E-Commerce Domain
E-Commerce Domain
E-Commerce Domain
Business:-A business is an organization engaged in the trade of goods, services, or both to consumers.
Commerce: - The buying and selling of products and services between firms, usually in different status
or countries.
E-commerce: - E-commerce means buying and selling of products or services over electronic systems such as
the internet and other computer networks. Electronic commerce draws on technologies such as mobile commerce,
electronic funds transfer, supply chain management, Internet marketing, online transaction processing, Electronic
Data Interchange (EDI), inventory management systems, and automated data collection systems.
E-commerce framework
Conceptual framework
Here are seven important infrastructure decisions that E -commerce businesses face.
1. Marketing
2. Facilities
3. Customer Service
4. Information Technology
5. Fulfillment
7. Human Resource
In both the cases, E stands for “Electronic networks “ and describes the applications of Electronic network
technology – including internet and electronic data interchange (EDI) – to improve and change business process .
E-commerce covers outward - facing processes that touch customers, suppliers and external partners, including
sales, marketing, order taking, delivery, customer service, purchasing of raw materials.
E-business includes E-commerce but also covers internal process such as production, inventory management,
products development, finance, human resources, E-business strategy is more complex, productivity and cost
savings.
Ex:-E-bay, Amazon.
Activities of E-commerce
a) Increasing the speed of service delivery.
b) Use of computer networks to search and retrieve information for human
c) Buying and selling of information, products and services via computer network.
d) Faster customer response and improve services quality .
e) Advertising on the internet.
f) Online electronic commerce payments just like electronic funds transfer.
Benefits of E-commerce
a. The global nature of the technology.
b. Low cost.
c. Opportunity to reach hundreds of millions of people.
d. Interactive nature.
e. Variety of possibilities.
f. Rapid growth of the supporting infrastructures.
E-commerce benefits are classified into 3 types.
1. Benefits to organization.
2 . Benefits to consumers.
3 . Benefits to society.
Technical Infrastructure
Internet connectivity
The Internet's growth has become explosive and it seems impossible to escape the bombardment of www.com's seen
constantly on television, heard on radio, and seen in magazines. Because the Internet has become such a large part of
our lives, a good understanding is needed to use this new tool most effectively. Internet is network of network means
a global network of computers. Each computer connected to the Internet must have a unique address. Internet
addresses are in the form of nnn.nnn.nnn.nnn (where nnn must be a number from 0 – 255). This address is known
as an IP address. (IP stands for Internet Protocol; more on this later.)
The picture below illustrates two computers connected to the Internet; your computer with IP address 1.2.3.4 and
another computer with IP address 5.6.7.8. The Internet is represented as an abstract object in-between. (As this paper
progresses, the Internet portion of Diagram 1 will be explained and redrawn several times as the details of the
Internet are exposed.)
Diagram 1
If you connect to the Internet through an Internet Service Provider (ISP), you are usually assigned a temporary IP
address for the duration of your dial-in session. If you connect to the Internet from a local area network (LAN) your
computer might have a permanent IP address or it might obtain a temporary one from a DHCP (Dynamic Host
Configuration Protocol) server. In any case, if you are connected to the Internet, your computer has a unique IP
address. Diagram-2
Application Protocol Layer Protocols specific to applications such as WWW, e-mail, FTP, etc.
Transfer Control Protocol TCP directs packets to a specific application on a computer using a port
Layer number.
Hardware Layer/Physical Converts binary packet data to network signals and back.
Layer (E.g. Ethernet network card, modem for phone lines, etc.)
Diagram 3
Networking Infrastructure
Here we see Diagram 1 is redrawn with more details. The physical connection through the phone network to the
Internet Service Provider might have been easy to guess, but beyond that might bear some explanation.
The ISP maintains a pool of modems for their dial-in customers. This is managed by some form of computer (usually
a dedicated one) which controls data flow from the modem pool to a backbone or dedicated line router. This setup
may be referred to as a port server, as it 'serves' access to the network. Billing and usage information is usually
collected here as well.
After your packets traverse the phone network and your ISP's local equipment, they are routed onto the ISP's
backbone or a backbone the ISP buys bandwidth from. From here the packets will usually journey through several
routers and over several backbones, dedicated lines, and other networks until they find their destination, the computer
with address 5.6.7.8.
Internet Infrastructure
The Internet backbone is made up of many large networks which interconnect with each other. These large networks
are known as Network Service Providers or NSPs. Some of the large NSPs are UUNet, IBM, BBN Planet,
SprintNet, PSINet, as well as others. These networks peer with each other to exchange packet traffic. Each NSP is
required to connect to three Network Access Points or NAPs. At the NAPs, packet traffic may jump from one NSP's
backbone to another NSP's backbone. NSPs also interconnect at Metropolitan Area Exchanges or MAEs. MAEs
serve the same purpose as the NAPs but are privately owned. NAPs were the original Internet interconnect points.
Both NAPs and MAEs are referred to as Internet Exchange Points or IXs. NSPs also sell bandwidth to smaller
networks, such as ISPs and smaller bandwidth providers. Below is a picture showing this hierarchical infrastructure.
