ASSIGNMENT DRIVE SPRING DRIVE 2014 PROGRAM BACHELOR OF BUSINESS ADMINISTRATION (BBA) SEMESTER IV SUBJECT CODE & NAME - BBA401- E-COMMERCE BK ID B1712 CREDIT 4 MARKS 60 Q.No 1 a. eBay is The World's Online Marketplace, enabling trade on a local, national and international basis. With a diverse and passionate community of individuals and small businesses, eBay offers an online platform where millions of items are traded each day. Mention and explain the various opportunities offered by ecommerce for businesses. b. What are the advantages and disadvantages of eCommerce? ( a. Listing the opportunities and explaining b. Listing the main advantages Listing the disadvantages) 3+3+4=10 Answer: a) E-Commerce Opportunities for Businesses: 1. Tourism and Travel Sector: This sector has updated its system with ecommerce services. Consumers can make online reservations of hotels, motels, air tickets, railway tickets, etc. 2. Banking Sector: Most banks have changed their working style by making their services available online through their respective websites. 3. Health Care Sector: This sector is large and uses a major part of government expenses. So, most health care companies communicate or exchange their services with each other. 4. Stock Sector: In the stock exchange sector, e-commerce services provide demat account facilities for customers who can do an overall analysis of the status of the stock areas and do their respective transactions. 5. Financial Sector: In India, the financial sector has adopted e-commerce services and the users make maximum use of the same. Advantages of E-Commerce: 1. All-time processing: Customers can use the marketplace at all times with the use of e-commerce services. 2. Better service: Customers are fully satisfied and receive better service. 3. No mediators: Customers can directly contact the suppliers and remove all mediators. 4. Data on consumer performance: Using the e-commerce services, one can understand consumer behaviour, for example, websites, products, schemes and modes of payment which are preferred by the customer. 5. Time saving: Customers can save time because they can purchase anything through the merchant websites. Other Advantages: E-commerce reduces the cost of the product. It reduces paperwork as the entire work is done electronically. Improved customer relationship is achieved by fast dissipation of information. E-commerce minimizes the time taken from order to delivery. Provides better, faster and effective linkage with clients E-commerce helps people work together. E-commerce is a 24 × 7 operation and has a global reach. Disadvantages of E-Commerce: 1. Lack of customer awareness: People who have no knowledge about electronic communication like the Internet, and computers find it difficult to transact electronically. 2. Not for small business: Small businessmen do not want to take any extra burden because they have no knowledge of e-commerce functions. 3. Does not support all types of businesses: Some types of businesses are not fit for e-commerce services. 4. Legal formalities: Before implementing e-commerce services in the business, it is necessary to complete certain legal formalities like authorization and authentication. Other Disadvantages High risk for Internet startup organization Security problems Customer relation problems Data integrity problems Customer satisfaction problems 2 a. The TCP/IP reference model is the network model used in the current Internet architecture. This model is derived from the OSI model and they are relatively same in nature. Explain the different characteristics of Gateways in the TCP/IP reference model with a neat diagram b. Write short note on Hyper Text Markup Language (HTML) with example (a. Diagram Characteristics b. Explanation on HTML Example )3+3+3+1=10 Answer: a) Characteristics of Gateways Gateway routers are used to connect dissimilar LANs and perform all the functions of bridges and routers. It operates as all seven layers of the OSI Reference Model. Gateways provide full protocol conversion from one proprietary LAN technology to another. Gateway uses higher layers of the OSI model, perhaps through layer 7, the application layer. 1. Application------------------------------- Represents data to the user plus encoding and dialog control. 2. Transport -------------------------------- Support communication between diverse devices across diverse networks (using TCP/IP). 3. Internet----------------------------------- Determines the best path through the Network ( using gateway). 