E-Commerce Technology Made Easy
E-Commerce Technology Made Easy
E-Commerce Technology Made Easy
S. Sridhar* et al.
(IJITR) INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY AND RESEARCH
Volume No.5, Issue No.3, April – May 2017, 6183-6198.
satellites. Also the following are valid :-Satellite – - WWW server Functions
accessible from any spot on the globe. ; Can - Third-party Services
provide broad band digital services including voice o Digital Library of document / Data Server
and data & video.;Over 150 communication o Third party information processing tools/
satellites are providing wide range of services; services
Geosyn chronous orbit ( GEO)satellites are placed o Electronic payment servers
in a high circular orbit 22,300 miles above equator; Essential concepts in Web
GEO satellites rotate with earth and appear to be
URL : Uniform resource locator (Address Scheme)
stationary; Used to broadcast a wide beam to
ensure the wide area coverage; Mortorola’s / HTTP: Network Protocol – Hyper text transfer
Microsoft & Mcaw cellular- provide basic protocol
infrastructure to beam data / voice practically
HTML: Mark-up Language representing hypertext
anywhere in the world; Next VSAT ( very small
documents containing list boxes graphics.
aperture terminal) satellite uses small ground
antennas to provide low data rate point to point
N/W services . Day by day this is increasing for
retail markets.
2.4 I-Way
E-commerce applications are dependent on I-way.
In the case of cable TV , two-way interactive
applications are not possible. Whereas in I-way,
small business information of publishing using
tools like www( world wide web) are possible.
Possibilities are mentioned below :- Publish 3.1 Internet Application And Utility Programs
information by set-up of on-line servers;
Consumers / end-users or business paying for Today ATM interface is an integral part of bank’s
information on products / services; Information communications and market strategy.
services for commercial / govy./pvt. For goods / ATM Network
services; Value-added information providing etc.;
Components of the information super I-way
infrastructure
Network access equipment : consumer / business
premises equipments
Local on ramps : Telecom based infrastructure,
cable TV based infrastructure , wireless
infrastructure, commercial on-line infrastructure
Global Information distribution – N/W : Backbone ENTERTAINMENT:-Movies On Demand, Video
communications & satellite N/W Cataloging, Interactive Ads, Multi-User Games,
Online-Discussion
FINANCIAL SERVICES:-Home Banking,
Financial Services, Financial News
ESSENTIAL SERVICES:- Home shopping,
electronic catalogs, Telemedicine, remote
diagnostics
EDUCATION AND TRAINING:- Interactive
education, multi-user games, Video conferencing
III. Networks Making Up The Internet on-line databases
Business internet provides accepted TCP/IP as the
standard protocol on their own Networks thus,
allowing smooth linkage with the Academic
Internet.
DOMAIN SERVICES / WEB SERVICE
PROTOCOLS
- Client Browser
V. MARKETING STRATEGY -
TARGETED AUDIENCE
Enable Technology– Information servers, client
browsers bulletin boards, software agents
Authors of marketing materials - companies and
consumers
any other product need some way to examine VI. NETWORK SECURITY &
products before they buy; Buying and selling FIREWALLS
should be simple and have as low as entry cost in
Two Broad Types : Client –Server Security, Data
time, money and effort as possible. Opening a
and Transaction Security
first virtual A/c : Contain a Format: Full Name,
e-mail, ph#, address, postal code , state etc.. First Client –Server Security uses Various
Information Process : Customer attempts to Authorization; Only Valid users / programs have
download information; Merchant has the option to access to information like databases; Properly
verify the A/c.; Offered information will be sent to authenticated users are allowed access; Includes
buyer directly form merchants server; Merchants Password protection , encrypted smart cards,
server sends e-mail detailing buyer & Seller ID, biometrics & Firewalls.
