E-Commerce
Electronic commerce, commonly known as e-commerce or eCommerce, consists of the buying and selling of products or services over electronic systems such as the Internet and other computer networks. The amount of trade conducted electronically has grown extraordinarily with wide-spread Internet usage. A wide variety of commerce is conducted in this way, spurring and drawing on innovations in electronic funds transfer, supply chain management, Internet marketing, online transaction processing, electronic data interchange (EDI), inventory management systems, and automated data collection systems. The Top 10 E-commerce Online Retailers include Amazon.com, eBay.com, Wal-Mart.com, BestBuy.com, JCPenney.com ,Target.com ,Kohls.com ,Overstock.com , google.com, Sears.com
Advantages of E-Commerce
Being able to conduct business 24 x 7 x 365 . E-commerce systems can operate all day every day. Your physical storefront does not need to be open in order for customers and suppliers to be doing business with you electronically.
Access the global marketplace . The Internet spans the world, and it is possible to do business with any business or person who is connected to the Internet. Simple local businesses such as specialist record stores are able to market and sell their offerings internationally using e-commerce. This global opportunity is assisted by the fact that, unlike traditional communications methods, users are not charged according to the distance over which they are communicating.
Speed. Electronic communications allow messages to traverse the world almost instantaneously. There is no need to wait weeks for a catalogue to arrive by post: that communications delay is not a part of the Internet /e-commerce world.
Marketspace. The market in which web-based businesses operate is the global market. It may not be evident to them, but many businesses are already facing international competition from web-enabled businesses.
Opportunity to reduce costs. The Internet makes it very easy to 'shop around' for products and services that may be cheaper or more effective than we might otherwise settle for. It is sometimes possible to, through some online research, identify original manufacturers for some goods - thereby bypassing wholesalers and achieving a cheaper price.
Computer platform-independent . Many, if not most, computers have the ability to communicate via the Internet independent of operating systems and hardware. Customers are not limited by existing hardware systems.
Efficient applications development environment - 'In many respects, applications can be more efficiently developed and distributed because the can be built without regard to the customer's or the business partner's technology platform. Application updates do not have to be manually installed on computers. Rather, Internet-related technologies provide this capability inherently through automatic deployment of software.
Allowing customer self service and 'customer outsourcing'. People can interact with businesses at any hour of the day that it is convenient to them, and because these interactions are initiated by customers, the customers also provide a lot of the data for the transaction that may otherwise need to be entered by business staff. This means that some of the work and costs are effectively shifted to customers; this is referred to as 'customer outsourcing'.
Stepping beyond borders to a global view. Using aspects of e-commerce technology can mean your business can source and use products and services provided by other businesses in other countries. This seems obvious enough to say, but people do not always consider the implications of e-commerce. For example, in many ways it can be easier and cheaper to host and operate some e-commerce activities outside Australia. Further, because many e-commerce transactions involve credit cards, many businesses in Australia need to make arrangements for accepting online payments. However a number of major Australian banks have tended to be unhelpful laggards on this front, charging a lot of money and making it difficult to establish these arrangements - particularly for smaller businesses and/or businesses that don't fit into a traditional-economy understanding of business
Disadvantages of E-commerce
Time for delivery of physical products. It is possible to visit a local music store and walk out with a compact disc, or a bookstore and leave with a book. E-commerce is often used to buy goods that are not available locally from businesses all over the world, meaning that physical goods need to be delivered, which takes time and costs money. In some cases there are ways around this, for example, with electronic files of the music or books being accessed across the Internet, but then these are not physical goods.
Physical product, supplier & delivery uncertainty. When you walk out of a shop with an item, it's yours. You have it; you know what it is, where it is and how it looks. In some respects e-commerce purchases are made on trust. This is because, firstly, not having had physical access to the product, a purchase is made on an expectation of what that product is and its condition. Secondly, because supplying businesses can be conducted across the world, it can be uncertain whether or not they are legitimate businesses and are not just going to take your money. It's pretty hard to knock on their door to complain or seek legal recourse! Thirdly, even if the item is sent, it is easy to start wondering whether or not it will ever arrive.
