Page 1 E-Business (MBA-218) Business Business can be defined as the organized effort of individuals to produce and sell for a profit, products and services that satisfy society’s needs. (Example of Involved Process by business: Production, Purchases, Sales, Advertisement, Exhibition of Products, Marketing of Products, Sampling of Products etc.) Commerce Commerce is a negotiated exchange of valuable object (Cash, Cheque, Gold, etc) or services between at least two parties and includes all activities that each of the parties undertake the complete the transaction. Example: My Person trades eggs to one of his neighbors in exchange for repairs to his furniture. E- Business Definition 1: E-business in the simple words is the use of internet technologies and computing to implement business transition online to improve customer services operation enhances the market share, attract large number of consumers, streamline supply chain and reach existing & new customers. Definition 2: In general the term E-business means doing any kind of business transaction on the internet with the aid of two integrate component of E-Commerce (EDI & VAN). E-Commerce Definition 1: A part of e-business; the term refers only to the activities involved in buying and selling online, which may include identify suppliers, selecting products or services, making purchases commitments, completing financial transactions, and obtaining services. Definition 2: We will define e-commerce as the use of electronic data transmission to implement or exchange any business activity. Page 2 Example: A buyer sends an electronic purchases order to a seller. The seller then sends and electronic invoice back to the buyer. History of Internet 1969 : The US Department of Defense started the first network among major research centers in US. 1971 : A total of major connection or nodes were established. E-mail was introduced. 1973 : Defense Department started developing various forms of file transfer. 1984 : Domain Name Service (DNS), was introduced. 1986 : US National Service Foundation created Internet-based telephone lines 1987 : The number of hosts (Computer on the Internet) reached 10,000. 1988 : The number of hosts on the Internet became over 60,000. 1989 : Over 100,000 hosts on the Internet were registered. 1991 : The World Wide Web (WWW) was created by CERN in Switzerland. (Conseil European pour la Recherché Nuclearire) 1992 : One million hosts on the Internet were found. 1995 : There were a total of 6.6 million hosts or computer on the Internet. July 1997 : 1.3 million Domain names registered. Dec. 1997 : 22 million servers, 40 million users on the WWW. 2000 : 110 million users and 72 million Domains Names. 2003 : 802.2 million users and 233 hosts. Growth of Internet in India Years Internet Subscribers Internet User 1997 25 45000 1998 250 200000 1999 359 1000000 2000 650 2000000 2001 1130 6668000 2002 1763 10684000 2003 3661 29000000 2004 4403 31723000 2005 6674 52875000 Page 3 60000 50000 40000 Subscribers User 30000 20000 10000 0 1999 2000 2001 Internet 2002 2003 2004 2005 Usage in India History of E-Commerce The term E-Commerce was derived from E-mail means conducting business online with the help of electronic devices like personal computer, phone lines, fax machine, pager etc. IBM was the first company who use the term internationally. During 1970, the introduction of EFT (Electronic Fund Transfer) between banks over secure private network changed financial changed financial market. During the late 1970 & early 1980’s, E-commerce becomes widespread with in companies in the form of electronic messaging technologies: EDI & E-mail. The 1972, IBM used this term as ‘E-business’ and the first successful transaction is held between USA and European union in 1973 with invention of personal computers. E-commerce refers to the paperless exchange of business information using EDI, Electronic bulletin Boards, E-mail and other network based technologies. It not only automates manual processes and paper transaction, but also helps organization move to fully e-environment and change the way they operate. Electronic commerce (e-commerce) has become a buzzword for business over the past few years Page 4 Total E-Commerce Transaction in India Year Total e-commerce transaction 1998-1999 131 crore Rs. 1999-2000 450 crore Rs. 2000-2002 1400 crore Rs. 2006 (Expected) 2300 crore Rs. Difference between E-commerce & E-Business: Internationally both the term can be interchange and having the same concepts i.e. doing business online. However, E-Business is the term is derived from e-Commerce. E-Commerce E-Business 1. Open System. 1. Closed System. 2. Not Secured. 2. Secured. 3. Does not involve the use of EDI. 3. Used EDI. 4. E-Commerce always operates on Internet. 6. Used for small and large transaction. 4. Always operates on intranet or extranet. 5. Involve explicitly business transactions. 6. Used for bulky transaction. 7. amazon.com, bazaar.com are example 7. e-trade.com, e-business.com are 5. Involve all types of commerce. of E-Commerce. example of E-Business. Main Goals of E-Commerce 1. To understand what are the need of consumer, merchants, & organization. 2. How to improve quality & quantity of goods. 3. How to increase speed of services Need for E-Commerce Page 5 E-Commerce Is the business environment in which information for the buying, Selling and transportation of goods and service moves electronically. E-commerce includes any technology that enables a company to do business electronically. Some of the direct benefits of E-Commerce are: Improved Productivity: (Speed of Transactions with accuracy, easier access document and information) Cost Saving: (Check on Duplication of entries, human Error) Streamline Business Process Better Customer Services: Customers can enjoy the convince of shopping at any hour anywhere in the world. Opportunities for New Business Major Affecting Factors of E-Commerce 1. Growth of Internet: (Speed, Subscribers, Electronic Environment) 2. Govt. Policies & Laws: (Security, Computer Crime, Data Protection and Privacy, Telecommunication Laws) 3. Consumer Awareness: (familiar with electronic media) Function of E-Commerce E-Commerce application enables various business functions and transactions to be done electronically:- E-Advertising: - Advertising of Information is currently the largest commercial activities on the web like: a) The organization’s own web site, where information about products and the Organization’s profile can be found. b) Clickable Banners c) E-Commerce portals like: www.yahoo.com d) Newsgroup Page 6 E-Catalogs: - Electronic Catalogs are web pages offering information about the products or services offered by the company. An e-catalog may offer information like: a) Product attributes and characteristics, b) Packaging c) Availabilities, d) Ways of Payment e) Price etc. E-Publishing: - The publication sector was one of the first to invest in new technologies and especially in the Internet. Successful e-commerce efforts in relation to e-publishing are the electronic newspapers and the independent publication through the internet. Some of the services offered by the online publication include the following. a) On-line reading/ browsing: b) On-line Search c) Customized Information Services E-banking: - E-Banking offers remote banking facility electronically. Electronic Banking is also known as cyber banking, on-line banking, virtual banking or home banking. It enables web user to make purchase online and pay for the same using an online banking facility. It is cost-effective, easy and 24-hour available way of doing business. The services offered to customer include: a) Bill Paying b) Electronic Cheque Writing c) Tracking of bank account, credit cards etc. d) Record Keeping E-Traveling Page 7 Shopping Services 1. Shopping Services provided by independent business who send representative to store comparison shop for specific products. A shopping service is hired by contract and will compare competitive prices or prices for the same item in competitive stores, depending on the request and needs of the client. 2. Shopping Service offered to cable television subscriber where consumer can buy products (Usually at discount) that are displayed on a special shopping services channel. 3. Shopping Service offered to subscribers of personal information services for home computer use. For example: A Company provides on-line information to subscribers. Among the many services offered by this company is one called products, Guides, Etc. From which consumers may shop and select purchases right from their own computer terminals. Information Services: Pronounced as separate letters, and short for Information Systems or Information Services. For many companies, Information System or Services is the name of the department responsible for as IT and Management Information System. Information System Support different types of decision at different levels of the organizational hierarchy. Major types of information system include structural databases and information management software that can include the following; Transaction Process System (TPS) Enterprise Collaboration System (ECS) Management Information System (MIS) Decision Support System (DSS) Executive Support System (ESS) Electronic Data Interchange (EDI):EDI is a standard for exchanging business data or document. All trading partners must have to agree to follow some standard for exchange information like (Payment order, Purchases order, invoices, and bills). In EDI the information must move without intervention among trading partners. Page 8 Supply Chain Management (SCM):SCM can be define as an electronic alternative to the traditional paper chain, providing companies with a smarter, faster, more efficient way to get the right product to the right customer at the right time and price. Multimedia Content for E-Commerce Application 1. Multimedia content can be considered both fuel and traffic for e-commerce application. 