4. Network Layer ------------------------- Controls the hardware devices and media that make up the network . Figure 2.5 TCP/IP Reference Model for Communication b) Hyper Text Markup Language (HTML) HTML is a method where ordinary text can be converted into hypertext. It is a set of special codes included to control the layout and appearance of the text. Technically, HTML is not a programming language. It combines instruction within data to tell a display program called browser, how to render the data that the document contains. The following is the structure of HTML: <html> <head> about authors </head> <title> First Page </title> <body> <h1> Hello this my Home page! </body> </html> < HTML>: This tag defines the top most elements, identifying it as an HTML document. <Head>: This tag contains information about your HTML file. <Title>: This tag is nested within the head tag. It identifies your page to the rest of the world. Output of tag is displayed on your browser’s title bar but does not appear as part of the page. <body>:This is a body part of your HTML web page. Within this tag all the various tag is used. Every tag has prespecified attributes and there possible values. Levels of Heading: Six different levels up to <h1>,<h2>,<h3>,<h4>, <h5>,<h6> Adding a comments:<! - - and ends with — > Creating List: There are two types of list : ordered list and unordered list. Ordered List: <ol> <li> MS-Windows <li> MS-Excel <li> MS-Word </ol> Unordered List: <ul> <li> MS-Windows <li> MS-Excel <li> MS-Word </ol> Creating Definition Lists: A glossary consists of three tag elements: <dl>: Define the List <dt>: Define term <dd>: Define the definition Inserting Images: To insert images in your page use <img> tag as follows: <img src=”flower.gif” height=”100" width=”100" border=”1"> Linking the HTML page: To link one HTML to another use anchor tag as follows: <a href = “first.html” > Click me </a> Setting font size: We can set font of text by using font tag as follows: <font face=”Arial” size=”4" color=”red”> Marquee tag: This tag offers some movement from up, down, left, right of given text: <marquee direction=”up” bgColor=”red” behavior=”scroll”> MY Moving Text is displayed here </marquee> Table tag: Page layout on the web has to be set by using tables because HTML has no method to set margin or columns. Example: <table border=”1" cellspacing=”6" cellpadding=”6" width=”80%”> <tr> <th> Roll no </th> <th> Name </th> </tr> <tr> <td> 34 </td> <td> Pooja </td> </tr> <tr> <td> 35 </td> <td> Priya </td> </tr> </table> 3 Hanson websites are built to work for your business and are built on the concept of intelligent website. An intelligent website is more than just a brochure on the web. It allows you to edit the website yourself through a Content Management System (CMS). What is the need for an intelligent website? (Listing the steps Explanation) 4 +6 = 10 Answer: Step 1: Basic Web traffic analysis Before starting any Web activity, one first needs to analyse the Web traffic. This type of data provides a record of the entry and exit points into a website, pages that were visited, links that were followed, the duration for which a person viewed a particular page, the precise day and time of visit, the browser type, visitor’s IP address and other information. Step 2: Customer interaction analysis This step is used to collect more information about the customer’s interactions with the website. The registered users are people who have had to register for site usage, generally by filling out a survey form. As you know, in any site (even a free site) the user has to fill a registration form in which there are various types of questions related to profession, education, age, gender, leisure activities, merchandise purchasing, etc. Through this registration process, the site is able to get information related to both the demographics and preference. This type of data is used to help inform personalization engines to serve the contents according to the visitor’s interests. Step 3: Real-time personalization Personalization is the ultimate realization of the one-to-one marketing dream. Customers are recognized when they come in; they can tailor the way they interact with the merchant; and receive promotions and marketing programmes that perfectly fit their personal requirements and preferences. The following are four ways of personalization: (a)Greetings (b) Customization (c) Narrowcasting (d) Recommendation Step 4: Getting to fine-grained segmentation Fine-grained segmentation is used to enhance the site’s marketing power by using an e- commerce intelligence system performing customer segmentation. You can start with products that are at hand’s reach through coarse segmentation, and then continue to fine-grained segmentation. This step also uses artificial intelligence to conduct knowledge discovery. That is, it can look for patterns in large data sets and identify common elements. Step 5: Going through the streams of clicks The click-stream data contains details on customer behaviour that are richer than what can be achieved in traditional channels. Click-stream information is the recording of every page request from every visitor by the website owners. This information is stored into massive log files. Step 6: Enrich content with external data Once a customer performs a number of purchases, the website is able to further enhance the customer’s profile. Demographic data from third party providers may be added to the profile to provide a richer view of the customer base. Analysing the enriched data might show, for instance, that a customer who buys history books falls into a demographic segment which is also inclined to buy classical music. Step 7: Reaching optimal intelligence A company can reach optimal intelligence once it is able to combine historical transaction records, observed behaviour via click-stream data and preferences expressed in online surveys. 