Diagram 4
Diagram 5
HTTP is a connectionless text based protocol. Clients (web browsers) send requests to web servers for web elements
such as web pages and images. After the request is serviced by a server, the connection between client and server
across the Internet is disconnected. A new connection must be made for each request. Most protocols are connection
oriented. This means that the two computers communicating with each other keep the connection open over the
Internet. HTTP does not however apply this. Before an HTTP request can be made by a client, a new connection
must be made to the server.
When you type a URL into a web browser, this is what happens:
1. If the URL contains a domain name, the browser first connects to a domain name server and retrieves the
corresponding IP address for the web server.
2. The web browser connects to the web server and sends an HTTP request (via the protocol stack) for the
desired web page.
3. The web server receives the request and checks for the desired page. If the page exists, the web server sends
it. If the server cannot find the requested page, it will send an HTTP 404 error message. (404 means 'Page
Not Found' as anyone who has surfed the web probably knows.)
4. The web browser receives the page back and the connection is closed.
5. The browser then parses through the page and looks for other page elements it needs to complete the web
page. These usually include images, applets, etc.
6. For each element needed, the browser makes additional connections and HTTP requests to the server for each
element.
7. When the browser has finished loading all images, applets, etc. the page will be completely loaded in the
browser window.
When the TCP layer receives the application layer protocol data from above, it segments it into manageable
'chunks' and then adds a TCP header with specific TCP information to each 'chunk'. The information
contained in the TCP header includes the port number of the application the data needs to be sent to.
When the TCP layer receives a packet from the IP layer below it, the TCP layer strips the TCP header data
from the packet, does some data reconstruction if necessary, and then sends the data to the correct application
using the port number taken from the TCP header.
This is how TCP routes the data moving through the protocol stack to the correct application.
TCP is not a textual protocol. TCP is a connection-oriented, reliable, byte stream service. Connection-oriented
means that two applications using TCP must first establish a connection before exchanging data. TCP is reliable
because for each packet received, an acknowledgement is sent to the sender to confirm the delivery. TCP also
includes a checksum in it's header for error-checking the received data. The TCP header looks like this:
Internet Protocol
Unlike TCP, IP is an unreliable, connectionless protocol. IP doesn't care whether a packet gets to it's destination or not. Nor
does IP know about connections and port numbers. IP's job is to send and route packets to other computers. IP packets are
independent entities and may arrive out of order or not at all. It is TCP's job to make sure packets arrive and are in the correct
order. About the only thing IP has in common with TCP is the way it receives data and adds it's own IP header information to
the TCP data.
E-commerce software
E-commerce software is the engine behind the scenes of an online store, making it possible to easily manage
inventory, add or remove products, calculate taxes, and everything else required to manage a website and fulfill
orders.
E-commerce software simplifies intricate processes in a friendly user interface that enables people of non-
technical backgrounds to oversee an entire ecommerce operation. Despite the ease of use that e-commerce
software brings to an online business, it is a multifaceted and complex machine. The purpose of e-commerce
software is to put everything you need to run your store in one place
E-COMMERCE SECURITY
E-commerce security is the protection of e-commerce assets from unauthorized access, use, alteration, or
destruction.
THREATS
1. Intellectual property threats -- use existing materials found on the Internet without the owner's permission,
e.g., music downloading, domain name (cyber squatting), software pirating
2. Client computer threats
– Trojan horse
– Active contents
– Viruses
3. Communication channel threats
– Sniffer program
– Backdoor
– Spoofing
– Denial-of-service
4. Server threats
– Privilege setting
– Server Side Include (SSI), Common Gateway Interface (CGI)
– File transfer
– Spamming
Benefits to consumers:
Benefits to society:
1.E-Commerce enables more individuals to work at home and to do less travelling for shopping resulting in
less traffic on the roads and lower air pollution.
2. E-Commerce enables people in rural areas to enjoy products and services that are not available to them. This
includes opportunities to learn professions and earn college degrees.
3. E-Commerce facilitates delivery of public services such as health care education and distribution of
Government social services at a reduced cost and or improved quality.
Limitations of E-Commerce
1. There is a lack of system security, reliability, standards and some communication protocols.
2. There is insufficient telecommunication band width.
3. Soft ware development tools are changing rapidly.
4. It is difficult to integrate the internet and soft ware with some existing application data basis.
E-COMMERCE APPLICATIONS:
1)E-MARKETING : E-Marketing also known as Internet marketing, Online marketing, Web marketing. It is the
marketing of products or services over the internet. It is consider to be broad in scope because not refers to
marketing on the internet but also done in Email and wireless media. E-Marketing ties together the creative and
technical aspects of the internet, including design development, advertising and sales. Internet marketing is
associated with several business models ie., B2C, B2B, C2C. Internet marketing is inexpensive when examine
the ratio of cost to the reach of the target.
