E Business
E Business
E Business
Introduction-E-Business
E-Business-Meaning
Electronic business (e-business) refers to the use of the Web, Internet, intranets,
extranets, or some combination thereof to conduct business. E-business is similar to e-
commerce, but it goes beyond the simple buying and selling of products and services
online.
E-business includes a much wider range of businesses processes, such as supply chain
management, electronic order processing and Customer relationship management.
Characteristics:
3) Global reach: E-business can reach any part of the globe with the help of
available technology and does its business activities. It is possible to reach every
customer across the globe provided that the required technology is present in that
geographical location. For example, www.dell.com can sell its products to any customer
in the world with the help of the internet.
4) Hardware and software: E-Business is characterized by having hardware and
software in its infrastructure. Hardware like client computer, server, cables used in the
network, etc. and software like the operating system, wireless
applications, internet browser, etc. are essential components of E-Business.
Basis for
Traditional Business E-business
comparison
Meaning Traditional business is a branch of business E-Business means carrying out
that focuses on the exchange of products commercial transactions or
and services, and includes all those exchange of information,
activities which encourages exchange, in electronically on the internet.
some way or the other.
Processing of The transactions will take place manually in Business transactions happen
Transactions the business. with the help of technology.
Accessibility The business activities are carried for a Business transactions can
limited time period happen 24/7.
Physical Goods can be inspected physically before Goods cannot be inspected
inspection purchase. physically before purchase.
Customer The communication between a business Here the interaction will be
interaction and its stakeholders will be face to face. between individual and screen.
Basis for
Traditional Business E-business
comparison
Scope of Limited to a particular geographical Worldwide reach
business location.
Information No uniform platform for the exchange of Provides a uniform platform for
exchange information. information exchange.
Resource The focus of the business will be on the Resources will focus on the
focus supply of resources. demand for the products and
services
Business There will be a linear relationship between The relationship will be end to
Relationship business and its customers end.
Marketing The marketing activities will be more or The marketing activities can
less one way happen in both ways
Payment The payment options will be limited There are many payment
options available
Delivery of Instantly Takes time
goods
E-BUISNESS FRAMEWORK
• E-Selection: E-selection is the perfect online service bundle tool for workforce
selection processes. E-selection instantly provides an accurate picture of a candidate’s
fitness for filling a specific position, of your colleagues’ strengths and weaknesses, and
of their inherent potential. As tools that assist in the tasks of HR professionals, our tests
are suitable not only for choosing among external candidates, but they will also be
useful in your company’s internal processes, such as promoting, transferring, and
training of managers, CEOs, and other professionals.
• Security: These services are related to protecting online business transactions like
buying, selling, payment, feedback from customers, business data management, etc.
III. Infrastructure:
Advantages of E-Business:
• Easy to Set Up: It is easy to set up an electronic business. You can set up an
online business even by sitting at home if you have the required software, a
device, and the internet.
• Cheaper than Traditional Business: Electronic business is much cheaper than
traditional business. The cost taken to set up an e-business is much higher than
the cost required to set up a traditional business. Also, the transaction cost is
effectively less.
• No Geographical Boundaries: There are no geographical boundaries for e-
business. Anyone can order anything from anywhere at any time. This is one of
the benefits of e-business.
• Government Subsidies: Online businesses get benefits from the government as
the government is trying to promote digitalization.
• Flexible Business Hours: Since the internet is always available. E-business breaks
down the time barriers that location-based businesses encounter. As long as
someone has an Internet connection, you may be able to reach and sell your
product or service to these visitors to your business website.
• Cheaper Marketing, More Control: Traditionally, companies had to rely on
advertising agencies to promote their brand and educate people about it. Now
there are lots of ways to pour money back into your business. When you control
how your product is represented, you control your company. E-business allows
owners to embrace their power in ways they haven't been able to before.
Disadvantages
· Lack of Personal Touch: E-business lacks the personal touch. One cannot touch or
feel the product. So it is difficult for the consumers to check the quality of a product.
Also, the human touch is missing as well. In the traditional model, we have contact with
the salesperson. This lends it a touch of humanity and credibility. It also builds trust with
the customer. An e-Business model will always miss out on such attributes.
· Delivery Time: The delivery of the products takes time. In traditional business, you get
the product as soon as you buy it. But that doesn’t happen in online business. This lag
time often discourages customers. However, e-businesses are trying to resolve such
issues by promising very limited delivery times. For example, Amazon now assures one-
day delivery. This is an improvement but does not resolve the issue completely
· Security Issues: There are a lot of people who scam through online business. Also, it is
easier for hackers to get your financial details. It has a few security and integrity issues.