Perishable goods . Forget about ordering a single gelato ice cream from a shop in Rome! Though specialised or refrigerated transport can be used, goods bought and sold via the Internet tend to be durable and non-perishable: they need to survive the trip from the supplier to the purchasing business or consumer. This shifts the bias for perishable and/or non-durable goods back towards traditional supply chain arrangements, or towards relatively more local e-commerce-based purchases, sales and distribution. In contrast, durable goods can be traded from almost anyone to almost anyone else, sparking competition for lower prices. In some cases this leads to disintermediation in which intermediary people and businesses are bypassed by consumers and by other businesses that are seeking to purchase more directly from manufacturers.
Limited and selected sensory information. The Internet is an effective conduit for visual and auditory information: seeing pictures, hearing sounds and reading text. However it does not allow full scope for our senses: we can see pictures of the flowers, but not smell their fragrance; we can see pictures of a hammer, but not feel its weight or balance. Further, when we pick up and inspect something, we choose what we look at and how we look at it. This is not the case on the Internet. If we were looking at buying a car on the Internet, we would see the pictures the seller had chosen for us to see but not the things we might look for if we were able to see it in person. And, taking into account our other senses, we can't test the car to hear the sound of the engine as it changes gears or sense the smell and feel of the leather seats. There are many ways in which the Internet does not convey the richness of experiences of the world. This lack of sensory information means that people are often much more comfortable buying via the Internet generic goods - things that they have seen or experienced before and about which there is little ambiguity, rather than unique or complex things.
Returning goods. Returning goods online can be an area of difficulty. The uncertainties surrounding the initial payment and delivery of goods can be exacerbated in this process. Will the goods get back to their source? Who pays for the return postage? Will the refund be paid? Will I be left with nothing? How long will it take? Contrast this with the offline experience of returning goods to a shop.
Privacy, security, payment, identity, contract. Many issues arise - privacy of information, security of that information and payment details, whether or not payment details (eg credit card details) will be misused, identity theft, contract, and, whether we have one or not, what laws and legal jurisdiction apply.
Defined services & the unexpected . E-commerce is an effective means for managing the transaction of known and established services, that is, things that are everyday. It is not suitable for dealing with the new or unexpected. For example, a transport company used to dealing with simple packages being asked if it can transport a hippopotamus, or a customer asking for a book order to be wrapped in blue and white polka dot paper with a bow. Such requests need human intervention to investigate and resolve.
Personal service . Although some human interaction can be facilitated via the web, e-commerce can not provide the richness of interaction provided by personal service. For most businesses, e-commerce methods provide the equivalent of an information-rich counter attendant rather than a salesperson. This also means that feedback about how people react to product and service offerings also tends to be more granular or perhaps lost using e-commerce approaches. If your only feedback is that people are (or are not) buying your products or services online, this is inadequate for evaluating how to change or improve your e-commerce strategies and/or product and service offerings. Successful business use of e-commerce typically involves strategies for gaining and applying customer feedback. This helps businesses to understand, anticipate and meet changing online customer needs and preferences, which is critical because of the comparatively rapid rate of ongoing Internet-based change.
Size and number of transactions. E-commerce is most often conducted using credit card facilities for payments, and as a result very small and very large transactions tend not to be conducted online. The size of transactions is also impacted by the economics of transporting physical goods. For example, any benefits or conveniences of buying a box of pens online from a US-based business tend to be eclipsed by the cost of having to pay for them to be delivered to you in Australia. The delivery costs also mean that buying individual items from a range of different overseas businesses is significantly more expensive than buying all of the goods from one overseas business because the goods can be packaged and shipped together.
