(i) Mercantile process transactions using digital cash (e-cash).
(ii) Mercantile process transactions using credit cards.
(i) Mercantile Process Transactions Using Digital Cash (E-cash)
E-cash stands for electronic cash. It is one of the forms of on-line payment. It is similar to paper currency that can
be easily transmitted through some electronic means. It also has a risk of theft or loss, so requires security for its storage.
that
Following are the various steps involved in this process,
ner
ner Step 1
Customer takes out e-cash from the bank.
eds Step 2
hip
Customer informs the vendor that he wants to purchase a particular product.
Step 3
Vendor tells the customer about the cost of the product.
ive
nd Step 4
iat I Customers pay e-cash to the vendor purchasing the product.
UNIT-3 : Consumer Oriented E-Commerce Applications 83
The diagrammatic representation of all the three phases of the process model from consumer’s perspective is provided
below,
Pre purchase determination phase
To solve
Disputes between
company and customer
Based on mode of payment used, interaction/transaction between customer and vendor (also known as mercantile
process) varies. There are two forms of payment used in purchase consummation phase. They are,
(i) Mercantile process transactions using digital cash (e-cash).
(ii) Mercantile process transactions using credit cards.
(I) Mercantile Process Transactions Using Digital Cash (E-cash)
E-cash stands for electronic cash. It is one of the forms of on-line payment. It is similar to paper currency that can
be easily transmitted through some electronic means. It also has a risk of theft or loss, so requires security for its storage.
Following are the various steps involved in this process,
Step f
Step 7
Vendor on getting this message from the bank, delivers the product to the customer.
Step 8
Finally, after delivery of the product, vendor informs its bank to mark e-cash sent by the customer as already used.
So, next time customer in order to purchase a new product, must provide new e-cash.
(ii) Mercantile Process Transactions using Credit Cards
Once the customer has taken the product, he gives his credit card to the retailer for payment of the product. Retailer
uses different devices for scanning the credit card information. For Example, an electronic cash register, point of
sale device.
Step 2 , .
The information of transaction done through credit card is transmitted to the network access point by POS device.
The purpose of this access point is to establish a connection so that the information is distributed or stored over the
network.
Step 3
Transaction information is now available on the network. Hence, POS device checks whether the source of transaction
is valid or not. Then, the transaction information is sent through the network to the customer’s bank to check whether
the credit card is authorized or not. The confirmation is displayed on the screen of POS device.
Step 4
Once the transaction process is complete, the retailer starts a new type of transaction called “close out” transaction.
This transaction deletes all the current transaction information from point of sale device for space for new transactions.
Q15. Describe briefly the mercantile model from the merchant’s perspective.
Mercantile Models from Merchant’s Perspective (or) Order to Delivery Cycle from Merchant’s Perspective
The two important factors that various organizations must keep in mind from the order to delivery of the product
are,
❖ Quality of the product.
❖ Cost of that product.
Organizations must make sure that the products they produce are of good quality and maintain that quality for a
long time. Another point that organizations must consider is to ensure the cost of the product is reasonable.
There are eight different steps from product ordering to delivery (also known as order management cycle).
1. Order planning and order generation
2. Cost estimation and pricing
3. Order receipt and entry
4. Order selection and prioritization
5. Order scheduling
6. Order fulfillment and delivery
7. Order billing and account/payment management
8. Post sales service.
1. Order Planning and Order Generation
This is the first step of order management cycle. In this step, a plan regarding the requirements for a particular order
is made. This requires a proper coordination between the particular departments of a company for completing the order of
the customer. For example, the concerned departments must discuss together the workers required to complete the order,
cost for completing the order etc. If there is no proper coordination between the departments, the end result will not be as
expected. With proper planning of order, order can be properly generated.
This is the second in order management cycle. Now, after a company has completed an order given by the customer, it
must know how to fix a price forthat order. Pricing acts as a link between the requirements of the customer for an order and
ability of the company to complete that order. There are various factors that help the company to fix a price for an order,
❖ When company has created an order, it must ensure whether that order will be of any help to customer.
This is the third step of the order management cycle. Checking whether the order is received properly or not by
the customer, whether the entry of the order is done correctly or not. All these tasks are handled by a separate department
of the company which is customer service department. The people working in this department might be experienced or
inexperienced. Irrespective of this, customer service people are in regular contact with the customers.
This is the fourth step of the order management cycle. Other than handling order receipt and entry tasks, customer
service department also decides which orders are good or bad for the company. Selection of those orders are made from
which the company can profit.
After order selection, next step is order prioritization. Prioritizing an order is nothing but taking a decision on which
order can be carried out more quickly. Unfortunately, these decisions are taken by those people of the company which are
having absolutely no knowledge of prioritizing an order.
5. Order Scheduling
This is the fifth step of the order management cycle. In this step, orders which are prioritized are placed in different
company departments. As a result, scheduling the orders will be more difficult because every department will be having
its own way of scheduling the orders.
...
_ SIA PUBLISHERS
, .< v
AND DISTRIBUTORS PVT. LTD.
■■■■*■ . ■
86 E-COMMERCE
6. Order Fulfillment and Delivery
This is the sixth step of the order management cycle. Order fulfillment and delivery process is carried out from more
than one place of the company. For example, separate places are required for creation of orders, manufacturing of orders,
and storage of orders etc.
This is the seventh step of the order management cycle. Order billing and account/payment management task is
handled by finance department of the company. The only functionality of this department is just to deliver the bills to
the customers and receive the payments from them. This department is beneficial only for the company and not for the
customers. This is because most of the customers are not satisfied with the billing system.
8. Post Sales Service
This step provides different services that will help in the development of a company. The services are,
(a) Providing training to the customers
(b) Installing the product in the system as well as repairing and maintaining the product.
OR
OR
m more OR
OR
What are mercantile process models from consumer’s and merchant’s perspective.
Answer : March-11,011(b)
task is
Mercantile Process Model from Consumer’s Perspective
>ills to
for the For answer refer Unit-Ill, Page No. 81, Q.No. 13.
Mercantile Process Model from Merchant’s Perspective
OR
Answer :
Designing Electronic Payment System
The different factors that are to be considered while designing electronic payment systems are,
1. Privacy and confidentiality
2. Security and protection
3. Intuitive interfaces
4. Database integration
5. Network bankers
6. Cost assigning
7. Standards.
1. Privacy and Confidentiality
Privacy must be ensured and maintained by every electronic payment system. Every user must be assured that details
of their transactions are kept confidential so that they can trust the payment systems.
2. Security and Protection
Different security techniques must be embedded within the system such as access control and authentication that
verifies the identity of parties that are involved in the transaction.
3. Intuitive Interfaces
The electronic payment system should be developed using a convenient and easy to use interfaces.
4. Database Integration
It is very important to integrate different databases that store various accounts associated with a customer. This
customer related information is kept up-to-date and free from any errors so that a customer can gain access to any
database using home banking service.
5. Network Bankers
A broker is essentially required while designing a payment system. Broker is the one who is responsible for clearing
conflicts and performing financial operations electronically.
6. Cost Assigning
How to price the services offered by electronic payment system is of major concern while designing payment system.
For example, is it necessary to use any subsidies to motivate the customer for changing their form of payment since
£ they consume more resources that waste a lot of money. Without subsidies it is impossible for any payment system
to assign the cost to a service accurately.
7. Standards ■ .
With the help of standards, it is possible for different customers, operating on different networks by using a variety
of payment systems to interoperate. Interoperability is assured by using standard protocols and message formats.
Q19. Explain credit card based electronic payments system.
Answer :
There are two steps in which credit card payment is negotiated,
1. The seller presents the buyer with cost of goods or services, confirmation of order and its status, notification of
delivery and choices for payment that the seller can accept.
2. The buyer presents the seller with the payment option and required information in a secure way.
Electronic payment system that is based on credit card is used to avoid the difficulties and time-consuming issues that
were present while processing e-cash or e-checks. Here, the processing is done by credit card company when a customer
wishes to purchase any goods or services.
Credit card based payments can be processed by using the following three methods,
1. Using plain unencrypted credit card features for payment
2. Using encrypted credit card features for payment
3. Using third-party authorization for credit card payment.
1. Plain Unencrypted Credit Card Feature for Payment
This is the simplest form of payment over public network such as Internet. The problems that arise using plain credit
card are,
(i) Security level provided by Internet is very low that allows any hacker to interpret the network and gather valuable
information like credit card number, account number etc.
(ii) Lack of authentication techniques.
Security and authorization can be provided by using a third-party which is a company that gathers and verifies the
payment of funds that flows from one party to another.
Companies that are providing infrastructure to on-line credit card processing are First Virtual Holdings (FVH),
interactive transaction partners, VISA interactive, master banking.
2. Encrypted Credit Card Features for Payment
In this type of payment, credit card is encrypted before performing any transaction using various encryption
techniques like PGP, PEM. One important factor to be considered is its cost that limits micro-payment transactions to be
executed because they even add to total transaction cost.
As soon as credit card details are entered into a browser which is used to navigate over the internet, encryption
process is started so that these details are encoded into cipher text while it is being transmitted from a payer PC to payee
PC such that it is not intercepted by any intruder. This encrypted credit card system fails to meet the requirements of a
financial institute such as providing protection, high speed and non-repudability.
. . . . .
The following sequential steps are followed to provide protected and non-reputable credit card transaction,
(i) A payer gives the credit card details to the payee with payment choice in a secure manner.
(ii) Payee performs authentication to verify the identity of card holder.
(iii) Payee presents the charge details and digital signature to online processors of credit card.
(iv) (The processor then presents the details to the payer’s financial institution for validating and verifying the ownership
of a card holder.
(v) Payer’s financial institution then returns the charge authentication, credit card verification details to the payee.
Encryption is provided using two numerical keys viz., private key and a public key which are generated by each
buyer and seller. The public key is stored on public key server in a credit card company which sends a unique credit card
number and limits the usage of credit card to payer.
Encryption is performed again on the private key using the password of buyer and seller. In order to start the
transaction, buyer must initially sign the message using the public key. Buyer does this by encrypting the message using
the own password. After the completion of buyer’s transaction, seller digitally signs the message using the private key.
The information about the card is transferred to credit card company, which is responsible for sending the bill to the buyer.
The seller stores the receipt and presents it to acquiring bank that transfers the amount to sellers account by deducting it
from payer’s account.
It is not possible to misuse the system because neither there is a chance for buyer to disagree to transaction nor a
seller can introduce fake charges. In order to make credit card payment system to work efficiently, it is necessary to develop
distributed key servers and card checkers.
For performing low-value payments online, it is necessary to automate the previous steps. This can be made possible
by using WWW browser that consists of two servers (1) Seller server, (2) Billing or accounting server.
In order to initiate the transaction, both buyer and seller need to register themselves with accounting server by creating
an account. Then, a buyer sends a purchase request to seller server by clicking on the URL of the accounting server. The..
URL contains the following details that are required for making any purchase,
1. Cost of product " “ ..........
2. Destination URL
3. Time duration.
The above information is encoded and transmitted to accounting server that verifies the buyer by requesting their
account number and other associated information for verifying the identity. If accurate information is provided, the transaction
is processed by accounting server which then gives the items web page along with access URL that encodes the purchase
information.
The access URL ensures the seller that the buyer has paid for the purchase which acts as an invoice in digital form
that has been marked and paid by accounting server. The access URL is the actual destination URL transmitted by seller
server with extra field such as,
A HTTP server is executed by a seller that is manipulated and edited to access URL’s. This HTTP server verifies the
validity of URL and gives the necessary privileges if the time is not expired. If access becomes invalid i.e., if the expiration
time is exceeded, then server gives the buyer a chance to purchase a product again.
After verifying customer’s authentication, the payment is processed automatically. Payment paradigm is implemented
by accounting server that maintains various payment accounting systems such as credit card account wherein the server
system has to establish a connection with the clearing house of credit card. All micro transactions are then executed by
this system after collecting and providing instant settlement in aggregate format. Online statement is used for recording
each and every transaction that gives a within overview of all purchases that have been done recently where eachlihe in
this overview is the hypertext link.
Q20. Explain briefly about the digital currency or electronic cash. Model Paper-m, QH(t>)
r
OR
Answer : Sep,/Oct,-15,011(b)
Electronic cash is a form of electronic payment system which provides high level of security and reduces the overhead
of paper cash. Because of its adaptable and flexible nature, it opened a way for new markets and applications. In spite of
that, there are several reasons, why paper currency is still superior over e-cash.
(i) Lack of belief or confidence in banking system.
(iii) Negative rate of real interest paid on all the bank deposits.
Due to its superior, dominant nature, business practises can be changed in order to improve the process of purchasing.
In order to replace cash, e-cash should possess some features of paper cash.
— —______ SIA PUBLISHERS AND DISTRIBUTORS PVT. LTR. ,
92 E-COMMERCE
Properties of E-cash
The four important properties of e-cash are,
1. Monetary value
2. Interoperability
3. Retrievability and storability t
4. Security and protection.
1. Monetary Value
E-cash possesses monetary value that is evaluated in terms of money, credit/debit cards or cashier’s check that is
certified by bank. There should not be any confusion or conflicts while e-cash transaction is being processed between two
financial institutions. Every e-cash token should be certified by bank in order to avoid the risk of disagreement.
2. Interoperability
E-cash has the ability to be exchanged easily with either other e-cash, paper cash or other electronic payment systems
including credit cards or banks commitment etc. Multiple banks are responsible for managing this e-cash exchangeability
along with cosmopolitan clearing house that involves an association of banks.
3. Retrievability and Storability
It is possible to perform storage and retrieval operations remotely that allows customers to perform transactions
involving e-cash exchange either from their office or while on a business trip. These remote operations are performed by
storing cash either in smart card device or electronic purses that can be easily transported. In order to provide security, it is
better to store cash on specialized devices that are static and cannot be changed. These devices provide security by means
of various authentication and access control techniques.
4. Security and Protection
It is very important to provide security while an e-cash exchange transaction is being processed so that it is not easy
to copy or swindle the transaction. The major problem present in the internet is forgery, which is very difficult to detect if
appropriate conformity is not available. Methods should be implemented to detect and avoid double spending of e-cash.
It is very difficult to prevent this issue, if multiple banks are responsible for handling transaction exchange.
Advantages of E-cash to Customers
Electronic cash or digital cash offers a large number of advantages to both customers and merchants. E-cash
transactions are more efficient than traditional cash transactions. Hence, more business can be done and businessmen can
offer lower prices to consumers.
1. Traditional money exchange systems involve banks, clerks, automated teller machines and many others. As a result,
traditional money exchange becomes expensive. On the other hand, e-cash transfer simply uses Internet and hence
£ the operating cost of e-cash transfer is considerably low.
2. Moving physical cash or checks over a distance will incur some cost. The cost of movement of currency depends
on the distance it is moved. However, movement of electronic cash is independent of the distance of movement i.e..
transferring money from Hyderabad to Delhi will cost the same as transferring it from Hyderabad to New York.
3. One consumer can pay e-cash directly to other consumer, in the same way as one merchant pays to other merchant in
a business-to-business relationship. There is no need of an authorization, as in the case of credit card transactions.
4. E-cash provides shopping convenience to the customers, hence they are free to choose from a variety of products
available globally.
5. E-cash eliminates the risks associated with carrying the paper cash all the time.
6. E-cash also provides a high transaction privacy compared to other credit card transactions because of its blind signatures.
7. E-cash system uses several transaction protocols which employ RSA public key cryptography to avoid message
tampering and eavesdropping.
8. The protection of e-cash on the local machine can be done by using password protection and encryption mechanisms,
so e-cash is safe on both sides i.e., during the transit and also on the local machine.
SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD. —----------------
ERCE UNIT-3 : Consumer Oriented E-Commerce Applications 93
Advantages of E-cash to Merchants
Paper currency is perceptible and treated as legal tender which means that payee cannot refuse to accept it. If this
cash is bank certified, many people wishes to use financial institutions like banks to store their money and settle their
payments using checks or debit cards. On the otherhand. If e-cash is treated as a legal tender it would create a problem
if each component of e-cash represent a real cash element then there will be no rate of interest earned on real balances of
e-cash.
The other business issue that is related to e-cash arises if there is huge up and down in face value of cash. E-cash
is more suitable for being exchanged at traditional rates of market rather than using it for by passing foreign exchange
market. The only way of starting conventional exchange market is to develop its own gray market.
94 E-COMMERCE
Answer ?
Electronic Cash in Action
A cryptographic technique called digital signature, is used to perform secure e-cash transaction. This technique
makes use of two keys,
1. Public key used for decoding
2. Private key used for encoding.
Both the public and private keys used are numeric keys that are basically very large prime numbers. When a message
is being transmitted, it is encoded into cipher format by using private key and decoded into plain message format by using
public key. The private key is kept secret whereas public key is known to everyone.
Bank gives the public key to all its customers and allows them to decode the message that was encoded using the
private key. If decoding is performed successfully, then the customer is assumed that the encoding was done by bank but
not by an intruder.