time purchased & price; First virtual sends e-mail
Data & transmission Security ensures Privacy;
to customer whether he/she wants to pay for this
Ensures confidentiality in Electronic messages /
item; If ‘Yes’ some attention (similar to e-mail A/c
Data Pkts; Authentication of remote users of on-
opening time some virtual agreement taken); Then
confirm transaction. line payment; Data encryption using
Cryptographic methods as preventive measures
5.5 Cyber Cash
To process credit card transaction, one must
establish merchant Account with a bank offering
cyber cash :Cyber cash client software is available
from several sources including cyber cash’s
website; When customer completes a purchase,
click cyber cash PAY button, then merchant
receives information about this customer’s order;
The encrypted data includes customer’s payment
information; Merchant’s cyber cash forwards the
encrypted message to cyber cash; Once cyber cash
receives the encrypted payment message, then
cyber cash determines credit card – based or cyber
coin transaction; When cyber cash is credit card
based, then cyber cash forwards the message to
merchant’s designated bank or credit card
processor; Then the acceptance or rejection takes Types of holes in Client-Server Network Security
place in 20 sec.; With cyber coin, electronic wallet : Physical Security holes; Software Security holes;
essentially holds digital money transfer is US$20 Inconsistent usage holes. Physical Security holes:
increments; Cyber coin money is placed into A/C Examples:Public workstation so that any hacker
at cyber cash and during transaction, money is can temper the first data; On the Network , guess
pulled from wallet and sent to merchant’s cyber passwords. Software Security holes: Badly written
coin wallet; The Cyber cash merchant server must programs like “send mail” hole during 1988;
be properly setup before any cyber cash Recently in IBM CRS – 6000 workstations, a
transactions; Tests are to be conducted before “root” shell with highest level of access was
accepting cyber cash possible & could be used to delete the entire file
system. Inconsistent usage holes: When system
Running First Time S/W For Cyber Cash administrator assembles a combination of
New Wallet Screen; Summary Screen; Key Hardware & software such that seriously flawed
generation screen; New Wallet Confirmation; from security point of view: This is common when
Back up screen; Add credit card screen; Name software is more complex. Trust-based Security:
credit card screen; Credit card billing information Trust everyone & do nothing extra far protection.
screen; Credit card number entry screen; Credit Security Through obscurity (STO); Any Network
card wizard screen 1; Credit card wizard screen 2; is secured so far as nobody outside its management
Credit card wizard screen 3; Credit card wizard group is allowed to find out anything about its
screen 4; Cyber cash client application operational details. This is quite successful in
administration panel; Cyber cash client application system like IBM MVS or DEC VAX. Password
– transaction log; Cyber cash payment request Schemes:- First level barrier to accidental
summary; Transaction authorization notification intrusion. Biometric System: Most secure level of
screen authorization involving some unique aspect of a
person’s body. Past biometric authentication was
based on comparison of finger prints, palm prints
or signature verification. Many biometric devices and is not kept secret; Since only the bonafide
are costly. author of an encryption message has knowledge of
the private key, successful decryption using the
6.1 Threats To Network Security
corresponding public key verifies the identify of
Security threat that is emerging in Electronic the author and ensures message integrity; Public
Commerce world is mobile code (Software Agent) keys can be maintained in some central repository
which resembles like traditional virus threat ;It is and retrieved to decode or encode information; No
executable program with ability to move from one can figure out the private key from the
machine to machine; Invoke itself without external corresponding public key; Further public key
influence; These threats of 2 kinds: Threat to local cryptography can be used for sender authentication
computing environment from mobile software; known as digital signatures
Access control and threats to servers including
6.4 Secured Electronic Transmission
denial of service, packet replay and packet
modification It Involves Data Security, Message Security,
Message confidentiality, Message and system
6.2 Software Agents And Malicious Code Threat
integrity, Message sender authentication /
These threats arise from malicious data or code, identification, Encryption as basis for Data and
refers to viruses, worms, Trojan horses, logic message security, Data Encryption standard
bombs and other deviant Software programs. (DES), Public key cryptography. Network Security
Virus: A Code segment then replicates by Solution involves Security and Web, Categories of
attaching copies of itself to existing EXE files. The internet Data and transaction, WWW – Based
new copy of virus is executed when user executes security schemes, Basic authentication features,
the host program. Trojan Horse : A program that Secure Sockets Layer (SSL), Secure Hypertext
performs a desired task but also includes Transfer Protocol (S-HTTP), Security and Web : It
unexpected and undesirable function. When is a high profile problem; Day by day # of
editing program for a multi-user systems, could applications forwards commerce; Many Client –
lead to deleting some user’s files too. Worm: A Server authentication need Server authentication,
self-replicating program that is self-contained and Privacy using encryption, Data integrity ;
does not require a host program. Worms Categories of internet data & Transaction : Several
commonly utilize network services to propagate to categories of data must be encrypted; Public data
other host systems . Threats To Servers: These have no security restriction; Copyright data have
threats consist of Unauthorized modification of content that is copyrighted but not secret;
server data; Modification of incoming data pkts.; Confidential data is secret; Secret data’s existence
Compromise of a server system by exploiting bugs is secret. WWW-Based Security Schemes : Secure
in server software; Compared to stand-alone HTTP (S-HTTP) is a revision of HTTP , enabling
systems, network servers are much more the incorporation of various cryptographic
susceptible to attacks. Example: Hackers have message formats, most of security take place at the
potential access to a large # of systems. This lead protocol level; Security Socket Layer (SSL) uses
to security holes; Hackers can use popular UNIX RSA security to wrap security information around
programs like Finger, rsh, to discover A/C name, TCP /IP based protocols.