This also causes distrust among potential customers.
· Difficult to try before buying: You can say that online shoppers will not have
much
ability to inspect physically, even sometimes they lose the power to negotiate the price
and payment terms might exist different as compared to local stores.
INTERNET AS E-BUSINESS ENABLER
Challenges to E-Business
· Lack of infrastructure: E-Business has the biggest challenge in the form of poor
infrastructure in the country. The internet penetration in the country is much lower than
in the USA and China. Rural India doesn’t have access to internet infrastructure and
businesses cannot afford to invest huge capital for infrastructure.
· Lack of computer literacy: Computer literacy in the country is very less when
compared with developed countries. This hinders the development of e-business in the
country. The estimated digital literacy in the country is approximately around 10% based
on a survey conducted.
· Security: Despite the fact that the internet has come a long way from its ‘open’
days, the fear of online transactions, be it financial or data transfer, is very high in the
consumer’s mind. Hacking, identity theft, credit card stealing, bank information stealing,
etc. are some of the greatest security issues that hinder the consumer from trusting
online businesses. Eventually, this means loss of potential business for organizations.
· Feature phones still rule the market: Though the total number of mobile phone
users in India is very high, a significant majority still use feature phones and not
smartphones. As a result, this consumer group is unable to make e-business purchases
on the move. Though India is still a couple of years away from the scales tipping in favor
of smartphones, the rapid downward spiral in the price of entry-level smartphones is an
encouraging indication.
Internet: The internet is a globally connected network system that uses TCP/IP to
transmit data via various types of media. The internet is the network of global
exchanges including private, public, business, academic and government networks
connected by guided, wireless and fiber-optic technologies.
The Internet enables the activities of E-Business by connecting the people across the
globe. The role of the internet in E-Business is explained as follows.
· It will help the business to increase its visibility among the customers.
· It provides the platform for customer support services round the clock.
· It enables the business to network with people and organization across the globe.
E-Business Models
E-Business Model: It refers to the way in which a business is conducted and the
existence of relationship between buyer and seller.
Based on the nature of transactions online, E-Business models are classified as follows.
· Business-to-Business (B2B)
· Consumer-to-Consumer (C2C)
· Business-to-Government (B2G)
· Government-to-Business (G2B)
· Consumer-to-Business (C2B)
B2C Model
• Portal
• E-tailer
• Content Provider
• Transaction Broker
• Service Provider
• Market Creator
• Community provider
1. Portal: A web portal is a specially designed website that brings information from
diverse sources, like emails, online forums, and search engines, together in a uniform
way. It is two kinds.
2. E-tailer: The E-tailer is an online retailer, who sells products and services to
customers online. These E-tailers are further classified into different types.
a)Virtual merchant: Online version of the retail store where customers can shop 24/7
with comfort. E.g.: Amazon.com.
b) Click and mortar: Online distributor channel for a company that also has physical
stores. e.g.: Walmart.com.
c)Catalog merchant: Online version of the direct catalog. The catalog merchant has
generally lower prices than other retailers and lower overhead expenses due to the
smaller size of the store and lack of large showroom space. E.g.: LandsEnd.com,
5. Service provider: Companies that make money by selling users a service, rather
than a product. Offers services online, like consultancy, trade knowledge, expertise, etc.
e.g.: Incometax.gov.in, Paytm.com
2) Seller: One who sells products to end customers online. For example, a
manufacturer selling his products through amazon.in
4.Place an Order.
B2B model
B2B Model: A website following the B2B business model sells its products to an
intermediate buyer who then sells the products to the final customer. As an example, a
wholesaler places an order from a company's website and after receiving the
consignment, it sells the endproduct to the final customer who comes to buy the
product at the wholesaler's retail outlet.
B2B identifies both the seller as well as the buyer as business entities. B2B covers a large
number of applications, which enables businesses to form relationships with their
distributors, resellers, suppliers, etc. Following are the leading items in B2B eCommerce.
• Electronics
• Shipping and Warehousing
• Motor Vehicles
• Petrochemicals
• Paper
• Office products
• Food
• Agriculture
Key Technologies
Following are the key technologies used in B2B e-commerce −
Basis for
B2B B2C
Comparison
The selling of goods and services The transaction in which business
between two business entities is sells the goods and services to the
Meaning
known as Business to Business or consumer is called Business to
B2B. Consumer or B2C.
Basis for
B2B B2C
Comparison
A manufacturing firm or service
Customer End-user will be a customer.
provider will be customer
The focus will be on the The focus will be on product and
Focus on
relationship with customer product benefits.
Quantity of It deals with a large quantity of It deals with small quantity of
merchandise products products.