2. Multimedia content is the combination of text audio, video, and graphics in a computer file document. Text Image Graphics Audio Multimedia Numerical Data Hologram Video Animation 3. It is the natural way to communication to the people. 4. The goal of multimedia is to increase the utility of all information through the processing & distribution of new forms such as image, audio, video. 5. Multimedia has come to means the combination of computers, television and telephone capabilities in a single device. Storage Application:Multimedia Servers and Electronic Commerce 1. E-commerce requires robust server to store and distribute large amount of digital content to consumer. 2. These multimedia storage servers are large information warehouse capable of handling various content, ranging from books, newspapers, advertisement catalog, movies and games. 3. These servers serve information upon request must handle, large scale distribution, guarantee security and complete reliability. E-Commerce Framework Page 9 It is clear that e-commerce application will be built on existing infrastructure myriad of computer, communication, network and connection software framing the nascent information superhighway. E-Commerce Application: 1. Supply chain Management 2. On-line Banking 3. Procurement & Purchasing 4. On-line Marketing & Advertisement 5. Home Shopping Figure shows variety of possible e-commerce applications, including both inter organizational & consumer oriented example none of these uses would be possible without each of the building blocks in the infrastructure. Common business services Infrastructure /Security/Authentication/Electronic Payment The messaging & information distribution Infrastructure (EDI, E-mail) Multimedia content & Network Publishing Infrastructure The information superhighway infrastructure (Telecommunication, Cable TV, wireless network, Internet Public Policy legal & Privacy Issues (Cyber Law, IT Act 2000) Technical Standard for edocument s, multimedia & Network Protocols Building Blocks in the information 1. Common business services, for facilitating the buying & selling process. 2. Messaging & Information distribution, as a means of sending & retrieving information. We frequently send & retrieve the information so these are facilities of E-commerce. Page 10 3. Multimedia content & network publishing for creating a product and a means to communication about it. The e-commerce related website has the information about the products and its design. 4. The information superhighway- The very foundation for providing the highway system along which all e-commerce. The Two pillars supporting all e-commerce applications & infrastructure are just a indispensable. 1. Public Policy, to govern such as universal access privacy and information pricing. 2. Technical Standard- To dictate the nature of information publishing, user interface and transport in the interest of compatibilities across the entire network. Information can be access by any type of devices which consumer choose & support any type of Operating System. Difference between E-Commerce & Traditional System S.No. Basis E-Commerce 1 It does not involve data at multi points. With EReduce the data commerce data goes error directly from one to another computer without involving human being. 2 Initial cost of e-commerce is very high as compared to paper process but over a long period of time it is very effective. Reduce Cost 3 Reduce Paper Work 4 Reduce Process Cycle Time Traditional The buyer & Seller create purchases order on their system print it or fare it or mail to receiver. The receiver then reenter the same information on the computer. This will create the error. As time is money, time is directly linked to saving the money. In it there is a repetition of same work at every level. So it involves a lot of time and if the error is arisen that will lead to more wastage money. It requires re-entry of data at each E-Commerce data in the level and requires lot of time. So electronic form makes it the peak time is wasted in reeasy to share it across the entering and printing of the organization. reports. In Traditional System, when the E-commerce reduces the buyer order in a paper format, the processing cycle time of data is re-entered into the seller’s complete cycles as the data computer and then only is entered the system it is processing can take place which simulating process. is a time consuming and full commitment. Page 11 What is required in order to conduct E-Commerce? Number 1-3 below are the components that you will need to conduct E-Commerce, and number 4-5 are optional depending on how you intend to accept payment, 1. You need a commercial website. 2. You need products or services that you plan to sell through your website. 3. You need a shopping cart system or an order form that your customers can use to shop for and purchases what you are selling. 4. If you plan to accept credit cards as payment, you will need a credit card merchant account. 5. If you plan to process credit cards in real time over the web, you will need an online payment gateway. *** Website: It is collection of web pages which are linked each other. *** Shopping Cart: A piece of software that keeps a record of the choices you making during an online buying session. *** Gateway: It is a software program used to connect two networks using different Protocols so that they cam transfer data between the two network. *** Electronic fund Transfer: It is transfer of money between financial institutions over secure private networks. Manufacturers Open Market Direct Transaction Low Transaction Cost Direct Access to Market New Business Electronic Markets Dealers Page 12 Industry’s Perspective Consumers Quick Shopping Variety of Merchandise Financial Market Xccccc Shopping Worldwide at Home Cccc Labour Markets Assets Management Job hunting at home Shopping Mall Consumer’s Perspective Households Resource & Energy Savings Decreasing Unemployment Governments Improving Quality of Life Economic Growth in Developing Countries Enhancing International Free Trade System Electronic Market Enterprises Page 13 Impact on the society Merchant Web Site Online Consumer Internet Private Gateway Online Transaction Server Processing Network Issuing Consumer Bank Acquiring Merchant Bank Institutes Government Merchants Process Marketing Sales erce E- Commerce Entities Page 14 Component of E-Commerce On-Line Shopping Services Bill Payment Inter bank clearing house Real –time financial information (Stock ticker) Consumer Home Investment vehicles (bonds, mutual funds) Bank Server Advances services and home banking Consumer Merchant or Commerce Server Transaction Management Security Return Management Settlement Page 15 Browser: Other Communication Between the bank & customer A View of Internet Payment Process Page 16 Merchant Customer 1 8 Third Party 2 8 Encryption Software Monthly Statement Processor Verify 3 2 8 6 3 2 Credit Card Processor 8 4 3 On-line Credit Card Transaction 2 8 5 Customer Bank 4 3 2 8 Simplified on-line mercantile model 7 2 8 Page 17 What is Electronic Payment System (EPS)? The Electronic fund transfer of money between financial intuitions over secure private network. Making Payments on the internet are essentially electronic version of the traditional payment systems. But in the electronic payment everything is digital and it is designed to handle electronically, no change and/or old currency problems! Electronic Payment System is more sure faster payment systems which serve its customer fast and low cost services. (2) Remittance Request (1) Buy Request Customer with need Payment Institution Merchant (4) Delivery (3) Approval Advantage of Electronic Payment System 1. EPS is not bounded by region boundaries so that fund can transfer anywhere. 2. It is secure method of fund transfer. It provides faster services compare to conventional payment system. 3. It provides services not only to big organization, bank, business transaction but also to users and consumers for online shopping & marketing at very low cost. 4. It provides various way by which a customer can make payment such credit card, digital cash, debit card etc. Issues Involves in EPS Page 18 1. The selection of the mode of EPS which is chosen by consumers in which customer must satisfy for example- E-Cash, E-Cheque, Credit Cards and Debit Cards. 2. In online market, how can we manage the financial risk associated with various payment instrument- Privacy, Frauds and Mistakes as well as other risks like bank 3. What are the step-by-step procedure & institutional arrangements that from the fabric of the electronic payment business process that link consumer and organization? Types of E-Payment System Three categories of EPS: 1) Banking & Financial Payments: Large scale or whole payment (e.g. bank to bank transaction) Small scale or retail payment (e.g. ATM) 2) Retailing Payments: Credit Cards(VISA or Master Cards) Private label credit/debit cards Charges cards(e.g. American Express) 3) Online E-Commerce Payments: E-Cash E-Cheque Digital Token – Based Electronic System In a traditionally system, their deficiency is their assumption that the parties will at some time or other’s physical presence or that will be a sufficient delay in the process for frauds, overdrafts and other undesirables to be identified and corrected. Entirely new forms of financial instruments are also being developed. One such new financial instrument is “Electronic Tokens” in the form of electronic Cash/Cheque. Simply stated, electronic tokens are equivalent to cash that is backed by a bank. Electronic tokens are of three types: 1. Cash or real-time: Transaction are settled with the exchange of electronic Page 19 currency. An example of on-line currency exchange is electronic cash (e-cash). 2. Debit or prepaid: User pay in advance for the privilege of getting information. Examples of prepaid payment mechanism are stored in smart card and electronic purses that store electronic money. 