E-commerce is - PPG Group of Institution

advertisement
BA9177
E-COMMERCE TECHNOLOGY
AND MANAGEMENT
UNIT I
ELECTRONIC COMMERCE &
PHYSICAL COMMERCE
E-commerce
E-Commerce involves buying and
selling of goods and services on
internet
E-Commerce means anytime
anywhere service. (It provides 24 hrs
service online)
It doesn't require involvement of
wholesaler and retailer.
Traditional commerce
It involves physical exchange of
goods and services.
It frees staff from customer service
and sales support
It needs to employ, large number of
staff who provide customer service
and sale support.
Traditional commerce is restricted to
working hours.
It requires involvement of
wholesaler and retailer.
It does not involve physical exchange Physical exchange of currency
of currency. Its convenient to make
payment via network.
FORCES FUELLING E-COMMERCE
a) Economic Forces
a) reduction in communications costs
b) low-cost technological infrastructure,
c) speedier and more economic electronic transactions with suppliers
d) lower global information sharing and advertising costs
e) cheaper customer service alternatives.
f) Economic integration is either external or internal.
g) External integration refers to the electronic networking of corporations, suppliers,
customers/clients, and independent contractors
h) Internal integration, on the other hand, is the networking of the various departments
within a corporation, and of business operations and processes.
b) Market Forces
Corporations are encouraged to use e-commerce in marketing and promotion to capture
international markets, both big and small. The Internet is likewise used as a medium for
enhanced customer service and support. It is a lot easier for companies to provide their
target consumers with more detailed product and service information using the Internet.
c) Technology Forces
The development of ICT is a key factor in the growth of e-commerce. This in turn has made
communication more efficient, faster, easier, and more economical as the need to set up
separate networks for telephone services, television broadcast, cable television, and Internet
access is eliminated.
ADVANTAGES OF E-COMMERCE
• 24 x 7 operation
• Global reach
• Cost of acquiring, serving and retaining customers
•
An extended enterprise is easy to build
•
Disintermediation
•
Improved customer service to your clients
• Power to provide the ‘best of both the worlds”
•
A technology-based customer interface
• The customer controls the interaction
• Knowledge of customer behavior
DISADVANTAGES OF E-BUSINESS
• Time for delivery of physical products
• Physical product, supplier & delivery uncertainty
• Perishable goods
• Limited and selected sensory information.
• Returning goods.
• Privacy, security, payment, identity, contract.
MYTHS OF E-COMMERCE
Myth #1 – E-commerce is “easy”
Myth #2 – E-Commerce is inexpensive
Myth #3 – No Experience Required
Myth #4 - It’s not a business.
Myth #5 – Manufacturer Photos are Good Enough
MYTHS OF E-COMMERCE
Myth #6 – You will get the sale if you have the
best price
Myth #7 - Build it and they will come
Myth #8 – Fraud
Myth #9 - Competition
Myth #10 - One year, one million dollars.
BUSINESS MODEL
Business model – set of planned activities
designed to result in a profit in a marketplace
Business plan – document that describes a
firm’s business model
E-commerce business model – aims to use and
leverage the unique qualities of Internet and
Web
ECOMMERCE BUSINESS
MODELS
1. Stores Model - e.g. Dell
2. Brokerage Model
1.
2.
3.
4.
Online Market Place - e.g Amazon, Taobao
Group Buying - e.g Groupon
Comparison Shopping - e.g. Shopping.Com,
Online Auction - e.g. Auctionair
3. Social Commerce – e.g ShopSocially
UNIT II
INTERNET VS WWW
Internet
Established in 1969 through
opening
of
network
to
commercial interest began in
1988
It comprises of Network of
Computers,
copper wires,
fibre-optic cables & wireless
networks
It is governed by Internet
Protocol (IP)
WWW
1983
Files, folders & documents
stored in various computers
Governed by Hyper Text
Transfer Protocol (HTTP)
This is the base; Independent of It depends on Internet to work
the World Wide Web
Hardware
Software
INTERNET PROTOCOLS
• The Internet Protocol (IP) is the principal
communications protocol used for relaying
datagrams (also known as network packets)
across an internetwork using the Internet
Protocol Suite.
• Responsible for routing packets across
network boundaries, it is the primary
protocol that establishes the Internet.
• Version—Indicates the version of IP currently used.
• IP Header Length (IHL)—Indicates the datagram header length in 32-bit
words.
• Type-of-Service—Specifies how an upper-layer protocol would like a
current datagram to be handled, and assigns datagrams various levels of
importance.
• Total Length—Specifies the length, in bytes, of the entire IP packet,
including the data and header.
• Identification—Contains an integer that identifies the current datagram.
This field is used to help piece together datagram fragments.
• Flags—Consists of a 3-bit field of which the two low-order bits control
fragmentation. The low-order bit specifies whether the packet can be
fragmented. The middle bit specifies whether the packet is the last
fragment in a series of fragmented packets. The third or high-order bit is
not used.