try to guess simple password etc and then have
6.5 Web Security Layers
illegal entry; Hackers can trap user names and
unencrypted password sent over internet; Hackers
can configure a system to masquerade as another
system, thus gaining unauthorized access; Servers
are especially vulnerable to service over loading
by writing a small loop, then sends requests
continuously for a particular file; Message over
loading occurs when somebody sends a very large
file, every few minutes
6.3 Public Key Cryptography
Firewall – is the barrier between the corporate
More powerful form of cryptography that involves Network and the outside world (untrusted
the use of public keys ; It involves a pair of keys, a network). It is a method of placing a device, a
private key and a public key associated with each computer or a router between the network and the
other; Information encrypted by private key can be internet. It is to control and monitor all traffic
decrypted only using the corresponding public key; between the outside world and the local network.
The private key used to encrypt transmitted Typically the device allows insiders to have full
information by the user is kept secret; The public access to service on the outside world while
key is used to decrypt information at the receiver granting access from the outside only selectively,
based on log on name, password, IP address or 7.1 EDI: Legal, Security And Privacy Issues
other identifiers .
Under US contract law, there are three modes of
6.6 Firewall – Secured Internet Connection communication:Instantaneous:IF the parties use
face to face communication like telephone, an
offer or acceptance is deemed communicated and
operable when spoken; Delayed (USPS) (US
posted service)The mailbox rule provides that an
acceptance communicated via USPS mail is
effectively communicated when dispatched or
physically deposited in a USPS mailbox ;Delay
(Non USPS)Offers an acceptance transmitted
(other then through USPS mail) via telegram,
mailgram and probably electronic managing
system are deemed communicated and operable
upon receipt. Couriers fell within this category.
6.7 Secure Firewall with IP packet Screening
The legal disparity between USPS and non – USPS
router
service requires re-examination as the differences
no longer there. Messaging systems combine both
instantaneous and delayed communication. A
message delay is a function of specific application,
message routing, Networks traversed, system
configuration and other technical factors. So who
assumes liability? If US mail or an overnight
express does not deliver a contract to the right
addresses, then it can be held responsible for any
business loss caused by the error. In the case of
EDI, court has NOT decided yet. The US
6.8 Proxy Application Servers government will support the legal authority of
digital signature will meet the requirements of
legally binding signatures for most purposes. If a
contract is signed with digital signature one can
early verity that no one byte is altered. Thus, legal
consideration of digital notarizing and binding
strength of EDI is a topic deserving of prompt,
quantified and intense attention.