Purchasing Digital Cash from Currency Server
There are two steps that are to be considered while purchasing e-cash from online bank,
1. Creating an account
2. Maintenance of sufficient funds in the account.
Many users prefer to buy e-cash using paper cash because they do not possess any bank account or they want to
preserve their anonymity.
The primary prerequisite of purchasing e-cash from any online bank is to create an account with currency server.
E-cash must be present in multiple currencies that are supported by different financial institutions in order to gain global
privileges. If this is made possible, then a person residing in one country can purchase an e-cash token from a person
residing in another country and perform the exchange transaction locally.
Steps for Purchasing E-Cash
1. Creating an account with central online bank or currency server by filling the registration form. This account is used
for withdrawing and depositing e-cash.
2. A series of random numbers are generated using e-cash software which can be used as a digital note.
3. Before transmitting the note to customer, the bank signs the note digitally for the requested amount by using its secret
key. This digital signature specifies that the bank is responsible for representing the face value of note in terms of
.. dollar amount.
Digital signature is very secure to use since neither the buyer nor the seller can swindle that signature. By applying
digital signature method, the following types of protection can be achieved,
(i) Bank is protected against any counterfeit.
(ii) Sellers are protected against a situation wherein a legal digital note is rejected by a bank.
(iii) Buyers are protected against fake charges.
Q23. Explain in detail about electronic checks.
Answer :
Electronic Checks (E-Checks)
Electronic check is another form of electronic payment system. These checks are preferred when a customer is willing
to make a payment without using paper cash. The e-cash system is generally an electronic implementation of paper check
system. These checks make use of digital signature for signing and endorsing and use digital certificates to authenticate
the buyer, the buyer’s financial institution and the buyer’s account. Digital signature authentication is provided by using
public key cryptography.
Answer ?
Electronic Cash in Action
A cryptographic technique called digital signature, is used to perform secure e-cash transaction. This technique
makes use of two keys,
1. Public key used for decoding
2. Private key used for encoding.
Both the public and private keys used are numeric keys that are basically very large prime numbers. When a message
is being transmitted, it is encoded into cipher format by using private key and decoded into plain message format by using
public key. The private key is kept secret whereas public key is known to everyone.
Bank gives the public key to all its customers and allows them to decode the message that was encoded using the
private key. If decoding is performed successfully, then the customer is assumed that the encoding was done by bank but
not by an intruder.
Purchasing Digital Cash from Currency Server
There are two steps that are to be considered while purchasing e-cash from online bank,
1. Creating an account
2. Maintenance of sufficient funds in the account.
Many users prefer to buy e-cash using paper cash because they do not possess any bank account or they want to
preserve their anonymity.
The primary prerequisite of purchasing e-cash from any online bank is to create an account with currency server.
E-cash must be present in multiple currencies that are supported by different financial institutions in order to gain global
privileges. If this is made possible, then a person residing in one country can purchase an e-cash token from a person
residing in another country and perform the exchange transaction locally.
Steps for Purchasing E-Cash
1. Creating an account with central online bank or currency server by filling the registration form. This account is used
for withdrawing and depositing e-cash.
2. A series of random numbers are generated using e-cash software which can be used as a digital note.
3. Before transmitting the note to customer, the bank signs the note digitally for the requested amount by using its secret
key. This digital signature specifies that the bank is responsible for representing the face value of note in terms of
.. dollar amount.
f-
Digital signature is very secure to use since neither the buyer nor the seller can swindle that signature. By applying
digital signature method, the following types of protection can be achieved,
(i) Bank is protected against any counterfeit.
(ii) Sellers are protected against a situation wherein a legal digital note is rejected by a bank.
(iii) Buyers are protected against fake charges.
Q23. Explain in detail about electronic checks.
Answer :
Electronic Checks (E-Checks)
Electronic check is another form of electronic payment system. These checks are preferred when a customer is willing
to make a payment without using paper cash. The e-cash system is generally an electronic implementation of paper check
system. These checks make use of digital signature for signing and endorsing and use digital certificates to authenticate
the buyer, the buyer’s financial institution and the buyer’s account. Digital signature authentication is provided by using
public key cryptography.
OR
OR
Electronic payment means paying the amount for purchased goods electronically. Electronic Fund Transfer (EFT)
is defined as a process of transferring funds electronically from one financial institution to another. Thistype of electronic
transfer started using different electronic devices like computers, telephone devices, electronic terminals, telecommunication
devices.
Electronic fund transfer is different from traditional methods of payment that depends on physical delivery of cash
by using physical means of transport.
Electronic payment media can be grouped into three types depending on information being transferred online,
1. Banking and financial payment
2. Retailing payment
The banking and financial payment system is again classified into three types. They are,
(a) Large-scale payment
(b) Small-scale payment
(c) Home banking.
(a) Large-scale Payment
Bank-to-bank transfer is a good example for this kind of payment where the funds flow from one bank to another
instantaneously.
(b) Small-scale Payment
ATMs and cash dispensers are examples for this kind of payment using ATM. A customer can withdraw money from
anywhere at anytime.
(c) Home Banking
If a customer purchases any product or service using credit card, then the card details can be transferred to the service
provider and then the credit-card company processes the transaction.
(b) Debit Payment
In this type of retailing payment, the customer pays in advance for enjoying the privileges of information to be
retrieved. Examples for such prepaid payment system is the electronic purses.
(c) f' Charge-card Payment
Charge-card is a way of getting a short-term loan for a purchase. It is similar to credit card, except that the customer
makes an agreement with the financial institution that he will pay some fixed charges to it each month. Example of
charge-card payment include American Express.
3. Online E-commerce Payment
It is a form of digital cash which provides a high level of security. It also reduces the overhead of paper
cash.
(ii) E-check
E-check is another form of electronic payment system. These checks are preferred when a customer is willing
to make a payment without using paper currency.
Example: Net cheque, net bill.
Smart cards are similar to debit/credit cards but with enhanced features such as micro processors that
UNIT-3 : Consumer Oriented E-Commerce Applications 97
(i) E-cash
It is a form of digital cash which provides a high level of security. It also reduces the overhead of paper
cash.
(ii) E-check
E-check is another form of electronic payment system. These checks are preferred when a customer is willing
to make a payment without using paper currency.
Example: Net cheque, net bill.
In this type of payment system, the credit-card transaction is provided without using any encryption
techniques. It is one of the simplest form of payment system.
(ii) Encrypted Credit-card Payment System
In this type of payment, credit-card is encrypted before performing any transaction using various encryption
schemes like Privacy Enhanced Mail (PEM) and Pretty Good Privacy (PGP).
(iii) Online Third-party Credit-card Payment System
Security and verification can be provided by using third-party, which is a company that gathers and verifies
the payment of funds that flow from one party to another.
OR
For answer refer Unit-Ill, Page No. 87, .Q.No. 17, Topic: Advantages.
The risks that are associated with electronic payment system are,
Every electronic payment system has the capability of recording data automatically and electronically. It is very
easy and less expensive to store data in electronic devices. This automatic record gives the deflated description of the
transactions without any external effort made by any other involved party.
When transactions are imperceptible and depend only on automatic records, then all the financial institutions follow
a principle which states that “it is not necessary to delete any requirement of data”. Characteristics of records that are stored
automatically using electronic systems are,
One of the important purpose of maintaining automatic records is risk management that conflicts with the anonymity
of currency. This conflict arises, because paper cash was introduced earlier before the development of electronic devices.
Most of the customers or users always desire that there should be anonymity in their operation i.e., their transaction should
be kept confidential because of the occurrence of many forged attempts such as tax evasion, smuggling. A query that is
raised by anonymity is that, is it possible for an electronic payment system to exist without automatic record?
The problem of anonymity can be resolved by using regulation that provides security to customers. It is not possible
for bankers or government to accept electronic payment system that is unremarkable in the absence of automatic record.
With the help of statement of accounts, forgery and frauds can be solved easily only if regulation is applied correctly.
2. Risk Associated with Privacy
It is essential for all the electronic payment systems to maintain and ensure privacy. Whenever a purchase is made
using smart card or credit card, the information is stored in the database that consists of various records. All these records
in the payment system database are linked together to form a single folder that gives information about what or when the
products were purchased, from where the purchase was made etc. However tracking these informations contradicts a law
which states that privacy of customers should be ensured.
SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD. __
UNIT-3 : Consumer Oriented E-Commerce Applications 99
All customers must ensure that information about their transactions are confined to parties that are involved in the
transaction process. Privacy should be provided by protecting the transaction from intruders present on the network and
from persons that are not authorized to access the transaction. It should be protected from being deceived, cheated until
the whole transaction processing is completed. This protection can be provided using trusted third party agents that can
verify the identification of parties that are involved in transaction processing.
In order to handle credit card risk, digital online central bank have developed various procedures to reduce insolvencies.
Every procedure has its own benefits and drawbacks,
(i) Either the bank settles its net position with guarantee, or
This procedure eliminates the need of insolvency test because the bank presumes that risk associated with credit
card is from different banks and not from buyers and sellers.
In this policy, it is necessary for digital banks to define the terms and conditions needed to extend the liquidity for
settlement of their net position.
Answer :
Electronic token or electronic token is one of the e-commerce system which is entirely based on internet. The payment
systems that are based on this system are used to resemble paper currency.
For remaining answer refer Unit-Ill, Page No. 96, Q.No. 24, Topic: Token-based Payment System.
Q27. Describe smart cards as an electronic payment system. Model Paper-i, QH(b)
OR
Answer :
Hybrid/Smart Card
As electronic tokens are not very secure and do not have the ability to manage multiple transactions, another form
of electronic payment system was developed that replaced the electronic token. This form of system is called smart cards
that provide more security while exchange transaction is being performed.
Smart cards are also known as store value cards and are similar to credit cards but with enhanced features such as
microprocessor or integrated circuit chip technology that stores massive amount of customer specific information such as
electronic money and is 80 times greater than the conventional magnetic strip cards.
Electronic payment in the form of smart card is mostly used in countries like Japan, France, Germany that use these
cards for transaction, phone calls payments.
There are two types of smart cards,
1. Relationship based smart cards
2. Electronic purses.
SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD.
100 E-COMMERCE
1. Relationship Based Smart Cards When a purchase is made, the amount is deducted
Relationships based smart cards are generally used from the buyer’s account immediately and saved in the
to replace conventional credit cards in order to fulfill the electronic cash box. The balanced amount is displayed on
demands of technical customers and to satisfy the need the electronic machine or it can be checked by using balance
of using well-developed electronic payment system. reading device. When there is no amount left on electronic
Relationship based smart cards are nothing but improvement purse, it can be recharged again at any ATM center or using
in services of existing cards or introducing new services that special telephone. The drawback of electronic purses is that
a bank gives to its customers using integrated chip based they are very expensive.
card. New services such as,
Q28. What is a smart card? What are their types and
(i) Providing access to many financial accounts uses?
Chip-based cards are used to meet particular accounting For answer refer Unit-Ill, Page No. 99, Q.No. 27.
and personal needs of an individual. The customer-specific Uses of Smart Card
information is used by seller to track the behavior of a buyer. Smart cards are used in a huge collection of
Advantages of Relationship based Smart Cards
applications as follows,
1. Pay phones
(i) They access to many financial accounts.
2. Mobile communications
(ii) They provide different kinds of functions like
3. Banking and retail
bill payment, balance enquiry etc.
4. Health caresector
(iii) They provide various means of accessing the
5. ID verification and access control.
account that is situated at multiple locations
using different types of devices such as ATM, 1. PayPhones
PDA or a screen phone. By integrating smart card option in the pay phone,
both the customers and the company will be beneficial
2. Electronic Purses
because the customer does not have to worry about carrying
Though relationship-based smart cards are flexible the appropriate number of coins, remembering large access
and versatile, their payments are done based on credit and codes, pin codes etc. On the other hand, the company does
there is no instant settlement using them. Electronic purses not require coin recognizer, storage box for coins etc. Also
have been developed by many financial companies as well the need for a company professional to collect the coins from
as government organizations for meeting their demands for various terminals is eliminated.
developing a financial device that substitutes paper cash. 2. Mobile Communication
Electronic purses are wallet sized smart cards that include In GSM digital mobile phones, smart card serves as
a microchip for storing electronic money that a card holder an identification device because it contains all the significant
utilizes for purchasing products or services. information about the users so that the user will be billed
according to their usage irrespective of the phone terminal
Working of Electronic Purse
utilized.
When the required amount of electronic money is 3. Banking and Retail
stored in electronic purse, it can be used for purchasing any
The smart card can also be used in banking and retail
product or service. The transaction of electronic purse is
sector i.e., a smart card can serve as a credit card, debit card
processed using electronic device that is embedded with a or a stored value card. The smart card is integrated with
card reader. The two things that an electronic device needs a highly powerful microchip that authenticates the user
to verify is, (customer and merchant). Another microchip present in the
smart card reader authenticates the bank. Thus, fraudulent
1. Authentication of card holder
usage is avoided. The smart card also supports other features
2. Balance in the account (to know if there is sufficient like phone banking, automatic memory dialing and online
money for the purchase). services.
SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD. —. . _____ -----........
UNIT-3 : Consumer Oriented E-Commerce Applications 101
4. Health Care Sector
The smart card helps the hospital staff to obtain the history of the patient so that they could be treated by keeping
their past medical conditions in mind. Smart card also helps in the identification of doctors and provides them with a secured
multi-level access to the private information. It also helps in designing an insurance policy for the patients.
5. ID Verification and Access Control
Smart cards are also capable of storing the finger prints of the user, their pictures etc. This information is used for
revealing the identification of the card owner. A smart card reader enabled network can be easily accessed by the user after
proper authentication.
Answer :
Smart Cards
Smart cards store massive volume of customer’s information such as verification ID, health sector care, financial
banking. Apart from this, it even stores electronic money which can be used for processing transactions. It stores more
information when compared to traditional magnetic strips cards. It can be programmed to support distinct applications.
Some smart cards has the feature of editing and updating even after issuing it to the customers. Smart cards can be used
by customer’s in their daily life.
4. The entered PIN security authorities checks based on the certifications issued.
Thus, if the certificates are valid then the transaction is processed or else it is terminated. Once the transaction gets
successful then the information is updated in the card.
Answer :
For answer refer Unit-Ill, Page No. 100, Q.No. 27, Topic: Electronic Purses.
A debit card is a card that is used instead of cash in shopping. Debit cards can be used for e-commerce transactions
in the same way as a credit card. The only difference in the credit card is the way to pay later, whereas a debit card is a way
to pay then and there itself. Debit cards are also known as cash cards. Whenever the buyer uses debit card for shopping,
his account will be instantly debited (i.e., the amount is immediately deducted from his savings account). The debit cards
can be used anywhere merchants display the debit cards brand name or logo. ATM cards have the features of debit card.
It is mostly accepted by grocery stores, retail outlets, gasoline stations, restaurants etc.
- ----- ' SIA PUBLISHERSAND DISTRIBUTORS PVT. LTD.
_ NIT-3 : Consumer Oriented E-Commerce Applications 101
4 Health Care Sector
The smart card helps the hospital staff to obtain the history of the patient so that they could be treated by keeping
r.eir past medical conditions in mind. Smart card also helps in the identification of doctors and provides them with a secured
- Jti-level access to the private information. It also helps in designing an insurance policy for the patients.
5 ID Verification and Access Control
Smart cards are also capable of storing the finger prints of the user, their pictures etc. This information is used for
-sealing the identification of the card owner. A smart card reader enabled network can be easily accessed by the user after
~roper authentication. '
Answer :
Smart Cards
Smart cards store massive volume of customer’s information such as verification ID, health sector care, financial
banking. Apart from this, it even stores electronic money which can be used for processing transactions. It stores more
information when compared to traditional magnetic strips cards. It can be programmed to support distinct applications.
Some smart cards has the feature of editing and updating even after issuing it to the customers. Smart cards can be used
by customer’s in their daily life.
4. The entered PIN security authorities checks based on the certifications issued.
Thus, if the certificates are valid then the transaction is processed or else it is terminated. Once the transaction gets
successful then the information is updated in the card.
tAectrotoc purses
Answer :
For answer refer Unit-Ill, Page No. 100, Q.No. 27, Topic: Electronic Purses.
A debit card is a card that is used instead of cash in shopping. Debit cards can be used for e-commerce transactions
in the same way as a credit card. The only difference in the credit card is the way to pay later, whereas a debit card is a way
to pay then and there itself. Debit cards are also known as cash cards. Whenever the buyer uses debit card for shopping,
his account will be instantly debited (i.e., the amount is immediately deducted from his savings account). The debit cards
can be used anywhere merchants display the debit cards brand name or logo. ATM cards have the features of debit card.
It is mostly accepted by grocery stores, retail outlets, gasoline stations, restaurants etc.
3. Debit card frees the user from carrying cash and cheque book.
4. In most of the countries merchants accept debit cards than cash or cheques.
1. They are less secured than the commonly used credit cards.
2. The liability for unauthorized debit cards will be more when it is stolen.
Answer :
Hybrid Card
For answer refer Unit-Ill, Page No. 99, Q.No. 27, Topic: Hybrid/Smart Card.
