E Commerce Notes
E Commerce Notes
E-commerce (Electronic Commerce) refers to the process of buying, selling, or exchanging goods,
services, and information online. It encompasses all steps and actions needed to conduct online
business transactions, from browsing products to finalizing payment and delivery.
Key Concepts:
- Customer Journey: Stages a customer goes through, including product discovery, selection,
payment, and post-purchase service.
- Back-End Processes: Activities like order processing, inventory management, and shipping
logistics that support online transactions.
Example:
When a customer buys a book on Amazon, they browse options, add the book to their cart, and
complete payment. Behind the scenes, Amazon processes the order, confirms stock, arranges
shipping, and tracks delivery.
Definition:
Front-End Components:
- User-facing part of the website or app where customers interact with product listings,
checkout, and customer service.
Back-End Components:
- Server, database, and application layers that handle data processing, storage, and integration
with payment systems and inventory.
Example:
An e-business like Shopify includes front-end features (storefront, product pages) and back-end
architecture (cloud hosting, payment gateway integration, APIs) to ensure smooth transactions
and data handling.
2. Visual Design: Using appealing graphics, fonts, and colors to create an engaging experience.
3. Content Quality: Offering clear, helpful, and accurate product information and details.
4. Responsiveness: Designing for compatibility across devices like phones, tablets, and desktops.
5. Load Speed: Minimizing loading times to improve user experience and retention.
6. Security: Implementing encryption and secure payment options to protect user data.
7. Search Engine Optimization (SEO): Making the site searchable on engines like Google to drive
organic traffic.
Examples:
- Amazon's mobile site adjusts seamlessly to smaller screens while retaining functionality.
2. Interaction Stage: Customers engage with online content (e.g., reading reviews).
Examples:
- A customer googling "best smartphones under $500" lands on a product comparison website.
- Amazon sends tracking updates and follow-up emails requesting product reviews.
Key Concepts:
- Payment Security: Measures such as SSL encryption and tokenization to protect sensitive
payment information.
- Payment Options: Common methods include credit/debit cards, digital wallets (e.g., PayPal),
and mobile payments.
- Fraud Prevention: Techniques like two-factor authentication (2FA) and secure customer
identification.
Example:
A site like Etsy offers multiple payment methods, including credit cards and PayPal. To prevent
fraud, Etsy uses encryption, monitors transactions for suspicious activity, and offers buyer
protection.
Evolution of E-Commerce
Timeline:
- 1990s: Amazon and eBay launched, introducing online retail and auctions.
- 2000s: Rise of digital payment systems like PayPal, expanding secure payment options.
- 2010s: Mobile commerce (m-commerce) becomes popular with smartphones; social media
platforms add shopping features.
Examples:
- A small business in Japan can sell to customers in the US through an online store.
- Many direct-to-consumer brands operate without physical stores, saving on rent and utilities.
Types of E-Commerce
- Example: Alibaba connects manufacturers with businesses that need wholesale goods.
Revenue Models
2. Commission Model: The platform takes a percentage or fee for each transaction.
- Example: Facebook offers a free service to users but earns revenue by showing targeted ads.
Definition:
A value chain refers to the series of activities businesses use to create and deliver a product or
service.
Primary Activities:
Support Activities:
Examples:
- Amazon: Partnering with suppliers for product sourcing, efficient inventory management in
warehouses, fast delivery through Amazon Prime, personalization through recommendations,
and 24/7 customer support.
- Coca-Cola: Acquiring ingredients like sugar and concentrates, bottling processes across global
facilities, distribution to retailers worldwide.
Definition:
B2B marketing refers to the process where businesses market or sell products and services to
other businesses, rather than directly to individual consumers.
Characteristics:
Example:
A company like Alibaba connects manufacturers and wholesale suppliers with retailers and
small businesses looking for bulk orders.
Purchasing Strategies:
- Supplier Integration: Building relationships with trusted suppliers to ensure quality and timely
delivery.
Logistics Strategies:
- Just-In-Time (JIT): Ordering inventory only when needed to reduce storage costs.
- Third-Party Logistics Providers (3PLs): Outsourcing logistics to specialized providers like DHL or
FedEx for efficiency.