2)E-ADVERTISING: It is also known as online advertising it is a form of promotion that uses internet and world
wide web to deliver marketing messages to attracts customers. Example: Banner ads, Social network advertising,
online classified advertising etc.The growth of these particular media attracts the attention of advertisers as a
more productive source to bring in consumers. An online advertisement also offers various forms of animation.
The term online advertisement comprises all sorts of banner advertisement, email advertising, in game
advertising and key soon.
3) E-BANKING OR INTERNET BANKING: Means any user with a personal computer and browser can get
connected to his banks, website to perform any of the banking functions. In internet banking system the bank has
a centralized data base i.e., web-enabled. example for E-Banking is ATM.
4) MOBILE-COMMERCE: Mobile Commerce also known as M-Commerce, is the ability to conduct, commerce
as a mobile device, such as mobile phone.
SERVICES ARE:
1. Mobile ticketing
2. Mobile Vouchers, Coupons and
3. Mobile contract purchase and delivery mainly consumes of the sale of ring tones, wallpapers and games of
mobile phones.
5) E-LEARNING: E-Learning comprises all forms of electronically supported learning and teaching’s-Learning
specially the computer and network skills and knowledge’s-Learning applications include web-based learning,
computer-based learning. Content is delivered via. The internet, intranet, audio, or video tape, satellite TV, and
ED-ROM.Computer-Based Learning, refers to the use of computers as a key component of the education
environment.
6) ONLINE SHOPPING:- Online shopping is the process whereby consumer directly buy goods or services from
a sell in real time, without an intermediary services over the internet . Online shoppers commonly use credit card
to make payments, however some systems enable users to create accounts and pay by alternative means ,such as
7) SEARCH ENGINE:- A web search engine is designed to search for information on the WWW and FTP
servers. The search results are generally presented in list of result and are often called hits. The information may
consist of web pages, images, information, and other types of files.
.
8) ONLINE TRADING:- An online trading community provides participants with a structured method for
trading bantering (exchanging goods with goods) or selling goods and services. These communities often have
forums and chat rooms, designed to facilitate communication between the members.
9) ENTERTAINMENT:-
The conventional media that have been used for entertainment are
1. Books/magazines.
2. Radio.
3. Television/films.
4. Video games.
Definition: Electronic payment is a financial exchange that takes place online between buyers and sellers. The
content of this exchange is usually as encrypted credit card numbers, electronic cheques or cash. The various
factors that have the financial intuitions to make use of electronic payments are:
1. Decreased technology cost. Interest is becoming free almost everywhere in the world.
2. Reduced operational and proceeding cost.
3. Increasing online commerce.
Advantages:-
1. Privacy.
2. Integrity.
3. Compatibility.
4. Good transaction efficiency.
5. Acceptability.
6. Convenience.
7. Mobility.
8. Low financial risk.
9. Anonymity.
1) The greatest advantage of e-payments is the convenience. i.e. customer can pay from any
locations 24 hours day, 7 days a week.
2) E-payments have reduced the amount of time spent on bill management or payment by about
60%.
3) Compared to the cost of postage, online payment can save the money.
4) E-payments are secure.
There are three major risks in the operation of the payment system
1) Fraud or mistake.
2) Privacy issues.
3) Credit Risk.
1) Fraud or Mistake:
All electronic payment systems need some ability to keep automatic records. Once information has
been captured electronically, it is easy and inexpensive to maintain. The need for record keeping for
purpose of risk management like fraud or any sort of mistakes.
2) Privacy Issues:
The electronic payment system must ensure and maintain privacy. The privacy of customers should
be protected as much as possible. privacy must be maintained against unauthorized access. For any
type of transaction trusted third-parties will be needed for all tenacity and good faith.
Credit or systematic risk is a major concern in net settlement systems because a bank’s failure to
settle its net position could lead to a chain reaction of bank failures.
Electronic payment systems are mainly used in banking, retail, health –care, online markets, etc., Electronic
payment system also called as Electronic Funds Transfer (EFT) It is defined as “ any transfer of funds initiate
through an electronic terminal telephonic instrument or computer or authorize a financial institution to debit or
credit an account”
2 )Retailing payments
Credit Cards (e.g., VISA or MasterCard)
Private label credit/debit cards (e.g., J.C. Penney Card)
Shammi Jha | 8305429370
E-commerce Domain
i)Token-based payment systems Electronic cash (e.g., DigiCash) Electronic cheques (e.g., NetCheque) Smart
cards or debit cards (e.g., Mondex Electronic Currency Card)
ii)Credit card-based payments systems Encrypted Credit Cards (e.g., World Wide Web form-based
encryption) Third-party authorization numbers (e.g., First Virtual)
E-cash is a new concept in online payment system because it combines computerized convenience with
security and privacy. E-cash presents some interesting characteristics that should make it an attractive
alternative for payment over the internet.
Properties of E-cash:
E-cash must have a monetary value; it must be backed by cash, bank-authorized credit or a bank certified
cashier cheque. When e-cash created by one bank is accepted by others.
E-cash must be Interpretable i.e. this can be cleared in multiple banks, because multiple banks are required with
an international clearing house that handles the exchangeability issues because all customers are not going to
be using the same bank or even be in the same country.