3. Credit or postpaid: The server authenticates the customers and verifies with the bank and funds are adequate before purchases. Examples of postpaid mechanism are credit/debit cards and electronic Cheque. Certificate Authority Certificates Authority is issued to companies and organizations that are accessible via the internet. They are issued for certain period of time and are used as a guarantee of the security of a web site. Digital Certificate Digital certificate is defined as a method to verify electronically for authenticity. The digital certificate equivalent of positive identification, such as a driver’s license. Issued by various certificate authorities, digital certificates are used to prove that a website, or a visitor to a website, is the entity or person they claim to be: An electronic credential issued by a certification authority to establish the identity of an organization when doing business on the internet. Contents of digital certificate It includes Holder’s Name, organization, address. The name of certificate authority. Public key of the holders for cryptographic use. Time limit, these certificates are issued for 6 month to a year long. Digital certificate identification number. Electronic Cash Page 20 Electronic cash is a form of electronic payment system which is based on encryption; it means it is a secure payment system. Security of e-cash is measures by digital signature. It uses a pair of key for locking & unlocking fund. Locking key is used for encoding of a message into a cipher text. The encoding key is kept private and the decoding key is made public. By supplying all customers (buyers & sellers) with its public key, a bank enables customers to decode any message or (currency) encoded with banks private key. Purchasing E-Cash from Currency Servers or e-mint The purchase of e-cash from an on-line currency server (or bank) involves two steps. 1. Establishment of an account 2. Maintaining enough money in the account to back the purchases. E-mint 2. Transfer Money 7. Credit Merchant a/c Consumer’s Bank 3. Send E-Cash 6. Return ECash 1. Request to obtain cash 4. Send E-Cash Consumer Merchant’s Bank Merchant 5. Delivers Goods Working of E-Cash The e-cash transaction take place in three district and independent phases as discussed below: Page 21 Phase- 1: Obtaining Electronic cash: 1. The consumer requests his/her bank to transfer money to the e-mint to obtain ecash. 2. The consumer bank transfers money from the consumer’s a/c to the e-mint. 3. The e-mint sends e-cash to the consumer. The consumer servers his/her cash. Phase- 1: Purchasing with Electronic cash: 4. The consumers select the goods and transfer the e-cash to the merchant. 5. The merchant provides the goods to the consumer. Phase- 3: Redeeming Cash by the Merchant: 6. The merchant may sent the e-cash to its bank and the bank in turn redeems the money from the e-mint. 7. The e-mint transfer money to the merchant’s bank for crediting the merchant’s a/c. Properties of E-Cash Following four properties 1) Monetary value: (E-cash created by one bank and accepted by others) 2) Interoperability: (Exchangeable as payment for other e-cash, paper cash, goods, services. ) 3) Retrieval & Storage 4) Security: (E-cash should not be easy to copy) Advantage Best suited for small transactions. Authentication is not an issue who pay’s is not important as long as a merchant gets his payment. Operational risk associated with e-cash 1. The time over which given money is valid. 2. How much can be stored on and transferred by electronic money. 3. The no. exchange that can take place before a money needs to redeposit with a bank or financial institutional. 4. The number of such transactions that can be made during a given period of time. Electronic Cheque: Page 22 Electronic Cheque has all the same features as a paper Cheque. It functions as a message to the sender’s bank to transfer funds, the message is given to the receiver, who in turn endorses the Cheque and presents it to the bank to obtain funds. Consumer’s Bank Merchant’s Bank 6. Forward Cheque 8. Account Update 7. Forward Cheque 5. Forward to bank 3. Validate Cheques Clearing House Consumer Browser 1. Access and Browser 2. Select goods pay e-Cheque Merchant System 4. Close Transaction Working of E-Cheque Phase-1: Purchasing Goods 1. The consumer accesses the merchant server and the merchant server presents its goods to the consumer. 2. The consumer selects the goods and purchase them by sending an electronic Cheque to the merchant. 3. The merchant may validate the electronic Cheque with its bank for payment authorization. 4. Assuming the Cheque is validated the merchant closes the transaction with the consumer. Phase-2: Depositing Cheque at the merchant’s bank: 1. The merchant electronically forwards the Cheque to the bank. 2. The merchant bank forwards the e-Cheque for clearing house for cashing. 3. The clearing house with the consumer bank, clears the Cheque and transfers money to the merchants bank, which updates the merchant account. Smart Card: Page 23 Smart cards are credit and debit cards and other card products enhanced with microprocessor, capable of holding more information than the traditional magnetic stripe. Most of these methods are known as stored value cards or electronic purse system. Units of prepayment or currency value are electronically stored on an IC chip imbedded in these cards. Smart cards are basically of two types: Relationship-based smart credit card and electronic purse. Electronic purse, which replace money, are also known as debit cards and electronic money. Relationship-based smart credit card: A relationship-based smart card is an enhancement of existing card services and/or the addition of new services that a financial institution delivers to its customers via a chip-based card or other device. These new services may include access to multiple financial accounts, balance inquiry and other information cardholder may want to store on their card. Working :( Access multiple accounts, such as credit, debit, investments or stored value for e-cash, on one card or electronic devices) Electronic Purse and debit cards: E-Purse is wallet size smart card embraced with programmable microchip that store monitory value in form of money. The electronic purse works in the following manner. After the purse is loaded with money, at an ATM or through the use of an inexpensive special telephone, it can be used to pay for example Candy in a vending machine equipped with a card reader. The vending machine is authentic and there is enough money available for a chocolate bar. Credit Card: The credit card transaction simply requires that the consumer have a valid credit card number and expiry date when placing an order. This information has been provided through standard internet option like e-mail/sms. In credit cards may used a long with a personal information number (PIN). The pin is a secret code that the consumer must enter while using the credit card online. As such, it prevents misuse of the card in case it is stolen. Working of Credit Card: Phase:1 Purchases of goods: transaction starting from 1-4. Phase:2 Settlement of transaction from 5-6. Phase:3 Consumer update of credit card bill in the transaction number. Page 24 6. Forward receipt and obtain payments Card Issuer Merchant’s Bank 3. Request and obtain credit authorization Consumer (Browser) 1. Access Home page 2. Select goods, make credit card payment 4. Close Transaction Working of Credit Card: 5. Provide credit and receipt Merchant Page 25 Merchant Customer 1 8 Third Party 2 8 Encryption Software Processor Monthly Statement 4 3 2 8 3 2 8 6 3 2 Credit Card Processor 8 5 4 3 E-Security 2 A security threat is define as a circumstances, condition, or event to cause economic hardship to data or network resources in8the form of destruction, disclosure, and Customer Bank modification of data, denial of services and/or fraud & waste. In addition, organization must be concerned with the inherent security threats associated with business over the web such as: 1. Unauthorized user access 2. Tampering and eavesdropping 7 2 8 Page 26 To overcome this strong network security solution is essential which can transparently and automatically control the access of corporate intranets or extranets. The solution must provide identification and authentication of users, encryption of all traffic from the application to the user, and access control to all information. E-Security can be divided into two parts: 1) Client-server network security 2) Data & transaction security Client-server network security: Client server security ensure that only authorized users can access to information resources. a) Physical Security: When unauthorized user gain physical access to computer b) Software Security: When program/software is comprised into doing thing they should not. c) Inconsistent Usage: When administrator assembles combination of Hardware & Software such that the system is seriously flowed from a security point of view. To reduce these security threats, various protection methods are used. Protection-also called authorization or access control. Protection methods are:1) Trust-based security 2) Security through 3) Passwords Schemes 4) Biometric System A) Trust-based security: Trust based security means to trust everyone & do nothing extra for protection and there is not access restriction on any kind of data access. All users work in a network can shared information, this approach assume that no any user make an expensive break as detection of files or modification of data or unauthorized access of data Now a days this approach do not work, it used in past. B) Security through Obscurity: Any network can be secure as long as nobody outside its management group is allowed to find out any thing about its operational details. Hiding account password in binary