7.2 EDI , E-Commerce Standard
Two major EDI standards are ANSI : American
National Standards Institute X.12 committee;
United Nations EDI for Administrations,
VII. EDI – APPLICATIONS commerce and trade ( EDIFACT) standards for
Electronic Data Interchange (EDI) applications are international usage. ANSI X.12 : Accredited
as follows:-Railway rolling stock monitoring; Ship Standard committee in 1979 to R & D Standard
“baby plans” (Cargo plans for container For business documents; X.12 committed set
standard for EDI related business transactions like
ships);Ship berthing / scheduling notices;
order placement and processing, shipping and
Notification of dangerous goods on ships / trains /
planes; Exchange of CAD / CAM documents; receiving , invoicing, payments, cash applications
Tender tracking; Lodgment of law court processing for products and services; Sets
documents; Notification of lodgment of archives generally map a traditional paper document to
documents; Ship manifests / airway bills / electronic format to move over telecommunication
N/W; Each transaction format includes many data
Customer clearances; Airline Tkts settlements;
segments. EDIFACT : Developed by united
International cross border trade; Electronic fund
transfer; Health care EDI for insurance claims; Nations; Similar to ANSI X.12 ; Based on
Manufacturing and retail procurement; TRADECOMS developed by UK; Department of
International trade and EDI in this context, trade customs and excise with assistance of SITPRO (
efficiency which allows faster, simpler, broader British simplifications of Trade proceedings
board); Further developed by United Nations
and less costly using EDI.
economic commission for Europe; Widely
accepted by EDI std.; Today EDIFACT and ANSI
are working towards compatibility.
Than 30% From 2012 To $12.6 Billion In deal with businesses online, and offers specific
2013. Us E-Commerce And Online Retail advice on what happens if things go wrong.
Sales Projected To Reach $294 Billion, An
12.3 In The United Kingdom
Increase Of 12 Percent Over 2013 And 9%
Of All Retail Sales. Alibaba Group Has The The Financial Services Authority (FSA) was
Largest Initial Public Offering Ever, Worth formerly the regulating authority for most aspects
$25 Billion. of the EU's Payment Services Directive (PSD),
until its replacement in 2013 by the Prudential
2015: Amazon.Com Accounts For More
Regulation Authority and the Financial Conduct
Than Half Of All E-Commerce Growth,
Authority. The UK implemented the PSD through
Selling Almost 500 Million Sku's In The Us.
the Payment Services Regulations 2009 (PSRs),
XII. GOVERNMENTAL REGULATION which came into effect on 1 November 2009. The
PSR affects firms providing payment services and
12.1 In The United States their customers. These firms include banks, non-
Certain electronic commerce activities are bank credit card issuers and non-bank merchant
regulated by the Federal Trade Commission acquirers, e-money issuers, etc. The PSRs created
(FTC). These activities include but not limit to the a new class of regulated firms known as payment
use of commercial e-mails, online advertising and institutions (PIs), who are subject to prudential
consumer privacy. The CAN-SPAM Act of 2003 requirements. Article 87 of the PSD requires the
establishes national standards for direct marketing European Commission to report on the
over e-mail. The Federal Trade Commission Act implementation and impact of the PSD by 1
regulates all forms of advertising, including online November 2012.
advertising, and states that advertising must be
12.4 In India
truthful and non-deceptive. Using its authority
under Section 5 of the FTC Act, which prohibits The Information Technology Act 2000 Governs
unfair or deceptive practices, the FTC has brought The Basic Applicability Of E-Commerce.
a number of cases to enforce the promises in
12.5 In China
corporate privacy statements, including promises
about the security of consumers' personal Telecommunications Regulations of the People's
information. As a result, any corporate privacy Republic of China (promulgated on 25 September
policy related to e-commerce activity may be 2000), stipulated the Ministry of Industry and
subject to enforcement by the FTC. Information Technology (MIIT) as the government
Internationally there is the International department regulating all telecommunications
Consumer Protection and Enforcement Network related activities, including electronic commerce.