Role of Hybrid Cards in E-commerce
❖ Smart cards or hybrid cards are used as credit/debit cards, transit payment cards etc. Therefore, a consumer can
perform electronic payment through these cards.
❖ They act as a reliable medium for carrying password protected personal data like bank account information, passwords
etc.
❖ Other confidential data like medical records, secret cryptographic keys etc., can also be stored in the card in a form
that is understandable to the card reader only.
❖ The micro-controller chip present in hybrid/smart card has the ability to decide with whom to share data. These
cards work with only those vendors that they trust.
❖ Mostly the smart cards are register based stored value cards. The secret keys that are present in the card are known
only to the issuing authority and not even to the card owner. If the card owners got to know the secret keys then
they can mint electronic cash.
❖ Hybrid cards are multiple application smart cards. A single hybrid card may serve multiple purposes. For example, a
single hybrid card may store personal information (driver’s license information, social security, medical information).
£ website passwords, digital signatures, works as a phone card, a debit card, a credit card.
With such a secure and flexible environment, smart or hybrid cards are definitely of much use. Use of these cards
in future is beyond expectation.
I. Multiple Choice
are used by those customers who are not having enough knowledge about computers.
2. _____ . is an electronic market place having more number of suppliers and less number of customers [ ]
In_______ step of purchase consummation phase of mercantile model, the vendor tells the customer the cost of
the product. [ ]
9. In_________ type of payment system, the credit-card transaction is provided is provided without using any
encryption techniques. [ ]
10. _________ cards store massive volume of customer information such as verification ID, health sector care, financial
banking etc. [ ]
4. The term used to refer software that are available free of cost is________ software.
1- (b)
2. (d)
3. (a)
[ ]
4. (d)
5- (c)
6- (d)
! any
7. (b)
[ ]
8- (a)
9- (a)
10. (b)
4. Freeware
6. Three
8. Digital Signature
10. Debit
Answer :
Mercantile process models enables the consumers to perform online shopping with same features as that of manual
shopping. This model consists of seven different functions and each of these functions are in turn placed in three different
phases.
Answer :
Order receipt and entry is the third step of the order management cycle. Checking whether the order is received
properly or not by the customer, whether the entry of the order is done correctly or not. All these tasks are handled by a
separate department of the company which is customer service department. .
Answer :
Electronic Fund Transfer (EFT) is defined as a process of transferring funds electronically from one financial
institution to another. This type of electronic transfer started using different electronic devices like computers, telephone
devices, electronic terminals, telecommunication devices.
Answer :
The different factors that are to be considered while designing electronic payment systems are,
*
3. Intuitive interfaces
4. Database integration
5. Network bankers
6. Cost assigning
7. Standards.
Answer :
Electronic purse is a wallet sized smart card that include a microchip for storing electronic money that a card holder
utilizes for purchasing products or services.
( LEARNING OBJECTIVES
After learning this unit, a student will have thorough understanding about the following key concepts,
❖ Way information flows in organization with partial EDI system and fully integrated EDI system.
In today’s electronic market, most of the companies are trying out different methods for improving their
business. For instance, they are using a method called Electronic Data Interchange (EDI). EDI is a method
that deals with exchange and sharing of business documents between organizations or businessmen
electronically. Before EDI, organizations had to rely on postal systems for exchange of business information.
pDI has made a positive impact on the working of various organizations. Business information can be
transferred quickly to various parts of the world. Organizations can have access to their business partners
anytime and anywhere in the world.
Partially integrated EDI system is a system consisting of both Non-EDI system and EDI system, that is there
are certain operations that are carried out manually and certain operations which are carried out electronically.
Fully integrated EDI is an EDI system that carries out information flow electronically. In contrast to partially
integrated EDI, the fully integrated EDI performs their transactions with high speed and high-level of accuracy
but with a trade-off cost. The components that are required for EDI implementation are standards, translation
software, banks, VAN services, trading partners and proprietary hardware and network. It is necessary to
ensure that transaction data is legalized and secured.
4 INTERCHANGE
v
SIA GROUP
J
( LEARNING OBJECTIVES )
After learning this unit, a student will have thorough understanding about the following key concepts,
❖ Way information flows in organization with partial EDI system and fully integrated EDI system.
( INTRODUCTION )
In today’s electronic market, most of the companies are trying out different methods for improving their
business. For instance, they are using a method called Electronic Data Interchange (EDI). EDI is a method
that deals with exchange and sharing of business documents between organizations or businessmen
electronically. Before EDI, organizations had to rely on postal systems for exchange of business information.
E^DI has made a positive impact on the working of various organizations. Business information can be
transferred quickly to various parts of the world. Organizations can have access to their business partners
anytime and anywhere in the world.
Partially integrated EDI system is a system consisting of both Non-EDI system and EDI system, that is there
are certain operations that are earned out manually and certain operations which are carried out electronically.
Fully integrated EDI is an EDI system that carries out information flow electronically. In contrast to partially
integrated EDI, the fully integrated EDI performs their transactions with high speed and high-level of accuracy
but with a trade-off cost. The components that are required for EDI implementation are standards, translation
software, banks, VAN services, trading partners and proprietary hardware and network. It is necessary to
ensure that transaction data is legalized and secured.
PART-A
OR
OR
EDI
EDI can be defined in many different ways. Few possible definitions of EDI are,
1. Electronic Data Interchange (EDI) is a technique which follows a standardizedprocedure for electronically transmitting
various kinds of information. For instance, commercial information, administrative information etc.
or
2. EDI can be referred to as a process used by various trading partners for transmitting information among themselves
without any interference.
or
Q2. Write a short note on Internet based EDI. (Oct./Nov.-11, Q7 | March-11, Q6)
OR
OR
Answer :
In this type of service, transfer of EDI data is possible through Internet without using VAN network. In order to
perform this type of transaction, business partners must use same protocol for exchanging messages.
This service offers two types of methods through which messages are exchanged. They are,
E-mail is the conventional method of exchanging message . Every e-mail message should encapsulate EDI interchange
and encryption techniques for ensuring e-mail privacy.
FTP-based messaging is another message exchange method provided by VAN-free Internet EDI service. In order
to exchange EDI messages using FTP, the trading partner needs to create an agreement.
5IIA PUBLISHERS AND DISTRIBUTORS PVT. LTD. -
UNIT-4 : Electronic Data Interchange 109
OR
Benefits of EDI
Answer : Oct./Nov.-12, Q4
6. It reduces the number of data entry errors, human intervention, processing delays etc. So, the quality of the outcome
will be good.
OR
VAN
Answer : March/April-13, Q4
VAN is a network that makes communication possible among different business partners. These partners exchange
EDI messages such as purchase orders, invoices. The other services provided by VAN’s are,
Answer : Oct./Nov.-n, Q5
1. It has the capability to act as a source of raw-materials as well as finished goods from any part of the world.
2. All management as well as global business strategies results from accurate execution.
3. As the real time information is processed online, the information associated with supply chain is transparent.
4. It has the capability of managing information within the organization or between the organizations.
5. It is capable of performing integration of all processes present in supply chain that consist of various users,
standards, information systems etc.
6. It is capable of developing and implementing accounting models that are used as the tools for reducing cost
and increasing performance.
Answer :
Intra-organizational E-commerce refers to the activities that are performed within the organization so as to consistently
deliver superior quality service to consumers. These activities include methods and technologies that support the internal
business processes of the organization. The main focus of intra-organization commerce activities is to achieve the most
efficient business process. The various activities of intra organizational commerce are work flow management, supply
chain management and product and service customization.
(i) Work Flow Management
Work flow management is a process of coordinating the tasks of various individuals or departments within the
enterprise. The departments usually work in isolation with each other. However, work flow management collaborates
their individual work to get a complete product.
(ii) Supply Chain Management
A supply chain refers to a network in which customers and suppliers are present. Management of supply chain is
an important activity for any enterprise as it makes the business operation possible. In this competitive world, it is
impossible for a single company to stand alone and work isolated from others.
(iii) Product and Service Customization
Customization refers to build the product according to the specifications given by the consumer. Consumers always
want their customized products to be of high quality, high reliability and of longer life spans..
OR
Answer :
Privacy issues play an important role in most of the organizations. Since, they are the mean to collect consumer
information easily using digital tool like digital signatures. In order to ensure the privacy of consumers, there is a requirement
of timely resolution with government and business working together. This is made possible by developing a few particular
standards that are part of uniform business code to carry out transaction over Internet.
OR
EDI Standards
f
Answer : , (March/April-16, Q81 March/April-15, Q4)
Standard play a very important role in the success of EDI system. Standards make sure that the information is
properly transmitted.
Some of the financial EDI standards are,
1. BAI (Bank Administration Institute)
2. 820 and 823
3. CCD (Cash, Concentration and Disbursement)
4. CTP (Corporate Trade Payments)
5. CCD+
6. CTX (Corporate Trade Exchange)
PART-B
ESSAY QUESTIONS WITH SOLUTIONS
....... —..................................... ■■■............... I III- ...................... ..... I HI ...... -
4.1 INTRODUCTION
Q9. What is EDI? Explain four layers of EDI architecture.
Answer : Model Paper-I, Q12(a)
- ' ■ ..
PART-B
....... . .
ays ? EDI can be defined as a medium of passing business information in a standardized format.
Electronic Data Interchange is a method using which relevant business information is exchanged from one computer
to another computer in an electronic format. Other than companies, this method is also used by banks, government
. 04
organizations etc.
EDI Architecture
.04
Architecture of EDI mainly consists of four different layers,
(i) EDI semantic/application layer
ner (ii) EDI standards translation layer
lent (iii) EDI transport/packaging layer
liar
(iv) Physical network infrastructure/EDI document transport layer.
The EDI layered architecture is shown below.
. 04
EDI Semantic
Application Level Services
Layer (1st Layer)
EDI Physical
Internet, I-way Dial Up Lines
Layer (4th Layer)
Consider two trading partners who want to transmit a file between them. A special type of software is used by trading
partners for file transmission. This type of software is called EDI translation software. This software converts the file sent
by the trading partner at the sender’s side into a format that is easily understood by the trading partner at the receiver’s
side.
This is the second layer of the EDI architecture. This layer describes the structure of EDI form that was available
on the EDI application layer and the appearance of EDI form on the higher layer.
(iii) EDI Transport/Packaging Layer
This is the third layer of the EDI architecture. In this layer, the business form is sent from one company to another.
Various companies do not use any electronic medium for transmission of business information among themselves. They
transmit information either by using regular postal system, or a special type of carrier service called a united parcel service.
Often the information is exchanged via e-mail.
This is the fourth layer of the EDI architecture. In this layer, transmitting business document is more complex when
compared with the transmission of e-mail information, or file sharing through a modem or some other electronic device.
The reason behind this is that the business document information is far more organized than the e-mail information and
hence requires lots of processing.
Q10. What is EDI? List out the advantages and disadvantages of EDI.
Answer : Sep./Oct.-15,012(b)
EDI
For answer refer Unit-IV, Page No. Ill, Q.No. 9, Topic: Electronic Data Interchange (EDI).
Advantages of EDI
6. It reduces the number of data entry errors, human intervention, processing delays etc. So, the quality of the outcome
will be good.
9. It reduces the number of personnel required. Also, EDI reduces the data entry cost.
10. It simplifies order entry and processing.
Answer :
In order to be successful in today’s electronic market, companies have to satisfy customers as well as their suppliers.
This requires lot of money and time.
Following are the ways by which EDI can reduce the time and cost,
(a) By reducing paper based systems
(tf) By improving problem resolution and customer’s service
(c) By expanding the customer/supplier base.
(a) By Reducing Paper-based Systems
Before EDI, various companies required a lot of man power for doing their work. For instance, keeping records of
the customers as well as suppliers, storing company’s relevant information consumed both time and effort. Because
of this, everything is done automatically and making payments through EDI also became a lot easier and quicker.
(b) By Improving Problem Resolution and Customer’s Service
Companies with the implementation of EDI can solve their business problems a lot quicker. EDI also plays an
important role in improving the customer service of the company. By using EDI, the order of the customers can be
completed faster without any errors.
(c) By Expanding Customer/Supplier Base
By using EDI, companies not only interact with different customers having different needs, but also with different
kinds of suppliers.
-- SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD.
114 E-COMMERCE
Q12. Explain in detail about the working of Non-EDI system.
Answer :
The working of Non-EDI system can be illustrated with the help of following example.
Consider an example wherein customer and vendor communicate regarding purchasing application.
The interaction takes place between customer and vendor by using mailrooms called paper based mailrooms. These
mailrooms are available on both customer side as well as vendor side. Suppose a customer wants to pass a purchase order
request to vendor, then the following steps are involved,
(i) Customer must first take out a receipt of purchase order information from his/her mailroom.
(ii) Customer must then transmit this receipt to the vendor.
(iii) Vendor gets the receipt of purchase order in a letter or fax format.
(iv) Finally, this receipt of purchase order is stored in vendor’s mailroom.
This can be as shown in figure below,
I I
OR
Explain the prerequisites for EDI. March/April-14, Q12(b)
OR
SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD.
UNIT-4 : Electronic Data Interchange 115
What are the prerequisites of EDI?
When two companies or organizations agree for conducting business with each other, the both parties need to sign
an agreement or a contract which consists of the information regarding,
(i) Kind of business transaction to be done.
(ii) How the business transaction will be done.
* '
(iii) Source of transmission for business transactions.
(iv) Standard that will be used for transactions.
Similarly, the same procedure is followed when carrying out business in e-commerce, wherein EDI technique is
used for doing transactions. It is important to ensure that if the concerned parties are willing for the business proposal,
then it is necessary for these parties to agree for use of EDI. Only then EDI can be implemented otherwise, it cannot be
implemented.
The benefit of using EDI process is that there will be no inference during transmission. This is because EDI system
provides a standard by which information can be transferred.
Prerequisites of EDI
The prerequisites of EDI are the components that forms the basic kit necessary for EDI implementation. These
components include,
1. Standards
2. Translation software
3. Bank
4. VAN services
5. Trading partners
6. Proprietary hardware and network.
1. Standards
Standards play a very important role in the success of EDI system. They make sure that the information is properly
transmitted.
2. Translation Software
The translation software is responsible for,
(eft Sending messages among trading partners.
(b) Integrating data into current computer applications as well as from current complete application.
(c) Translating the data between EDI message standards.
3. Bank
It offers payment as well as remittance.
4. VAN Services
VAN is a service provider that allows communication possible among different business partners. These business
partners exchange electronic data such as purchase orders and invoices.
5. Trading Partners
Trading partners are nothing but suppliers and customers of firm who are responsible for running the business.
6. Proprietary Hardware and Network
If the company is a sponsor or hub company, then it allows the use of EDI. Sponsors are the bigger companies such
as Ford, GM and Toyota.
SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD.
114 E-COMMERCE
Q12. Explain
Answer :
The wor is and structure of EDI transaction.
The
mailroo’
reque' just to make sure that two concerned parties communicate properly but also to
vare devices can be used at the same time for smooth flow of business data.
.Mards were developed but most of them were found to be incompatible. This affected the usage
—to overcome this incompatibility, two standards were developed. These standards are as follows,
1. ANSI X 12 standard
2. EDIFACT standard. '
1. ANSI X 12 Standard
One of the standards that is used to describe how EDI based transactions should be done is X 12 standard. This
standard was developed by American National Standards Institute (ANSI) along with Accredited Standards Committee
(ASC) in 1979. Hence, this standard is also referred to as ANSI ASC X 12 standard.
Types of transactions defined by this standard are,
(a) Purchase order transactions
(b) Delivery order transactions
(c) Invoice transactions
(d) Shipping transactions.
This type of standard is mostly used by United States. The protocols used for ANSI X 12 defined transactions are,
(i) MIME based protocol
(ii) X.400 protocol
❖ X 12 transportation standard
❖ X 12 insurance standard.
2. EDIFACT Standard
The full form of this standard is Electronic Data Interchange for Administration, Commerce and Transport. This
standard was developed under United Nations in the year 1987. Hence, it is also referred as UN/EDIFACT. ANSI X 12
Stannard got merged with ED1FACT standard in the year 1997. The purpose of these standards is make the system versatile.
EDIFACT standard was further developed with the help of UN/ECE. It stands for United Nations Electronic Commission
for Europe.
Some of the transactions defined by this standard are similar to those defined by ANSI X 12 standard. For instance,
purchase order transaction, delivery order transaction, invoice transaction etc. This type of standard can be used to transmit
information among various countries or companies. Most of the transactions under this standard are done by using an
Interactive Exchange Protocol called I-EDI. EDIFACT standard specifies how data can be properly organized by defining
some rules.
With so many benefits provided by EDIFACT standard, in future there are chances that all the countries will be
using only this standard for doing transmissions.
5IIA PUBLISHERS AND DISTRIBUTORS PVT. LTD. ..
114 E-COMMERCE
Q12. Explain in deta;
Answer :
o
The world-' £ is and structure of EDI transaction.
The in
mailroo’
just to make sure that two concerned parties communicate properly but also to
reque'
vare devices can be used at the same time for smooth flow of business data.