Support Activities:
- Using customer support portals to provide businesses with order status, returns processing,
and issue resolution.
Example:
Companies like Walmart use integrated supply chain platforms to improve their purchasing and
logistics processes, ensuring efficiency and lower costs.
Electronic Data Interchange (EDI)
Definition:
Advantages:
Example:
A retailer like Target uses EDI to send purchase orders to suppliers, who in turn send back
invoices and shipping notifications electronically.
| Communication Standard | Uses structured, proprietary formats like X12. | Relies on open
formats like XML, JSON. |
| Complexity | Requires specialized software and training. | Easy to use with web-
based interfaces. |
| Cost | High setup and maintenance costs. | Lower costs; can leverage
existing web tools. |
Example:
Traditional EDI systems are used by large enterprises like Ford to handle high-volume supply
chain transactions. In contrast, small businesses might use web-based platforms like Shopify for
simpler e-commerce integration.
Definition:
SCM refers to the coordination and management of all activities involved in sourcing,
production, and delivery of products to customers.
Example:
Amazon uses advanced SCM systems to optimize its warehouses, automate inventory control,
and ensure fast delivery through services like Amazon Prime.
Features:
- Centralized databases to collect, analyze, and share data across the supply chain.
Advantages:
Example:
Walmart uses a real-time, database-driven supply chain system to track inventory across its
stores and warehouses, ensuring efficient stock management.
- Platforms that centralize information and enable businesses to access products, services, and
transactions.
- Example: Supplier portals allow businesses to manage orders, invoices, and communication
with suppliers in one place.
Marketplaces:
- Online platforms where multiple businesses can sell their products or services to other
businesses or consumers.
- Example: Alibaba is a leading B2B marketplace that connects suppliers and buyers globally.
Benefits:
Example:
A small retailer can source bulk products on Alibaba or IndiaMart, while large corporations use
dedicated portals like SAP Ariba for procurement.
Technology Infrastructure
1. Internet:
- Example: Browsing websites, streaming videos, and sending emails all rely on the internet.
- System of interlinked hypertext documents and multimedia content that can be accessed via
the internet using web browsers.
- Key Difference: The WWW is just one of the many services available on the internet (others
include email and file sharing).
- Example: Websites like Wikipedia and YouTube are part of the WWW.
3. Networks:
- Systems of connected devices (computers, servers, routers) that share data and resources.
- Types:
- LAN (Local Area Network): Connects devices within a small geographic area, like a home or
office.
- WAN (Wide Area Network): Connects larger areas, like cities or countries.
- Companies that provide access to the internet for individuals and organizations.
- Services Offered: Internet connectivity, email accounts, domain registration, and cloud
storage.
- Example: Comcast, AT&T, and Vodafone are ISPs that offer internet services globally.
5. Markup Languages:
- Coding systems used to structure and format content for the web.
- Purpose: Define the structure of web pages, such as headings, paragraphs, links, and images.
```html
<html>
<head>
</head>
<body>
<h1>Welcome to My Website</h1>
</html>
- Search Engine Optimization (SEO): Optimizing websites to rank higher in search engine
results.
- Pay-Per-Click Advertising (PPC): Paid ads displayed on platforms like Google and Facebook.
- Social Media Marketing: Leveraging platforms like Instagram or TikTok for promotions.
- Email Marketing: Sending personalized emails to engage customers and boost sales.
Example:
Amazon uses personalized email campaigns to recommend products based on user browsing
history.
Example:
A startup may struggle with limited resources to compete with larger e-commerce platforms in
Pay-Per-Click (PPC) bidding.
- Social Media Messaging: Direct communication via platforms like WhatsApp or Facebook
Messenger.
Example:
- Dividing a broad customer base into smaller groups with shared characteristics (e.g.,
demographics, preferences, or behavior).
Example:
Example:
Spotify runs ads based on user demographics, such as student discounts for younger users.
1. Awareness: The customer learns about the brand (e.g., ads, social media).
2. Engagement: The customer interacts with the brand (e.g., visiting the website).
Amazon Prime encourages retention by offering exclusive benefits like free shipping.