(ICPEN), which was formed in 1991 from an On the same day, The Administrative Measures on
informal network of government customer fair Internet Information Services released, is the first
trade organisations. The purpose was stated as administrative regulation to address profit-
being to find ways of co-operating on tackling generating activities conducted through the
consumer problems connected with cross-border Internet, and lay the foundation for future
transactions in both goods and services, and to regulations governing e-commerce in China. On
help ensure exchanges of information among the 28 August 2004, the eleventh session of the tenth
participants for mutual benefit and understanding. NPC Standing Committee adopted The Electronic
From this came Econsumer.gov, an ICPEN Signature Law, which regulates data message,
initiative since April 2001. It is a portal to report electronic signature authentication and legal
complaints about online and related transactions liability issues. It is considered the first law in
with foreign companies. There is also Asia Pacific China's e-commerce legislation. It was a milestone
Economic Cooperation (APEC) was established in the course of improving China's electronic
in 1989 with the vision of achieving stability, commerce legislation, and also marks the entering
security and prosperity for the region through free of China's rapid development stage for electronic
and open trade and investment. APEC has an commerce legislation.
Electronic Commerce Steering Group as well as
XIII. E-COMMERCE IMPACT
working on common privacy regulations
throughout the APEC region. 13.1 Impact On Markets And Retailers
12.2 In Australia Economists have theorized that e-commerce ought
to lead to intensified price competition, as it
Trade is covered under Australian Treasury
increases consumers' ability to gather information
Guidelines for electronic commerce, and the
about products and prices. Research by four
Australian Competition and Consumer
economists at the University of Chicago has found
Commission regulates and offers advice on how to
that the growth of online shopping has also
affected industry structure in two areas that have addition, e-commerce has a more sophisticated
seen significant growth in e-commerce, bookshops level of impact on supply chains: Firstly, the
and travel agencies. Generally, larger firms are performance gap will be eliminated since
able to use economies of scale and offer lower companies can identify gaps between different
prices. The lone exception to this pattern has been levels of supply chains by electronic means of
the very smallest category of bookseller, shops solutions; Secondly, as a result of e-commerce
with between one and four employees, which emergence, new capabilities such implementing
appear to have withstood the trend. Depending on ERP systems, like SAP ERP, Xero, or
the category, e-commerce may shift the switching Megaventory, have helped companies to manage
costs—procedural, relational, and financial— operations with customers and suppliers. Yet these
experienced by customers. Individual or business new capabilities are still not fully exploited.
involved in e-commerce whether buyers or sellers Thirdly, technology companies would keep
rely on Internet-based technology in order to investing on new e-commerce software solutions
accomplish their transactions. e-commerce is as they are expecting investment return. Fourthly,
recognized for its ability to allow business to e-commerce would help to solve many aspects of
communicate and to form transaction anytime and issues that companies may feel difficult to cope
anyplace. Whether an individual is in the US or with, such as political barriers or cross-country
overseas, business can be conducted through the changes. Finally, e-commerce provides companies
internet. The power of e-commerce allows a more efficient and effective way to collaborate
geophysical barriers to disappear, making all with each other within the supply chain.
consumers and businesses on earth potential
13.3 Impact On Employment
customers and suppliers. Thus, switching barriers
and switching costs may shift. eBay is a good E-commerce helps create new job opportunities
example of e-commerce business individuals and due to information related services, software app
businesses are able to post their items and sell and digital products. At same time, it also causes
them around the Globe. In e-commerce activities, job losses as it replaces traditional shopping and do
supply chain and logistics are two most crucial not need amount of in-store staff. Accompanied
factors need to be considered. Typically, cross- with the e-commerce development, it requires
border logistics need about few weeks time round. broader range of skills in digit, technology and
Based on this low efficiency of the supply chain information base. The employees should be
service, customer satisfaction will be greatly capable at dealing with large number of customers’
reduced. Some researcher stated that combining e- demands and order process. Therefore, it increases
commerce competence and IT setup could well the demand of employees with high skills and
enhance company's overall business worth. Other specialized expertises as well as increases the
researcher stated that e-commerce need to consider wages for this group of people. In contrast, people
the establishment of warehouse centers in foreign who with poor technical skills cannot enjoy the
countries, to create high efficiency of the logistics wages welfare. On the other hand, because e-
system, not only improve customers' satisfaction, commerce requires sufficient stocks that could be
but also can improve customers' loyalty. delivered to customers in time, the warehouse
become an important element. Warehouse needs
13.2 Impact On Supply Chain Management
more staff to manage, supervise and organize, thus
For a long time, companies had been troubled by the condition of warehouse environment will be
the gap between the benefits which supply chain concerned by employees.