Internet Business Models
Conceptualizations of business models try to formalize informal descriptions into building blocks and their relationship which allows enterprises to describe their business model. The following are crucial in understanding and categorising a type of internet business model;
Infrastructure
Core capabilities: The capabilities and competencies necessary to execute a company's business model.
Partner network: The business alliances which complement other aspects of the business model.
Value configuration: The rationale which makes a business mutually beneficial for a business and its customers.
Offering
Value proposition: The products and services a business offers. Quoting Osterwalder (2004), a value proposition "is an overall view of .. products and services that together represent value for a specific customer segment. It describes the way a firm differentiates itself from its competitors and is the reason why customers buy from a certain firm and not from another."
Customers
Target customer: The target audience for a business' products and services.
Distribution channel: The means by which a company delivers products and services to customers. This includes the company's marketing and distribution strategy.
Customer relationship: The links a company establishes between itself and its different customer segments. The process of managing customer relationships is referred to as customer relationship management.
Finances
Cost structure: The monetary consequences of the means employed in the business model. A company's DOC.
Revenue: The way a company makes money through a variety of revenue flows. A company's income.
Electronic commerce that is conducted between businesses is referred to as business-to-business or B2B. B2B can be open to all interested parties (e.g. commodity exchange) or limited to specific, pre-qualified participants (private electronic market). Electronic commerce that is conducted between businesses and consumers, on the other hand, is referred to as business-to-consumer or B2C. This is the type of electronic commerce conducted by companies such as Amazon.com. Others include, Business-to-employee (B2E), Government-to-business (G2B), and Government-to-citizen (G2C).
E-commerce Security
Many issues arise - privacy of information, security of that information and payment details, whether or not payment details (eg credit card details) will be misused, identity theft, contract, and, whether we have one or not, what laws and legal jurisdiction apply. Private information must be kept from unauthorized parties by using cryptographic techniques.
Web Cryptography
Cryptography is the science of information security. Cryptography is closely related to the disciplines of cryptology and cryptanalysis. Cryptography includes techniques such as microdots, merging words with images, and other ways to hide information in storage or transit. However, in today's computer-centric world, cryptography is most often associated with scrambling plaintext (ordinary text, sometimes referred to as cleartext) into ciphertext (a process called encryption), then back again (known as decryption). Individuals who practice this field are known as cryptographers. Cryptography involves encryption and decryption techniques.
Modern cryptography concerns itself with the following four objectives:
1) Confidentiality (the information cannot be understood by anyone for whom it was unintended)
2) Integrity (the information cannot be altered in storage or transit between sender and intended receiver without the alteration being detected)
3) Non-repudiation (the creator/sender of the information cannot deny at a later stage his or her intentions in the creation or transmission of the information)
4) Authentication (the sender and receiver can confirm each other?s identity and the origin/destination of the information)
Encryption and Decryption
Encryption is the conversion of data into a form, called a cipher text, that cannot be easily understood by unauthorized people. Decryption is the process of converting encrypted data back into its original form, so it can be understood.
Simple ciphers include the substitution of letters for numbers, the rotation of letters in the alphabet, and the "scrambling" of voice signals by inverting the sideband frequencies. More complex ciphers work according to sophisticated computer algorithms that rearrange the data bits in digital signals.
Procedures and protocols that meet some or all of the above criteria are known as cryptosystems. Cryptosystems are often thought to refer only to mathematical procedures and computer programs; however, they also include the regulation of human behavior, such as choosing hard-to-guess passwords, logging off unused systems, and not discussing sensitive procedures with outsiders.
Digital Certificate
A digital certificate is an electronic "credit card" that establishes your credentials when doing business or other transactions on the Web. It is issued by a certification authority (CA). It contains your name, a serial number, expiration dates, a copy of the certificate holder's public key (used for encrypting messages and digital signatures), and the digital signature of the certificate-issuing authority so that a recipient can verify that the certificate is real. Some digital certificates conform to a standard, X.509. Digital certificates can be kept in registries so that authenticating users can look up other users' public keys.