- Traditional Commerce Advertising: Channels include TV, radio, newspapers, billboards. Reach
is broad but less targeted. Cost is high for production and placement.
- E-Commerce Advertising: Channels include PPC ads, social media, influencer marketing. Reach
is highly targeted to specific audiences. Cost is flexible with pay-per-click or per-impression.
Example:
- Social Media Ads: Sponsored posts or stories on platforms like Instagram or LinkedIn.
Example:
A clothing brand might use Instagram influencer marketing alongside Google search ads to
maximize reach.
- This act provides a legal framework for the use of electronic signatures and records in
commerce. It ensures that electronic contracts have the same legal standing as traditional
paper-based contracts.
- UETA is a state-level legislation in the U.S. that establishes the legal equivalence of electronic
records and signatures with paper documents and handwritten signatures. It facilitates
electronic transactions by providing a consistent legal framework across states.
- Consumer Protection Laws:
- These laws are designed to protect consumers from unfair trade practices, such as deceptive
advertising, fraud, and misrepresentation. They ensure that online marketplaces operate fairly
and transparently.
- Jurisdictional Challenges:
- E-commerce often involves transactions across different countries, each with its own legal
system. Businesses must comply with the laws of each jurisdiction where they operate, which
can be complex and require careful legal navigation.
- Copyright:
- Protects original works of authorship, including literary works, music, dramatic works, and
artistic works such as images and videos. Online businesses must ensure they do not infringe
upon others' copyrights by using unauthorized content.
- Trademarks:
- Protect distinctive signs, logos, names, or slogans that identify and distinguish the source of
goods or services. Trademarks help businesses build brand recognition and prevent competitors
from using similar marks.
- Patents:
- Grant exclusive rights to inventors for their inventions, such as new technologies or business
methods. Patents are crucial for protecting innovative products or processes in the e-commerce
sector.
- Trade Secrets:
- Involve confidential information that provides a business with a competitive edge. Trade
secrets can include formulas, practices, processes, designs, instruments, patterns, or
compilations of information.
- Challenges:
- The digital environment makes it easier to copy and distribute intellectual property, increasing
the risk of infringement. Businesses must implement robust measures to protect their IP and
respect others' rights.
- Cybercrime:
- Includes various illegal activities conducted via the internet, such as identity theft, phishing,
hacking, and online fraud. Cybercriminals exploit vulnerabilities in security systems to steal
sensitive data or disrupt operations.
- Fraudulent Activities:
- Fake online stores and counterfeit products are significant concerns in e-commerce. These
activities undermine consumer trust and can lead to financial losses for both businesses and
customers.
- Cyberterrorism:
- Involves the use of internet-based attacks to cause harm or disruption. E-commerce platforms
may be targeted to disrupt financial systems or steal funds to support terrorist activities.
- Cyber Warfare:
- Mitigation Strategies:
- Truthful Advertising:
- E-commerce companies must ensure that their advertising is honest and not misleading. This
includes accurate product descriptions, transparent pricing, and genuine customer reviews.
- Sustainable Practices:
- Ethical considerations extend to ensuring fair wages and safe working conditions for
employees, particularly in warehouses and supply chains. Businesses must avoid exploitative
labor practices.
- Social Responsibility:
- Companies are increasingly expected to contribute to social causes, such as donating a
portion of profits to charity or supporting local communities. Social responsibility initiatives help
build a positive brand image.
- Algorithmic Bias:
- E-commerce platforms use various tools to gather data on customer preferences and
behaviors. These include cookies, tracking pixels, and analysis of purchase history.
- Privacy Risks:
- Unauthorized data sharing, breaches, or misuse of personal information can erode consumer
trust. High-profile incidents, such as data leaks, highlight the need for robust data protection
practices.
- Laws like the General Data Protection Regulation (GDPR) in the EU and the California
Consumer Privacy Act (CCPA) in the U.S. empower customers with rights over their data. These
regulations require businesses to implement strong data protection measures.
- Balancing Act:
- E-commerce businesses must strike a balance between collecting data to enhance customer
experiences and respecting privacy rights. Transparent data policies and user consent
mechanisms are critical.