Supplier - Manufacturer
Relationship Manufacturer - Wholesaler Retailer - Consumer
Wholesaler - Retailer
Relationship It is mainly long term relationship Relationship between seller and
horizon between seller and buyer buyer is comparatively shorter.
Buying and
It is comparatively lengthy It is short
Selling cycle
Buying Planned and Logical, based on
Emotional, based on want and desire.
Decision needs.
Creation of It is created through trust and It is created through advertising and
Brand Value mutual relationship promotion.
C2C Model:
Customers benefit from the competition for products and often find items that
are difficult to locate elsewhere. Also, margins can be higher than traditional pricing
methods for sellers because there are minimal costs due to the absence of retailers or
wholesalers. C2C sites are convenient because there is no need to visit a brick-and-
mortar store. Sellers list their products online, and the buyers come to them.
Players in C2C Model
1) Consumer: One who buys or sells products or services online with help of an
intermediary.
Advantages:
• There are minimal costs involved with the lack of retailers and wholesalers, keeping
the margins higher for sellers and prices lower for buyers.
• There is also the convenience factor – instead of trying to sell items in person at a
brick-and-mortar store, consumers can simply list their products online and wait for
buyers to come to them.
• Buyers don't need to drive around and search through stores for an item they want –
they just search for it on a C2C site.
Disadvantages:
• Credit card payments can be difficult, as the platforms are not necessarily secure and
able to process such payments.
• There is a lack of quality control – since the sellers are consumers themselves, there is
little recourse for poorly made or misrepresented products.
• On the flip side, because the buyers are consumers themselves, the payment
guarantees can be hard to enforce.
Types of C2C:
Following are the types of C2C model based on the nature of transactions.
• Online Auctions
• Online Classifieds
• Online Selling
B2G Model:
• E.g.: www.gs1india.org
C2G model
G2B Model:
G2B concept is used for expressing the relationship between public administration and
enterprises. The relationship may refer the demand for information from the enterprises
in any life situation or a transfer of an official document to the statutory body. The
abbreviation is usually used to refer to the ICT solution that converts such
communication to the electronic form or to describe a solution that simplifies the
communication between public administration and enterprises
E.g.: tenders.gov.in
The model covers an electronic exchange of any information between businesses and
the government, usually using internet so the cooperation or communication is more
efficient than is usually off the internet. In G2B, government agencies and business use
websites, procurement marketplaces, applications, web services.
The relationship may refer the demand for information from the enterprises in any life
situation or a transfer of an official document to the statutory body. The model is usually
used to refer to the ICT solution that converts such communication to the electronic
form or to describe a solution that simplifies the communication between public
administration and enterprises (e.g. internet portal of the procurement authority or
electronic solutions for purchasing).
G2G Model:
e.g.: www.gst.gov.in
P2P Model:
Peer-to-peer (P2P) is a decentralized communications model in which each party has the
same capabilities and either party can initiate a communication session. Unlike the
client/server model, in which the client makes a service request and the server fulfills the
request, the P2P network model allows each node to function as both a client and
server.
e.g.: Airbnb, Aristotle Circle, eBay, Match.com, and Zopa
M-Commerce
M-commerce (mobile commerce) is the buying and selling of goods and services
through wireless handheld devices such as cellular telephone and personal digital
assistants (PDAs). Known as next-generation e-commerce, m-commerce enables users
to access the Internet without needing to find a place to plug in.
E-BUSINESS SECURITY
E-Business Security: E- Business security refers to the principles which guide
safe electronic transactions, allowing the buying and selling of goods and services
through the Internet, but with protocols in place to provide safety for those involved.
1) 1) Privacy: One of the most obvious E-Business security basics is privacy, which in
this situation means not sharing information with unauthorized parties. When you shop
online, your personal details or account information should not be accessible to anyone
except the seller you have chosen to share it with. Any disclosure of that information by
the merchant would be a breach of confidentiality. The business is responsible to
provide at least the minimum in encryption, virus protection, and a firewall so that bank
details and credit card information remain private.
2) Integrity: A second concept which is crucial within secure E-Business is the idea of
integrity—that none of the information shared online by the customer will be altered in
any way. This principle states that a secure transaction includes unchanged data—that
the business is only using exactly what was entered into the Internet site by the buyer.
Any tampering with information is breaking the confidence of the buyer in the security
of the transaction and the integrity of the company in general.