files or script so that “nobody will ever find them”. But its usefulness is minimal in the UNIX world. Where users are free to move around the file system, have a great understanding of programming techniques. They can easily guess at the bits of knowledge considered confidential. These bypass the whole basis of STO and make this method of security useless. Page 27 C) Password Schemes: One security is password schemes. However it can also break when we use some common words or names for password. The simplest method used by most hackers is dictionary comparison. Comparing a list of encryption user passwords against a dictionary of encryption common words. This schemes often works because users tend to chose relatively simple or familiar words as passwords as passwords. As a solution we use mixed-case passwords containing at least one non alphanumeric character & changing passwords every 60 to 90 days We can also include one time passwords, smart card randomized tokens. D) Biometric System: Biometric system involve some identical aspects which related to human body such as compare the finger prints, palm prints and voice recognition. Biometric Systems are very expensive to implement. Biometric System use one to one relationship and one to many relationships. Data & Message Security: Transaction securities have two parts: I) Data Security II) Message Security Data Security: Data securities suffer from packet sniffing. Sniffing attack begin when a computer is compromised to sharing some data or program. Cracker starts to install packet sniff into data that monitors the networks sniffer program to attack on network traffic, telnet, FTP. Session that legitimate user initiate to gain access to another system. The session contains the login ID, password and user no. of the person logging into other machines, all this necessary information a sniffer needs to login into machine. Message Security: Threats to message security fall into three categories a) Confidentiality b) Integrity c) Authentication/Identification a) Message Confidentiality: Confidentiality is important for user sensitive data such as credit card number. This requirement will be amplified when other kinds of data such as employee records, government files and social security number, begin traversing the nature. b) Message Integrity: Content of transaction must be unmodified during transport. Page 28 It must be clear that number one has added, delete or modified any part of the the message. Error detection codes or checksum, sequence no., and encryption techniques are methods to enhance information integrity. Sequence number prevents recording, loss or replaying of message by an attacker. Encryption technique such as digital signature can detect modification of a message. C) Message Sender authentication/identification For e-commerce, it is important that clients authenticate themselves to servers that servers authenticate to clients, that both authenticate to each other. Authentication in e-commerce basically requires the users to prove his or her identify for each requested service. Third-party authenticate services must exist within a distribution network environment where a sender can not be trusted to identification itself correctly to a receiver. Client-Server Security Threats: These threats can be divided into two major categories. 1) Threats to client 2) Threats to server Threats to client 1) Client threats mostly arise from malicious data or code, Malicious code refers to viruses, worms, Trojan horses and deviant. Virus: A code segment that replicate by attaching copies of itself to existing executable (EXE files). The new copy of the viruses is executed when users executes the host programs some viruses displaying a text string or delete all files on the hard disk on a particular date. Trojan Horse: A program that performs a desired task but also includes unexpected functions. Example: Editing program for multi-user system. This program could be modified to randomly delete one of the user’s file. WORM: A self replicating program that a self continued & does not require a host program. Clients must scan for malicious data & executable program fragment that are transferred from the server to the client. Page 29 Threat to servers Threat to server consist unauthorized modification of source data. Unauthorized eavesdropping Modification of incoming data packets. Eavesdropping: Hackers can use electronic eavesdropping to trap user names & unencrypted password sent over that network. It is difficult to delete that some one is eavesdropping encryption can prevent eavesdropping from obtaining data traveling over unsecured network. Denial of Services: It is two types. 1) Service Overloading 2) Messaging Overloading Service Overloading: One can easily overload a www server by writing a small loop that sends requests continually for a particular file for example: A home page. Message Overloading: Occurs when some one sends a very large file to a message box every few minutes. The message box rapidly grows in size & begins to occupy all space on the disk and increase the no. of receiving process on the recipients’ machine & causing a disk crash. Packet Replay: Refer to the recording & retransmission of message packets in the network. Hacker could replay legitimate authentication sequences message to gain access to a secure system. Packet Modification: Integrity threat, involve modifying a message packet or destroyed the message packet. IP Spoofing: A technique where an attackers attempts to gain unauthorized access through a false source address to make it appear as though communication have originated in a part of the network with high privileges. Some Security threats & Solutions Threats Security Data intercepted, Encryption read or modified illicitly False identify with Authentication an intension of fraud Unauthorized user Firewall on one network gains access to another Function Technology Encoder data to Symmetric and prevent tempering Asymmetric encryption Identity verification Digital signature of both sender & receiver Filter and prevents Firewalls: certain traffic from Virtual private nets entering the network or server Page 30 Encryption as the basis for data & messaging security: Encryption is a cryptography technology to scramble (encrypted) the data with a key so that no one can make sense of it while its being transmitted. When data reaches its destination, the information is unscramble (decrypted) using same or different key. Cryptography: The terms used commonly in a cryptography system are as follows: Intruder: Intruder is a person who is not authorized to access the information or th network. Plain Text: Intelligible message that is to be converted into unintelligible message (Encrypted message). Cipher Text: Message in an encrypted form. Example: (Encrypt Form) Plain Text Algorithm Cipher Text (Decrypt Form) Algorithm Plain Text Goods Next Two Word Iqqfu Previous Two word Goods Sales Previous One Word rzkdr Next One word Sales Encryption: Process of converting plain text to cipher text. Decryption: Process of converting cipher text to plain text. Algorithm: A cryptography algorithm is a mathematical function. Key: String of digits. There are two type of cryptography or methods of encryption Secret key or symmetric key Public key or asymmetric key Page 31 Secret key: In this scheme, both the sender and recipient possess the same key to encrypt and decrypt the data. Original Message Encrypted Message Secret Key Encrypt Internet Encrypted Message Original Message Secret Key Decrypt Example: DES: (Data Encryption Standard) For example message A encrypts a message with secret key & e-mails the encrypted message to B on receiving the message, B checks the header to identify the sender & takes out the duplicate of the secret key, B then uses the secret key to decrypt the message. Shared key techniques suffer from the problem of key distributions since shared keys must be securely distributed to each pair of communicating parties. The i) Generation ii) Transmission & iii) storage of keys is called key management. In a business environment where a company deals with 1000 of on-line customers, it is impractical to assume that key management will be flawless. Drawbacks Both parties must agree upon a shared secret key. If there are “n” correspondent one have to keep track of n-different secret keys. If the same key is used by more than one correspondent, common key holders can read each other’s mail. Symmetric encryption schemes are also subjected to authenticity problems. Because, sender & recipient have same secret key identity of originator or recipient can not be proved. Both can encrypted or decrypted the message. Page 32 Public Key Cryptography This scheme operates on double key called pair key one of which is used to encrypt the message and only the other one in the pair is used decrypt. This can viewed as two parts, one part of the key pair, called private key known only by the designated by the owner, the other part, called the public key, is published widely but still associated with owner. Original Message Public Key Encrypt Encrypted Message (Cipher Text) Internet Original Message Encrypted Message Private Key Decrypt (Cipher Text) Schematic diagram of Asymmetric Encryption Encrypting & decrypting Data encrypted with public key can only be decrypted with private key. Data encrypted with private key can only be decrypted with public key. Strong points of this scheme The key can be used in two different ways: 1. Message confidentiality can be proved: The sender uses the recipients public key to encrypt a message, so that only the private key holder can decrypt the message, non other. Page 33 2. Authenticity of the message originator can be proved: The receiver uses his private key to encrypt a message, to which only the sender has access. 