- Determining when and where to apply sales tax can be complex, particularly in cross-border
transactions. Different jurisdictions have varying tax laws, and businesses must comply with
each one.
- Many countries impose Value Added Tax (VAT) on digital goods like software or streaming
services. E-commerce businesses must navigate international tax rules to ensure compliance.
- Double Taxation Risks:
- Complying with diverse tax laws can be a significant burden for small and medium-sized
enterprises (SMEs). The complexity and cost of compliance can hinder their growth and
competitiveness.
- Following the U.S. Supreme Court's decision in South Dakota v. Wayfair Inc. (2018), states can
require e-commerce businesses to collect and remit sales tax based on transaction volume or
value, even if they do not have a physical presence in the state.
- Platforms like Amazon or eBay may be required to collect sales tax on behalf of sellers
operating through their platforms. This shifts the tax collection responsibility from individual
sellers to the marketplace facilitators.
- Compliance Costs:
- Varying state regulations increase administrative complexity for businesses, particularly those
operating across multiple states or regions. Compliance costs can be significant and may require
specialized knowledge or tools.
- Impact on Pricing:
- Taxation pressures may lead to higher product prices, potentially reducing the
competitiveness of smaller e-commerce companies. Businesses must carefully manage their
pricing strategies to remain competitive while complying with tax laws.
1. Definitions
- Auctions:
- Auctions are competitive processes where goods, services, or assets are sold to the highest
bidder in a structured and time-bound manner. Examples include eBay, where users bid on
items, and the highest bid wins at the end of the auction period.
- Web Portals:
- Web portals are centralized platforms that provide access to a variety of resources, tools, and
information tailored to specific users. They can be horizontal (general-purpose) like Yahoo or
vertical (industry-specific) like WebMD for healthcare.
- Virtual Communities:
- Virtual communities are online groups where people with shared interests, goals, or values
interact, share knowledge, and build relationships. Examples include Facebook Groups and
YouTube Channels with comment sections.
- English Auction:
- Also known as an ascending auction, it starts with a minimum price, and bidders
incrementally increase their offers. The highest bidder wins. Examples include art auctions and
online platforms like eBay.
- Dutch Auction:
- Starts at a high price, which gradually decreases until a bidder accepts the current price. It is
fast-paced and ideal for perishable or high-demand goods. Examples include flower auctions in
the Netherlands and IPOs.
- Sealed-Bid Auction:
- Participants submit confidential bids, and the highest bidder wins. It prevents bidders from
knowing competitors' bids, encouraging genuine offers. Examples include government tenders
and real estate auctions.
- Reverse Auction:
- Buyers post their requirements, and sellers compete to offer the lowest price. It focuses on
reducing costs for the buyer. Examples include B2B procurement and freelancing platforms like
Upwork.
- Double Auction:
- Buyers and sellers submit bids and offers simultaneously, and matches occur when a buyer's
bid meets a seller's offer. It is used in dynamic markets with many participants. Examples include
stock exchanges and commodity trading.
- Penny Auction:
- Each bid raises the price by a small increment, and bidders pay a fee for each bid. The last
bidder wins when no new bids are placed within the allotted time. Examples include consumer
goods on penny auction sites like Quibids.
- Participants submit sealed bids, and the highest bidder wins but pays the amount of the
second-highest bid. It encourages honest bidding. Examples include online advertising auctions
like Google AdWords.
- Understanding how different auction methods work involves exploring the rules, processes,
and mechanisms behind each type. Focus areas include the bidding process, how winners are
determined, and the contexts where each technique is used.
- Advantages:
- Global Reach: Sellers can attract bidders from anywhere, increasing the chances of a higher
price.
- Cost Efficiency: Online platforms reduce operational costs compared to physical auctions.
- Disadvantages:
- Time Sensitivity: Auctions may disadvantage users in different time zones or with slow
internet connections.
- Technological Barriers: Some users may find the auction process complex or intimidating.
- Payment Concerns: Reluctance to share financial details online due to security risks.
- Limited Warranty or Returns: Auctioned goods often come with "no returns" policies.