technology has and the solutions to deliver those
13.4 Impact On Customers
benefits. However, the emergence of e-commerce
has provided a more practical and effective way of With the existence of e-commerce, it brings
delivering the benefits of the new supply chain convenience for customers as they do not have to
technologies. E-commerce has the capability to leave home and only need to browse website
integrate all inter-company and intra-company online, especially for buying the products which
functions, meaning that the three flows (physical are not sold in nearby shops. It could help
flow, financial flow and information flow) of the customers buy wider range of products and save
supply chain could be also affected by e- customers’ time. Then, the online shopping often
commerce. The affections on physical flows provides sales promotion or discounts code, thus it
improved the way of product and inventory is more price effective for customers. Moreover, e-
movement level for companies. For the commerce provides products’ detailed information;
information flows, e-commerce optimised the even the in-store staff cannot offer such detailed
capacity of information processing than companies explanation. Customers can also review and track
used to have, and for the financial flows, e- the order history online. However, e-commerce is
commerce allows companies to have more lack of human interaction for customers, especially
efficient payment and settlement solutions. In who prefer face-to-face consumption. When the
customer regrets to purchase the product, it extra convenience for online shoppers. Online
involves returning goods and refunding process. merchandise is searchable, which makes it more
This process is inconvenient as customers need to accessible to shoppers. Many online retailers offer
pack and post the goods. If the products are a review mechanism, which helps shoppers decide
expensive, large or fragile, it refers to safety on the product to purchase. This is another
issues. convenience and a satisfaction improvement
factor.
13.5 Social Impact
XIV. CONCLUSIONS
Along with the e-commerce and its unique charm
that has appeared gradually, virtual enterprise, e-commerce is not a new industry, technically
virtual bank, network marketing, online shopping, speaking, but it is creating a new economic model.
payment and advertising, such this new vocabulary Most people agree that e-commerce will positively
which is unheard-of and now has become as impact economic society in the future, but in its
familiar to people. This reflects that the e- early stages its impacts are difficult to gauge.
commerce has huge impact on the economy and Some have noted that e-commerce is a sort of
society from the other side. For instance, B2B is a incorporeal revolution. e-commerce has numerous
rapidly growing business in the world that leads to social benefits: one, the cost of running an e-
lower cost and then improves the economic commerce business is very low when compared
efficiency and also bring along the growth of with running a physical store; two, there is no rent
employment. e-commerce has changed the relative to pay on expensive premises; and three, business
importance of time, but as the pillars of indicator processes are simplified and less man-hours are
of the country's economic state that the importance required to run a typical business smoothly. In the
of time should not be ignored. e-commerce offers area of law, education, culture and also policy, e-
the consumer or enterprise various information commerce will continue to rise in impact. e-
they need, making information into total commerce will truly take human beings into the
transparency, and enterprises are no longer is able information society.
to use the mode of space or advertisement to raise
XV. REFERENCES
their competitive edge. Moreover, in theory,
perfect competition between the consumer [1]. "Administrative Measures on Internet
sovereignty and industry will maximize social Information Services". 20 September 2000.
welfare. In fact, during the economic activity in the
[2]. "Advertising and Marketing on the
past, large enterprises frequently had the advantage
Internet: Rules of the Road". Federal Trade
of information resources at the expense of
consumers. Nowadays, the transparent and real- Commission.
time information protects the rights of consumers, [3]. "Amazon Buys Zappos; The Price is
because the consumers can use the internet to pick $928m, not $847m". TechCrunch. 22 July
out the portfolio to their own benefit. The 2009. Retrieved 21 December 2012.
competitiveness of enterprises will be much more
obvious than before; consequently, social welfare [4]. "Amazon will account for more than half of
would be improved by the development of e- 2015 e-commerce growth, says Macquarie".
commerce. The new economy led by e-commerce Market Watch.
changes humanistic spirit as well, but above all, [5]. "AppWrapper Volume 1 Issue 3 Ships"
employee loyalty. Due to the market with (press release).
competition, the employee's level of
professionalism becomes crucial for enterprise in [6]. "Attention Shoppers: Internet Is Open".