3. Easy to distribute public key: Public key of the pair can be easily distributed. Person “X” Original Message Person “Y’s” Public Key Encrypt Encrypted Message (Cipher Text) Internet Encrypted Message Person “Y’s” Private Key Decrypt Original Message (Cipher Text) Person “Y” Page 34 Firewalls: The term firewall is a method of placing a device a computer or a router-between the network and the internet to control and monitor all traffic between the outside world & the local network. A firewall system is usually located at a gateway point such as a site’s connection to the internet. A firewall is simply a barrier between two networks-in most cases an internal network often called the trusted network and case an external network called untrusted. Firewalls examine incoming & outgoing packets according to a set of policies defined by administrator either let them through or block them. Internet 40,000 networks-no. of hackers? Enterprises LAN Or WAN Firewall by pass should not be allowed Firewall Policy: Firewall generally implement one of two basic design policies. 1) Premises Approach 2) Restrictive Approach Page 35 Permissive Approach: Allows all the services to pass the site by default, with the exception of those services that the network services access policy has identified as disallowed. Restrictive Approach: A firewall that implement the second policy denies all services by default, but then passes those services that have been identified as allowed. The first policy is desirable, since it offers more a venues for getting around the firewall. Second policy follows the classic access model used in all areas of information security. Certain service, such as FTP, Archie & RPC are difficult to filter, for this reason, they may be better accommodated by a firewall that implements the first policy. The second policy is stronger and safer, but it is more restrictive for users. Types of Firewall: Two types of firewalls A) Static Firewall B) Dynamic Firewall Static Firewall: Static firewalls are generally pre-configured and they allow or deny the access from the outside world by default. Default allows the inbound traffic, in such a mechanism only the specified user will be denied access to the network of the enterprises. In the default deny policy, only the specific users who display their authentication are permitted to access the network. Dynamic Firewall: The dynamic firewall uses allow and denial of services policy at the network on the time basis. Some service on the network may be allowed and other may be denied for a specific time interval. The configuration of such firewall is slightly more complex. Now a day’s firewall can be implementing in two ways:1) IP packet screening routers. 2) Proxy Application Gateways. 1) IP packet screening routers: This is a traffic routing service placed between the network service provider’s router & the internal network. The firewall router filters incoming packets to permit or deny IP Packets based on several screening rules. It examines the source & destination addresses & port of incoming TCP & UDP packet & denies or allows packets to enter based on a set of predefined rules. Page 36 Packet filter are inexpensive but relatively complex process. It usually requires precise knowledge of network, transport and sometime even application protocols. Another problem with is packet filters is that they are susceptible to IP spoofing; A tricky hackers can gain access to a corporate network by changing IP address in packet headers to ones that are acceptable. Public Internet IP Packet screening router Sample Screening Rules: Protocols (TCP, UDP) Source IP address (Domain.edu) Target TCP port 80 (WWW only) Secure firewall with IP packet screening router Proxy Application Gateways: A proxy server application gateway is a special server that typically runs on a firewall machine. Instead of directly talking to external WWW servers, each request from the client would be routed to a proxy on the firewalls that is defined by the users. The proxy waits for a request from inside the firewall, forwards the request to the remote server outside the firewall, forwards the request to the remote server outside the firewall reads the response & then returns it to the client. Page 37 Public Internet Web HTTP Server Secure subnet inside the firewall security perimeter FTP Server Proxy server on the firewall machine that connect to the external internet Client inside the Firewall Gopher Server Telnet Server USENET news Server Digital Signature: E-Commerce business transactions for authentication the digital signature are used. The authentications refer the legal, financial & other document related issues. Digital Signature is just like hand written signature which determined presence & absence of authentications. The digital signature consist of two parts 1. Signature in the document: Signer authentication 2. Document Authentication Signer Authentication: A signature should indicate who signed a document, message or record and should be difficult for another person to produce without authorization. Document Authentication: A signature should identify what is signed. Sender can not remove the content of messages after signing it. The receiver can not do any change in the message. Hash Function: It is a formula that converts a message of a given length into a string of digits called a message digest. (Hash function Message digest) Working: X sends the message to Y Encrypt With sender’s private key X Sender Digital Signature Y Receiver Page 38 1. Sender generates a message. 2. Sender creates a “Message digest” of the message by using Hash Function. 3. Sender attaches the digital signature to the end of the message. 4. Sender encrypts both message & signature with receiver’s public key. 5. Receiver decrypts entire message with own private key. 6. Receiver calculates the message digest using hash function. (Receiver uses the same hash function as that of sender used, which was agreed upon before hand) Advantage: Unauthorized persons can access to the public key of X person, but can not have his hash function, which makes the digital signature authentic. Page 39 Types of E-Commerce or E-Commerce Transaction Model Business to Consumer (B to C) Business to Business (B to B) Consumer to Business (C to B) Consumer to Consumer (C to C) Business to Consumer: B2C, E-Commerce offers consumers the capabilities to browse, select and buy merchandise online from a wider verity of sellers and at better prices. The B2C of electronic commerce transaction is ideally suited for the following type’s merchandise. Goods that can be easily transformed into digital format, such as book, music, clips and videos and software packages. Items that follow standard specification like printer. Ribbon, ink cartridge etc. Highly rated branded items or items with return security: such as Compaq computers, e-gadgets Sony etc. Items sold in packet that can not be opened even in physical stores e.g. Kodak film rolls. Item that can be experienced online, such as music, videos etc. Example: http:\\ www.dell.com , http:\\ www.mustafa.com.sg How does B2C Work? 1. 2. 3. 4. 5. 6. Customer identifies a need Searches for the product or services Selects a vendor and negotiates a price Receives the products or services Makes Payment Gets services and warranty claims Business to Business: B2B, electronic commerce facilitates inter-organizational interaction and transaction. This type of E-commerce requires two or more business entities interacting with each other directing, or through intermediary. Application of B2B: 1. 2. 3. 4. 5. Inventory Management Channel Management Distribution Management Order fulfillment & delivery Payment Management Page 40 The B2B electronic commerce can be following type: i) Supplier oriented ii) Buyer oriented iii) Intermediary oriented Supplier oriented: A supplier sets up the electronic market place. Number of customer/buyer business interacts with the supplier at its electronic commerce marketplace. Typically, it is done by a dominant supplier in the domain of products its supplies. Buyer oriented: In buyer oriented electronic commerce, major businesses with high volume purchases capacity create an electronic commerce marketplace for purchases and gaining by starting a site on their own. The online e-commerce marketplace is used by the buyer for placing request for quotations and carrying out the entire purchases process. Intermediately oriented: In buyer oriented e-commerce, in the business to business context, a third party set up the electronic commerce marketplace and attracts both the buyer and seller businesses to interact with each other. The buyers and seller, both benefits from the increased option in terms of pricing, quality, availability and delivery of goods. Raw Material Producer Manufacturer Distributor Retailer Consumer B2C B2B Relation between B2B and B2C models. Summary of E-Business Transaction Models Model B2C Description Sells products or services directly to consumers. Example amazon.com, autobytel.com, eDiets.com, pets.com, B2G Sells products or services to other businesses or bring multiple buyer & seller together in a central marketplace. Business selling to local, state and federal agencies. C2C Consumer sell directly to other consumers ebay.com, inforocket.com, baazee.com C2B Consumers fix price on their own, which businesses accept or decline. priceline.com B2B metalsite.com, verticalnet.com, shop2gether.com igov.com Page 41 Consumer to Consumer (C2C) C2C e-business model, consumers sell directly to other consumers via online classified advertisements and auctions or by selling personal services or expertise online. infoRocket.com, one of the first question and answer marketplaces, is driven by a person to person auctions format. Consumer to Business (C2B) The C2B model can be described as a form of e-commerce where, the transaction, originated by the customer has a set of requirement specifications and specific price for merchandise. Mobile Commerce Mobile