Certificate Authority (CA)
A certificate authority (CA) is an authority in a network that issues and manages security credentials and public keys for message encryption. As part of a public key infrastructure (PKI), a CA checks with a registration authority (RA) to verify information provided by the requestor of a digital certificate. If the RA verifies the requestor's information, the CA can then issue a certificate.
Digital Signature
A digital signature (not to be confused with a digital certificate) is an electronic signature that can be used to authenticate the identity of the sender of a message or the signer of a document, and possibly to ensure that the original content of the message or document that has been sent is unchanged. Digital signatures are easily transportable, cannot be imitated by someone else, and can be automatically time-stamped. The ability to ensure that the original signed message arrived means that the sender cannot easily repudiate it later.
A digital signature can be used with any kind of message, whether it is encrypted or not, simply so that the receiver can be sure of the sender's identity and that the message arrived intact. A digital certificate contains the digital signature of the certificate-issuing authority so that anyone can verify that the certificate is real.
Private and Public Keys
In cryptography, a public key is a value provided by some designated authority as an encryption key that, combined with a private key derived from the public key, can be used to effectively encrypt messages and digital signatures.
The use of combined public and private keys is known as asymmetric cryptography. A system for using public keys is called a public key infrastructure (PKI).
In cryptography, a private or secret key is an encryption/decryption key known only to the party or parties that exchange secret messages. In traditional secret key cryptography, a key would be shared by the communicators so that each could encrypt and decrypt messages. The risk in this system is that if either party loses the key or it is stolen, the system is broken. A more recent alternative is to use a combination of public and private keys. In this system, a public key is used together with a private key. See public key infrastructure (PKI) for more information.
A PKI (public key infrastructure) enables users of a basically unsecure public network such as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority. The public key infrastructure provides for a digital certificate that can identify an individual or an organization and directory services that can store and, when necessary, revoke the certificates. Although the components of a PKI are generally understood, a number of different vendor approaches and services are emerging. Meanwhile, an Internet standard for PKI is being worked on.
The public key infrastructure assumes the use of public key cryptography, which is the most common method on the Internet for authenticating a message sender or encrypting a message. Traditional cryptography has usually involved the creation and sharing of a secret key for the encryption and decryption of messages. This secret or private key system has the significant flaw that if the key is discovered or intercepted by someone else, messages can easily be decrypted. For this reason, public key cryptography and the public key infrastructure is the preferred approach on the Internet. (The private key system is sometimes known as symmetric cryptography and the public key system as asymmetric cryptography.)
A public key infrastructure consists of:
A certificate authority (CA) that issues and verifies digital certificate. A certificate includes the public key or information about the public key
A registration authority (RA) that acts as the verifier for the certificate authority before a digital certificate is issued to a requestor
One or more directories where the certificates (with their public keys) are held
A certificate management system
How Public and Private Key Cryptography Works
In public key cryptography, a public and private key are created simultaneously using the same algorithm (a popular one is known as RSA) by a certificate authority (CA). The private key is given only to the requesting party and the public key is made publicly available (as part of a digital certificate) in a directory that all parties can access. The private key is never shared with anyone or sent across the Internet. You use the private key to decrypt text that has been encrypted with your public key by someone else (who can find out what your public key is from a public directory). Thus, if I send you a message, I can find out your public key (but not your private key) from a central administrator and encrypt a message to you using your public key. When you receive it, you decrypt it with your private key. In addition to encrypting messages (which ensures privacy), you can authenticate yourself to me (so I know that it is really you who sent the message) by using your private key to encrypt a digital certificate. When I receive it, I can use your public key to decrypt it. Here's a table that restates it:
I can use your public key to decrypt it. Here's a table that restates it:
To do this
Use whose
Kind of key
Send an encrypted message
Use the receiver's
Public key
Send an encrypted signature
Use the sender's
Private key
Decrypt an encrypted message
Use the receiver's
Private key
Decrypt an encrypted signature (and authenticate the sender)
Use the sender's
Public key
Who Provides the Infrastructure
A number of products are offered that enable a company or group of companies to implement a PKI. The acceleration of e-commerce and business-to-business commerce over the Internet has increased the demand for PKI solutions. Related ideas are the virtual private network (VPN) and the IP Security (IPsec) standard. Among PKI leaders are:
RSA, which has developed the main algorithms used by PKI vendors
Verisign, which acts as a certificate authority and sells software that allows a company to create its own certificate authorities
GTE CyberTrust, which provides a PKI implementation methodology and consultation service that it plans to vend to other companies for a fixed price
Xcert, whose Web Sentry product that checks the revocation status of certificates on a server, using the Online Certificate Status Protocol (OCSP)
Netscape, whose Directory Server product is said to support 50 million objects and process 5,000 queries a second; Secure E-Commerce, which allows a company or extranet manager to manage digital certificates; and Meta-Directory, which can connect all corporate directories into a single directory for security management
Secure Socket Layer
The Secure Sockets Layer (SSL) is a commonly-used protocol for managing the security of a message transmission on the Internet. SSL has recently been succeeded by Transport Layer Security (TLS), which is based on SSL. SSL uses a program layer located between the Internet's Hypertext Transfer Protocol (HTTP) and Transport Control Protocol (TCP) layers. SSL is included as part of both the Microsoft and Netscape browsers and most Web server products. Developed by Netscape, SSL also gained the support of Microsoft and other Internet client/server developers as well and became the de facto standard until evolving into Transport Layer Security. The "sockets" part of the term refers to the sockets method of passing data back and forth between a client and a server program in a network or between program layers in the same computer. SSL uses the public-and-private key encryption system from RSA, which also includes the use of a digital certificate.
Transport Layer Security (TLS) is a protocol that ensures privacy between communicating applications and their users on the Internet. When a server and client communicate, TLS ensures that no third party may eavesdrop or tamper with any message. TLS is the successor to the Secure Sockets Layer (SSL).
TLS is composed of two layers: the TLS Record Protocol and the TLS Handshake Protocol. The TLS Record Protocol provides connection security with some encryption method such as the Data Encryption Standard (DES). The TLS Record Protocol can also be used without encryption. The TLS Handshake Protocol allows the server and client to authenticate each other and to negotiate an encryption algorithm and cryptographic keys before data is exchanged.
Information sent over the Internet commonly uses the set of rules called TCP/IP (Transmission Control Protocol / Internet Protocol). The information is broken into packets, numbered sequentially, and an error control attached. Individual packets are sent by different routes. TCP/IP reassembles them in order and resubmits any packet showing errors. SSL uses PKI and digital certificates to ensure privacy and authentication. The procedure is something like this: the client sends a message to the server, which replies with a digital certificate. Using PKI, server and client negotiate to create session keys, which are symmetrical secret keys specially created for that particular transmission. Once the session keys are agreed, communication continues with these session keys and the digital certificates.
PCI, SET, Firewalls and Kerberos
Credit card details can be safely sent with SSL, but once stored on the server they are vulnerable to outsiders hacking into the server and accompanying network. A PCI (peripheral component interconnect: hardware) card is often added for protection, therefore, or another approach altogether is adopted: SET (Secure Electronic Transaction). Developed by Visa and Mastercard, SET uses PKI for privacy, and digital certificates to authenticate the three parties: merchant, customer and bank. More importantly, sensitive information is not seen by the merchant, and is not kept on the merchant's server.
Firewalls (software or hardware) protect a server, a network and an individual PC from attack by viruses and hackers. Equally important is protection from malice or carelessness within the system, and many companies use the Kerberos protocol, which uses symmetric secret key cryptography to restrict access to authorized employees.