- Market Research: Businesses can monitor discussions to understand customer preferences and
improve products.
Web Server Hardware & Software, Electronic Commerce Software, & Electronic Commerce
Security
- Web Server: A critical component in e-commerce, responsible for hosting websites, processing
requests, and ensuring smooth communication between users and businesses.
- Processors (CPU):
- Powerful processors like Intel Xeon and AMD EPYC are used in enterprise-grade web servers
to handle multiple concurrent requests efficiently.
- These processors are designed to manage high volumes of data processing and ensure fast
response times.
- Memory (RAM):
- Large memory capacity (16 GB - 512 GB) is necessary for caching frequently accessed web
pages and handling high traffic loads.
- Adequate RAM ensures that the server can manage multiple processes simultaneously
without lag.
- Storage:
- Traditional HDDs: Used for backup storage due to their cost-effectiveness and large
capacity.
- Solid-State Drives (SSDs): Improve performance by reducing data retrieval times, making
them ideal for frequently accessed data.
- RAID (Redundant Array of Independent Disks): Ensures data redundancy and protects
against data loss by distributing data across multiple disks.
- Redundant power supplies ensure continuous operation even in the event of a power failure.
- Cooling systems prevent overheating, which can lead to hardware failure and downtime.
- NGINX:
- Often used as a reverse proxy server to distribute client requests to backend servers.
- A Windows-based web server designed for seamless integration with Microsoft technologies.
- Email Options:
- Businesses host their own email servers using software like Microsoft Exchange.
- Advantages: Full control over email data, customizable configurations, and enhanced
security.
- Services like Gmail for Business (Google Workspace), Microsoft 365 Outlook, and Zoho Mail
offer scalable email hosting.
- Spam Filters:
- Email providers use AI-powered spam filters (e.g., Gmail's filtering system) to automatically
detect and block unwanted emails.
- Organizations maintain lists of trusted and blocked email addresses to manage incoming
emails effectively.
- CAPTCHAs:
- Prevent bots from spamming contact forms by requiring users to complete a test that proves
they are human.
- Authentication Protocols:
- Sender Policy Framework (SPF): Ensures that only authorized servers can send emails on
behalf of a domain, reducing the risk of email spoofing.
- DomainKeys Identified Mail (DKIM): Verifies the integrity of emails by adding a digital
signature that can be validated by the recipient's email server.
- cPanel: A popular web hosting control panel that provides a graphical interface for
managing web hosting services.
- Plesk: Another widely used control panel that offers similar functionality to cPanel.
- WordPress: A highly customizable and user-friendly CMS that powers a significant portion of
the web.
- Joomla and Drupal: Offer more advanced features and flexibility for developers.
- E-Commerce Platforms:
- Shopify: A user-friendly platform that allows businesses to set up online stores quickly.
- Magento: Offers extensive customization and scalability for larger e-commerce operations.
- WooCommerce: A WordPress plugin that transforms a WordPress site into a fully functional
e-commerce store.
- Google Analytics: Provides insights into website traffic, user behavior, and conversion rates.
- MongoDB: A NoSQL database management system suitable for handling large volumes of
unstructured data.
- Web-Hosting Services:
- Shared Hosting:
- Multiple websites share a single server, making it a cost-effective option for small businesses
and startups.
- Disadvantages: Limited resources and potential performance issues during high traffic
periods.
- Offers dedicated resources within a shared server environment, providing more control and
better performance than shared hosting.
- Dedicated Hosting:
- A single business has full control over an entire server, offering maximum performance and
customization.
- Cloud Hosting:
- Uses distributed resources for better scalability and reliability.
- Disadvantages: Can be more complex to manage and may have higher costs depending on
usage.
- Shopify and BigCommerce: Managed solutions that require no technical expertise, allowing
businesses to focus on sales and marketing.
- Advantages: Easy to set up and manage, with built-in features for marketing and analytics.
- Marketplace Integrations:
- Businesses sell on platforms like Amazon, eBay, and Etsy to reach a broader audience.
- Disadvantages: Competition with other sellers and fees associated with using the platform.
- Square, Stripe, PayPal: Process online transactions and integrate with e-commerce
platforms.