.^ards were developed but most of them were found to be incompatible. This affected the usage
Io overcome this incompatibility, two standards were developed. These standards are as follows,
1. ANSI X 12 standard
2. EDIFACT standard.
1. ANSI X 12 Standard
One of the standards that is used to describe how EDI based transactions should be done is X 12 standard. This
standard was developed by American National Standards Institute (ANSI) along with Accredited Standards Committee
(ASC) in 1979. Hence, this standard is also referred to as ANSI ASC X 12 standard.
Types of transactions defined by this standard are,
(a) Purchase order transactions
(b) Delivery order transactions
(c) Invoice transactions
(d) Shipping transactions.
This type of standard is mostly used by United States. The protocols used for ANSI X 12 defined transactions are,
(i) MIME based protocol
(ii) X.400 protocol
The full form of this standard is Electronic Data Interchange for Administration, Commerce and Transport. This
standard was developed under United Nations in the year 1987. Hence, it is also referred as UN/EDIFACT. ANSI X 12
standard got merged with EDIFACT standard in the year 1997. The purpose of these standards is make the system versatile.
EDIFACT standard was further developed with the help of UN/ECE. It stands for United Nations Electronic Commission
for Europe.
Some of the transactions defined by this standard are similar to those defined by ANSI X 12 standard. For instance,
purchase order transaction, delivery order transaction, invoice transaction etc. This type of standard can be used to transmit
information among various countries or companies. Most of the transactions under this standard are done by using an
Interactive Exchange Protocol called I-EDI. EDIFACT standard specifies how data can be properly organized by defining
some rules.
With so many benefits provided by EDIFACT standard, in future there are chances that all the countries will be
using only this standard for doing transmissions.
SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD. -
ERCE UNIT-4 : Electronic Data Interchange 117
Transaction set is the first field in the structure of EDI message. It can be defined as a collection of data segments or
JNIT-4 : Electronic Data Interchange 117
Transaction set is the first field in the structure of EDI message. It can be defined as a collection of data segments or
documents that are transmitted using EDI. There are around three hundred transaction sets in ANSI X 12 standard.
This is the second field in the EDI structure. Data segments are nothing but a set of data elements. The purpose of
using data segments is that they provide information regarding different transactions like,
Third and final field in EDI structure is data elements. This field comprises numerical data like,
OR
.Write about,
OR
Partially integrated EDI system is a system consisting of both Non-EDI system and EDI system, that means there are
certain operations that are performed manually (paper-based work) and certain operations which are performed electronically.
The information flow in this system can be understood by considering the following example which is explained :
step-wise manner.
SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD.
118 E-COMMERCE
Customer/Buyer Vendor/Seller
1. Clerical errors incurred because of the data pntry is decreased. Since, purchasing agent is not filling out the form
manually.
2 The time period for completing the purchase order is reduced.
Fully integrated EDI is an EDI system that carries out information flow electronically. In contrast to partially
integrated EDI, the fully integrated EDI performs their transactions with high speed and high-level of accuracy but with a
trade-off cost.
Consider the following example wherein customer and vendor communicate regarding purchasing products to
illustrate the fully integrated EDI system.
1. Customer transmits purchase order request from the EDI-enabled computer to vendor’s EDI-enabled computer.
2. Vendor responds to the request by giving confirmation message from the EDI-enabled computer.
3. Vendor transmits booking request from the computer to transport company’s EDI-enabled computer.
4. Transport company responds to the request by giving a confirmation message from the computer.
5. Vendor transmits advance shipment notice from the computer to customer’s EDI-enabled computer.
6. Transport company transmits status message to the vendor in order to know about the status of the vendor.
7. Customer passes receipt advice message to the vendor in order to know about the detailed list of various
products supplied.
8. In response, vendor sends list of products supplied along with their cost to the customer.
9. Finally, customer transmits the payment check to the vendor.
This can be as shown in figure below,
* ■
4.2.2 EDI Applications in Business
~ 1 " ............... . 1 , ...... ■.... c .............. ............... ........... ii 1 ..........
OR
OR
OR
OR
Explain about financial EDI and types of financial EDI. March/April-16, Q12(b)
Answer :
Electronic Data Interchange
Electronic Data Interchange (EDI) can be defined as a medium of transmitting business information in a standardized
format. Generally, there are several applications of EDI that are still under development. Some of them include monitoring
of railway rolling stock, plans for containerships, notification of explosive goods on ships, trains, buses or aeroplanes,
exchanging of CAD/CAM (Computer Aided Design)/(Computer Aided Manufacturing) documents, tracking of different
tenders, storing of trade related documents like airway bills, custom clearance, air ticket settlements, goods purchase and
supply related documents exchange etc.
The main objective of doing international trade transaction is to transmit the documents containing goods information
and goods simultaneously and on time. It should not be the case where goods have arrived earlier and the documents
containing goods information have arrived late. These delays in arrival of documents is due to improper management of
documents. Transmission of information is made easier by the use of EDI method. For most of the time, paper based systems
have been used for doing international trade. However, there have been several drawbacks with such systems. They are,
(b) More labour is required in these systems. As a result, cost incurred is more.
(c) Chances of more errors occurring. This makes paper based systems less efficient.
Due to these drawbacks, paper based systems have been replaced by EDI. EDI makes the task easier for small-scale
traders for doing international trade transaction by providing good and efficient services.
Advantages of Using EDI for International Trade
2. Financial EDI
2(a)) r urTT1 EleCtJ°nic Data ^change is a special type of EDI mechanism used for doing financial transactions
cons6 ’ 1 F CUSe° financial EDI’ the transmission of financially related transactions will be more quick and less time
consuming. For instance, transfer of money or payment transactions.
Types of Financial EDI
2(a))
Financial EDI consists of three types of payment methods. They are,
(a) Checks
12(a)
(b) Electronic Funds Transfer (EFT)
2. Financial EDI
Financial Electronic Data Interchange is a special type of EDI mechanism used for doing financial transactions
online. With the use of financial EDI, the transmission of financially related transactions will be more quick and less time
consuming. For instance, transfer of money or payment transactions.
Types of Financial EDI
(a) Checks
It is one of the payment methods used in financial EDI. It is the most commonly used payment method.
(b) Electronic Funds Transfer (EFT)
Electronic Funds Transfer is the second payment method used in financial EDI. EFT is a transmission technique
used by various banks to do payment transactions among each other. Different kinds of payment transactions are
possible like credit transactions, debit transactions etc. In simple terms, EFT is a technique used for bank-bank
communication.
(ii) E-cash.
This is the third type of payment method used in financial EDI. All transactions are processed through a special
type of central server called Automated Clearing House (ACH). For instance, credit based transactions like payroll
payments, payments to contractors and vendors etc., and debit based transactions like consumer payments, payments
of bills, mortgage loans etc., are all possible through Automated Clearing House. Therefore, rather than using credit
cards or debit cards for doing transactions, most of the businesses today are doing transactions through ACH payment
system. This type of payment system is particularly useful for two types of customers,
Advantages
■ a) Quick transfer of money for the customer is possible with financial EDI.
ib) Transactions can be done at any time i.e., round the clock.
Disadvantages
(c) Payments may incorporate significant delays if the transmission speed is low or transmission media is congested.
Manufacturing process in e-commerce is basically done by using a special type of technique called JIT or Just in
Time. The importance of EDI with JIT is as follows,
(a) EDI with JIT
Many of the companies using EDI with JIT are finding it easier to do manufacturing process. Companies can now
deliver the products on time to their suppliers. This is because, once the orders get completed, the respective products
are delivered to the suppliers electronically, which helps in decreasing the time-consumed in delivering the products.
(b) EDI with Quick Response
Retailing process in e-commerce can be done efficiently using a technique called Quick Response (QR). The usage
of this technique depends on the individuals using it. Customers use quick response technique so that they get to
know about the latest products and their services in the market. Retailers and suppliers use this technique to have
an edge over their competitors. Just like EDI was used along with JIT to make the manufacturing process easier,
similarly, EDI is used with Quick Response for simplification of the retailing process.
There are mainly two reasons why EDI is used with quick response,
(i) To minimize the time that is taken for order generation till order completion.
(ii) To identify the type of goods are for sale and the type of goods are for purchase. For this, a special EDI technique
called Point of Sale (POS) is used. In other words, this technique is used for proper inventory management.
Advantages
(a) The overhead and the cost involved in storing a large inventory of products is eliminated by using Just-In-Time
technique.
(b) The retailers make use of the Quick Response (QR) technique, which mainly focuses on the inventory-level of al.
the products. Once the product inventory goes below a specific level, QR technique automatically generates purchase
orders for its suppliers.
Disadvantages
(a) There is a possibility of losing bulk orders if inventory level becomes low.
(b) JIT and QR techniques work well till the relationship between retailers, suppliers and manufacturers is good bu:
once this relationship breaks then the suppliers and the retailers will not have sufficient stock to satisfy customer
demands until they get a new manufacturer.
(317. Explain the working of financial EDI for E-commerce.
Answer :
Financial EDI Payments
There are two types of information that are absolutely necessary in financial EDI,
❖ Payment information
❖ Remittance information.
So, financial EDI payments can be done in two possible ways,
(i) Transmitting payment information and remittance information simultaneously
(ii) Transmitting payment information and remittance information separately.
(i) Transmitting Payment and Remittance Information Simultaneously
Consider two companies, say company A and company B involved in financial EDI payment transaction. For doinj
such type of payments, a special central bank server called ACH(Automated Clearing House) is needed. ACH manage;
transactions that take place between customers bank and supplier’s bank. In this example, assume company A as th;
customer and company B as the supplier.
SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD. -- -------------- ------------------- —-------------
UNIT-4 : Electronic Data Interchange 123
The steps involved in payment transaction process between company A and B are as follows,
1. Company A passes the remittance information and payment instructions to its bank. Both the information contains
the details of the amount to be paid to the supplier as well as the date that was given for payment respectively.
•2. On receiving both the information, bank of company A sends them to ACH.
3. ACH operator updates the payment instructions, extracts accounting data and then sends the payment instructions
remittance information to the bank of company B.
4. Finally, the bank of company B sends both these pieces of information to company B.
The diagrammatic representation of transmission process of payment and remittance information simultaneously is
as follows,
Transmits
Goods or
Services
Bought
is as shown below,
Answer :
Value Added Network (VAN)
VAN is a network that makes communication possible among different business partners. These partners exchange
EDI messages such as purchase orders, invoices. The other services provided by VAN’s are,
Electronic MailBoxes
It is a feature of software that stores EDI messages which users fetch depending on their requirements. It is ven
much similar to home personal mailboxes.
Many business transactions are performed by establishing a connection directly between businesses or by making
use of VAN. VAN acts as middleman and allows companies to automatically and securely exchange crucial data over the
network. Through VAN, the exchange of EDI messages takes place in the following order,
Pricing structure of VAN is based on services that are provided by it. Different services offered by VAN are,
(i) E-mail capability
(ii) Inter-VAN connectivity
(iii) EDI to fax support
(iv) Supporting EDI translation software
(v) Transmission of X. 12 documents.
There are three categories of costs that are associated with VAN services,
1. Account start up costs
2. Usage or variable costs
3. Interconnect costs.
1. Account Start Up Costs
> very i Whenever an account with VAN is created, start up cost and network usage cost is incurred. Network usage cost is
the monthly rent that should be paid even if services are not utilized.
laking | It may also incorporate mailbox fee that maintains an account and a password. There are various factors on which
'er the | start up costs depend,
This is a variable cost that depends on the utilization of EDI services. In E-commerce, usage refers to the number
of transactions carried out by a particular customer. In order to reduce the transaction cost, many transactions are merged
together and transmitted in a single envelope.
3. Interconnect Costs
Interconnect cost is the cost that is incurred while establishing a connection for the purpose of exchanging EDI
messages. Interconnect cost includes monthly rent and even incorporate other charges only when a transaction is performed.
Usage cost on each transaction is reduced when there is increase in number of transactions conducted. This is because
VAN offers discounts depending on volume of transaction. There is a lot of difference in incurrence of costs while sending
message to a customer using same VAN or using another VAN.
In Internet-based EDI, the data is transferred through Internet without using VAN network. This is possible only
when both communicating business partners use same protocol for exchanging messages.
This service offers two types of methods through which messages are exchanged. They are,
E-mail is the conventional method of exchanging message. Every e-mail message should encapsulate EDI interchange
and encryption techniques for ensuring e-mail privacy. The following information is exchanged among business
partners,
(b) Agreement on various encryption and authentication techniques used including e-mail feedback in the form
of acknowledgment.
(c) Public keys used in encryption techniques such as PEM or PGP (Pretty Good Privacy).
FTP-based messaging is another message exchange method provided by VAN-free Internet EDI service. In order
to exchange EDI messages using FTP, the trading partner needs to create an agreement that will include,
Most of the organisations today are using Internet for carrying out EDI based transactions. The researchers of DOD
(Department of Defence) states that a trading partner can make a choice of using either VAN or Internet as their
communication medium if VAN and Internet interoperate with each other.
SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD. ................ -... - - - - -------
UNIT-4 : Electronic Data Interchange 127
Q20. What is intra-organisational E-commerce? What are its features?
Answer :
Intra-Organisational E-commerce
Intra-organizational E-commerce refers to the activities that are performed within the organization so as to consistently
deliver superior quality service to consumers. These activities include methods and technologies that support the internal
business processes of the organization. The main focus of intra-organization commerce activities is to achieve the most
efficient business process. The various activities of intra organizational commerce are,
Work flow management is a process of coordinating the tasks of various individuals or departments within the
enterprise. The departments usually work in isolation with each other. However, work flow management collaborates their
individual work to get a complete product.
(i) Removing the useless or unnecessary operational steps from the business process.
(ii) Replacing the internal paper work with computerized processes. By doing so, the processing time and speed
of the business process is reduced.
Customization refers to build the product according to the specifications given by the consumer. Consumers always
want their customized products to be of high quality, high reliability and of longer life spans. This activity is related with
agile manufacturing wherein elimination of inventory and other useless activities are performed. This is done to achieve
more flexibility in production scheduling a help quality product.
OR
Write about legal, security and privacy issues in EDI. March/April-15, Q12(a)
OR
OR
OR
What are the legal and security issues in EDI? (March/April-13, Q12(b | Model Paper-I, Q12(b))
Mostly, EDI transactions are carried out on a large scale. For example,
❖ Transactions between two countries
❖ Transactions between two corporations.
Therefore, it is necessary that transaction data is legalized and secured before transmission. Legalizing and securing
process also plays an important role when any particular application is designed, especially an EDI based application. In
order to use an EDI globally, it is mandatory that transactions through EDI should be legalized. Efforts have been made to
legalize EDI based transactions. Generally, a law is used for making transactions legal in e-commerce. This law contains
three types of communication standards which basically define the type of transactions that are legalized. These standards
are bfsed on special type of service called USPS (United States Postal Service).
Unlike previous two standards, this standard does not use features of USPS. This standard legalizes telegram based
transaction.
SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD. -_ __ _____
UNIT-4 : Electronic Data Interchange 129
Privacy Issues
Privacy issues play an important role in most of the organizations. Since, they are the mean to collect consumer
information easily using digital tool like digital signatures. In order to ensure the privacy of consumers, there is a requirement
of timely resolution with government and business working together. This is made possible by developing a few particular
standards that are part of uniform business code to carry out transaction over Internet.
Digital Signatures and EDI
Digital signatures are cryptographic process of making sure that the transactions between the sender and receiver
is legal. Digital signatures guarantee that no alterations occur during transactions.
Transactions between Sender and Receiver using Digital Signatures
Before transmitting a message, the sender uses hashing technique to convert it into a special type of message called
message digest. This message digest is then encrypted by using a private key which is known only to its owner (the sender).
This encrypted private key is called digital signature. Now, the original message as well as the digital signature is sent to
the receiver.
Receiver gets the original message as well as the digital signature. In order to check the authenticity of the sender
or in other words, if receiver wants to know whether sender is authorized or not, the receiver decrypts the digital signature
into a message digest by using its public key. Also, receiver with the help of hashing techniques converts the original
message into another message digest. Hence, there will be two message digests. Finally, the receiver cross checks both
the message digests. If both the message digest matches, receiver will be assured that the sender is authorized. There is no
question of alteration of such type in transaction process. If digital signature process is implemented for EDI transactions,
then legalization of EDI is possible which intum ensures security and privacy of transactions.
Traditional EDI service is a type of EDI service where orders are transmitted through a special type of network
called Value Added Network (VAN). In other words, traditional EDI service is a service where EDI transactions are done
through Value Added Network. This service can also be referred to as conventional EDI service.
Traditional EDI service is used for converting EDI based documents into a standard that can be easily understood
by trading partners. It uses a special technique called EDI Translation Software which sends the documents to partners
over communication channels.
Different techniques are used in traditional EDI service. Few of them are as follows,
❖ Electronic funds transfer
❖ Trade data inte-change.
Electronic funds transfer is issued in traditional EDI service to carry out financial transactions.
Trade data interchange technique is used in traditional EDI service carry out trade based transactions.