E-cash must be storable and retrievable from any place telephone or personal communication device and
withdraw from and deposit into banking A/C. E-cash should not be easy to copy, this includes preventing or
detecting duplication.
Working of E-cash:
E-cash is based on cryptographic systems called “Digital Signatures”. This method involves a pair of numeric
keys (Very large no’s)
- One for locking (encoding)
- Another for unlocking (decoding)
- Encoding key is kept private and the decoding key is made public.
Digital money is a perfect medium of exchange e-cash would be allowed to realize its potential for
bypassing the transaction costs of the foreign exchange market.
– On-line
• Individual does not have possession personally of electronic cash
• Trusted third party, e.g. e-banking, bank holds customers‘ cash accounts
– Off-line
• Customer holds cash on smart card or electronic wallet
• Fraud and double spending require tamper-proof encryption
The purchase of e-cash from an on-line currency server (or bank) involves two steps:
Establishment of an account
Maintaining enough money in the account to bank the purchase.
Once the tokens are purchased, the e-cash software on the customer‘s PC stores digital money
undersigned by a bank.
The users can spend the digital money at any shop accepting e-cash, without having to open an account
there or having to transmit credit card numbers.
As soon as the customer wants to make a payment, the software collects the necessary amount from
the stored tokens.
Smart cards have been in existence since the early 1980s and hold promise for secure transactions using
existing infrastructure.
Smart cards are credit and debit cards and other card products enhanced with microprocessors capable
of holding more information than the traditional magnetic stripe.
The smart card technology is widely used in countries such as France, Germany, Japan, and Singapore to
pay for public phone calls, transportation, and shopper loyalty programs.
Types of Smart Cards:
Relationship-Based Smart Credit Cards
Electronic Purses also known as debit cards
Relationship-Based Smart Credit Cards:
It is an enhancement of existing cards services &/ or the addition of new services that a financial
institution delivers to its customers via a chip-based card or other device.
These services include access to multiple financial accounts, value-added marketing programs, or other
information card holders may want to store on their card.
It includes access to multiple accounts, such as debit, credit, cash access, bill payment & multiple access
options at multiple locations.
Electronic Purses:
To replace cash and place a financial instrument are racing to introduce electronic purses wallet-sized smart
cards embedded with programmable microchips that store sums of money for people to use instead of cash for
everything.
After purse is loaded with money at an ATM, it can be used to pay for candy in a vending machine with a
card reader.
It verifies card is authentic & it has enough money, the value is deducted from balance on the card &
added to an e-cash & remaining balance is displayed by the vending machine.
--Charge cards
• Such as one from American Express, carries no preset spending limit.
Advantages:
– Payment cards provide fraud protection.
– They have worldwide acceptance.
– They are good for online transactions.
Disadvantages:
Payment card service companies charge merchants per-transaction fees and monthly
processing fees.
Out-band authorization
In this approach, the verifying party (typically a bank) notifies the authorizing party (the payer) of a transaction.
The authorizing party is required to approve or deny the payment using a secure, out-band channel (such as via
surface mail or the phone). This is the current approach for credit cards involving mail orders and
telephone orders: Anyone who knows a user‘s credit card data can initiate transactions, and the legitimate user
must check the statement and actively complain about unauthorized transactions. If the user does not complain
within a certain time (usually 90 days), the transaction is considered ―approved by default.
Password authorization
A transaction protected by a password requires that every message from the authorizing party include a
cryptographic check value. The check value is computed using a secret known only to the authorizing and
verifying parties. This secret can be a personal identification number, a password, or any form of shared secret. In
addition, shared secrets that are short - like a six-digit PIN - are inherently susceptible to various kinds of attacks.
They cannot by themselves provide a high degree of security. They should only be used to control access to a
physical token like a smart card (or a wallet) that performs the actual authorization using secure cryptographic
mechanisms, such as digital signatures.
Signature authorization
In this type of transaction, the verifying party requires a digital signature of the authorizing party. Digital
signatures provide non repudiation of origin.
Confidentiality
Some parties involved may wish confidentiality of transactions. Confidentiality in this context means the
restriction of the knowledge about various pieces of information related to a transaction: the identity of
payer/payee, purchase content, amount, and so on. Typically, the confidentiality requirement dictates that this
information be restricted only to the participants involved. Where anonymity or un-traceability are desired, the
requirement may be to limit this knowledge to certain subsets of the participants only, as described later.
Operational Risks:
Legal Issues:
Electronic cash will force bankers and regulators to make tough choices that will shape the form of lawful
commercial activity related to electronic commerce.
1. The consumers acquire an OTPP account numbers by filling our registration form. This will give the OTPP a
customer information profile.
2. To purchase in on-line the consumer requests the form the merchant by quoting OTPP account number.
3. The merchant contacts with OTPP payment server with the customer’s account number
4. The OTPP payment server verifies the customer’s account number for the vendor and check for stuffiest
funds.