3) Authentication: For E-Business to take place, both seller and buyer have to be
who they say they are. A business cannot sell unless it’s real, the products are real, and
the sale will go through as described online. The buyer must also provide proof of
identification so that the merchant can feel secure about the sale. In E-Business,
fraudulent identification and authentication are possible, and many businesses hire an
expert to make sure these kinds of E-Business security basics are in place. Common
solutions include technological solutions—customer logins and passwords or additional
credit card PINs.
4) Non-repudiation: Repudiation is denial, and good business depends on both
buyers and sellers following through on the part of the transaction which originated
with them—not denying those actions. Since E-Business happens in cyberspace, usually
without any live video, it can feel less safe and sure. The legal principle of non-
repudiation adds another level of security by confirming that the information which was
sent between parties was indeed received and that a purchase or email or signature
cannot be denied by the person who completed the transaction. Customers who don’t
feel transactions are secure won’t buy. Hesitation on the part of the buyer will destroy E-
Business potential. Any breach will cost a business in lost revenues and consumer trust.
These E-Business security basics can guide any business owner regarding safe online
transaction protocol.
5) Non-Repudiability: It is the protection against the denial of order or denial of
payment. Once a sender sends a message, the sender should not be able to deny
sending the message. Similarly, the recipient of message should not be able to deny the
receipt.
6) Encryption: Information should be encrypted and decrypted only by an authorized
user.
7) Auditability: Data should be recorded in such a way that it can be audited for
integrity requirements.
Security Threats:
In simple words, you can say that using the internet for unfair means with an intention
of stealing, fraud and security breach.
There are various types of e-commerce threats. Some are accidental, some are
purposeful, and some of them are due to human error. The most common security
threats are phishing attacks, money thefts, data misuse, hacking, credit card frauds, and
unprotected services.
1) Client server threats: Following are the client lever security threats:
3. Hackers and Predators: People, not computers, create computer security threats
and malware. Hackers and predators are programmers who victimize others for their
own gain by breaking into computer systems to steal, change, or destroy information
as a form of cyber-terrorism. These online predators can compromise credit card
information, lock you out of your data, and steal your identity.
2. Common gateway interface (CGI) security threats: These are the programs which
on misuse may generate a security problem. These programs can be triggered to fire
with their characteristics to obtain their target associated with them. These programs set
the changes of all data from server connected to some other program of a database
program. These programs put the data or change in data to the web pages they are
associated with. Defective or malicious CGI with free access to resources disable the
system. CGI can call privileged original programs of the system to finish files, or find
confidential data or information which may be passwords or highly secured data.
3. Security threats to password hacking: These are the most common and the
simplest security threat against a password-based system is to guess passwords.
Guessing of passwords requires – a) Access to the complement b) The complementation
functions c) And the authentication functions. If no one of these three are changed by
the passing of time the password is guessed. In that case the hacker uses the password
to access the system information.
4. Internet-server security threats: The HTTP requests made by the customers are
obtained by the Internet-server software which give response and reply
on internet web. The web services are attached with these Internet-server software
keeping in view the risks. If the software is quite complex, there is maximum possibility
of getting coding errors or bugs which are the security weakness holes to provide entry
for the malicious attacker.
5. e-Business server security threats: The business server/ web-server, responds to
requests from web browsers through the HTTP protocol and CGI. The e-business server
software suitability with FTP server, mail server, far ends login server and OS. These
operating systems (OS) may have security issues
Active Threats:-
Active wiretapping takes place when an unauthorized person gets access to the signals
carrying the e-commerce message, for example, by tapping the telephone wires and
changing the content of the message stream of information. This affects the integrity of
the data and makes it unreliable.
Cyber vandalism:-
Cyber vandalism takes place when an unauthorized person changes the content of a
Web page, destroys it, defaces it, or replaces a Web site’s regular content with their
own, for example, hacking into the server of the website.
Masquerading:-
Here someone pretends to be someone else. This can be done by means of spoofing.
Someone creates a fictitious website in place of the real one so as to spoof website
visitors. All orders to the real website are then redirected to the fake website where the
orders are changed before passing on to the real website.
Subsequent accesses will then appear to come from a particular domain, when in fact
the person accessing the web does not know that he\she can alter a URL on the web
page so that later accesses appear as if they were handled by a trusted site, when in fact
they are not.
Necessity Threats:-
The purpose of necessity threats (delay, denial or denial-of-service), is to disrupt normal
computer processing or delay processing entirely. A computer that has experienced a
necessity threat slows processing to an intolerable speed and this will encourage
customers to go to the websites of competitors.
1. Keep up with system and software security updates: While software and security
updates can often seem like an annoyance, it really is important to stay on top of them.
Aside from adding extra features, they often cover security holes. Typically, if an update
is available for your OS, you’ll get a notification. You can often opt to update
immediately or set it to run later.