Traditional EDI service can be classified into two types,
(a) Old EDI service
(b) New EDI service.
Standards play a very important role in the success of EDI system. These standards make sure that the information
is properly transmitted. Other than standards, there are few other components that are also important in implementing EDI
successfully,
(b) Banks
Features of EDI
1. Messages are created anatomically through EDI. This means that no human involvement is required in message
generation.
2. Integrity of the message is also verified automatically. In short, EDI minimizes the human interference.
4. Using EDI, different forms of business documents can be transmitted. For instance, purchase orders, invoices etc.
Q24. Explain EDI software implementation and how much an EDI cost.
Using these four layers, message is encapsulated in the form of packets and transmitted to the destination using VAN
network. When receiver gets the packets, it performs decapsulation in order to retrieve actual message.
In this EDI layer, a document in a software application is created which is then transferred to EDI translator. The
responsibility of EDI translator is to convert a message into the format aS specified in EDI standard. If EDI translator and
software application belong to different vendors, it becomes necessary to merge document preparation application with
EDI translation software. If both the softwares belong to same vendor, then data transmission can be performed with high
speed. EDI translator also helps in creation and wrapping of document into EDI package.
The document that is created has a unique mailbox ID that is used to identify target business partners.
In this layer, the document is converted to a specific format so that it can be used by translator.
3. Translator Layer
The main purpose of using translator is to define the association that exists between data elements present in software
application and EDI standards. Translation is the core part of EDI process.
- - SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD;
132 E-COMMERCE
The task of translator is to ensure that data is translated according to the format as specified in EDI standards that
business partners can use to understand the message. There is a chance of running a business without EDI translator, which
could be a risk if business partners are unable to read the message that is transmitted.
Many companies themselves have developed their own custom EDI translators as,
(i) When compared to commercial translator, custom translator does not get any support or help when required
or if any difficulty arises.
(ii) Custom translator is confined to transact with only one business partner i.e., it is limited and performs the
operation within the organization boundary.
(iii) It is extremely difficult to update custom translator.
4. Communication Layer
Using these systems, business partners can communicate with each other through modem. The benefit of such systems
is that they are more simple to use.
(b) Limited VAN Services
♦
(a) Business layer creates an application which is transferred to EDI translation layer.
(b) EDI translation layer performs translation so that application is based on EDI standards.
(c) EDI communication layer receives the application in the form of an EDI envelope. This layer transfers the envelope
to VAN mailbox.
SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD.
UNIT-4 : Electronic Data Interchange 133
. ............ ........... ————
On the receiving end,
(a) EDI communication layer fetches the envelope from the mailbox using VAN network.
(b) EDI translator decapsulates the envelope and retranslates the message into a form that can be read by the receiver.
(c) EDI business layer performs validation of the application received from EDI translator layer.
The diagrammatic representation of the four layers is as follows,
Company A Company B
as
There are various factors on which the cost of EDI product depends,
1. Expected volume of electronic documents
2. Economics of EDI translation software
3. Implementation time
4. Maintenance fees
5. VAN charges.
1. Expected Volume of Electronic Documents
The number of documents managed by EDI products depends on the cost of EDI products. If the cost of EDI products
is more, then EDI products can manage more number of electronic documents. If cost of EDI products are less, then
they can manage less number of documents.
To implement or carry out any particular application or software, it is necessary to have knowledge about it. Another
important point to be noted is that, the implementation time of any particular application depends on the time taken
to learn that application. If more time is involved, implementation time will be more. Else, implementation time
will be less.
4. Maintenance Fees
Following are few services on which maintenance fees are charged by company,
(a) On using its customer support service
(b) On using its technical support service
(c) On using its software updation service.
5. VAN Charges
INTERNAL ASSESSMENT
I. Multiple Choice
1. The first layer of EDI architecture is [ ]
(a) EDI semantic/application layer
3.- is a special type of EDI mechanism used for doing financial transactions; [ ]
a
(a) Manufacturing EDI
(c) QREDI
4. is prerequisite of EDI. [ 1
(a) Standards
(c) QR system
6. refers to the activities that are performed within the organization so as to consistently deliver superior
quality service to consumers. I 1
(a) Intra-organizational E-commerce
(a) Four
(b) Five
(c) Six
(d) Seven
8. The number of documents managed by EDI products depends on__________ of EDI products. [
(a) Economics
(b) Demand
(c) Cost
3- . _____ prerequisite of EDI is responsible for sending messages among trading partners.
7. The main objective of doing international trade transaction is to transmit_________ containing goods information
and goods simultaneously and on time.
9- _______ ___ is the monthly rent that should be paid even if services are not utilized..
10- __________ is a variable cost that depends on the utilization of EDI services.
1. (a)
2. (c)
3. (b)
4. (d)
5- (b)
6. (a)
7. (a)
8- (c)
9. (b)
10. (d)
2. ValueAddedNetwork
3. Translation Software
5. Transaction Set
Answer :
Architecture of EDI mainly consists of four different layers,
(i) EDI semantic/application layer
(ii) EDI standards translation layer
(iii) EDI transport/packaging layer
(iv) Physical network infrastructure/EDI document transport layer.
Q2. What are the types of information that are needed in financial EDI?
Answer :
There are two types of information that are needed in financial EDI. They are,
❖ Payment information
❖ Remittance information. '
Q3. How data is transferred in internet based EDI?
Answer :
In Internet-based EDI, the data is transferred through Internet without using VAN network. This is possible only
when both communicating business partners use same protocol for exchanging messages.
Q4. Write a note on electronic mailbox.
Answer :
Electronic mailbox is a feature of software that stores EDI messages which user fetches depending on their needs.
It is very much similar to home personal mailboxes.
Q5. Define customization.
Answer :
Customization refers to the process of building the product according to the specifications given by the consumers.
Consumers always want their customized products to be of high quality, high reliability and of longer life spans. This
activity is related with agile manufacturing, wherein elimination of inventory and other useless activities are performed.
( LEARNING OBJECTIVES
After learning this unit, a student will have through understanding about the following key concepts,
❖ E-Advertisement.
INTRODUCTION
E-marketing is the achievement of marketing goals through the utilization of the Internet and the web based
technologies. E-marketing is also known as Internet marketing or marketing on the web or online marketing.
A search engine can be defined as a software system designed to search information on Internet. Unlike
directories, the search engines are considered to be the most popular method in finding sites. The search
engines operates by taking user-defined words and boolean expression in search bar.
Directories are new online advertising mechanism that helps in representing business functionalities. These
functionalities are represented in the index format that list and supplies links to the websites.
Online advertising is a marketing strategy that make use of Internet to fetch website traffic and target, deliver
marketing related information (in the form of messages) to the right customers.
Digital marketing refers to the management and execution of marketing activities by using digital electronic
technologies and channels like digital TV, E-mails, web, wireless media and digital data concerning consumer
behavior and its attributes.
Spam mail is a forceful means of attracting customers. The term spam mail refers to the unwanted and unrequested
on-line email called ‘junk mail’ which is repeatedly sent to multiple recipients at a time. Here, the word spam means
“postage due marketing”, which indicates thousands or millions of messages residing on the host systems of recipients.
These messages reside until they are deleted. This mail can be an advertisement from an organization that tries to sell
something to the recipient. Usually spam mails are send to those who have never visited the site. Sending of spam mail
requires e-mail addresses. Spammers usually collects the e-mail addresses from the social websites, chat rooms etc. They
also employ an e-mail appending techniques that makes use of known information about the Internet users and searches
the e-mail addresses of such users based on the available information._________________________________________
Q4. f¥Vrite a short note on E-mail.
OR
E-Mail
Answer : (Model Paper-I, Q5 | March/April-16, Q5)
Electronic mail is simply an information that is sent electronically from one computer user to another. E-mail is a
fast and convenient way to handle correspondence. E-marl is a system for sending and receiving text messages, graphics,
audio and videos through the user’s computer. E-mail provides fast, inexpensive and convenient service to the computer
users.
E-mail system has five functions. They are,
(i) Compose
(ii) Send
(iii) Report
(iv) Display
(v) Disposition.
SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD. _
UNIT-5 : E-Marketing Techniques 141
Q5. Write about directories.
Answer : Oct./Nov.-16, Q5
Directories are new online advertising mechanism that helps in representing business functionalities. These
functionalities are represented in the index format that list and supplies links to the websites. The listing of the websites
can be done either alphabetically or category wise. The indexes which are listed category wise displays the indexes in a
sequential order. So, when the users click on one category, they are then navigated to the respective page. However, the role
of the directory service is critical and it is important that the categories are listed inaccordance to the user’s expectations.
This is necessary because if any category is missing or listed somewhere else, the user may think that the intended content
is not present on that site. Apart from this, they exist many directory services that depict the organization businesses in
multiple categories.
These days, there are many directory services that registers the websites free of cost. Some of these include info
seek, Internet mall, the yellow pages and yahoo.
Q6. What are the banners?
OR
Banners
Answer : (March/April-15, Q8 | March/April-14, Q6 | March/April-13, Q8
Banners are the most popular form of online advertising method which is used to attract visitors. A banner typically
can be defined as a rectangular shape box, about 60 pixels high and 360 pixels wide. Generally banner advertisements
contain texts, graphics or some times only graphics. They are meant to appear on screens of each engines, web browser
software and web-sites so as to capture the attention of WWW users. These advertisements are referred to as “click-through”
advertisements. They contain hypertext links corresponding to the site about which the banner is advertising.
Q7. Write about Applications of 5P’s in Internet.
Answer : (Model Paper-ll, Q5 | Oct./Nov.-12, Q8)
A search engines can be defined as a software system designed to search information on Internet. Unlike, directories,
the search engines are considered to be the most popular method in finding sites. The search engines operates by taking
user-defined words and boolean expression in search bar. The generated search results are represented in a line of strings,
which are a list of closely matched websites and are often called as Search Engine Results Pages (SERPs). The generated
result content may be the combination of web pages, images and various types of files. So, when the user types certain
string in search bar and clicks enter, the search engine periodically “crawls” through the Internet searching for new pages
and updates the existing databases. The speed with which the engine performs updation and searches the number of location
have major impact on the total number of sites indexed as well as on the revenue to the site. That is the more number of
clicks to a site by user, the higher income to the site owner. In addition to this, the search engines maintains real-time
information by using an algorithm on web-crawler.
- — ' SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD.
142 E-COMMERCE
OR
Explain any three E-marketing techniques in detail.
(Refer Only Topics: Search Engine and Directory Registration, Solicited Targeted E-mail, interactive Sites)
Answer : March/April-17, Q13(a)
Directories are new online advertising mechanism that helps in representing business functionalities. These
functionalities are represented in the index format that list and supplies links to the websites. The listing of the websites
can be done either alphabetically or category wise. The indexes which are listed category wise displays the indexes in a
sequential order. So, when the users click on one category, they are then navigated to the respective page. However, the role
of the directory service is critical and it is important that the categories are listed inaccordance to the user’s expectations.
This is necessary because if any category is missing or listed somewhere else, the user may think that the intended content
is not present on that site. Apart from this, they exist many directory services that depict the organization businesses in
multiple categories.
These days, there are many directory services that registers the websites free of cost. Some of these include info
seek, Internet mall, the yellow pages and yahoo.
(iii) E-mail Chain Letters
E-mail Chain Letters is an aggressive advertising technique which is designed to attract the attention of the users. It
is a low-cost technique which can be used by firms for promoting their products or services. For instance, whenever a user
registers by visiting a site and forwards its link to others, then the referring individual gets extra benefits for every person
who visited the site by clicking on the link._________________________________________________________________
Q11. List out the advantages and disadvantages of E-marketing.
Answer : (Model Paper-Ill, Q13(a) | Oct./Nov.-13, Q13(b))
Advantages of E-marketing
E-marketing is a readily accessible, inexpensive, fastest means of bringing together various buyers and sellers,
large and small all over the world. When the buyers and sellers are electronically linked, huge volumes of data can be
interchanged which ultimately results in increasing trading activities. The advantages of E-marketing can be divided into
the following,
SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD. ■
UNIT-5 : E-Marketing Techniques 145
(a) Advantages to sellers
(b) Advantages to customers.
Advantages of E- markeing
__ I ' I
Online marketing provides competition from the various parts of the world. Unlike, the traditional marketing wherein
the buyers and sellers were confined only to certain specific geographic areas, online marketing enables them to
access any comer of the world. An online marketer can access global customers, follow global strategies, compete
globally and fluid global supply chains. Opening a website is equivalent to opening a marketing office.
2. Global Marketing
With the help of online marketing, even small firms can have access to all the markets at a cheaper rate. Example,
a sole trader having the business of hair oil in some local area in India can sell its products and services anywhere
in the globe and that too at a comparatively lower marketing cost.
3. Scope for Unimpeded, Constraints Free Growth
Limitations of showroom’s space, warehouses, sales staff, office building, retail shop and many other do not cause
apy effect on the running of the business. The marketers can operate through web by using a single warehouse and
limited staff members.
4. Offers Many Services and Products from a Single Stop 6
A huge number of buyers and sellers interact with each other and they offer a very big variety of goods and services
on a single website. This is possible because of the direct and indirect access of the marketer to the customer.
5. Targets the Customer Individually
The online direct and interactive communication help marketers to target the customers individually. They can get
all the necessary information about the customer irrespective of the location and the marketer also provides all the
necessary information to the customer. Targeting customers individually helps to provide a tailor made product and
personalized services.
6. Helps in Building Relationships with Customers
Online marketing being interactive and one-to-one marketing helps in building relationship with customers. Due to
good relationship between the seller and the customer, the seller can offer more customized products, services and
incentives. They may also offer a product totally according to the customer’s specifications. Example, customized
services provided by the Dell computers.
SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD.
146 E-COMMERCE
7. Helps to Reduce Costs 5. Customers can get ‘More for Less’
The online marketing helps in reducing various costs Online marketing helps the customers to get more
such as business costs, channel costs, Communication value for their money. The sellers offer the product to
costs etc. Business costs includes various costs which the customers at appropriate price and value keeping
are incurred to carry out the business operations without the point in mind that, the customer can purchase the
the use ofpaper. It is estimated that web business costs product anywhere in the world. So, they follow the
only one-tenth of the traditional business. Channel policy ‘more for less’.
costs are reduced as the product is marketed through the
6. The Power Equation Shifts in Favour of the
web. It reduces the cost of showrooms, warehouses etc.
Customer
Communication or promotion costs are also reduced as
the product is advertised through web to large group The web marketing alters the power equation from
of people. the marketer to the customer. In case of traditional
8. A Versatile Medium of Communication
marketing more focus was laid on the supply side
and the customer was taken as granted. There was
Online is said to be a versatile medium of
an assumption that the customer will make and take
communications as it is a combination of newspaper,
all troubles to purchase the product from the stores
magazines, radio, billboards, telephone and T.V.
as long as the stores are fully stocked.
The online marketing is flexible in nature which is a
distinctive feature of it. Internet is a unique medium as Due to the benefits of online marketing it has become
it is a mass, personalized medium in reaching people fast and has manifested itself in three ways,
and at a low cost. ❖ Growth in volume
(b) Advantages to Customers ❖ Enlargements in the range ofproducts marketed
1. Convenience ❖ Growth in Internet subscriber base.
The customer can purchase the product just by
Disadvantages of E-marketing
clicking a mouse button staying at home. Lots of
time and money is saved in online marketing. The The disadvantages of online marketing are,
customers can have 24 x 7 access to the online 1. All Products do not Lend Equally Well for
marketing. There is online interaction between the Web Marketing
marketer and the customer. The customer can have The first and foremost drawback of online marketing
the demonstration of the product, make online orders, is that it is not suitable for any and every product.
make online payments and accomplishes the entire For instance, when Philips India went in for web
purchase process through net. marketing it had to select a few products and keep
2. Search Advantage and Wider Options the others off.
In traditional shopping customer was provided with 2. Costs Involved are Not Inconsequential
limited choices. They had to visit 4 or 5 outlets in
Costs involved in web marketing are not low as it is
order to get the best of it, which used to be tedious. But
f the whole scenario is changed with the use of online often made out. The costs are not incurred just once
at the time of creating up a website but the marketer
marketing. Online marketing provides the customers
is required to spend money on running, maintaining
with a large variety of products throughout the world.
and updating the site. If the marketer does not spend
3. Customers can Bargain on Net with a Host
sum on the above mentioned activities then there are
of Sellers
chances of losing a large number of customers.
Online marketing being interactive in nature helps its
3. No Reliability about Profitability
customers to bargain with sellers for the low prices.
The customer can make comparisons regarding the Many marketers in the present era are struggling
brands, prices and makes the best deal. to make their business viable and profitable. Even
4. Transparency and Accuracy Amazon the world’s biggest online marketer is yet
to break even.
The online marketing provides the customer with high
level of transparency unlike, the business transactions. 4. Lack of Personal Interaction While Making a
Nothing is hidden from the customers. Just by a click Purchase
of mouse the customer comes to know about every Many people prefer the live interaction when they
minute detail of the product regarding its prices and buy. They believe in having face to face conversation
terms. rather than online marketing.