5. The OTPP payment server sends an electronic message to the buyer. The buyer responds to this message in
one of two ways. Yes I agree to pay; No; I will not pay;
6. If the OTPP payment servers get a yes from the customer, the merchant is informed and the customer is
allowed to download the material immediately.
7. The OTPP will not debit the buyer’s account until it receives conformation of purchase completion.
PAYMENT SERVER
CREDIT CARD,
DEBIT CARD,
DIGITAL CASH
A medium of payment between remote buyers and sellers in cyberspace: electronic cash,
software wallets, smart cards, credit/debit cards
INTRODUCTION
EDI refers to the exchange of electronic business documents i.e. purchasing orders, invoices, etc. between
applications. The exchange involves no paper, no human intervention and takes place in a matter of seconds.
EDI documents are formatted using published standards. EDI requires a network connection between the two
companies exchanging business documents.
EDI has provided great value to trading partners especially those in certain “EDI – ENABLED” industries such
as retail, automotive, and petroleum. The advent of the internet has created a common information and
communications platform upon which business can be conducted. Internet provides the communications.
Capabilities of EDI over a Value-Added network at a much lower price.
NON-EDI SYSTEMS:-
EDI today is most widely used in large business and by smaller companies trading with larger
businesses.
The entire non- EDI process requires the use of multiple clerks by both the customer and vendor
to complete the transaction. The typical clerks involved in the buying cycle are Inventory
control, purchasing, receiving, accounts payable, etc.. The typical clerks involved in the selling
cycle are sales order processing, credit, warehouse, shipping, accounts receivable and cash receipts.
The EDI features are implemented in the organization through third party network services, generally
called Value-Added-Networks.(VAN).The services provided by most VANS include
ROLE OF VAN
VAN
COMPANY'S A
Company A AND B Company B
(Vendor) TRADING (Customer or
AGREEMENT partner)
Fully integrated EDI systems encompass electronic data sharing throughout all aspects of the
purchasing and payment cycles.
1. The processing of the actual payment and remittance advice is called Financial EDI.
2. Fully integrated EDI, including financial EDI, provides firms with the greatest benefits in terms
of speed and accuracy.
3. Payment systems also did in electronic fund transfer.
PRE-REQUISITES OF EDI
One way of legal & security issue is Digital signatures. The technical uses of digital signatures
are:-
1.Messages are time- stamped or digitally notarized to establish dates and times at which a
recipient hard access or even read a particular message.
2.These signatures are to replace handwritten signatures, as it is same legal status as
handwritten signatures.
3 Digital signatures should have greater legal authority than handwritten signatures.
REVENUE MODEL
In business, revenue typically consists of the total amount of money received by the company for goods
sold or services provided during a certain time period. Therefore, revenue models are a part of the
business model. Many online companies generate revenues from multiple income streams such as
advertising, subscription, affiliate marketing etc. Online models not only sell goods or services but also
contacts (e.g. banner) and information (e.g. user-data).
Typically, fees are generated from advertisers in exchange for advertisements, which is ultimately the
classic principal among the revenue models besides sales. Even if representatives of major media
companies complain about earning less money with online advertising than with advertising in print or
TV, the figures indicate steadily rising revenues.
The advertising revenue model is based on contacts making it one of the indirect sources of revenue.
The conventional version is display-marketing - for example wallpaper, super banner, rectangle,
skyscraper- which is paid according to traffic (invoice per CPC/cost-per-click or CPX/cost-per-action).
Examples
Users are charged a periodic (daily, monthly or annual) fee to subscribe to a service. Many sites combine
free content with premium membership, i.e. subscriber- or member-only content. Subscription fees do
not depend on transactions. Subscribers use the content as long and often as they want
Examples
Publishers and content services, e.g. newspapers, magazines, tv channels - they provide text, audio or video
content to users who subscribe for a fee to get access to the service or to download the new issue: New York
Times, Spiegel Online, Zattoo, Netflix
Networks offer premium memberships to find business partners or former classmates, subscribers can use all
services, i.e. they get any information about their account via short notifications or newsletter, receive and send
e-mails, get job offers: Xing, Linkedin, Stayfriends
Internet service providers offer the connectivity (e.g. via broadband) and services around (security software for
download, e-mail-services): T-Online, AOL
specific assortments and customer-specific discounts. It includes the IOS transactions and electronic market
transactions between organizations.
•IOS Transactions means Inter Organizational Information Systems refers to flow of standard transactions
information between business partners, such as placing orders, building or paying.
Consumer-to-Business (C2B)
In a Consumer-to-Business E-commerce environment, consumers usually post their products or services
online on which companies can post their bids. A consumer reviews the bids and selects the company that
meets his price expectations.
Consumer-to-Consumer (C2C)
In a Consumer-to-Consumer E-commerce environment consumers sell their online goods to other
consumers. A well-known example is eBay.
1) Passive Techniques.
2) Aggressive Techniques.
1) Passive Techniques: Passive techniques are considered to be those methods that require the user to
‘pull’ the information from the website.
2) Aggressive Techniques: Aggressive techniques are considered to be those techniques in which the
website “pushes” the information on to the customer regardless of whether the consumers is interested
or not.