the niche market. The enterprises must pay The New York Times. 12 August 1994.
attention to how to build up the enterprises inner [7]. "Australian Competition and Consumer
culture and a set of interactive mechanisms and it Commission". Australian Federal
is the prime problem for them. Furthermore, Government.
though the mode of e-commerce decreases the
information cost and transaction cost, its [8]. "Australian Treasury Guidelines for
development also makes human beings overly electronic commerce". Australian Federal
computer literate. Emphasizing a more humanistic Government.
attitude to work is another project for enterprise to [9]. "Dealing with Businesses Online in
development. Life is the root of all and technology Australia". Australian Federal Government.
is merely an assistive tool to support quality of life.
Online merchants gather purchase activity and [10]. "Diane Wang: Rounding up the "Ant"
interests of their customers. This information is Heroes". Sino Foreign Management.
being used by the online marketers to promote Retrieved 3 September 2011.
relevant products and services. This creates an
[11]. "E Commerce – Essays – Hpandurang92". [30]. "Tim Berners-Lee: WorldWideWeb, the
Study mode. Retrieved 17 June 2013. first Web client". W3. Retrieved 21
December 2012.
[12]. "eBay acquires PayPal". Investor. eBay.
Retrieved 21 December 2012. [31]. "UNCITRAL Model Law on Electronic
Commerce (1996)". UNCITRAL. 12 June
[13]. "Ecommerce Sales Topped $1 Trillion for
1996. Retrieved 19 August 2014.
First Time in 2012". eMarketer. Retrieved
14 May 2013. [32]. "US eCommerce Forecast: 2013 to 2018".
Forrester Research.
[14]. "Economics focus: The click and the
dead". The Economist. 3–9 July 2010. [33]. "What to do if thing go wrong in Australia".
p. 78. Australian Federal Government.
[15]. "Enforcing Privacy Promises: Section 5 of [34]. (Gap Inc/The) (2013-07-10). "Click-to-
the FTC Act". Federal Trade Commission. Brick: Why Online Retailers Want Stores in
Real Life". Business week. Retrieved 2014-
[16]. "First Electronic Stamps Being Put to
05-30.
Test". Sunday Business. 6 April 1998.
Retrieved 16 July 2013. [35]. 1988 Palmer.C Using IT for competitive
advantage at Thomson Holidays, Long
[17]. "FSA". UK.
range Planning Vol 21 No.6 p26-29,
[18]. "Groupon rejects Google's $6 billion Institute of Strategic Studies
offer". MS‐NBC. MSN. 3 December 2010. Journal,London- Pergamon Press [now
Retrieved 21 December 2012. Elsevier.B.V.] December 1988.
[19]. "Groupon's IPO biggest by U.S. Web [36]. Abbott, ed. by Lewis F. (2003). Industry
company since Google". Reuters. 4 and enterprise : an international survey of
November 2011. Archived from the original modernization and development (2nd rev.
on 13 September 2012. Retrieved 13 ed.). Manchester: Industrial Systems
September 2012. Research. ISBN 0906321271.
[20]. "H.R. 6353: Ryan Haight Online Pharmacy [37]. Ahmed, Saqib Iqbal (27 October 2009).
Consumer Protection Act of 2008". "GSI Commerce to buy Retail Convergence
Govtrack. for $180 mln". Reuters. Retrieved 6 April
2013.
[21]. "How To Private Label a Product". Jungle
Scout. [38]. Aldrich, Michael. "Finding Mrs Snowball".
Retrieved 8 March 2012.
[22]. "More Buyers Join Brazil's Robust
Ecommerce Market". eMarketer. [39]. Amarger, edited by Winfried Lamersdorf,
Volker Tschammer, Stéphane (27 August
[23]. "Online shopping: The pensioner who 2004). Building the E-service society E-
pioneered a home shopping revolution". commerce, E-business, and E-government.
BBC News. 16 September 2013. New York: Kluwer Academic Publishers.
[24]. "PRC, Electronic Signature Law". 28 ISBN 978-1-4020-8155-2.