SNA PUBLISHERS AND DISTRIBUTORS PVT. LTD................ ...................................... ......
UNIT-5 : E-Marketing Techniques 147
This is the combination of only component and only (b) Micromarketing through tele marketing.
bundles methods. Here, the product is sold separately (a) Micromarketing through Direct Mail
^ls well as by combining with other products.
In this micromarketing method, companies persuade
The feasibility of the above three methods depends people to buy their products by writing to them.
on the following factors, (b) Micromarketing through Telemarketing
(i) Cost of using each method. In this method of micromarketing, companies tell
(ii) Profit incurred with each method. people to buy their products by talking to them through
telephones.
(d) Relation between Pricing and Priority of
Information based Products The working of both the methods might be different
from one another but their objectives are same in order to
New type of products are slowly making an impact satisfy the needs of the customers.
on e-commerce. These products are called information based
products. The possible forms of information based products Micromarketing can be classified into two types,
are, 1. Direct-relationship Marketing
(i) Software related products This is the first type of micromarketing. In this type,
companies try to establish a relationship with the
(ii) Electronics related products
customers by direct contacting with them for the
(iii) Entertainment related products. purpose of improving their sales.
SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD. ——__ ______________________
UNIT-5 : E-Marketing Techniques 149
2. Direct-order Marketing E-commerce has brought a drastic change in many
economies with the effects that turned as the marketing
This is the second micromarketing type. In direct-
aspects of the products. They are,
order marketing, companies are not concerned about
how the sales will improve. They just concentrate on (i) Availability of new technology-based or technology-
how to sell their products and services to different enhanced products.
customers.
(ii) Availability of e-commerce results in change in the
(iii) Small Organisations Against Large presentation, distribution and assortment of existing
Organizations products.
Both large and small organizations used television as (iii) Availability of new opportunities for the participation
a medium of advertising. Despite of this, large organizations in Business-to-Business (B2B) commerce have come
dominated sm'all organizations for a long period of time. to the lime light.
The reason for this was that through television, large
The common attributes which a customer compares
organizations not only promoted their products in local
whether it may a product sold online or product sold from
markets, but also in global markets. For example, they
department stores is value, brand and product design.
advertised their products in India as well as outside India.
Whereas, small organizations could only do local advertizing 2. E-Commerce on Physical Distribution
as cost required for doing global advertizing through
E-Commerce has a great impact on retailing, physical
television was beyond the reach of small organizations.
distribution and supply chain management. Internet has
All this has changed with the emergence of electronic brought a wide change in the area of physical distribution
commerce. Now, small organizations can also promote with Just In Time (JIT) system, EDI and RFID. Supply Chain
their products globally by using services like internet. This Management (SCM) is one of the major influences of the
is because using internet is far more cheaper than using internet’s open standards for information flow. The efficient
television for global advertising. flow of information sharing is acquired through some
strategies which are leveraged by leading organizations.
5.3 E-COMMERCE INFLUENCE ON They include material planning, inventory planning,
MARKETING enhanced participation of partners, extending the research
Q15. Explain the impact of E-commerce on Marketing. and the distribution channels on the internet.
The steps involved in the process of interactive (ii) On categorizing the people using online firms,
marketing on internet are as follows, (a) For transaction processing
(b) For exploring the information.
3. Volume Methods
(i) Traditional Option There are four types of customer interactions. They are,
1. Passive Interaction
Ads are placed in airports, television, monitors on ski
lifts etc. It is carried out via anonymous FTP sites (File Transfer
Protocol), which is done by just dialling and utilizing the
(ii) Online Option
user name and password. The main goal is to provide a way
Ads are placed in news groups, yellow page in which customer is unrestrained completely.
directories, bulletin boards, WWW pages etc. 2. Direct Interaction (Active Interaction)
Once an advertising campaign is planned the It is carried out via e-mail or chatting, which allows
development of promotional materials is carried out which two users to have online discussion. The main goal is to
includes traditional advertising and knowledge oriented follow a customer with answers to questions and requesting
material. for answers.
—------ SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD.
152 E-COMMERCE
3. Group Dialog
It is carried out through news groups, bulletin boards across the company and customers. The main goal is to provide
customer interaction such that the solutions of unexpected problems are carried out in an easy manner.
4. Video Conferencing
It is carried out via Multicast Backbone called MBone on internet. The main goal is to provide active participation
among customers and to analyze. The product activities through digital broadcasting audio, video and text etc., supported
by MBone.
Step-5: Mastering through Customers
In this aspect, product evaluation criteria plays a vital role which is carried out by the marketing plan. Marketing
plan includes measuring or estimating productivity of elements like price, product, repeat purchase, market share, sales
volume etc. Analysis on company’s materials compared with channels like endsales, distributor contacts etc. Which is later
modified as per the needs of target groups.
Step-6: Online Customer Service
In the process of interactive marketing support for online services to customers plays a crucial role where the
customers interaction is compared with other marketing strategies.
Some of the online services which are supported by vendors, public forums incorporates bulletin boards, knowledge
bases on the business services like news groups, CompuServe etc.
Vendors should develop brand loyalty among consumers, so that the products are purchased repeatedly.
OR
Discuss about applications of 5P’s. (Model Paper-I, Q13(b) | Oct./Nov.-16, Q13(b))
OR
Pricing is a mechanism using which price of the physical good or service is determined. It is the amount of money
. - arged to the customers for the goods or services offered by a firm. There are many different strategies which are adopted
?y a firm in relation to price. For example, a customer is given discounted price if he buys the goods or service in larger
olume at a time. There are various strategies used by web based marketers to attract customers. For instance, few sites
are offering free of cost services to the customers only to create a community through which it can earn profits by selling
advertising space, for example parenthood.com. In another case there are few sites which are paying their customers for
_jing their services on hourly basis only to place its advertising bar on their web browsers. Frequent purchase systems are
-'eing introduced in order to gain customers trust and loyalty which indirectly will earn their interest in buying the products
nline again. Search engines provides an extra functionality to the customers by helping them compare the prices of the
products of all the goods and services which are available on the Internet. Now a days online auctions are also attracting the
?eople who frequently shop online. The auctioneers who wants to sell the product sets the price of the product at its lowest,
vhereas the bidders bid the highest prices sometimes or the prices which are fair enough. There is another technique wherein
die price of the product is set according to the prices offered by consumers. For example priceline.com which enables its
?uyers itself to set prices for hotel reservations, online airline tickets, cars on rent. Prices charged by the different firms for
die goods and services are freely available on the Internet. Due to which competition between them is increasing day by
day thus forcing each of them to lower down the prices of their products. Apart from this, there are many other criteria on
which the price of the product depends. They are,
(i) Reliability of sellers
(ii) Availability
(iii) Service
(iv) Incentives.
Thus, difference in the price tags of the products offerred by different firms brings a challenge to the web based
sites. There are different issues faced by the web based sites. One of them is how to standardize the prices. Therefore, it is
necessary to employ some stratergies which should set the price of the product according to it.
3. Place (Distribution)
Plaqe corresponds to the distribution of the product i.e., moving of the product from the producer’s warehouse to
customer. There are different channels or mediums through which product is delivered to the consumers, one channel is
that the product is sent directly to the consumer whereas the other channels obtains an indirect way. That is products are
distributed with the use of intermediaries such as retailers, warehouses, wholesaler. E-commerce can be revolutionary in
terms of business and delivery of goods within on time. At present it is the fastest communication channel through which
information about the products can be delivered to the customers. For example, insight enterprises is a real time firm which
has formed a strategic alliance with federal express. Thus, now federal express delivers the services to the customers directly
without the need of warehousing the products.
Internet is a boom in todays era because of its instant delivery of online services to the needy customer. For example,
if a person needs to convert its business file into French on urgent basis then he/she requires a English-French business
document translation software. Thus, an only option a customer can opt at depending on the moment is to buy an online
English-French business document software by visiting an online store using either its debit or credit card.
4. Promotion
Promotion refers to the marketing activities such as press release advertisements, word of mouth, news stories which
are used to create awareness of the products or services among the users. It is done with the goal of generating a positive
customer response. Some of the methodologies adopted for marketing communication are,
—....... .... —.. — - SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD.
154 E-COMMERCE
(i) New stories 5. People/Personalization
(ii) Paid advertisement channels People is an element which refers to individual, staff
(iii) Consumer’s personal experience and customers. It covers the customer service levels as well
(iv) Packaging as effective communication and training for the staff because
(v) Word of mouth. both are significant for growth of the business.
Paid advertisements is a form of marketing Personalization is a technique in which users are
communication in which the advertising media channels are allowed to customize their home page according to the
paid for advertising firm’s products or services. This includes individual preferences. User of the site are given the ability
billboards, television, special events, magazine, newspaper, to choose what information they want to see when they
direct mail. Apart from this, Internet acts as a new advertising open their web browser. For example, a user can customize
channel to inform customers about the benefits offered by its homepage for its favourites websites such as facebook,
the product and services. It is a new medium which charges gmail. Its functionality is far better than the product and
minimum money for advertising. Therefore, every year promotion as it covers both of their functionality. Personalize
companies issue a fixed amount of budget for advertising feature is present in user domain because they use it for
purpose. customizing and controlling. For example, Hallmark is the
Companies tries to keep track of the advertising media best example of it. It not only provides services to the users
in order to analyse whether their money which is being upon its request but also stores their personal details in the
spend is leading to success or growing their business scale. database in order to remind them of any special occasion,
But analysing and keeping track of the different number of or event. So that the users can easily arrange a greeting
advertising media is very difficult. Especially to determine or anything for others without any difficulty. They also
the advertising media which has caused the consumer to buy suggest gift items to the users based on the preferences they
the service or products is a challenging task. submitted previously.
There are two types of channels.
(i) One Way Channels 5.6 E-ADVERTISEMENT____________________
In this channel, a message is sent to the customer Q18. What is E-Advertisement? Mention the types of
without providing a direct technique through which a E-Advertising.
customer can contact the business person. Some of the
Answer :
examples are roadside bulletin boards, television, magazines,
radio, newspaper direct mail. E-Advertisement
(ii) Two Way Channels
Online advertising is a marketing strategy that make
In this channel, a message is sent to the customer use of Internet to fetch website traffic and target, deliver
and a technique is provided using which the customer marketing related information (in the form of messages) to
communicates with the business person. Some of the the right customers. This strategy provides quick promotion
examples are direct mail via phone responses, informercials of product information irrespective of geographical
via phone responses and inquiries, electronic mail with boundaries.
hypertext links to interactive websites, telemarketing.
Types of E-Advertising
Two way channels does not always provide two
communication. For instance, there are some website which Internet advertising or online advertising can be
~ provide complete information about their product or services classified into mainly two types,
without enabling the user to communicate in return. On the
1. Push-based advertising
other hand, when ever a firm takes all the benefits which
are offered by two way channels then a customer receives 2. Pull-based advertising.
a personalized message through which it gets attracted 1. Push-based Advertising
towards the services. Apart from this, there are three other
advertising channels which has acted as a powerful tools It is also known as active advertising. Push-based
for advertising. The techniques are consumer personal advertising is the most inefficient type of advertising. This
experience, word of mouth and news stories. The impact is because its does not convey relevant information to
of these techniques are either positive or negative from the customers. In short we can say that information sent through
customer. Positive message outcome can be beneficial to this advertising is meaningless.
company’s reputation and success which can strengthen its There are two types of push-based advertising,
position in the market. On the other hand, negative message
(a) Broadcast advertising
outcome can lead to company’s failure and decline in
business sale. (b) Direct mail advertising.
SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD. — ——
UNIT-5 : E-Marketing Techniques 155
(a) Broadcast Advertising Pull-based advertising can be classified into three
This is the first type of push-based advertising. types or forms,
Through broadcast advertising, different companies can (a) Bill board advertising
advertise their products to unlimited number of customers.
(b) Advertising through yellow pages
One ofthe ways by which broadcast advertising can be done
is by using television. Doing broadcast advertising with (c) Advertising through endorsements.
television has benefits and drawbacks. (a) Bill Board Advertising
The benefit is companies through television can This is the first type of pull-based advertising. It is
visually explain the importance of their products. also known as world wide web advertising. In this type
The drawbacks are, of advertising, one company has to take the help of other
company for promotion of its products online. In other
Using television for advertising is expensive. The time
words, one company promotes its products through other
duration allotted for showing advertisements on television
company’s online services.
is usually thirty sec. Hence in such short span of time,
customers cannot get the complete idea about the product. Advantages
Thus, product advertisement has to be displayed at periodic (i) Inexpensive to implement.
intervals of times in order to understand the customer. To
display the add more than once requires a lot of cost. (ii) Companies through this advertising, can make their
products reachable to different customers.
Another way in which companies can do broadcast
advertising is by using news groups. In other words, Disadvantages
company can advertise their products through news groups. Most of the customers don’t browse through one site
(b) Direct Mail Advertising for a long period of time. They constantly switches from one
site to another. So the product information provided by the
This is the second type of push-based advertising.
company should be in such a format that it is simple short
Direct mail advertising is the process in which companies
so that the customers can easily understand.
advertise their products by sending mails to different
customers. The benefits of this advertising technique are, (b) Advertising through Yellow Pages or Yellow
Pages Advertising
(i) Through direct mail advertising, companies can target
only those customers who seems interested in buying In this type of pull-based advertising, companies
their products. can promote their products by using yellow pages directory
services.
(ii) Companies can send the product information in their
own way. In other words, companies have full control Advantages
over presentation of the message. (i) Information can be kept for long time.
The drawbacks of direct mail advertising are, (ii) Using yellow pages for advertising is cheap.
'There is a possibility that some messages received by Disadvantages
customer will be of less importance.
(i) Product information cannot be frequently updated.
For this reason, direct mail is also referred to as
junk mail. These junk mail messages not only waste the (ii) Limited creativity in the ads.
customers time but also unnecessarily utilizes, the space of There are different types of yellow pages that can be
the customers mailbox. used by companies for promoting their products,
Another interesting point to note here is that ❖ Traditional yellow pages .
companies sometimes purposely send junk mails thinking
that there will be few customers who will read the message ❖ Audiotext yellow pages (talking yellow pages).
and buy their products. ❖ Interactive or consumer search databases.
2. Pull-based Advertising (c) Advertising through Endorsements or
This type of online advertising is also called as passive Endorsement Advertising
advertising. Companies by using pull-based advertising In this type of pull-based advertising. Companies
can have a better customer response than through push ask different celebrities, famous personalities, etc., to
based advertising. This is because with the help of pull promote their products. But in case of online endorsement
based advertising paradigm a feedback loop which directly advertising, a company asks the customers to give feedback
connects a company and customer is establish thereby for its products. In other words company ask the customers
providing meaningful information to the customers. to endorse its products.
SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD.
156 E-COMMERCE
Advertising on Internet has its own advantages and disadvantages. The advantages of advertising over
internet are,
(i) Through internet advertising companies can promote their products more efficiently.
(ii) By advertising through internet, companies can satisfy the needs of different customers.
(iii) Customers get to know about the latest products available in the market.
(iv) Income of companies will increase as a result of advertising on internet.
The disadvantages of advertising over internet are,
(i) Customers sometime receives unwanted messages in their mailbox.
(ii) No specific rules have been defined till date that describes how advertising should be done.
Q19. Explain various E-advertising techniques.
Answer : < March/April-17, Q13(b)
It is the body of the text generated by search engine in order to describe the contents of the websites.
(iii) Title Tag
It is the title of the website lists which is typically generated by search engines.
Furthermore keywords, meta tags and frequency of words plays a critical role in search engines. This is essential
because, a repeated word throughout the page can increase the rating for searches using that word. Although, this form of
searching is most prevalent but it has been known that few website designers has made an incorrect use of it. This enabled
search engine designers to make it as an abuse act. And such abuses are referred to as “search engine spamming”. This
sort of spamming is done using any of the following methods,
(i) In the first method, the word is consecutively repeated at prescribed intervals in the keyword section.
(ii) In the second method, the word is repeated using the same color text as background all over the page. Such words
on the web page becomes invisible to the user but will be visible to search engine. This results in degrading the
ranking of the site and may also results in dropping the sites from the indexes.
Depending upon certain criteria the search engines performs ranking. The criteria includes,
(a) Location of Words on Websites
The ranking is done based on the location of the words on the website. The listing of words is done in order of
importance. That is the words which are highly important are placed closer to the top of the page. This way of
initially locating important words prior to table increases the ranks of the sites.
(b) Popularity of Links
Popularity of links represents how popular the links are? If the links popularity is high then its ranks will also
beftiigh. Also, an ideal site is that site if its links are created from other sites. Such strategies can be improved by
employing reciprocal linking agreements with other sites.
(c) Reviewing Sites
The search engines performs the task of site reviewing and after reviewing it they rank the reviewed site prior to
non-reviewed sites. Therefore, sites are relevant, if they are attention gaining.
(d) Case Sensitive
The search engines can be case sensitive. So, in such cases if the words are repeated with many variations, then the
search engines pulls that sites and displays in the list.