4. When a data is sent across the network it is encrypted and arranged in a way that even if there is a diversion in the flow of data should not leak the data. At the reception it is decrypted and actual data is obtained. Explain the different methods of encryption technique. (Listing, Explanation each of them, Diagram for each of them) 1+5+4=10 Answer: There are three types of cryptography or methods of encryption: Secret key or private key or symmetric key cryptography Public key or asymmetric key cryptography Hash function 1. Secret key or symmetic key cryptography In this scheme, both the sender and the recipient possess the same key to encrypt and decrypt the data. Figure 8.1 shows how secret or private key cryptography works. Original Encrypted Message Message Secret Key Encrypt Internet Encrypted Original Message Message Secret Key Decrypt Figure 8.1 Schematic Diagram of Secret Key Cryptography Data Encryption Standard Data Encryption Standard (DES) is an example of secret key cryptography. It was developed by IBM. DES is block cipher-based scheme which encrypts a64-bit data block using a 56-bit key. The block is transformed in such a way that it involves sixteen iterations. This done by using the security key. To take an example, suppose, A encrypts a message with a secret key and e-mails it to B, who on receiving it, checks the header to identify the sender. B then has to take the duplicate of the secret key to decrypt the message. 2. Triple Encryption As discussed, the DES is a block cipher and employs shared secret encryption. But, nowadays DES is considered unsafe for various applications primarily due to the 56-bit key size which is too small. Triple DES is considered as an improved version to overcome many of the shortcomings of DES. The triple encryption technology is based on DES and is sometimes referred as Triple DES or 3DES. The event follows an Encrypt-Decrypt-Encrypt (EDE) sequence. Triple DES mode of operation takes three 64-bit keys for an overall key length of 192 bits. In Private Key Encryption, the user can just type in the complete 192-bit (24 character) key rather than entering each of the three keys individually. The procedure for encryption is exactly the same as regular DES, but it is repeated three times. The data is encrypted with the first key, decrypted with the second key and finally encrypted again with the third key 3. Public key cryptography This scheme operates on a double key, called pair key, one of which is used to encrypt the message and the other is used to decrypt it. This can be viewed as two parts; one part of the key pair, the private key, is known only by the designated owner. The other part, the public key, is published widely but is still associated with the owner of the private key. Figure 8.3 shows how public key encryption works. 5. Explain the different categories of electronic payment system in detail (Listing the types and sub types, Explanation) 3 +7 =10 Answer: There are three main categories of EPS. 1. Banking and Financial Payments Large-scale or whole payment (e.g., bank-to-bank transaction) Small-scale or retail payment (e.g., ATM) Home banking (e.g., bill payment) 2. Retail Payments Credit cards (VISA or Master cards) Private label credit/debit cards (e.g., JC Penny cards) Charges cards (e.g., American Express) 3.Online e-commerce Payments (i)Electronic token-based payment system Electronic cash (e.g., DigiCash) Electronic cheques (e.g., NetCheque) Smart cards or debit cards (e.g., Mondex e-currency cards) (ii)Credit card-based payment systems Encrypted credit cards (www form-based encryption) Third-party authorization number (e.g., First Virtual) Electronic Token-based Payment System Now a days, ‘electronic token’ (e-token) in the form of electronic cash/cheque has been developed. It is recognized as equivalent to cash and is backed by banks. 1. Electronic Cash Electronic cash (e-cash) is a form of electronic payment system based on encryption. This means it is a secure payment system. Before a product is bought or services availed cash has to be obtained from a currency server. The safety of e-cash is ensured by digital signature. 2. Electronic Cheques Electronic cheque has all the same features as a paper cheque. It functions as a message to the sender’s bank to transfer funds, the message is given to the receiver, who in turn, endorses the cheque and presents it to the bank to obtain funds. 