• Interactive sites.
• Banner advertising.
• Off-line advertising.
• Spam Mail.
E-mail marketing has become a popular medium because of its relatively low-cost and the ability to send
HTML messages containing full color pictures of products, as well as links to order from pages. The
transmit of an e-mail message to a solicited, targeted list is a method used to visitors to a website that
requires acts by both the website and the visitor. This mechanism allows a business to maintain regular
contract with customers and drive traffic to websites or other products.
Because the user requests the information this type of internet marketing technique is considered to be
“pulled” by the consumer with the help of the website.
Interactive Sites:
Some sites may exhibit initiative to attract initial and subsequent visitors to their site by providing
general information in an interactive fashion.
Banner Advertising:
Online Banner advertising, off-line advertising one comes under aggressive advertising techniques.
Online banner advertising a service sold. Internet marketing firms. Can be very effective. A major
advantage is that the banner’s effectiveness, in terms of a visitors to site is easily monitored.
The method used to promote website is off-line advertising, such as television, radio and print. These
advertising mechanisms are also relatively more costly than previously mentioned methods.
The method of on-line advertising that unsolicited, targeted email advertising to past visitor or
customers. This type of advertising is aggressive in that the visitor or customer does not specifically
request additional sales or promotion items. When conducted properly, these methods can be effective.
Spam mail:
Even more aggressive factices to attract customers is the sending of unsolicited e-mail advertisements
to individuals or business that have never visited the site. The e-mail address may be purchased or
traded with another business. The on –line eqvalent of junk-mail- that is sent out repeatedly is referred
to as spam mail.
Spam is referred to as “Postage due marketing “because the thousands of messages sent reside on the
recipients host computers until they are deleted, and the storage of such messages cost business
money.
Another low-cost, aggressive advertisement technique used on the internet is e-mail chair letters. E-mail
chair letters typically require that a user visit site and register.
The www provides an exciting and powerful new distribution channel for marketers. Web –based
electronic commerce is providing marketers with an exciting new marketing channel.
Marketing is the process of planning and executing the conception, pricing, promotion, and distribution
of ideas, goods and services to create exchanges that satisfy individual and organizational goals.
The www presents a new venue for marketers to use and with it comes new guidelines. Web based
marketing consider two issues.
(ii) Revolutionary- forming a new organization to realize the opportunity of marketing on the
web.
2) Consider how the various web-based marketing techniques can supplement current marketing
initiatives.
A customer oriented value chair that places the customer as the center of attention, with information
follows passing from a business to its customer for all facts of its operations except for own
procurement where the firm inter faces with its suppliers.
1) Product
2) pricing
4) Promotion
5) Personalization
Pricing
Procurement
Promotion
Customer
personalization
Place &
Product
Distribution
Figure: The relationship of the five Ps and the consumer- oriented value chain
Product:
Product is a good or service that a business offers to its customers without a perfect product to offer, a
business cannot survive. The produce component in the marketing is related to the production section
of the consumers –oriented value chain.
Pricing:
The pricing of a “good” refers to the processes involved in determining the amount to change for a
specific physical good or service pricing models are typically used to determine a firms price.
Because of the development of search engines customers are easily able to compare prices of many
goods offered for sale on the internet. On-line quotation are a popular method for selling items on the
internet an interesting method of pricing goods on the internet is through offers made by consumers.
Place (Distribution):
The Distribution task entails moving the product from the producer to the customer.
The product may travel directly from the products to the customer or it may be channeled
intermediaries such as whole sales or retailers.
E-commerce involving the sale of physical goods can be very useful in exchanging information between
business and delivery companies.
The physical internet itself us also a delivery channel for digital products like software data or
multimedia fill.
Promotion:
The sales and marketing function under the traditional marketing category called promotion.
The successful promotion of a product requires that at a minimum a positive message be received by
potential customers. This message can be communicated many ways.
The internet is leading marketers to a fundamental paradigm shift from mass marketing to personalized
marketing. Data bases and telecommunications technology make it very easy and cost – efficient to
mass marketing personalized services.
Personalization on the internet refers to the ability of customers to receive personalized information
Attracting visitors to websites is a key component to a successful web-based commerce site. The must
common sources of revenue come from allowing advertisers to pay for banners on their sites is to be
listed as site sponsors.
1) Banners.
2) Sponsorships.
3) Portals.
4) Online
Coupons. Banners:
According to interest advertising bureau (IAB), the most popular form of on-line advertising is banner
advertising.
Banner advertising containing text and graphic that are placed on the screens of search engines, web
browser software and websites to attract the attention of www users. Banner advertising is of two types
Click through advertisement contain hypertext links to the site about which the banner is advertising.
Non Click through advertisements which does not contain hypertext links to the site.
Firms are also interested in tracking whether visitors they make a purchase from the site. So software
tracking devices are available for tracking such items.
Sponsorships:
Sponsorship is another popular on-line advertising method. Sponsorships are similar to banner in that a
business gets to display a message typically just a logo, on a site a click- thorough may be allowed.