Commerce stands for electronic commerce made through mobile devices. M-commerce is defining by following ways “M-commerce is the use of mobile devices to communicate inform, manage & entertain using text and data via a connection to public & private network” (by Lehman brother) “Business to consumer transaction conducted from a mobile device” (by J.P. Morgan) “Mobile commerce refers to any transaction with monetary value that is conducted via a mobile telecommunications network” (by Durlacher) MobileInfo.com: Define m-commerce as “any electronic transaction of information interaction conducted using mobile device and mobile networks (wireless or switched public network) that leads to transfer or real or perceived value in exchange for information, services or goods” Typical Example of m-commerce: 1) Purchasing airline tickets 2) Purchasing movie tickets 3) Restaurant booking and reservation 4) Hotel booking & reservation M-Commerce is currently mainly used for the sale of mobile phone, ring tones and games as well as video and audio content, including full length music tracks. Page 42 Other services include the sending of information such as cricket scores via SMS. Currently the main payment methods used to enable m-commerce: Premium-rate calling numbers. Charging to the mobile telephone user’s bills or Deducting from their calling credit either directly or via reverse-charged SMS. Separating Mobile Commerce form E-commerce Technology E-Commerce M-Commerce Device Personal Computer Cellular phones, pagers Operating System Windows, Unix, Linux Pocket PC, Palm OS. Presentation Standard HTML HTML, WML, i-mode Ms Internet Explorer, Netscape Navigator. TCP/IP & Fixed wire line Internet Nokia Browser, Ms Mobile Explorer GSM, GSM/GPRS, TDMA, CDMA Browser Possessor Network Mobile Computing Framework 1. Wireless delivery technology and switching methods (Cellular, radio, paging, satellite and wireless LAN) 2. Mobile information access devices (Laptop, notebook, other portable computers and mobile phones) 3. Mobile data internetworking standard & equipment (No any interruption in between Bridge or Tunnels) 4. Mobile computing-based business application (Inventory & Package tracking and retail point of sale) (Most frequently mentioned include mail-enabled application & Information or data services to mobile users.) ) Application of M-Commerce Page 43 1. Goods: There can be two type of domain like business to business and business to Consumer. For example a vendor can sale to consumer or to another vendor. 2. Service: Again services can be business to business and business to consumer. For example a company can provide services directly to consumer or to another company. 3. Information: Information services can be paid to consumers or to other companies. The second aspect is advertising. Business to Business Business to Consumer Goods Shopping Vending Trading Services Information Gaming and Gambling PaidInformation Procurement Trading Ticketing E-Cash Banking Discount and Loyalty Schemes Limitations of Mobile-Commerce 1. Lack of consumer awareness about mobile commerce. Advertising Page 44 2. M-commerce operating system and platform (other software) is not as easy as well as desktop software’s. 3. Weak processor 4. Limited memory 5. Tiny screens and poor resolutions 6. Typically to enter data entry. Security Issues Pertaining to Mobile Commerce 1. To make the radio path as secure as the fixed network, this implies obscurity and confidentiality to protect against eavesdropping. 2. To have strong authentication to protect the operator against billing fraud. 3. To prevent operators from compromising each other’s security, whether unintentionally or because of competitive pressures. On the other hand, a security process must not: Significantly add to the delay of the initial call set up. Allow for increased error rates, or error broadcast. Add unnecessary complexity to the rest of the system. Be-cost ineffective. Page 45 Wireless Application: A Wireless is software that runs on a wireless device that exchanges content over a wireless network. The actual wireless applications are distinguish from one another based on the wireless devices, network, and application families. This can be summarized as: Web Phones: The most common device is the internet ready cellular phone, which call a web phone. Most web phones work only when they have a network connection. Newer advanced web phones can run application. Wireless Handles: Another common devices, the wireless handheld, such as a Palm, can also message and use a Micro browser. Two way Pagers: A device used often in business is the pager. The most popular is the two way pager because it lets you receive and send a message as well as use micro browser. Voice Portals: A recent advance is the voice portal, which lets you have a conversation with an information service by using a kind of telephone or mobile phone. Communication Appliance: Such electronic devices are fitted with wireless technology that can participate in the Internet. Example includes wireless cameras, watches, radio, pens and many other devices. WAP (Wireless Application Protocol): WAP provides web contents to small-area display devices in mobile phones. The service providers format contents in the WAP format. WAP was invented and is driven by WAP Farum- a group originally formed by Nokia, Ericssin, Motorola and phone.com in 1997. WAP is a group specification that offers a standard method to access Internet based content and services from wireless devices such as mobile phones etc. Wireless Technologies Time Division Multiple Access (TDMA): TDMA is a digital transport that divides the frequency range allotted to it into a series of channels. Each channel is divided into time slots. Each conversion within that channel gets a time slot; hence the term “division” in the name. GSM- (Global System for Mobile Communication):- GSM is one of the most popular mobile communication standards. It is the first digital cellular system to be used commercially. GSM Communication uses cellular networks. C1 C2 C5 C3 C6 C4 C7 Mobile communication using a cellular network Page 46 GSM is a second generation (2G) communication standard. GSM provide integrated services for voice and data. GSM cell phones require SIM (Subscriber Identity Module) cards for their operation. SIM is a smart card that identifies the user terminal by inserting the SIM card into the terminal, the user can have access to all the subscribed services without SIM card, the terminal do not work. The three kinds of services delivered by a GSM system are teleservices, supplementary services and bearer services. Teleservices Telephone/FAX Voice full 13 kbps SMS up to 160 Character MMS-GIF, JPG Video Text Access Supplementary Services Call Forward Caller line ID Call hold Call Waiting Call Charge Advice Bearer Services Full Duplex Synchronous & asynchronous General Packet Radio Services (GPRS): GPRS is a speed enhanced data transmission services designed for GSM system. GPRS is a packet oriented service for mobile stations data transmission and their access to the internet. Code Division Multiple Access (CDMA): CDMA is used as multiplexing method in many mobile telephony system. CDMA is an air link interface coding scheme, where in multiple subscribers are granted access to the same radio frequency source by assigning subscriber’s transmitted and received signals a spectrum- spreading code. A code transmitter assigns a unique code to each wireless connection and then broadcasts its data out on the channel simultaneously with all other connections. The receiver is able to decode each conversation by deciphering the unique code assigned to each connection. Page 47 E-Commerce & Banking Electronic Banking also known as electronic fund transfer (EFT), use computer and electronic technology as a substitute for checks on paper transactions. Electronic banking provides any time; anywhere access to cash through an automated teller machine (ATM) or direct deposit of e-Cheque into your saving accounts. Now, In current scenario, technology is changing between banks and their consumers. In particular technology innovations have enabled the following capabilities: 1. 2. 3. 4. Online delivery of bank brochures and marketing information. Electronic Access to bank statements Abilities to request the transfer of funds between accounts. Electronic bill payment and presentations. These online capabilities increase the facilities and speed of retail banking. What is Mobile Banking? Mobile Banking is a service that allows you to do banking transactions on your mobile phone without making a call, using the SMS facility. How is this different from making a call on my mobile phone or using Phone Banking? The difference between making a call on your mobile and sending a text message are as follow: You are not required to dial a number; you send a text message i.e. a coded message to the SMS Centre of your Cellular Service Provider. Bank does not charge anything for this service. However, the cellular service provider may charge a nominal charge for the SMS facility. In Mobile banking, you actually see your banking transaction on your mobile phone screen as opposed to hearing a message through the phone. How does mobile banking work? Mobile banking works on the “Text Message Facility” also called the SMS that is available on mobile phones. This facility allows you to send a Short Text Message from your mobile phone instead of making a phone call. All you need to do is type out a short text message on your mobile phone and send it out to a pre-designated number. The response is sent to you as SMS message, all in the matter of a few seconds. Page 48 This message travels from your mobile phone to the SMS Centre of the Cellular Services Provider, and there it travels to the bank’s system s. The information is retrieved and sent back to you mobile phone via SMS Centre, all in a matter of a few