3. Smart Cards Smart cards, containing microprocessors, are able to hold more information than cards based on the traditional magnetic strips. They help the cardholder to perform operations, especially of financial nature. Most of these methods are known as stored value cards or electronic purse system. Units of prepayment or currency value are electronically stored on an IC (integrated circuit) chip embedded in these cards. Credit Card-based Payment Systems When a customer buys a product or avails a service, the details of the credit card is given to the seller of goods or to the service providers involved. The credit card provider makes the payment. The credit card transaction simply requires that the consumer has a legitimate credit card number and expiration date while placing an order. This information has been provided through standard Internet options like e-mail/SMS. Credit cards use personal information number (PIN). Payment using encrypted credit card details In this type of credit card system, the credit card data is encrypted and fed into a browser or any other ecommerce devices and safely sent through the network from the buyers to the sellers. This provides safety, privacy and security as encrypted information is transferred over the public network. Payment using third party verification This credit card system uses a third party for security. An organization that gathers and allows payments from one client to another is known as third party. After a lapse of sometime, the transaction of one credit card for the whole accrued amount is completed. 6. We know that there are various internet services which help us to make the use of network efficiently. Being a regular user of the various services without probably knowing the technical aspects explain those services in details with an example. (Listing the various services, Explanation, Examples) 2 +6 +2 = 10 Answer Services that are available on the Net: World Wide Web E-mail File Transfer Protocol Telnet Web Chat Online Service Instant Messaging World Wide Web The World Wide Web is a system of interlinked hypertext documents accessed via the Internet. You can use a Web browser to view texts, images, videos and multimedia on web pages and navigate between them using hyperlinks. A majority of web pages are linked to other Web resources through hyperlinks. Electronic Mail E-mail is any method of digitally creating, transmitting or storing human communication that is primarily textual. The model on which a modern e-mail system works is the store-and-forward model. E-mails are rarely transmitted directly from one user to another. E-mail computer server systems accept, store and forward mail on behalf of users who connect up from their personal computers or any other networkenabled device. Transmission of any media is possible—including attachments consisting of audio and video clips through email. File Transfer Protocol File Transfer Protocol (FTP) is a generic term for a cluster of programs used to transfer files or data from one computer to another. It is a network protocol that allows an FTP client to connect to an FTP server and manipulate files on that server. Therefore, this protocol can be used to exchange and manipulate files across computers. FTP sites are normally used for uploading and downloading files to a central server computer before they are distributed. Telnet Telnet (Telecommunication network) is a network protocol used on the Internet or in local area network (LAN) connections. With Telnet, a user can get access to a command- line interface on a remote machine. Telnet is software which implements the client part of the protocol. Telnet clients are available for almost all platforms. However, because of security issues with Telnet, its usage has gone down considerably. Web Chat Web chat allows users to communicate with one another in real time through Web interfaces. A Web browser is the only requirement to be able to chat on the Web. Now days, technologies like Ajax and Flash, are used for the new chat systems such as Buzzen Chat. Online Services The first commercial online services became available in 1979. Anyone who had a modem and communicating software could chat and e-mail; or access news, financial and stock market information, various forums, bulletin boards and other general information. These services used text-based interfaces and menus. The problem with these services was that subscribers could exchange e-mails only with those who subscribed to the same service. Instant Messaging Instant messaging (IM) is a form of real-time communication between two or more people based on typed text. The text is conveyed via devices connected over a network such as the Internet. IM allows effective and efficient communication, providing instant acknowledgment or reply. IM provides other additional feature, such as use of webcams (to see the other participants) and free Internet telephony. IM allows a user to save a conversation for later reference.