2. Being suspicious: It should go without saying, being suspicious is one of the best
things you can do to keep your computer secure. Admittedly, with hacker techniques
becoming increasingly sophisticated, it can be difficult to tell when you’re under attack.
All it takes is one email open or link click and your computer could be compromised.
3. Enable a firewall
A firewall acts as a barrier between your computer or network and the internet. It
effectively closes the computer ports that prevent communication with your device. This
protects your computer by stopping threats from entering the system and spreading
between devices. It can also help prevent your data leaving your computer.
Encryption:
Encryption: Conversion of data into a form called a cipher text that cannot be easily
understood by unauthorised people. It is the translation of data into access code.
Cipher text: E T T P I
It is two types, they are secret key or symmetrical encryption and public key or
asymmetrical encryption
The main business applications for public-key cryptography are digital signatures in
which content is digitally signed with an individual’s private key and is verified by the
individual’s public key and encryption, where content is encrypted using an individual’s
public key and can only be decrypted with the individual’s private key.
For example making payment using QR code through an UPI. QR code is the public key
and PIN will be private key.
Secret key encryption: A private key, also known as a secret key, is a variable
in cryptography that is used with an algorithm to encrypt and decrypt code. Secret keys
are only shared with the key’s generator, making it highly secure. It is also called as
symmetrical encryption.
Due to the better performance and faster speed of symmetric encryption (compared to
asymmetric), symmetric cryptography is typically used for bulk encryption / encrypting
large amounts of data, e.g. for database encryption.
For example username and password used to open an account by the user.
Decryption
SSL PROTOCOL
SSL Protocol
SSL (Secure Sockets Layer) is a standard security protocol for establishing encrypted links
between a web server and a browser in an online communication. The usage
of SSL technology ensures that all data transmitted between the web server and browser
remains encrypted. SSL was first developed by Netscape in 1994 and became
an internet standard in 1996. SSL is a cryptographic protocol to secure network
Mechanism of SSL Protocol: A browser or server attempts to connect to a website (i.e. a
web server) secured with SSL. The browser/server requests that the web server identify
itself. The web server sends the browser/server a copy of its SSL certificate. The
browser/server checks to see whether or not it trusts the SSL certificate. If so, it sends a
message to the web server. The web server sends back a digitally signed
acknowledgement to start an SSL encrypted session. Encrypted data is shared between
the browser/server and the web server
SSL is a secure protocol which runs above TCP/IP and allows users to encrypt data and
authenticate servers/vendors identity securely
Functions of SSL Protocol
— SSL uses TCP/IP on behalf of the higher-level protocols.
— Allows an SSL-enabled server to authenticate itself to an SSL-enabled client.
— Allows the client to authenticate itself to the server;
— Allows both machines to establish an encrypted connection.
— Use public key encryption techniques to generate shared secret
Firewall
Software or hardware and software combination installed on a network to control
packet traffic. Provides a defense between the network to be protected and
the Internet, or other network that could pose a threat.
In computing, a firewall is a network security system that monitors and controls
incoming and outgoing network traffic based on predetermined security rules. A firewall
typically establishes a barrier between a trusted internal network and untrusted external
network, such as the Interne
Types of firewall:
—Packet-filter firewalls: Examine data flowing back and forth between a trusted
network and the Internet. This firewall performs a simple check of the data packets
coming through the router inspecting information such as the destination and
origination IP address, packet type, port number, and other surface-level information
without opening up the packet to inspect its contents.
—Gateway servers: Firewalls that filter traffic based on the application requested. Proxy
firewalls operate at the application layer to filter incoming traffic between your network
and the traffic source hence, the name “application-level gateway.” These firewalls are
delivered via a cloud-based solution or another proxy device. Rather than letting traffic
connect directly, the proxy firewall first establishes a connection to the source of the
traffic and inspects the incoming data packet.
—Proxy server firewalls: Firewalls that communicate with the Internet on the private
network’s behalf. Proxy firewalls operate at the application layer to filter incoming traffic
between your network and the traffic source—hence, the name “application-level
gateway.” These firewalls are delivered via a cloud-based solution or another proxy
device. Rather than letting traffic connect directly, the proxy firewall first establishes a
connection to the source of the traffic and inspects the incoming data packet.
Characteristics of a firewall
— All traffic from inside to outside and from outside to inside the network must pass
through the firewall
— Only authorized traffic is allowed to pass
— Firewall itself is immune to penetration
ELECTRONIC PAYMENT
Electronic Payment
It is a financial exchange that takes place online between buyers and sellers. The content
of this exchange is usually some form of digital financial instrument (such as encrypted
credit card numbers, electronic cheques or digital cash) that is backed by a bank or an
intermediary, or by a legal tender.