Sponsorships typically allow the firms banner to stay on a site for a longer period of time or for a certain
no. of days.
Portals:
A portal is referred to a site that serves the “post of entry” on to the web. Portals are designed to give
web users the information they need as they first enter the www.
Customized pages are an option, as well a customized news items and stock quotes. Portals types sell
advertising space on their sites.
Online coupons:
Online coupons are printed for use in stores or requested and sent via portal mail for use in stores when
the visitor expenses the produce in which they are interested the store mails the coupons to them.
On-line coupons are also distributed from sites that specialize in distributing such coupons for
businesses that subscribe to their services.
Electronic markets (or electronic marketplaces) are information systems (IS) which are used by
multiple separate organizational entities within one or among multiple tiers in economic value
chains. In analogy to the market concept which can be viewed from a macroeconomic
(describing relationships among actors in an economic systems, e.g. a monopoly) as well as
from a microeconomic (describing different allocation mechanisms, e.g. public auctions of
telephone frequencies) perspective, electronic markets denote networked forms of business
with many possible configurations:
Second, the services provided by electronic markets may serve infrastructural or allocation
purposes. Among the infrastructure services are routing, messaging, identification and partner
directories whereas allocation services enable pricing process which in turn may be static or
dynamic in nature. Typical implementations are catalogs, exchanges and auctions.
Third, the relationships of actors involved in electronic markets may be stable or atomistic in
nature. The former usually refers to classical supply chains where business collaborate during a
longer period of time. In the latter case, the transaction partners are only stable for a single
transaction. This is usually to be found in auction and other exchange settings.
This leads to two definitions: In a narrow sense Electronic Markets are mainly conceived as
allocation platforms with dynamic price discovery mechanisms involving atomistic
relationships. Popular examples originate from the financial and energy industries. In a broader
sense, price discovery is not critical for electronic markets. This covers all forms of electronic
collaboration between organizations and consumer as well as vice versa.
Electronic Auctions
The electronic auction (e-Auction) is an e-business between auctioneers and bidders, which
takes place on an electronic marketplace. It is an electronic commerce which occurs business to
business (B2B), business to consumer (B2C), or consumer-to-consumer (C2C).
The auctioneer offers his goods, commodities or services on an auction side on the internet.
Interested parties can submit their bid for the product to be auctioned in certain specified
periods. The auction is transparent, all interested parties are allowed to participate the auction
in a timely manner.[
1. forward auction in which several buyers bid for one seller's goods
2. reverse auction in which several sellers bid for one buyer's order.
No physical location
The products for auction do not need any physical location in case of online auction. The
inventory can be managed online and upon sale the product can be shipped physically. This
makes it flexible to hold an auction online site.
Convenience
The bidder can participate in auction from anywhere at anytime through online auction.
There is no limitation regarding the time, place, or person to conduct online auction.
Bidders can participate in auction from home or office using the computer terminal.
Rich information
The related information about each auction product is neatly presented on the website. Bidders
can peruse all the documents related to the products before participating in the auction. There
is no confusion to get information at fingertips.
Time& money saving
Online auction saves time and money. There is no dedicated time required to travel and reach
an auction place. Just logging into the site makes it possible for the user to participate in
auction which also saves money spent for reaching the auction spot.
Prolonged time
In normal auction the time for auction is fixed which will not be changed. But in the case of
online auction, the timer is reset with 20 or 30 seconds when a bidder places a bid which makes
the auction time to be prolonged causing time delay in closing the auction.
Anonymous bidder
The online auction does not take place face to face which creates anonymous bidders. The
auctioneers cannot have a hold on who is participating in the bidding. This can lead to
anonymity in identifying the bidders.
Product genuineness
One can view only the product photo on the auction website. One cannot inspect the product
about its condition and usability physically which may lead to lack of product genuineness.
Some of the online auction does not support refund
Fake sites
The auction website may be sometimes fraudulent which sells fake products which will never
be delivered. The product description and actual product may differ. Sometimes the product
delivered may not be the product that was placed for auction leading to chaos.
M-Commerce
M-Commerce or mobile commerce is process of buying and selling products and services through
wireless handheld devices such as cell phones or PDAs. Though M-commerce is a new term, it has
become an instant hit and is also being called as the next generation e-commerce. M-commerce lets
users carry out financial transaction using mobile phones and does not always require internet. It is has
made the process of buying and selling products even easier due to a technology known as WAP
(Wireless Application Protocol), which allows users to connect to the internet without dealing with the
hassle of wires and electricity.
It also allows businesses to reach consumers even faster compared to e-commerce, as a person may not
always have a computer with them, while a person will always have their cell phones on them.
Promotional text messages are an example of mobile commerce. Another popular example is
downloading movie tickets and airline tickets on the phone. With the constant upgrade in cellular
technology, more and more possibilities are available to the consumers. Mobile applications, online
banking, online shopping via phone, are also different forms of m-commerce.