seconds. What is the Company ID in the Bill Pay message? Company ID consists of 4 alphanumeric character, which are predetermined by the company and help identify the bill. Your Phone is now your bank! When you dial in to Phone banking, a voice prompt will guide you through the various transactions. You may also a talk phone banker, who will provide you with the required assistance. Avail of the following services via phone banking Check your account balance Enquire on the Cheque status Order a Cheque book / Account Statement Stop payment Loan related enquires Transfer funds between banks Pay your bills Report loss of your ATM/ Debit Card Enquires about latest interest/Exchange rates What can I do using Net banking? Manage you Demat Account Create fixed deposits online. Check your account balance Enquire on the Cheque status Order a Cheque book / Account Statement Stop payment Loan related enquires Transfer funds between banks Pay your bills Report loss of your ATM/ Debit Card Enquires about latest interest/Exchange rates Page 49 Changing Dynamic in the Banking Industry By using the electronic banking technology, banks have increased profitability. In the past, the banking industry was chiefly concerned with assets quality and capitalization, but now a day this is not enough. Bank need to find new ways to increase revenue in a “mature market” for most traditional banking services, a through understanding of this competitive environment is needed before banks can determine their online strategy. Find different factors contribute to the new competitive Changing consumer desires driven by online commerce Optimization of branch networks in order to reduce costs. Changing demographics trends and potential new consumer markets New online economic products Changing Consumer needs Now a day Consumers like fast financial process with secured environment so that they want e-services like: Online account related information Online download account statement Online transfer funds between account to account Online Payment of bills & dues Online purchasing & selling online other services Consumer Oriented Service Consumer Life-Style Needs Entertainment Financial Services and information Complementary Multimedia Services Movies on demand, video cataloging, interactive ads, Multi-user games, online discussion Home banking, Financial service, Financial news Essential Services Home shopping, Electronic catalogs Education and Training Video conferencing, on-line database Page 50 Home Banking Management Home banking services are often categorized as basic, intermediate, and advanced. Basic Services are related to personal finance: checking and savings account statement reporting, round the clock banking with ATM fund transfer, bill payment, account reconciliation, Stop payment request. Intermediate services include a growing collection of home financial management services, which include household budgeting, update stock values and tax return preparation. Advanced Services include stock and mutual fund brokerage or trading services, currency trading, and credit & debit card management. Management Issues in online banking According to dynamic changing in banking industry, bank’s management has resourcefulness and vision to connect the technology and give consumers with new services & products on their satisfactory. Banks must deliver high quality products at the consumer’s convenience with high tech personal and affordable services. Management has to balance the five key values that increasingly drive consumer’s banking decisions: Simplicity, Customized Services, Convenience, Quality & Price Online banking will realize its full potential when the following key elements fall into place: 1. The development of any interesting portfolio of product and services that are attractive to consumer and sufficiently differentiated form competitors. 2. The creation of online financial supply chains to manage the shift from banks as goalkeeper models to banks as gateways. 3. The emergence of low-cost interactive access terminals for the home as well as affordable interactive home information services. 4. The identification of new market segments with unused needs such as the willingness to pay for the convenience of remote banking. 5. The development of effective back-office systems that can support sophisticated retail interface. Page 51 E-Commerce & Retailing: Retailing includes all the activities involved in selling goods as services directly to final consumer for personal, non business use. A retailer or retail store is any business enterprises whose sale volume comes primarily from retailing. Any organization selling to final consumer. Whether it is a manufacturer, whole seller or retailer is doing retailing. It does not matter how the goods or services are sold (By person, mail, telephone, vending machine or Internet) or where they are sold (in a store, on the sheet, or in the consumer’s home). Almost every retailer is re-evaluating every aspects of its operation from customer services to advertisement, merchandise to store design and logistics to order fulfillment. Further more, reaching to the pressure of retailers, supplier and assessing technology based solutions to drive down costs (Labour, delivery and production) and become more efficient producers of goods. Means e-commerce provide a gateway for retails business, now a days supermarkets, Big Bazaar etc, are providing you a commercial website for retail selling. Example: www.futurebazaar.com, www.giftmate.com Online Mercantile Models Online channels such as online services and the web are also impacting traditional retail business models. In traditional model, the consumer went to the store and located the product. In the online model, the retailer seeks out the consumer. The success of catalog retailers demonstrates that a significant portion of customer has embraced the reverse model: the retail going to the customer. Retailers need to consider the following in developing a business model: 1. Product/Content Issues: What kinds of products are suited for online retailing? 2. Software Interface Issues: What kind of futures will constitute an effective interface? What features make it easy to find and select items for online purchases? 3. Process Issues: What are the specific steps in the shopping process from a consumer’s perspective? What kind of processes should companies develop to fulfill orders efficiently? 4. Pricing Issues: How much will consumers be willing to pay for convenience? 5. Payment Issues: What payment methods would consumers use for online purchases? Management Challenges in on-line retailing: Page 52 1. Pay Attention to Product Description 2. Streamline Site Architecture 3. Consider Shopping Search 1.) Pay Attention to Product Descriptions Most medium to large retailers will have a database of products, with product descriptions that are substantially the same between products, or even between competitors who sell products from the same manufacturer. Search engines are not likely to index multiple pages with very similar content, and without something else to differentiate a page from competitors, ranking for that product name will be difficult, McGee said. In fact, it's not likely that retailers want to rank for their exact product names, as found in the product database. Most searchers are not entering a query for "Izod solid crested pique polo," but will instead search for "Izod polo shirt," which would be a better phrase to optimize a page for, he said. "Product databases are not optimized for searchers. It's not hard to convince a client that when we show them how many searches are being done for general terms, like 'polo shirt,' and how few are being done for the specific brand name in the database," McGee said. 2.) Streamline Site Architecture Another challenge for some retailers is the lack of a text-based navigation system, which leaves search engine spiders unable to access many of the products on a site. While all sites should have a search box on their site, it cannot be the only way to navigate the site, McGee said. "At the very least, they need to have a directory or sitemap. But since many users like to browse instead of search for specific products, they should consider adding navigation to product category pages as well," he said. That's not to downplay the value of a well optimized site search. On a large-scale ecommerce site, visitors will head for the site search box about half the time, by some accounts. In addition, many SEO experts agree that generating reports from site search can show the retailer searcher intent and help optimizing pages for certain keywords, both for internal site search and for external search engines. In addition to on-site SEO, retailers should follow the same strategies as other sites to get inbound links to their sites -- such as by providing informational content worth linking to. This can be done with specific sections of the retailer’s site, new mini-sites Page 53 or blogs. Retailers should also consider tagging their product images with relevant keywords and making them available to spiders to they'll be found in image searches. 