Step Description
Bank issues and activates a credit card to the customer on his/her
Step 1
request.
The customer presents the credit card information to the merchant
Step 2 site or to the merchant from whom he/she wants to purchase a
product/service.
Merchant validates the customer's identity by asking for approval
Step 3
from the card brand company.
Card brand company authenticates the credit card and pays the
Step 4
transaction by credit. Merchant keeps the sales slip.
Merchant submits the sales slip to acquirer banks and gets the service
Step 5
charges paid to him/her.
Acquirer bank requests the card brand company to clear the credit
Step 6
amount and gets the payment.
Now the card brand company asks to clear the amount from the
Step 6 issuer bank and the amount gets transferred to the card brand
company.
Debit Card
Debit cards are the second largest e-commerce payment medium in India. Customers
who want to spend online within their financial limits prefer to pay with their Debit
cards. With the debit card, the customer can only pay for purchased goods with the
money that is already there in his/her bank account as opposed to the credit card where
the amounts that the buyer spends are billed to him/her and payments are made at the
end of the billing period.
Debit card payment process:
Ø Debit cards are protected by a four digit PIN that you set yourself. This PIN is needed
to make almost any purchase with your debit card. This gives you a great deal of
protection against theft.
Ø The only thing that you need to have for a debit card is a bank account. Anyone can
open a bank account with a small minimum deposit.
Smart Card
It is a plastic card embedded with a microprocessor that has the customer’s personal
information stored in it and can be loaded with funds to make online transactions and
instant payment of bills. The money that is loaded in the smart card reduces as per the
usage by the customer and has to be reloaded from his/her bank account. A smart card,
typically a type of chip card, is a plastic card that contains an embedded computer chip–
either a memory or microprocessor type–that stores and transacts data. This data is
usually associated with either value, information, or both and is stored and processed
within the card's chip. Smart cards can provide identification, authentication, data
storage and application processing.
There are two types of smart cards. They are contact cards like bank cards, membership
cards, loyalty cards, SIM cards, healthcare cards and contactless cards like RF smart card.
NET BANKING
Net banking
This is another popular way of making e-commerce payments. It is a simple way of
paying for online purchases directly from the customer’s bank. It uses a similar method
to the debit card of paying money that is already there in the customer’s bank. Net
banking does not require the user to have a card for payment purposes but the user
needs to register with his/her bank for the net banking facility. While completing the
purchase the customer just needs to put in their net banking id and pin.
Advantages of digital:
Ø Employing the use of digital wallets removes the need for intermediaries, in a variety
of forms. Purchases in-store may no longer require a cashier because the purchasing
process becomes as simple as a tap or scan of a mobile device. Applications like Square
can replace expensive POS (point of sale) systems that will reduce transaction costs for
the business.
Ø Digital wallet applications provide a more convenient transaction processing method
for customers, giving businesses that employ this technology a competitive edge in the
market. It redefines the user experience of paying and incorporates a novelty aspect to
each purchase.
MOBILE PAYMENT
Mobile Payment
One of the latest ways of making online payments are through mobile phones. Instead
of using a credit card or cash, all the customer has to do is send a payment request to
his/her service provider via text message; the customer’s mobile account or credit card
is charged for the purchase. To set up the mobile payment system, the customer just
has to download a software from his/her service provider’s website and then link the
credit card or mobile billing information to the software.
An e-commerce system that uses e-cash refers to a system in which money is only
exchanged electronically. To use e-cash, link your personal bank account to other payee
accounts or set up an e-cash account using a centralized system, such as PayPal, and
link it to your personal bank account. To fund your e-cash account, you can debit from
your personal bank account or credit card. To make payments using your e-cash
account, you can make a deposit to the other person's e-cash account if you have their
banking information, or request a transfer to their bank account.
Digital Cheque
Electronic checking systems provide a means to send a message to a bank to transfer
funds from the sender's account to another account. The message is first directed to the
intended receiver of the funds who endorses the check and presents it to the bank to
collect the funds.
Payment gateway
A payment gateway is a merchant service provided by an e-commerce application
service provider that authorizes credit card or direct payments processing for e-
businesses, online retailers, bricks and clicks, or traditional brick and mortar
1. RuPay
RuPay is an Indian domestic card scheme conceived and launched by the National
Payments Corporation of India (NPCI). It was created to fulfill the Reserve Bank of India's
desire to have a domestic, open loop, and multilateral system of payments in India.