• Fragment Offset—Indicates the position of the fragment’s data relative to
the beginning of the data in the original datagram
• Time-to-Live—Maintains a counter that gradually
decrements down to zero, at which point the datagram is
discarded. This keeps packets from looping endlessly.
• Protocol—Indicates which upper-layer protocol receives
incoming packets after IP processing is complete.
• Header Checksum—Helps ensure IP header integrity.
• Source Address—Specifies the sending node.
• Destination Address—Specifies the receiving node.
• Options—Allows IP to support various options, such as
security.
• Data—Contains upper-layer information.
FTP
This is both a program and a method used to transfer files between
computers on the Internet.
Anonymous FTP is an option that allows users to transfer files from
thousands of host computers on the Internet to their personal
computer account.
File transfer is quite rapid.
FTP sites contain books, articles, software, games, images, sounds,
multimedia, course work, data sets and more.
FTP transfers can be performed on the World Wide Web even
without special software. In this case, the Web browser will suffice.
FTP can be retrieve files via search engines such as FAST FTP search,
located at http://ftpsearch.lycos.com/. This option is convenient
because you do not need to know FTP program commands.
INTRANET AND EXTRANET
• Intranet
Intranet is the generic term for a collection of
private computer networks within an
organization.
An intranet uses network technologies as a
tool to facilitate communication between
people or work groups to improve the data
sharing capability and overall knowledge
base of an organization's employees.
INTRANET AND EXTRANET
• Extranet
An extranet is a computer network that allows
controlled access from the outside, for specific
business or educational purposes.
In a business-to-business context, an extranet can be
viewed as an extension of an organization's intranet
that is extended to users outside the organization,
usually partners, vendors, and suppliers, in isolation
from all other Internet users.
A buzzword that refers to an intranet that is partially
accessible to authorized outsiders.
CRYPTOGRAPHY
• The art of protecting information
transforming it (encrypting it) into
unreadable format, called cipher text.
by
an
• Only those who possess a secret key can
decrypt the message into plain text.
• Encrypted messages can sometimes be
broken by cryptanalysis, also called
codebreaking, although modern cryptography
techniques are virtually unbreakable.
SYMMETRIC-KEY CRYPTOGRAPHY
PUBLIC-KEY CRYPTOGRAPHY
CRYPTANALYSIS
Cryptanalysis is the art and science of
analyzing information systems in order to
study the hidden aspects of the systems.
Cryptanalysis
is
used
to
defeat
cryptographic security systems and gain
access to the contents of encrypted
messages.
CRYPTOSYSTEM
• A cryptosystem is pair of algorithms that take a
key and convert plaintext to ciphertext and
back.
• Plaintext is what you want to protect; ciphertext
should appear to be random gibberish.
• The design
cryptographic
mathematical.
and analysis
algorithms
of
is
today’s
highly
CRYPTOGRAPHIC PRIMITIVES
• Much of the theoretical work in cryptography
concerns cryptographic primitives—algorithms
with basic cryptographic properties—and their
relationship to other cryptographic problems.
• More complicated cryptographic tools are then
built from these basic primitives.
• These primitives provide fundamental properties,
which are used to develop more complex tools
called cryptosystems or cryptographic protocols,
which guarantee one or more high-level security
properties.
INFORMATION PUBLISHING TECHNOLOGY
- Advantages
• Platform Transparency: data residing on variety of server
platforms is available
• Distribution Transparency: A page displayed on a browser
screen may contain text coming from a IBM server in New
York, an image from Windows NT servers located in Delhi.
• Information Type Transparency: The text, graphics, sound,
video and various other data formats can be integrated and
displayed uniformly through the browser interface.
• Interactive: In addition, it also supports forms with input
windows, radio buttons, options lists, checkboxes for
submitting the data.
• Dynamic: If the information is updated at the server site, the
latest version is made available. The web publishing does
not incur any cost of reproducing the copies.
• Graphical and Navigational: Capable of integrating &
displaying graphics, text and other multimedia formats in
same page & user can jump from pages on a server to other
servers by clicking on links.
BASICS OF WEB SERVER
• The main job of a Web server is to respond
to requests from Web client computers
• There are 3 components of a Web server:
– Hardware
– Operating system software
– Web server software
TYPES OF WEB SITES
• Development sites: Used to evaluate different Web designs
• Intranets: Corporate networks that house internal memos,
corporate policy handbooks, and a variety of other
corporate documents
• Extranets: Intranets that allow authorized parties outside
the company to access information stored in the system
• Transaction-processing sites: Commerce sites that must be
available 24 hours a day, seven days a week
• Content-delivery sites: Deliver content such as news,
histories, summaries, and other digital information
WEB
CLIENTS
AND
WEB
SERVERS
• Client/server architectures
•
•
•
•
•
– Client computers request services
– A server processes the clients’ requests
Web software is platform neutral, meaning that it lets different types of servers
communicate with a variety of clients
Dynamic content is non static information constructed in response to a Web
client’s request
– Dynamic page: Web page whose content is shaped by a program in response
to user requests
– Static page: An unchanging page retrieved from disk
Server-side scripting -Programs running on a Web server create Web pages before
sending them back to the requesting Web clients
Dynamic page-generation technologies: Server side scripts are combined with
html tags to create dynamic content - Active Server Pages (ASP), JavaServer Pages
(JSP), PHP: Hypertext Preprocessor (PHP)
Server: Computer used to provide files or make programs available to other
computers.