Transactions
Sensitive information has to be protected through at least three transactions:
credit card details supplied by the customer, either to the merchant or payment gateway. Handled by the server's SSL and the merchant/server's digital certificates.
credit card details passed to the bank for processing. Handled by the complex security measures of the payment gateway.
order and customer details supplied to the merchant, either directly or from the payment gateway/credit card processing company. Handled by SSL, server security, digital certificates (and payment gateway sometimes).
Credit Card Processing
A credit card is part of a system of payments named after the small plastic card issued to users of the system. It is a card entitling its holder to buy goods and services based on the holders promise to pay for these goods and services.[The issuer of the card grants a line of credit to the consumer (or the user) from which the user can borrow money for payment to a merchant or as a cash advance to the user.
Parties involved
Cardholder: The holder of the card used to make a purchase; the consumer.
Card-issuing bank: The financial institution or other organization that issued the credit card to the cardholder. This bank bills the consumer for repayment and bears the risk that the card is used fraudulently. American Express and Discover were previously the only card-issuing banks for their respective brands, but as of 2007, this is no longer the case. Cards issued by banks to cardholders in a different country are known as offshore credit cards.
Merchant: The individual or business accepting credit card payments for products or services sold to the cardholder
Acquiring bank: The financial institution accepting payment for the products or services on behalf of the merchant.
Independent sales organization: Resellers (to merchants) of the services of the acquiring bank.
Merchant account: This could refer to the acquiring bank or the independent sales organization, but in general is the organization that the merchant deals with.
Credit Card association: An association of card-issuing banks such as Visa, MasterCard, Discover, American Express, etc. that set transaction terms for merchants, card-issuing banks, and acquiring banks.
Transaction network: The system that implements the mechanics of the electronic transactions. May be operated by an independent company, and one company may operate multiple networks. Transaction processing networks include: Cardnet, Nabanco, Omaha, Paymentech, NDC Atlanta, Nova, TSYS, Concord EFSnet, and VisaNet.[4]
Affinity partner: Some institutions lend their names to an issuer to attract customers that have a strong relationship with that institution, and get paid a fee or a percentage of the balance for each card issued using their name. Examples of typical affinity partners are sports teams, universities, charities, professional organizations, and major retailers.
Transaction steps
Authorization: The cardholder pays for the purchase and the merchant submits the transaction to the acquirer (acquiring bank). The acquirer verifies the credit card number, the transaction type and the amount with the issuer (Card-issuing bank) and reserves that amount of the cardholder's credit limit for the merchant. An authorization will generate an approval code, which the merchant stores with the transaction.
Batching: Authorized transactions are stored in "batches", which are sent to the acquirer. Batches are typically submitted once per day at the end of the business day. If a transaction is not submitted in the batch, the authorization will stay valid for a period determined by the issuer, after which the held amount will be returned back to the cardholder's available credit . Some transactions may be submitted in the batch without prior authorizations; these are either transactions falling under the merchant's floor limit or ones where the authorization was unsuccessful but the merchant still attempts to force the transaction through. (Such may be the case when the cardholder is not present but owes the merchant additional money, such as extending a hotel stay or car rental.)
Clearing and Settlement: The acquirer sends the batch transactions through the credit card association, which debits the issuers for payment and credits the acquirer. Essentially, the issuer pays the acquirer for the transaction.
Funding: Once the acquirer has been paid, the acquirer pays the merchant. The merchant receives the amount totaling the funds in the batch minus the "discount rate," which is the fee the merchant pays the acquirer for processing the transactions.
Chargebacks: A chargeback is an event in which money in a merchant account is held due to a dispute relating to the transaction. Chargebacks are typically initiated by the cardholder. In the event of a chargeback, the issuer returns the transaction to the acquirer for resolution. The acquirer then forwards the chargeback to the merchant, who must either accept the chargeback or contest it.