- Cybercriminals trick users into revealing sensitive information, such as login credentials or
credit card numbers, through deceptive emails or websites.
- Overloads servers with a flood of traffic, making websites inaccessible to legitimate users.
- Intercept communication between users and e-commerce websites to steal data or inject
malicious content.
- Antivirus Software:
- Norton, McAfee, Bitdefender: Protect against malware and viruses that can compromise
client computers.
- Firewalls:
- Prevent unauthorized network access by monitoring and controlling incoming and outgoing
traffic.
- Adds additional security layers by requiring users to provide multiple forms of verification,
such as a password and a fingerprint scan.
- Reduces the risk of unauthorized access even if one verification method is compromised.
- SSL/TLS Encryption:
- Secure Sockets Layer (SSL) and Transport Layer Security (TLS) encrypt data transmitted
between clients and servers.
- Ensures that sensitive information, such as credit card numbers and login credentials, is
protected during transmission.
- Fix security vulnerabilities and ensure that the server software is protected against known
threats.
- Responds to security incidents and provides guidance on preventing and mitigating cyber
threats.
- Ensures secure handling of credit card transactions and protects cardholder data.
- Mandatory for businesses that process, store, or transmit credit card information.
- Credit/Debit Cards:
- Visa, MasterCard, AMEX: Widely accepted payment methods for online transactions.
- Digital Wallets:
- PayPal, Google Pay, Apple Pay: Store card details securely and facilitate quick transactions.
- Cryptocurrency Payments:
- Bank Transfers:
- Disadvantages: Slower processing times and higher fees for international transfers.
- Cryptocurrency Payments:
- Bitcoin:
- The first and most widely recognized cryptocurrency, created in 2009 by an anonymous
entity known as Satoshi Nakamoto.
- Operates on a decentralized blockchain network, enabling peer-to-peer transactions without
intermediaries.
- Blockchain:
- Each transaction is stored in a block, which is linked to the previous block, forming a chain of
blocks.
- Ensuring customer trust and smooth transactions is crucial for the success of e-commerce
businesses.
- Security Risks:
- Phishing, fraud, hacking, and identity theft pose significant threats to online transactions.
- Privacy Concerns:
- Storing and handling customer payment data requires compliance with regulations like PCI
DSS and GDPR.
- Managing currency conversion and cross-border fees is important for businesses operating
globally.
- Some transactions take time due to verification and bank processing times.
- Optimizing payment processing to reduce delays can enhance the customer experience.
| Digital Wallets | Services like PayPal, Apple Pay, and Google Pay store card details securely |
Quick transactions, enhanced security, biometric authentication | May not be accepted by
all merchants |
| Buy Now, Pay Later (BNPL) | After pay allow installment-based payments |
Increases purchasing power, no interest if paid on time | Risk of overspending, late
fees |
- PayPal:
- Stripe:
- Square:
- Amazon Pay:
- Authorization:
- Verifying whether the buyer has sufficient funds to complete the transaction.
- Ensures that the payment method is valid and that the funds are available.
- Authentication:
- Using encryption, Card Verification Value (CVV) checks, and multi-factor authentication
(MFA) to validate users.
- Involves coordination between the acquiring bank, issuing bank, and card networks.
- Chargeback Management:
- Ensures that customers are protected and that merchants can resolve disputes efficiently.
- Businesses expanding into international markets must plan for legal, cultural, and technical
challenges.
- Ensuring compliance with local regulations and adapting to customer preferences is crucial
for success.
- Different countries have varying consumer protection laws, tax regulations, and payment
restrictions.
- Ensuring compliance with local laws is essential for operating legally and ethically.
- Offering local payment options can enhance the customer experience and increase sales.
- Localization involves adapting content, design, and functionality to meet the needs of
specific regions.
- Cross-border shipping involves customs duties, tariffs, and longer delivery times.
- Regulations like GDPR and CCPA affect how businesses collect and store personal data.
- Ensuring data privacy and security is essential for building customer trust.
- Cost Savings:
- Cybersecurity Risks:
- Technical Limitations:
- Requires access to electronic devices and the internet, limiting adoption in certain regions.