3. Banners
Banners are the most popular form of online advertising method which is used to attract visitors. A banner typically
can be defined as a rectangular shape box, about 60 pixels high and 360 pixels wide. Generally banner advertisements
contain texts, graphics or some times only graphics. They are meant to appear on screens of each engines, web browser
software and web-sites so as to capture the attention of WWW users. These advertisements are referred to as “click-through”
advertisements. They contain hypertext links corresponding to the site about which the banner is advertising.
-------- SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD.
158 E-COMMERCE
The click-through advertising strategy is a unique kind of advertising wherein, it directly navigates the potential
user to its intended transaction location. In contrast to other advertisements the click through is fastest as it enables the
customer to just click the banner, perform necessary purchases and complete the purchase order instantly. The price of the
banner advertisement is based on two features namely,
(i) Cost Per thousand Impressions (CPM)
(ii) Click Through Rate (CTR).
(i) Cost Per Thousands Impressions (CPM)
It can be defined as each time the act of viewing that page which displays the banner. Sometimes, it happens that the
user doesn’t wish to include graphics on the site, so he filters them out. By doing this, the banner wont be visible to
the WWW user but it exist on the web page and is still considered as an impression.
(ii) Click Through Rate (CTR)
It is one of the most important feature in advertising rates. The role of the CTR is to count the number of users that
visited the site.
Subsequently, also the firms keep monitoring their sites in order to track whether the visitors are interested on
navigating through multiple pages on site, or whether they make any purchase from the site. Such an act is known as
fulfillment. This term is used to keep track of those product or services that sold out as a result of making advertisements.
To ease this task many software tracking devices were introduced, but they turned out to be imperfect and imprecise due
to the following reasons,
❖ Sharing of computers by multiple users.
❖ Use of network servers and ISPs as gateways. This makes even more complex for keeping track of each individual
user.
❖ Users disabling their cookie feature of their browsers
❖ Availability of intelligent agents or ‘bots’ and web crawlers in order to make advancements in WWW and updating
indexes.
Apart from this, the advertising of banner can also be done by subscribing to a network such as double click. These
firms role is to track visitors, visiting the sites within the network. It accomplishes this track by making use of cookies in
the browser. Now, based on the generated reports on users, it targets specific types of banner advertisements.
4. Sponsorships
The sponsorships are one of the popular on-line advertising method. It is an ideal mechanism for generating brand
recognition. They are similar to banners but there are two features that distinguishes it from banners.
❖ K With sponsorships, the firm’s banner can stay on the site for longer period of time may be a prespecified time slots
or certain number of days.
❖ The sponsorships sends a assurance message specifying that sponsors has full trust in the company behind the
website.
Besides this, firms that are interested in sponsoring the websites require minimum number of CPMs or click through
or may also pay a flat rate.
5. Portals
Portals can be defined as a site that are designed to provide information to the WWW user. Apparently, they servers
as “port of entry” onto the web and are meant to sell advertising space on their sites. The portal offers customized pages,
customized news items, stock quotes, search indexes and engines.
6. Online Coupons
The online coupons is one of the popular method of online advertisement. Many firms employs this type of advertising
It is basically a token or ticket which is offered online to the customers. They can be re-claimed online, or can be printed for
using in stores or can be mailed via postal mail. Beside this, they can be distributed through those sites that are specifically
meant to distribute such coupons.
SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD. .........
E
UNIT-5 : E-Marketing Techniques 159
i
e 5.7 VIRTUAL REALITY AND CONSUMER EXPERIENCE
e
Q20. Discuss in detail virtual reality and consumer experience.
Answer :
The development of real-time www based 3D environment is one of the significant achievements for web browsers.
The next generation browsers make use of 3D enabled user interfaces for navigating the web for giving visual appearances
to the grouping of documents and their relationships. Complex relationships within the document collection can also
e be visualized by merging the virtual reality with the servers. These servers are capable of classifying and merging of
j documents.
Consider an example of virtual air-ticket booking counter. Apart from booking the air-tickets the customers can
virtually move inside the aeroplane to locate his/her seat, can sit on the seat to know the comfort level, can know in
advance the extra benefits he/she might be provided with etc.
i
With virtual reality taking off, the users can virtually realize their dreams like meeting the top celebrities, travelling
different countries, making their favorite actors dance, sing, talk, smile etc., for them. On the otherhand the companies are
a
striving hard to set the attention of their potential customers with attractive websites.
s
While creating 3D environments, designers should keep focus on customers who are diversified into various types.
e They include,
(i) First Category Shoppers
The first category shoppers include those who does not care the products available either in 3D or 2D but focuses
d only on one priority that is price.
(ii) Second Category Shoppers
The second category shoppers includes replacement shoppers who focuses to minimize the shopping time. So the
2 virtual environment for such customer is offered with a product in the category the customer is interested in.
(iii) Third Category Shoppers
e
n The third category shoppers are the numerous and sophisticated shoppers. They only focus on the quality rather than
anything. The virtual environment is to be sophisticated enough to acquire diverse qualities of products.
Therefore, there are numerous ways of ideas for a virtual environment such as opportunity for education, experiments,
story telling and exploration using 3D environment.
d
Q21. Explain various emerging tools that are available in e-commerce for consumer data interface.
s Answep :
Most of the e-commerce applications need a complex interface between the users and the information resources,
e such applications make use of high-level interfaces in order to meet the customer’s requirements and preference. The
efforts being made for developing an efficient and effective consumer data interfaces can be classified as follows,
h 1. Human Computer Interface (HCI)
Different emerging technologies provides an effective interaction between the humans and computers. In near
future, voice-based machines that can recognize and reproduce speech signals, the GUI’s that enable quick browsing of
s massive amount of data user sensitive interfaces that can customize and display the available information as per the user’s
5, understanding capabilities will be available. The interaction with the machines will be through touch, facial expressions
and gestures.
2. Heterogeneous Database Interface
r
v The access methods for databases comprising of multiformated data (i.e., multiple structure databases) will be
»r developed. In the coming years, users will be capable of generating and broadcasting and query directly to the relevant
y database, thereby receiving the timely response with respect to that broadcasted query. Some examples of multiformated
data include plain text, spread sheet, programs, video, etc.
160 E-COMMERCE
3. User Centered Design Tools/Systems
Different methods and models that are capable of producing interactive tools and architecture-centric software
systems will be developed. The data driven capabilities and the knowledge-based capabilities are combined to form highly
effective and easily implemented interactive tools such as, document-oriented computing interface.
4. Virtual Reality and Telepresence
The virtual environment creating tools and methods will be developed in order to facilitate the real time
human interaction with machines and communication devices. This interaction will be via sensors, effectors and other
computational resources. For e-commerce applications, efforts are being made for creating shared virtual environments
that can be accessed by multiple network users.
The development of URL (Uniform Resource Locator) facilitates the users in locating different types of information
in internet. In other words, URL serves as a standard addressing mechanism for obtaining desired information from the
massive volume of data stored in the cyber space. It also enables merging of data obtained from different parts of the
internet. Now-adays, in order to access the information the user must be capable of identifying or locating the desired
information, he/she must also be capable of determining how that particular information is implemented and where can it
be applied.
5. Virtual Reality and Consumer Experience
The development of real-time www based 3D environment is one of the significant achievements for web browsers.
The next generation browsers make use of 3D enabled user interfaces for navigating the web for giving visual appearances
to the grouping of documents and their relationships. Complex relationships within the document collection can also
be visualized by merging the virtual reality with the servers. These servers are capable of classifying and merging of
documents.
Consider an example of virtual air-ticket booking counter. Apart from booking the air-tickets the customers can
virtually move inside the aeroplane to locate his/her seat, can sit on the seat to know the comfort level, can know in
advance the extra benefits he/she might be provided with etc.
With virtual reality taking off, the users can virtually realize their dreams like meeting the top celebrities, travelling
different countries, making their favorite actors dance, sing, talk, smile etc., for them. On the otherhand the companies are
striving hard to set the attention of their potential customers with attractive websites.
6. Virtual Reality and Consumer Choice and Behavior
Virtual reality plays a significant role in internet advertising and marketing. In coming years, it will become the
backbone fpr all internet advertisements. However, the users are still unaware of the distinct features that have been
added to it in order to facilitate marketing strategies and consumer influencing factors. This unawareness is due to lack of
communication between the developers and the marketing research teams.
The choice of the consumer is very important and research is being conducted on it since, ‘convincing the
customer’s is the main motive of any organization. Moreover, the requirements vary from customers to customers i.e.,
some customers may be technologically inexperienced while the others may be technologically independent. These
technologically inexperienced customers may require timely guidance when they are working in e-commerce environments
but the technologically experienced customers may find these guideline to be unnecessary. If customer preferences and
requirements are known in advance then, e-commerce user interfaces will be designed and implemented accordingly. The
outcome of the consumer choice research suggests two significant technological enhancements.
(i) Enhance the quality of the web pages so that they are more attractive to the custonlers. This can be done by
improving the features of HTML (Hyper Text Markup Language) and VRML (Virtual Reality Modeling Language).
(ii) The choice information is encapsulated into the applets for integrating domain-specific customer characteristics.
These applets enable the customization of the consumer’s client browser environment.
VRML will be interpreted by the web browsers of future generations like Gopher VR.
SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD. .—
UNIT-5 : E-Marketing Techniques 161
7. Virtual Reality Modeling Language (VRML)
The 3D data can be integrated into the web using VRML. In other words, VRML is the cunent specification for
integrating 3D images into the internet. The present version of VRML 1.0 was designed to satisfy the following three
requirements. They are,
(i) Platform independence .
(ii) Extensibility
(iii) Low-bandwidth access.
The 3D web pages created by using VRML does not require any special type of hardware or other peripherals
instead, any standard 486 PC with windows as an operating system is capable of running those applications. However, the
speed of the modem will be helpful.
Online marketing is the achievement of marketing goals through the utilization of the internet and the web based
technologies. Online marketing is also known as internet marketing or marketing on the web.
Online marketing is a part of e-business or e-commerce or electronic commerce. The internet marketing has changed
the way of working, buying and living of the people. It involves the exchange of products, services, information and
payments through the electronic medium of networks.
2. Internet or Online Advertising
Intemet/web advertising is a form of advertising that uses internet and world wide web so as to deliver marketing
information and also to gain customers attention. Banner ads, E-mail marketing, search engine result pages are
some of the examples of web advertisement. The major advantage of this kind of advertising is information is not
restricted to any particular geography or time. This form of advertising is also referred to as interactive advertising
that uses interactive media (interactive Tv, mobile devices, internet) to promote the customer’s buying decision.
3. Search Engine Marketing
Search engine marketing is one of the types of internet advertising which attempts to enhance the accessibility of
websites in Search Engine Results Pages (SERPs) by using Search Engine Marketing (SEM) activities and Search
Engine Optimization (SEO) strategies.
4. Mobile Marketing
Mobile marketing is one of the types of digital marketing which helps the organizations in communicating and
interacting with target customers through mobile device or wireless network. For example, mobile phone/cell phone,
MMS/SMS, PDA etc.
5. E-mail Marketing
E-mail marketing refers to the marketing done through electronic mail. In E-mail marketing, E-mail/messages are
sent only to those people who have agreed to receive messages. E-mail marketing is a highly economical digital
marketing. For digital marketers, E-mail marketing is considered as highly powerful and highly economical tool.
6. Viral Marketing
Viral marketing is also known as Electronic Word-of-Mouth (EWOM) or word-of-mouse. In viral marketing, word-
of-mouth communication is done through e-mail or SMS and social networking technology is used to pass on the
f‘ messages via self-replicating viral processes which affects marketing activities.
7. Social Media Marketing
Social media marketing is a type of internet marketing where social web channels and technologies or online
collaborative media is used for carrying out marketing activities like sales, distribution, public relations and customer
service. Social networks, online communities, blogs, Twitter, Youtube, Whatsapp and wikis are some of the examples
of social web channels and technologies.
8. Blog Marketing
A major component of digital marketing is blog marketing. Many companies host their own blogs wherein they
promote their new products or services. Alternatively, the company may take the help of specialized bloggers to
publicize and promote its products.
Generally in case of blog marketing , it needs to be updated on a regular basis.
9. Interactive Marketing
This component/mode of digital marketing includes chat box and other types of interactive platforms wherein the
customers interact with the marketers.
SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD. - ----- ——-
UNIT-5 : E-Marketing Techniques 163
10. Audios and Videos
One of the most popular form of digital marketing is audio and video marketing. A good example of audio marketing
is the ‘podcasts’. Further, video marketing is carried out using digital videos which carry the marketers message to—
the target audience. B2C (Business to Consumers) and B2B (Business to Business) videos are regularly broadcasted
on popular digital video platforms such as Youtube etc.
Most of the B2B organizations are opting for web based, digital public relations over the traditional public relation
media. Organizations are opting for online contacts wherein postal mails and virtual press releases are becoming
common methods of digital Public Relation (PR).
Answer :
The concept of digital marketing had gained importance in recent years. To remain competitive in the business world,
organizations need to be visible to their target audience. In todays highly digitalized world, this is possible only through
digital marketing.
A primary reason for organizations to go for digital marketing is for it to remain competitive. Most of the firm’s
competitors are already employing digital marketing tools. Further a firms present and potential customers expect
the firm to be visible on the digital marketing platform. Thus, it is a basic need for every organization to utilize the
platform of digital marketing to remain competitive.
The use of digital marketing is needed for the organization to improve its relation with its customers. This is all the
more true in case of B2B (Business to Business) customers where the customers are smaller and more influential.
Targeted PPC advertising is an excellent way for the organization to improve its relationship with its customers.
(c) To Be Up-To-Date
Digital marketing is needed because the traditional tools of marketing are declining and more and more firms are
shifting their marketing budget from traditional marketing sources to digital marketing. For example, a research
study carried out by Forester Research Inc had found that by the year 2014, $ 2.3 billion dollars would be spent
towards digital marketing.
The scope of digital marketing is very wide. It encompasses all areas of marketing and has replaced traditional
marketing sources, to become the top tool of marketing worldwide. Most global organizations are opting for digital marketing
rather than traditional marketing.
According to a research study organizations are focusing their marketing budget towards inbound digital marketing
tools such as social media marketing, company’s website, popular search engines etc.
The competition for effective digital marketing has become intense. Researcher Shepra conducted a survey of potential
customers and found that 71% of B2B customers look for information on the internet. Further customers are influenced by
the information found on the internet, web blogs, social media posts and videos. Thus it may be stated that the influence
and scope of digital marketing is very wide.
Digital marketing is a powerful and effective marketing tool which, if employed correctly would provide the
organization multiple benefits in the form of increased market share and profitability.
Role/Benefits of Digital Marketing
Digital marketing is an easy and effective means for the organization to communicate its marketing message to a
large number of present and potential customers. It has revolutionized marketing activities on popular social media
platforms such as Facebook, Twitter, Linked In etc.
2. Enables Direct Advertising
It acts as an effective platform for the organization to advertise about its product and create brand loyalty for its product.
3. Permanent Ad Display
Unlike traditional ads, ads on digital platforms are more permanent and can be accessed by potential customers any time.
4. International Advertisement
A major benefit of digital marketing is that it provides the company a good platform to advertise its offerings to the
global customers very easily.
5. Brand Promotion
It acts as an effective mode for brand promotion. Thus strengthening the organizations loyal customer base.
6. Boosts Sales
Digital marketing has made it possible for a prospective customer to shop any time (24/7) across any geographic
area. Thus it boosts the overall sales figure for the company.
7. Cost Effective
It has been found that digital marketing tools are very cheap and cost effective, in comparison to traditional marketing
modes such as TV, radio, magazines etc. Social media marketing platform such as Facebook, Linked In, Whatsapp,
Instagram have become cost effective platform of digital marketing.
Limitations of Digital Marketing
£
Digital marketing suffers from the following limitations,
(a) Highly dependent upon Internet
Most modes of digital marketing are dependent upon internet facility. Thus in areas where there is no internet facility,
digital marketing would not be effective.
(b) Fierce Competition
A major limitation of digital marketing is the intense competition from local, national and international brands. The
customer is provided with many alternative choice.
(c) Limited to Consumer Products
A major limitation of digital marketing is that it is effective mode for marketing consumer products but is not
impactful incase of industrial and pharmaceutical products.
(d) Lack of Privacy
There is no privacy on the digital marketing platform, competitor may copy the firms product, pricing strategy or
may even sell the product in their own name.
SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD. ............. .......
UNIT-5 : E-Marketing Techniques 165
I. Multiple Choice
1. ________ is the achievement of marketing goals through the utilization of the internet and the web based
technologies. [ ]
(a) E-mail
(b) E-marketing
(c) E-business
(d) E-advertising
3. _________ are the new online advertising mechanism that helps in representing business functionalities.! ]
(a) Banner advertising
4. __________ allows retailers to know the needs of different customers much earlier than they are available to
the manufacturers. [ ]
te (c) Online-advertising
6. _______ is the process in which companies advertise their products by sending mails to different customers. [ ]
X
(a) Direct mail advertising
(b) Push-based advertising
(c) Pull-based advertising
(d) None of the above
8. are defined as a site that are designed to provide information to the www user. [ 1
(a) CTR
(b) CM
(c) Portals
(b) Product
(c) Promotion
(d) Place
2/ _________refers to the unwanted and unrequested on-line email called ‘Junk mail’ which is repeatedly sent
to multiple recipients at a time.