E-Commerce Payment Systems
The easiest way to start an e-commerce site is to start by using the PayPal payment system. Offering PayPal has its ups and downs. Many people have PayPal accounts or are willing to make charges on their credit cards through PayPal. However, many are not. So the first thing is the possibility of losing customers by not offering an alternative payment system.
PayPal offers an "all in one" way to accept payments over the Internet and charges a relatively low fee for doing so. They provide a secure gateway, merchant account (theirs)and also have the ability to verify buyers.
PayPal does turn off some buyers, either because they have heard negative feedback about PayPal or have had previous negative experiences. In addition, when a consumer purchases through PayPal with their credit card, they may lose many of the "charge back" rights they would normally have.
Other Payment Systems
. Google has just started a payment system called "Google Checkout" which sounds like it may offer the "all in one" system like PayPal. Well known payment systems that allow credit card processing include CheckOut.com, Any Pay.com,AuthorizeNet.com , CCNow.com, Charge.com, Digital River.com ,Fire Pay .com, Internet Cash .com, MerchantEquip.com, PayQuake.com, Pro Pay .com etc
Online Advertising
Online advertising is a form of promotion that uses the Internet and World Wide Web for the expressed purpose of delivering marketing messages to attract customers. Examples of online advertising include contextual ads on search engine results pages, banner ads, Rich Media Ads, Social network advertising, online classified advertising, advertising networks and e-mail marketing, including e-mail spam.
Online video directories for brands are a good example of interactive advertising. These directories complement television advertising and allow the viewer to view the commercials of a number of brands. If the advertiser has opted for a response feature, the viewer may then choose to visit the brand’s website, or interact with the advertiser through other touch points such as email, chat or phone. Response to brand communication is instantaneous, and conversion to business is very high. This is because in contrast to conventional forms of interruptive advertising, the viewer has actually chosen to see the commercial.
One major benefit of online advertising is the immediate publishing of information and content that is not limited by geography or time. To that end, the emerging area of interactive advertising presents fresh challenges for advertisers who have hitherto adopted an interruptive strategy.
Another benefit is the efficiency of advertisers'investment. It means two facts, one is the customization of advertisements, including content and posted websites. For example, AdWords and AdSense enable ads shown on relevant webpages or aside of search results of pre-chosen keywords. Another is the payment method. Whatever purchasing variation is selected, the payment is usually relative with audiences' response.
The most common ways in which online advertising is purchased are as follows;.
CPM (Cost Per Impression) is where advertisers pay for exposure of their message to a specific audience. CPM costs are priced per thousand impressions, or loads of an advertisement. However, some impressions may not be counted, such as a reload or internal user action. The M in the acronym is the Roman numeral for one thousand.
CPV (Cost Per Visitor) or (Cost per View in the case of Pop Ups and Unders) is where advertisers pay for the delivery of a Targeted Visitor to the advertisers website.
CPC (Cost Per Click) is also known as Pay per click (PPC). Advertisers pay each time a user clicks on their listing and is redirected to their website. They do not actually pay for the listing, but only when the listing is clicked on. This system allows advertising specialists to refine searches and gain information about their market. Under the Pay per click pricing system, advertisers pay for the right to be listed under a series of target rich words that direct relevant traffic to their website, and pay only when someone clicks on their listing which links directly to their website. CPC differs from CPV in that each click is paid for regardless of whether the user makes it to the target site.
CPA (Cost Per Action) or (Cost Per Acquisition) advertising is performance based and is common in the affiliate marketing sector of the business. In this payment scheme, the publisher takes all the risk of running the ad, and the advertiser pays only for the amount of users who complete a transaction, such as a purchase or sign-up. This is the best type of rate to pay for banner advertisements and the worst type of rate to charge. Similarly, CPL (Cost Per Lead) advertising is identical to CPA advertising and is based on the user completing a form, registering for a newsletter or some other action that the merchant feels will lead to a sale. Also common, CPO (Cost Per Order) advertising is based on each time an order is transacted.