August 2004. [40]. Bakos, Y. (2001). The Emerging Landscape
[25]. "R.H. Donnelley Acquires Business.com for Retail E-Commerce. Journal of
for $345M". Domain Name Wire. Retrieved Economic Perspectives, 15(1), pp. 69–80
4 September 2011. [41]. BBC News (2014). "BBC - GCSE Bitesize:
[26]. "Tech in Asia - Connecting Asia's startup Electronic money and electronic
ecosystem". www.techinasia.com. commerce". Retrieved 2017-05-11.
Retrieved 2016-03-04. [42]. Burgess, S; Sellitto, C; Karanasios, S
[27]. "Telecommunications Regulations of the (2009), Effective Web Presence Solutions
People's Republic of China". 20 September for Small Businesses: Strategies and
2000. Successful Implementation, IGI Global
[28]. "The Electronic Mall". GS Brown. 30 April [43]. Chaudhury, Abijit; Kuilboer, Jean-Pierre
2010. Retrieved 17 June 2013. (2002). e-Business and e-Commerce
Infrastructure. McGraw-Hill. ISBN 0-07-
[29]. "The Payment Services Regulations 2009". 247875-6.
UK: Legislation. Retrieved 17 June 2013.
[70]. Munford, Monty (2016-08-26). "How chat [83]. Tkacz, Ewaryst; Kapczynski, Adrian
apps are transforming the global (2009). Internet — Technical Development
conversation". BBC News. Retrieved 2017- and Applications. Springer. p. 255.
05-07. ISBN 978-3-642-05018-3. Retrieved 28
March 2011. The first pilot system was
[71]. Nissanoff, Daniel (2006). FutureShop: How
installing in Tesco in the UK (first
the New Auction Culture Will
demonstrated in 1979 by Michael Aldrich).
Revolutionize the Way We Buy, Sell and
Get the Things We Really Want (hardcover [84]. Tong, Frank (16 September 2013). "China's
ed.). The Penguin Press. ISBN 1-59420- cross-border e-commerce tops $375 billion
077-7. 246 pp. in 2012". Internet Retailer.
[72]. O'Brien, A. J. & Marakas, M. G. (2011). [85]. Zhu, K. (2004). The complementarity of
Management Information Systems. 10e. information technology infrastructure and
New York: NY e-commerce capability: A resource-based
assessment of their business value. Journal
[73]. OECD (1999), "Economic and Social
of Management Information Systems,
Impact of Ecommerce: Preliminary
21(1), 167-202
Findings and Research Agenda", OECD
Digital Economy Papers, No.40. OECD
Publishing
[74]. Olsen, Robert (18 January 2010). "China's
migration to eCommerce". Forbes.
[75]. Power, Michael 'Mike' (19 April 2013).
"Online highs are old as the net: the first e-
commerce was a drugs deal". The
Guardian. London. Retrieved 17 June 2013.
[76]. Qin, Z., Li, S., Chang, Y. and Li, F. (2014).
E-Commerce Strategy. Berlin, Heidelberg:
Springer Berlin Heidelberg.
[77]. Robinson, James (28 October 2010). "UK's
internet industry worth £100bn". The
Guardian (report). London. Retrieved 21
December 2012.
[78]. Schafer, J. Ben; Konstan, Joseph A.; Riedl,
John (2001-01-01). Kohavi, Ron; Provost,
Foster, eds. Applications of Data Mining to
Electronic Commerce. Springer US.
pp. 115–153. doi:10.1007/978-1-4615-
1627-9_6#page-1. ISBN 9781461356486.
[79]. Schniederjans, M. and Cao, Q. (2002). E-
Commerce operations management.
Singapore: World Scientific.
[80]. Seybold, Pat (2001). Customers.com.
Crown Business Books (Random House).
ISBN 0-609-60772-3.
[81]. Steven Millward (17 September 2014).
"Here are all the must-see numbers on
Alibaba ahead of record-breaking IPO".
Tech In Asia. Retrieved 17 September
2014.
[82]. Teriz, N (2011). "The impact of e-
commerce on international trade and
employment - ScienceDirect".
www.sciencedirect.com. Retrieved 2017-
05-11.