RuPay is the first-of-its-kind domestic Debit and Credit Card payment network of India,
with wide acceptance at ATMs, POS devices and e-commerce websites across India. It is
a highly secure network that protects against anti-phishing. The name, derived from the
words ‘Rupee and ‘Payment’, emphasises that it is India’s very own initiative for Debit
and Credit Card payments. It is our answer to international payment networks,
expressing pride over our nationality.
RuPay fulfils RBI’s vision of initiating a ‘less cash’ economy. This could be achieved only
by encouraging every Indian bank and financial institution to become tech-savvy and
engage in offering electronic payments.
PCI during its journey for last six years, has made a significant impact on the retail
payment systems in the country. With Immediate Payment Service (IMPS), India has
become the leading country in the world in real time payments in retail sector. National
Financial Switch (NFS) and Cheque Truncation System (CTS) continues to be the flagship
products of NPCI. Unified Payments Interface (UPI) and Bharat Interface for Money
(BHIM) has been termed as the revolutionary products in the payment system. Bharat
Bill Payment System (BBPS) has also been launched in pilot mode. The other products in
pipeline include RuPay Credit Card, National Common Mobility Card - Tap & Go and
Electronic Toll Collection.
2. PayPal
PayPal Holdings, Inc. is an American company operating a worldwide online payments
system that supports online money transfers and serves as an electronic alternative to
traditional paper methods like checks and money orders.
PayPal, American e-commerce company formed in March 2000 that specializes
in Internet money transfers. It was heavily used by the Internet auction company eBay,
which owned PayPal from 2002 to 2015. PayPal was the product of a merger between
X.com and Confinity, and it allowed users to make payments on purchased goods or
exchange money between accounts in a secure online transaction.
After watching PayPal become the premier choice of Internet auction shoppers, online
marketplace giant eBay acquired PayPal for $1.5 billion in October 2002. The company
offers users the ability to link their PayPal accounts to their own bank accounts, making
transfers and payments more efficient than money orders or checks.
UNIT-4
MARKETING TECHNOLOGIES
1) Laptop Computers: Laptop computers are personal computers that are easy to
carry and use in various locations. Many laptops on the market are designed to offer
you all the functionality of a desktop computer, which means you can run the same
software and open the same types of files. The laptop has an all-in-one design with
built-in touchpad, keyboard, monitor and speakers. Laptops also offer you the option of
connecting to a larger monitor, regular mouse and other peripherals. This feature means
you can turn a laptop into a desktop computer, but one you can disconnect from the
peripherals and carry with you wherever you go.
2) Tablets: Tablets are also designed to offer portability. However, they provide you
with a computing experience different from laptops with the biggest difference being
that tablets do not have a touchpad or keyboard. Instead, the touch screen offers a
virtual keyboard you use to input text, while your finger replaces the mouse as a pointer.
Tablets are bigger than a smartphone and smaller than a laptop. Like the smartphone,
you can browse the Internet, carry out videoconferences, stay connected through email,
read e-books, play games, watch movies, share photos and listen to music with the
tablet.
3) Smartphones: A smartphone is a powerful mobile phone capable of running
applications in addition to providing with phone service. These devices have most of the
features available on tablets along with cellular Internet connectivity. Cell phone
companies offer data plans that offer you Internet access anywhere with coverage.
4) E-Readers: E-readers, or e-book readers, resemble tablet computers, but that they
are mainly designed for reading digital and downloadable documents. E-readers have
either an LCD or e-ink display. LCD Display: This is the same screen found on laptops
and tablet computers. This type of screen is suitable for viewing books and magazines
with photos because the LCD screen can display colors’ E-Ink Display: E-ink is short for
electronic ink and usually displays in black and white. It is designed to offer you the look
of an actual page in a book. Unlike the LCD display, the e-ink version is not backlit, so
text is readable even outdoors in full sun. E-ink displays offer a reading experience with
less eyestrain.
5) Handheld Gaming Devices: Handheld gaming devices are portable, lightweight
video game consoles that have built-in game controls, screen and speakers. With a
handheld gaming console, you can play your favorite console games wherever you are,
whether on the move or while someone else is watching the TV.
Popular transaction logs are cookies, shopping cart and data warehouse.
1) Cookies: A cookie is a small amount of data generated by a website and saved by
your web browser. Its purpose is to remember information about customer and also
used to store user preferences for a specific site.
Browser cookies come in two different flavors:
Session cookies are temporary and are deleted when the browser is closed. These types
of cookies are often used by e-commerce sites to store items placed in your shopping
cart, and can serve many other purposes as well.