Cost per conversion Describes the cost of acquiring a customer, typically calculated by dividing the total cost of an ad campaign by the number of conversions. The definition of "Conversion" varies depending on the situation: it is sometimes considered to be a lead, a sale, or a purchase.
CPE (Cost Per Engagement) is a form of Cost Per Action pricing first introduced in March 2008. Differing from cost-per-impression or cost-per-click models, a CPE model means advertising impressions are free and advertisers pay only when a user engages with their specific ad unit. Engagement is defined as a user interacting with an ad in any number of ways.
Types of Ads
Floating ad: An ad which moves across the user's screen or floats above the content.
Expanding ad: An ad which changes size and which may alter the contents of the webpage.
Polite ad: A method by which a large ad will be downloaded in smaller pieces to minimize the disruption of the content being viewed
Wallpaper ad: An ad which changes the background of the page being viewed.
Trick banner: A banner ad that looks like a dialog box with buttons. It simulates an error message or an alert.
Pop-up: A new window which opens in front of the current one, displaying an advertisement, or entire webpage.
Pop-under: Similar to a Pop-Up except that the window is loaded or sent behind the current window so that the user does not see it until they close one or more active windows.
Video ad: similar to a banner ad, except that instead of a static or animated image, actual moving video clips are displayed.
Map ad: text or graphics linked from, and appearing in or over, a location on an electronic map such as on Google Maps.
Mobile ad: an SMS text or multi-media message sent to a cell phone.
In addition, ads containing streaming video or streaming audio are becoming very popular with advertisers.
E-mail advertising
Legitimate Email advertising or E-mail marketing is often known as "opt-in e-mail advertising" to distinguish it from spam.
Affiliate marketing
is a form of online advertising where advertisers place campaigns with a potentially large number of small (and large) publishers, whom are only paid media fees when traffic to the advertiser is garnered, and usually upon a specific measurable campaign result (a form, a sale, a sign-up, etc). Today, this is usually accomplished through contracting with an affiliate network.
Affiliate marketing was an invention by CDNow.com in 1994 and was excelled by Amazon.com when it launched its Affiliate Program, called Associate Program in 1996. The online retailer used its program to generate low cost brand exposure and provided at the same time small websites a way to earn some supplemental income.
Contextual advertising
Many advertising networks display graphical or text-only ads that correspond to the keywords of an Internet search or to the content of the page on which the ad is shown. These ads are believed to have a greater chance of attracting a user, because they tend to share a similar context as the user's search query. For example, a search query for "flowers" might return an advertisement for a florist's website.
Another newer technique is embedding keyword hyperlinks in an article which are sponsored by an advertiser. When a user follows the link, they are sent to a sponsor's website.
Behavioral targeting
In addition to contextual targeting, online advertising can be targeted based on a user's past clickstream. For example, if a user is known to have recently visited a number of automotive shopping / comparison sites based on clickstream analysis enabled by cookies stored on the user's computer, that user can then be served auto-related ads when they visit other, non-automotive sites.
Ads and malware
There is also class of advertising methods which may be considered unethical and perhaps even illegal. These include external applications which alter system settings (such as a browser's home page), spawn pop-ups, and insert advertisements into non-affiliated webpages. Such applications are usually labeled as spyware or adware. They may mask their questionable activities by performing a simple service, such as displaying the weather or providing a search bar. Some programs are effectively trojans. These applications are commonly designed so as to be difficult to remove or uninstall. The ever-increasing audience of online users, many of whom are not computer-savvy, frequently lack the knowledge and technical ability to protect themselves from these programs.
Ad server market structure
Given below is a list of top ad server vendors in 2008 with figures in millions of viewers published in a Attributor survey.
Google 1,118, DoubleClick 1,079, Yahoo 362, MSN 309, AOL 156, Adbrite 73
It should be noted that Google acquired DoubleClick in 2007 for a consideration of $3,100 million. So this means Google is doing well.
26