3. ________ _is an aggressive advertising technique which is designed to attract the attention of the users.
4. _________ is a readily accessible, inexpensive, fastest means of bringing together various buyers and sellers
all over the world.
5. In_________, market segmentation is carried out with respect to the people behaviour, way of thinking, their
attitudes, etc.
8. _________ is a mechanism using which price of the physical good or service is determined.
9. _________ refers to the marketing activities such as press release advertisements, word of mouth etc.
10. _________ helps in reaching the target customers on-time without consuming much resources and in an interactive
manner.
SIA PUBLISHERSAND DISTRIBUTORS PVT. LTD. .. ..... ------------- ■-------- ------ -
UNIT-5 : E-Marketing Techniques 167
KEY
I. Multiple Choice
1- (b)
2. (a)
3. (c)
4. (a)
5. (d)
6. (a)
7. (d)
8- (c)
9. (d)
10. (b)
2. Spam mail
4. E-marketing
5. Behavioural method
6. Dynamic marketing
7. Static marketing
8. Pricing
9. Promotion
Answer :
E-marketing is the achievement of marketing goals through the utilization of the Internet and the web based
technologies. E-marketing is also known as Internet marketing or marketing on the web or online marketing.
Answer :
Online advertising is a marketing strategy that make use of Internet to fetch website traffic and target, deliver
marketing related information (in the form of messages) to the right customers.
Answer :
Digital marketing refers to the management and execution of marketing activities by using digital electronic
technologies and channels like digital TV, E-mails, web, wireless media and digital data concerning consumer behavior
and its attributes.
A search engine can be defined as a software system designed to search information on Internet. Unlike directories,
the search engines are considered to be the most popular method in finding sites. The search engines operates by taking
user-defined words and boolean expression in search bar.
Answer :
Directories are new online advertising mechanism that helps in representing business functionalities. These
iities are represented in the index format that list and supplies links to the websites.
Answer :
Program
<html>
<head>
<meta http-equiv=“Content-Language” content=“en-us”>
<meta http-equiv=“Content-Type” content=“text/html; charset=windows-1252”>
^script language=“JavaScript”>
<!-
function FP_swapImg() {//v 1.0
var doc=document,args=arguments,elm,n; doc.$imgSwaps=new Array(); for(n=2; n<args.length;
n+=2) { elm=FP_getObjectByID(args[n]); if(elm) { doc.$imgSwaps[doc.$imgSwaps.length]=elm;
elm.$src=elm.src; elm.src=args[n+l]; } }
}
function FP_preloadImgs()
{//vl.O
var d=document,a=arguments; if(!d.FP_imgs) d.FP_imgs=new Array();
for(var i=0; i<a.length; i++) { d.FP_imgs[i]=new Image; d.FP_imgs[i].src=a[i]; }
} ' •
function FP_getObjectByID(id,o)
{//vl.O
var c,el,els,f,m,n; if(!o)o=document; if(o.getElementById) el=o.getElementById(id);
else if(o.layers) c=o.layers; else if(o.all) el=o.all[id]; if(el) return el;
if(o.id=id || o.name=id) return o; if(o.childNodes) c=o.childNodes; if(c)
for(n=0; n<c.length; n++) { el=FP_getObjectByID(id,c[n]); if(el) return el; }
f=o.forms; if(f) for(n=0; n<f.length; n++) { els=f[n].elements;
for(m=0; m<els.length; m++){ el=FP_getObjectByID(id,els[n]); if(el) return el; } }
return null;
}
//-> .
</script>
</head>
<body bgcolor=“#C0C0C0” onload=“FP_preloadImgs(/*url*/‘button5.jpg’, /*url*/‘button6.jpg’, /*url*/‘buttonB.
jpg’, /*url*/‘buttonC.jpg’, /*url*/‘buttonE.jpg’, /*url*/‘buttonF.jpg’, /*url*/‘buttonll.jpg’, /*url*/‘buttonl2.jpg’,
/*url*/‘buttonlD.jpg’, /*url*/‘buttonlE.jpg’, /*url*/‘button20.jpg’, /*url*/‘button21.jpg’, /*url*/‘button35.jpg’,
/*url*/‘button36.jpg’)”>
<div style=“position: absolute; width: 1224px; height: 65px; z-index: 1; left: 13px; top: 15px; background-color:
#FF66FF” id=“layerl’>
<p align=“center”xfont size=“7” color=“#0000FF”>
<img border=“0” src=“sia.jpg” width=“70” height=“67”xb>SIA Publishers and
Distributors Pvt Lid.</b></fontx/div>
<p align=“center”> </p>
<p align=“center”> </p>
<table border=“l” width=“99%” bordercolordark=“#000080” bordercolorlight=“#00FF00”>
<tr>
<td width=“ 130” bgcolor=“#008080”>
<p align=“center”>
<img border=“0” id=“imgl” src=“button4.jpg” height=“20” width=“100” alt=“Books” fp-style=“fp-btn: Embossed
Capsule 2” fp-title-‘Books” onmouseover=“FP_swapImg(l,0,/*id*/‘imgl V*url*/‘button5.jpg’)” onmouseout=“FP_
swaplmg(0,0,/*id*/‘imgl’,/*url*/‘button4.jpg’)” onmousedown=“FP_swapImg(l,0,/*id*/ ‘imgl’,/*url*/‘button6.
jpg’)” onmouseup=“FP_swapImg(0,0,/*id*/‘imgr’,/*url*/‘button5.jpg’)”x/p>
<p align=“center”>
<img border=“0” id=“img2” src=“buttonA.jpg” height=“20” width=“100” alt=“Authors” fp-style=“fp-btn:
Embossed Capsule 2” fp-title=“Authors” onmouseover=“FP_swapImg(l,0,/*id*/‘img2’,/*url*/‘buttonB.jpg’)”
onmouseout=“FP_swapImg(0,0,/*id*/‘img2’,/*url*/‘buttonA.jpg’)” onmousedown=“FP_swapImg(l,0,/*id*/‘img
2’,/*url*/‘buttonC.jpg’)” onmouseup=“FP_swapImg(0,0,/*id*/‘img2’,/*url*/‘buttonB.jpg’)”x/p>
<p align=“center”>
<img border=“0” id=“img3” src=“buttonD.jpg” height=“20” width=“100” alt=“Mock Test” fp-style=“fp-btn:
Embossed Capsule 2” fp-title=“Mock Test” onmouseover=“FP_swapImg(l,0,/*id*/‘img3’,/*url*/‘buttonE.jpg’)”
onmouseout=“FP_swapImg(0,0,/*id*/‘img3’,/*url*/‘buttonD.jpg’)” onmousedown=“FP_swapImg(l,0,/*id*/‘img
3’,/*url*/‘buttonF.jpg’)” onmouseup=“FP_swapImg(0,0,/*id*/‘img3’,/*url*/‘buttonE.jpg’)”x/p>
<p align=“center”>
SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD.___
Lab Practical with Solutions LP.3
X Convert ” Select
Unit-1
H
OR OR
Internet. What are the advantages of Internet electronic
commerce over consumers?
Answer : (March/April-12, Q1 | March-11, Q1)
Answer: Oct./Nov.-12, Q9(b)
For answer refer Unit-I, Page No. 3, Q.No. 5.
For answer refer Unit-I, Page No. 11, Q.No. 21.
Q3. E-banking
Q9. Explain about the impact of E-commerce on
Answer : (March/April-15, Q7 | March/April-13, Q1)
business model.
For answer refer Unit-I, Page No. 5, Q.No. 11.
(Oct./Nov.-13, Q9(a) | Oct./Nov.-12, Q9(a))
Q4. E-Learning
OR
Answer : (March/April-17, Q1 | March/April-14, Q1)
*
What is the impact of E-commerce on business
For answer refer Unit-I, Page No. 5, Q.No. 12.
models? Oct./Nov.-16, Q9(b)
Q5. Online Trading
OR
Answer : (March/April-17, Q8 | Oct.-14, Q1)
Discuss in detail about the impact of E-commerce
For answer refer Unit-I, Page No. 6, Q.No. 15. on business models.
ESSAY QUESTIONS Answer : March/April-16, Q9(a)
1 0R OR
Discuss the three pillars of electronic-commerce. What are the different approaches of E-leaming?
Answer : March/April-14, Q9(b) Answer: Oct./Nov.-13, Q9(b)
For answer refer Unit-I, Page No. 8, Q.No. 19. For answer refer Unit-I, Page No. 37, Q.No. 41.
- SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD.
F.2 E-COMMERCE
Unit-
HTML March/April-15, Q5
OR
Q3. TCP/IP
For answer refer Unit-II, Page No. 47, Q.No. 13.
Answer : (March/April-12, Q4 | March/April-17, Q2) Q10. Explain the security services of E-commerce.
Oct.-14, Q10(b)
For answer refer Unit-II, Page No. 45, Q.No. 5.
OR
Q4. HTTP.
Explain the issues related to security, when us
Answer : (March/April-12, Q2 | March-11, Q2)
ing Web. March/April-16, Q10(b)
*
For answer refer Unit-II, Page No. 45, Q.No. 6. OR
SMTP OR
Answer : March/April-14, Q3
Explain two security techniques of encryption.
Oct./Nov.-13, Q10(b)
For answer refer Unit-II, Page No. 46, Q.No. 9.
OR
Q7. NNTP
Briefly explain the encryption techniques.
Answer : (Oct.-14, Q2 | Sep./Oct.-15, Q2)
Oct./Nov.-11, Q10(a)
For answer refer Unit-II, Page No. 46, Q.No. 10.
OR
Q8. Encryption.
Explain about encryption techniques.
Answer : (March/April-13, Q6 | March/April-17, Q6) Answer : Oct./Nov.-16, Q10(a)
For answer refer Unit-II, Page No. 46, Q.No. 11. For answer refer Unit-II, Page No. 62, Q.No. 29.
Unit-3
For answer refer Unit-Ill, Page No. 72, Q.No. 1. For answer refer Unit-III, Page No. 81, Q.No. 13.
Q2. List out the risk involved in E-payments. Q6. Explain mercantile process model.
Oct./Nov.-11, Q3
March/April-17, 011(a)
OR
OR
Risks in E-payment
Explain about Electronic Payment Systems.
(March/April-12, Q3 | March-11, Q3)
Oct./Nov.-16, 011(a)
OR
OR
What are the risks of E-payment system?
Answer : Oct./Nov.-16, Q4
Discuss about merchantile process model.
March/April-16, 011(a)
For answer refer Unit-Ill, Page No. 73, Q.No. 6.
OR
Q3. Credit Card
OR OR
Unit-4
SHORT QUESTIONS •
OR
OR
5r
EDI
OR
OR
Answer :
For answer refer Unit-IV, Page No. 108, Q.No. 2.
OR
Answer :
For answer refer Unit-IV, Page No. LIO, Q.No. 7.
ESSAY QUESTIONS
OR
OR
Answer : Oct./Nov.-12,012(b)
OR
Write about,
OR
Answer :
For answer refer Unit-IV, Page No. 117, Q.No. 15.
Q7. Describe about EDI applications in business. (Sep/Oct.-15, 012(a) | Oct./Nov.-13, 012(a))
OR
What is an EDI? What are the various EDI applications in business? March-11, Q12(a)
OR
OR
OR
*
Explain about financial EDI and types of financial EDI. March/April-16, 012(b)
Answer :
For answer refer Unit-IV, Page No. 120, Q.No. 16.
Q8. Write about the various issues involved in EDI. March/April-16, 012(a)
OR
fWrite about legal, security and privacy issues in EDI. March/April-15, Q12(a)
OR
OR
OR
What are the legal and security issues in EDI? March/April-13, 012(b)
OR
Answer :
For answer refer Unit-IV, Page No. 128, Q.No. 21.
_________ SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD.
F.6 E-COMMERCE
r-
Unit-O
SHORT QUESTIONS
Q1. Spam Mail
OR
OR
OR
OR
E-COMMERCE
( Common Paper for Computers, Computer Applications )
Note : Answer any Five of the following questions in not exceeding 20 lines each
2. Write about interface and support services. (Unit-ll, Page No. 44, Q2
4. What are the benefits of EDI? (Unit-IV, Page No. 109, Q3)
8. List out the risk involved in E-payments. (Unit-Ill, Page No. 73, Q6)
PART - B ( 5 x 12 = 60 Marks )
9. (a) Explain traditional value chain and customer oriented value chain. (Unit-I, Page No. 10, Q20)
OR
(b) Discuss in brief about E-business. (Unit-I, Page No. 18, Q26)
10. (a) Discuss the security issues faced by e-commerce site. (Unit-ll, Page No. 49, Q16)
f
OR
(b) Explain briefly about TCP/IP model. (Unit-ll, Page No. 54, Q21)
11. (a) Discuss about mercantile process model from consumer’s perspective. (Unit-Ill, Page No. 81, Q13)
OR
(b) Describe smart cards as an electronic payment system. (Unit-Ill, Page No. 99,027)
12. (a) What is EDI? Explain four layers of EDI architecture. (Unit-IV, Page No. 111, Q9)
OR
(b) What are the legal and security issues in EDI? (Unit-IV, Page No. 128,021)
13. (a) Explain about new age of information based marketing. (Unit-V, Page No. 147, Q14)
OR
(b) Discuss about applications of 5P’s. (Unit-V, Page No. 152, Q17)
MODEL
FACULTY OF COMMERCE
B.Com (CBCS) lll-Year Vl-Semester Examination
PAPER
"13 v-eeC'
12
E-COMMERCE
( Common Paper for Computers, Computer Applications )
Note : Answer any Five of the following questions in not exceeding 20 lines each
Note: Answer the following questions in not exceeding four pages each.
9. (a) Explain the global information distribution networks. (Unit-I, Page No. 13, Q22)
OR
(b) What is the impact of E-commerce on business models? (Unit-I, Page No. 20, Q30)
10. (aX Explain in detail about following protocols.
(i) FTP
(ii) HTTP
(b) (i) Describe in detail about S-HTTP. (Unit-ll, Page No. 58, Q23)
(ii) Explain in detail about SSL. (Unit-ll, Page No. 58, Q24)
11. (a) Discuss in detail the two forms of payment used in purchase consummation
phase. (Unit-Ill, Page No. 83, Q14)
OR
(b) Explain about consumer-oriented E-commerce applications. (Unit-Ill, Page No. 76, Q11)
OR
13. (a) Explain the E-marketing techniques in detail. (Unit-V, Page No. 142, Q9)
OR
(b) Explain the impact of E-commerce on Marketing. (Unit-V, Page No. 149, Q15)
MODEL
FACULTY OF COMMERCE
B.Com (CBCS) lll-Year Vl-Semester Examination
PAPER I3
E-COMMERCE
( Common Paper for Computers, Computer Applications )
PART - A ( 5 x 4 = 20 Marks )
Note : Answer any Five of the following questions in not exceeding 20 lines each
1. What are the benefits of E-commerce to Organization, Consumers and Society? (Unit-I, Page No. 4, Q8)
2 Write about digital signatures. (Unit-ll, Page No. 46, Q12)
3. What is E-cash? (Unit-Ill, Page No. 72, Q1)
4. List the EDI standards. (Unit-IV, Page No. 110, Q8)
5. Write about Spam Mail. (Unit-V, Page No. 140, Q3)
6. Write about World Wide Web. (Unit-I, Page No. 2, Q3)
7. What is HTTP? (Unit-ll, Page No. 45, Q6)
8. Write a short note on Home Banking. (Unit-Ill, Page No. 73, Q5)
PART - B ( 5 x 12 = 60 Marks )
Note: Answer the following questions in not exceeding four pages each.
9. (a) Define E-commerce from different perspectives along with its goal. (Unit-I, Page No. 7, Q17)
OR
(b) Write about E-commerce applications. (Unit-I, Page No. 23, Q32)
10. (a) Briefly explain the encryption techniques. (Unit-ll, Page No. 62, Q29)
(f °R
(b) Define cryptography and classify different cryptographic attacks. (Unit-ll, Page No. 64, Q30)
11. (a) Define electronic payment system. What are the advantages of electronic
payment system? (Unit-Ill, Page No. 87, Q17)
OR
(b) Explain briefly about the digital currency or electronic cash. (Unit-Ill, Page No. 91, Q20)
12. (a) What is an EDI? What are the various EDI applications in business? (Unit-IV, Page No. 120, Q16)
OR
(b) Explain EDI software implementation and how much an EDI cost. (Unit-IV, Page No. 131, Q24)
13. (a) List out the advantages and disadvantages of E-marketing. (Unit-V, Page No. 144, Q11)
OR
(b) State the role/benefits and limitations of digital marketing. (Unit-V, Page No. 164, Q25)
SIA PUBLISHERS AND DISTRIBUTORS PVT. LTD___