3.) Consider Shopping Search Another tactic to increase traffic and inbound links is to take advantage of shopping search engines. By showing up in the many places shopping search engines display their results, retailers are increasing their exposure. And since many retailers are currently not taking advantage of these listings, this exposure will give those retailers that do a competitive advantage, if only for a short time. The top five shopping search engines each had more than 20 million unique visitors in December 2006, according to comScore and self-reported numbers. Yahoo Shopping, and CNET topped 30 million unique visitors, followed by Price Grabber, Shopping.com and Shopzilla. NextTag and MSN Shopping added a combined 24 million more unique visitors, bringing the total unique visitors to the top 7 shopping search engines to 163 million last month. Electronic Data Interchange: EDI is defined as the inter-process communication (Computer Application to Computer Application) of business information in a standardized electronic form. Page 54 In short, EDI communicate information pertinent (Appropriate) for business transactions between the computer systems of companies, government organization, small business and banks. Using EDI, trading partners establish computer to computer links that enable then to exchange information electronically. EDI enables retailers and venders to place orders and pay bills electronically, reducing time & the expense of paperwork. The primary advantage of EDI to business is a considerable reduction in transaction costs by improving the speed & efficiency of filling orders. EDI can be used to electronically transmit documents such as purchases orders, invoice, shipping notice, receiving advices, and other standard business correspondence between trading partners. EDI may be most easily understood as the replacement of paper-based purchases order with electronic equivalent. Essential of EDI are 1) 2) 3) 4) An electronic transmission medium (VAN, Internet) Structured formatted message based on agreed standards Relatively fast delivery Direct communication between application Benefits of EDI Two categories of benefits 1) Direct Benefits 2) Strategic Benefits Direct Benefits: 1.) Since the transfer of information form computer to computer is automatically, there is no need to re-send again and again, data is only entered at the source. 2.) Cost of processing EDI documents is much smaller than that of processing paper documents. 3.) Customer service is improved. The quick transfer of business document & marked decrease in error allow orders to be fulfilled faster. 4.) Information is managed more effectively. 5.) There is improved job satisfaction among data entry. 6.) EDI can also reduce postage bills. In short, EDI reduce operating costs, administrative errors and delivery delays. Strategic Benefits: 1.) Customer relations are improved through better quality & speed of service. 2.) Competitive edge is maintained & enhanced. Page 55 3.) Reduction in product costs can be achieved. 4.) Business relations with trading partners are improved. 5.) More accurate sales forecasting & business planning is possible due to information availability at the right place at the right time. E-mail versus EDI E-mail EDI 1. Structure of E-mail is simple & easiest The structure of EDI is more complex. way of sending & receiving mail via an comparing e-mail. network communication 2. Either at the sending end or at the There is typically no human involvement in receiving end, the data are composed by, the processing of the information, as the reply by or interpreted by humans interface has software to software 3. EDI must follow the some EDI standard In e-mail there is no need of any specific without EDI standards transact between standard to which users have to follow. trading parties not take place. 4. The message is compared by a human The interchange is composed by one and/or a replay is composed by a human software for interpretation by another and/or interpreted by a human software. 5. It is not provided much security features EDI provides security aspects to its a the EDI documents provides customers by providing some legal issues. 6. 7. To use this features of internet the users have not need any complex information. They use it by only receiver & self email ID address. No any third party verification no any legal aspects, no any authentication are needed to the user for sending the data or receiving the data. EDI is based on four layer architecture & at each layer there is variety of services provided. EDI provides security, authority on data. Architecture of EDI: The architecture of EDI is divided into four layers. 1) Application Layer 2) Standard Translation Layer 3) Transport Layer confidentially, Page 56 4) Physical Layer Application Layer First layer of EDI defines the business applications that are used by EDI. This layer of EDI translates business application into request for quotation, purchases orders, acknowledgment & invoices. For every company this layer is specific & also for the software that company uses. By this layer of EDI the companies form are change into more specific format & then it may be send to various partners of the companies. The trading partners of the company have a several software applications to handle all forms aspects. To achieve all above activities the company must follow the EDI standards. Examples of EDI Standard are XIZ, ANSI, and EDIFACT etc. If the sender & receivers of company want to exchange some files then requires a compatible standards of EDI. Standard Translation Layer This layer of EDI architecture defines the structure of business form & some content, which are related with the application layer. This layer of EDI has no mean without application layer so we can say that EDI applications & standard are interlinked. For Ex. – EDIFACT, ANSI X12 business form standards. Transport Layer This layer correspondent closely with the non-electronic activity of sending a business form from one company A to company B. The business form could be sent via regular postal services, registered mail or private carrier. EDI documents are exchanged rapidly over electronic networks using the existing e-mail program & infrastructure. EDI document transport is more complex then simply e-mail message or sharing files through a network, a modem, or a bulletin board. EDI documents are more structured than e-mail. Physical Layer This layer defined the component communication path for EDI data transaction. Page 57 What ate the structure of e-commerce supported EDI in which information can be build & what are the communications established over which EDI data transfer from one consumer to another consumer. Information /Data Information /Data Internal format Conversion Internal format Conversion EDI Translator EDI Translator EDI envelope for document messaging EDI envelope for document messaging Modem Internet & VAN How EDI works How EDI works Modem Page 58 1. Preparation of Electronic Documents: The first step in the sequence of EDI is the collection of information and data. In the case of companies who already use computer to issue their documents like purchases orders, they may already have some sort of database which stores those information then they can start with the next step described below. 2. Outbound Translation: The next step is to translate the electronic file or database into a standard format according to the specification of the corresponding document. The resulting data file should contain a series of structured transactions related to the purchases order for example. If more than one company is involved in the particular transaction, individual files should be produced for each of them. 3. Communication: Then the computer should connect and transmit through (VAN) automatically, those data files to the prearranged. The VAN should then process each file and route to the appropriate electronic mailboxes according to the destination set in the file. 4. Inbound Translation: The destination of company should be able to retrieve the file from their electronic mailboxes in a constant period, and then reverse the process by translating the file from the standard format into the specific format required by the company application software. 5. Processing the electronic documents: The internal application system of the destination of company can process the received documents now. All the resulted documents corresponding to the received transaction should use the same process or steps to transmit back to the transaction originator. The whole cycle of the electronic data interchange can then be completed. EDI Standards: The need of defining standard is clear in order to assuring the success of EDI. It is because the EDI relies on the use of standard structure and interpretation of electronic business transaction to perform the interchange of data between all trading partners, so errors can be reduced in the transmission of data regardless the computer system involved. There are two major standard widely used today which defined the syntactical requirement for a wide variety of EDI transaction types. Virtually, almost any business needs can be addressed within those standards. They are briefly described in below. 1) ANSI ASC X12 Standard 2) United Nations EDITFACT Standard ANSI ASC X12 Standard: In 1979, The American National Standard Institute (ANSI) chartered a new committee called the Accredited Standards Committee (ASC) X12 to develop uniform standards for cross-industry electronic communications. It provide Page 59 guideline and rules for EDI on how the data should be structured, what documents should be transmitted electronically. The X12 standard defines a set of documents, which is referred as transaction sets, for a wide range of business transaction forms. Each transaction set is given a numeric code which is similar to the way in most of paper forms where forms numbers are assigned. Example: Transaction Set 850 810 Document Title Purchases Order Invoice Specification No. X12.1 X12.2 United Nations EDIFACT Standards: Many Companies are required to participate in the international market and exchange electronic data over different countries. Obviously, there is a need to extent the EDI in a global basis. With the concerns of this, general authority of UN/EDI. The EDIFACT (Administrations, Commerce, and Transport) standards development is responsible by two groups of organizations. The syntax and the data dictionary are done by the international Standard Organization (ISO). Financial EDI (FEDI): FEDI is typically setup between banks and their corporate customers allow the bank receive payment authorizations from payer