Persistent cookies are designed to store data for an extended period of time. Persistent
cookies are what allow websites to "remember you" for two weeks, one month, or any
other amount of time
2) Shopping cart: A shopping cart is a piece of software that acts as an online store's
catalog and ordering process. The advantages of a shopping cart are convenience, easy
check out, data management, order processing, saving products for future.
3) Data warehouse: A large store of data accumulated from a wide range of sources
within a company and used to guide management decisions. The term data warehouse
was coined by William H. Inmon. He described a data warehouse as being a subject-
oriented, integrated, time-variant and nonvolatile collection of data that supports
management's decision-making process
VIRAL MARKETING
Viral marketing (or viral advertising) is a marketing technique that uses pre-existing
social networking services and other technologies to produce increases in brand
awareness or to achieve other marketing objectives (such as product sales or marketing
buzz) through self-replicating viral processes.
• Newsletters
• Blogging
• Flash games
• Video clips
• Chat rooms
• Social media
Permission Marketing:
Permission marketing is the privilege (not the right) of delivering anticipated, personal
and relevant messages to people who actually want to get them. Permission marketing
is seen as a low-cost and effective way to create a relationship with a potential
customer. It takes away a lot of the overhead costs that competing channels.
Affiliate Marketing:
Affiliate marketing is one of the oldest forms of marketing wherein you refer someone
to any online product and when that person buys the product based on your
recommendation, you receive a commission.
UNIT-5
CLOUD COMPUTING
Platform-as-a-Service: This is the component where the app is being developed and
the database is being created, implemented, stored and tested. In recent times this
component allows creation of enterprise-level applications easily and is cost-effective.
BIG DATA
Big Data refers to our ability to make use of the ever-increasing volumes of data. The
basic idea behind the phrase 'Big Data' is that everything we do is increasingly leaving a
digital trace (or data), which we (and others) can use and analyse.
• One of the biggest advantages of Big Data is predictive analysis. Big Data
analytics tools can predict outcomes accurately, thereby, allowing businesses and
organizations to make better decisions, while simultaneously optimizing their
operational efficiencies and reducing risks.
• By harnessing data from social media platforms using Big Data analytics tools,
businesses around the world are streamlining their digital marketing strategies to
enhance the overall consumer experience. Big Data provides insights into the
customer pain points and allows companies to improve upon their products and
services.
• Being accurate, Big Data combines relevant data from multiple sources to
produce highly actionable insights. Almost 43% of companies lack the necessary
tools to filter out irrelevant data, which eventually costs them millions of dollars
to hash out useful data from the bulk. Big Data tools can help reduce this, saving
you both time and money.
• Big Data analytics could help companies generate more sales leads which would
naturally mean a boost in revenue. Businesses are using Big Data analytics tools
to understand how well their products/services are doing in the market and how
the customers are responding to them. Thus, the can understand better where to
invest their time and money.
• With Big Data insights, you can always stay a step ahead of your competitors. You
can screen the market to know what kind of promotions and offers your rivals are
providing, and then you can come up with better offers for your customers. Also,
Big Data insights allow you to learn customer behavior to understand the
customer trends and provide a highly ‘personalized’ experience to them.
VIRTUAL REALITY
Virtual Reality refers to a high-end user interface that involves real-time simulation and
interactions through multiple sensorial channels. Virtual Reality means feeling an
imaginary (virtual) world, rather than the real one.
Types of Virtual Reality
1. Non-immersive Virtual Reality: Non-immersive virtual reality refers to a virtual
experience through a computer where you can control some characters or activities
within the software, but the environment is not directly interacting with you.
For example, when you play video games such as World of WarCraft, you can control
characters within the game that have their own animations and attributes.
2. Fully Immersive Virtual Reality: On contrary to non-immersive virtual reality, a fully
immersive virtual technology ensures that you have a realistic experience within the
virtual world. It will be as if you are within the physically present in that virtual world and
everything is happening to you for real.
One example could be a Virtual Shooter gaming zone where you will be equipped with
the gears in a small room and you will be viewing a virtual world through the helmet
where you are facing other shooters trying to kill you.
3. Augmented Reality: Augmented Reality is when a certain entity or device seems to
be present in reality but is actually not. Rather than putting you into a virtual world, a
virtual entity is placed in the real world through any device.
For example, through your mobile screen, you can view your room, and probably place a
cartoon character at the corner.
Types of E-Marketing
• Vertical: Unlike horizontal plays, vertical players are specialists. So an online
retailer that only sells baby products is a vertical e-commerce business, so is one that
only sells shoes.
• Horizontal: Those that sell products from a large number of categories. The most
famous horizontal e-commerce business is Amazon.com. It sells books, furniture, food,
grocery, apparel, toys, software, music, gadgets, and a whole lot more.