Compared to M-commerce, E-commerce is more limited as it requires the use of a computer and
internet connection, while mobiles work on satellites. Video conferencing is now available on mobile
phones with 3G and 4G networks, without the hassle of internet. M-commerce however is costly
compared to E-commerce.
Virtual community
A virtual community is a social network of individuals who interact through specific social media,
potentially crossing geographical and political boundaries in order to pursue mutual interests or goals.
Some of the most pervasive virtual communities are online communities operating under social
networking services.
Virtual communities all encourage interaction, sometimes focusing around a particular interest or just to
communicate. Some virtual communities do both. Community members are allowed to interact over a
shared passion through various means: message boards, chat rooms, social networking sites, or virtual
worlds
may synthesize Web 2.0 technologies with the community, and therefore have been described as
Community 2.0, although strong community bonds have been forged online since the early 1970s on
timeshare systems like PLATO and later on Usenet. Online communities depend upon social interaction
and exchange between users online. This interaction emphasizes the reciprocity element of the
unwritten social contract between community members.
Concerns with a virtual community's tendency to promote less socializing include: verbal aggression and
inhibitions, promotion of suicide and issues with privacy. However, studies regarding the health effects
of these communities did not show any negative effects. There was a high drop-out rate of participants
in the study. The health-related effects are not clear because of the lack of thoroughness and the
variation in studies done on the subject.
New forms of civic engagement and citizenship have emerged from the rise of social networking sites.
Networking sites acts as a medium for expression and discourse about issues in specific user
communities. Online content sharing sites have made it easy for youth to not only express themselves
and their ideas through digital media, but also connect with large networked communities. Within these
spaces, young people are pushing the boundaries of traditional forms of engagement such as voting and
joining political organizations and creating their own ways to discuss, connect, and act in their
communities.
Civic engagement through online volunteering has shown to have positive effects on personal
satisfaction and development. Some 84 per cent of online volunteers found that their online
volunteering experience had contributed to their personal development and learning.
An online message board is a forum where people can discuss thoughts or ideas on various
topics. Online message centers allow users to choose which thread, or board of discussion,
users would like to read or contribute to. A user will start a discussion by making a post on a
thread. Other users who choose to respond can follow the discussion by adding their own post
to that thread. Message boards are not conversation based because user responses do not
have to take place right away. Whenever the user revisits the message board, he/she can make
a response. Unlike a conversation, message boards do not have an instantaneous response and
require that users actively go to the site to check for responses. Anyone can register to
participate in an online message board. A message board is unique because people can choose
to participate and be a part of the virtual community, even if they choose not to contribute
their thoughts and ideas. Registered users can simply view the various threads or contribute if
they choose to. Message boards can also accommodate an almost infinite number of users,
while the number of users who can be accommodated by a single chat room is limited at least
in practice.
Shortly after the rise of interest in message boards and forums, people started to want a way of
communicating with their "communities" in real time. The downside to message boards was
that people would have to wait until another user replied to their posting, which, with people
all around the world in different time frames, could take a while. The development of online
chat rooms allowed people to talk to whoever was online at the same time they were. This
way,messages were sent and online users could immediately respond back. The original
development by CompuServe CB hosted forty channels in which users could talk to one another
in real time. The idea of forty different channels led to the idea of chat rooms that were specific
to different topics. Users could choose to join an already existent chat room they found
interesting, or start a new "room" if they found nothing to their liking. Real time chatting was
also brought into virtual games, where people could play against one another and also talk to
one another through text. Now, chat rooms can be found on all sorts of topics, so that people
can talk with others who share similar interests. Chat rooms are now provided by Internet Relay
Chat (IRC) and other individual websites such as Yahoo, MSN, and AOL.
3.Virtual worlds:
Virtual worlds are the most interactive of all virtual community forms. In this type of virtual
community, people are connected by living as an avatar in a computer-based world. Users
create their own avatar character (from choosing the avatar's outfits to designing the avatar's
house) and control their character's life and interactions with other characters in the 3-D virtual
world. It is similar to a computer game, however there is no objective for the players. A virtual
world simply gives users the opportunity to build and operate a fantasy life in the virtual realm.
Characters within the world can talk to one another and have almost the same interactions
people would have in reality. For example, characters can socialize with one another and hold
intimate relationships online.
This type of virtual community allows for people to not only hold conversations with others in
real time, but also to engage and interact with others. The avatars that users create are like
humans. Users can choose to make avatars like themselves, or take on an entirely different
personality than them. When characters interact with other characters, they can get to know
one another not only through text based talking, but also by virtual experience(such as having
avatars go on a date in the virtual world). A chat room form of a virtual community may give
real time conversations, but people can only talk to one another. In a virtual world, characters
can do activities together, just like friends could do in reality. Communities in virtual worlds are
most similar to real life communities because the characters are physically in the same place,
even if the users who are operating the characters are not. It is close to reality, except that the
characters are digital. Second Life is one of the most popular virtual worlds on the Internet.
Whyville offers a good alternative for younger audiences where safety and privacy are a
concern. In Whyville you use the simulation aspect of the virtual world to experiment and learn
about various phenomenons.