– Server software: Used by a server to make files and programs available to
other computers
– Database server: Server on which database management software runs
TWO-TIER CLIENT/SERVER ARCHITECTURE
THREE-TIER AND N-TIER
CLIENT/SERVER ARCHITECTURES
UNIT III
DIFFERENT TYPES OF GOODS
ETAILING
• E-Tailing – electronic retailing
• E-tailing (less frequently: etailing) is the
selling of retail goods on the Internet.
TRADITIONAL VS E-RETAILING
• Traditional retailing: involves selling to a
final customer through a physical outlet
involves a fairly extensive chain from a
manufacturer to wholesaler to the retailer
Examples of physical outlets: Malls,
generalized stores, specialized stores,
franchise stores
• E-retailing: The Internet has allowed a new
kind of specialization to emerge.
Example: lastminute.com - allows last minute
purchases of travel, gift and entertainment
MAPPING TRADITIONAL VS ERETAILING
• Specialized stores – Specialized e-stores
• Generalized sores – Generalized e-stores
• Malls - E-malls
• Franchise stores - ?
• New form of business - e-broker
BENEFITS OF E-RETAILING
To the Customer
• Convenience
• Better information
• Competitive pricing
• Customization
• Shopping anywhere
• Anytime
To the Business
• Global reach
• Better customer service
• Low capital cost
• Mass customization
• Targeted marketing
• More value added services
• New forms of specialized stores and niche marketing
Models of E-Tailing
• Brick & Mortar
• Click & Mortar
• Click & Conquer
GOALS OF E MARKETING
Sell – Grow sales
Speak – Get closer to customers though
dialogue and participation
Serve – Add value
Save – Save costs
Sizzle – Extending your brand online
TYPES OF INTERNET MARKETING
•
•
•
•
•
•
•
•
•
Display advertising
Search engine marketing (SEM)
Search engine optimization (SEO)
Social media marketing
Email marketing
Referral marketing
Affiliate marketing
Inbound marketing
Video marketing
BUSINESS MODELS OF INTERNET
MARKETING
• E-commerce: a model whereby goods and services are
sold directly to consumers
• Lead-based websites: a strategy whereby an organization
generates value by acquiring sales leads from its website.
• Affiliate Marketing: a process wherein a product or
service developed by one entity is sold by other active
sellers for a share of profits.
• Local Internet marketing: a strategy through which a
small company utilizes the Internet to find and to nurture
relationships that can be used for real-world advantages.
ADVANTAGES AND LIMITATIONS OF
INTERNET MARKETING
• Inexpensive
• Wider audience for a small fraction of
traditional advertising budgets
• Consumers to research
• Brings results quickly
LIMITATIONS
• Outright scams
Schemes
- Empty boxes, Pyramid
• Unable to physically feel or try on the product
• Marketer will not be able to use the xfactor/personal touch factor/human touch
factor to influence the audience
E-ADVERTISING
• E-Mail
• Banners
• Skyscrapers
• Banner Swapping
• Streaming Video and Audio
• Effectiveness Tracking
• Mini-sites, Pop-ups
E-ADVERTISING
• Interstitials
• Sponsorships
• Coupons (www.coolsavings.com)
• Pay Per Advertising View (cybergold)
• Loyalty Programs (clickwards.com)
• Partnerships
E-CRM
PHASES OF E-CRM
1. Acquisition
2. Enhancement
3. Retention
BUSINESS ORIENTED ECOMMERCE
Business oriented E-commerce features B2B ECommerce.
Main features of B2B e-commerce are
• High volumes of goods traded
• High net value of goods traded
• Multiple forms of electronic payment
• Other payment methods permitted
• Prior agreements or contracts between the partners
• Higher level of information exchange
THREE BASIC TYPES OF MODELS
• Buyer Oriented E-commerce: Corporation does
not have to physically go out there searching for
suppliers.
• Seller-Oriented E-Commerce: Producing or
marketing products to a large number of small and
large corporations. i.e one (supplier) to many
(buyers) system. Example: Dell and Cisco
• Virtual Market Place: It provides a meeting place
for many vendors and many buyers.
FOUR PILLARS OF E-GOVERNMENT
E-GOVERNMENT
E-Government should enable anyone
visiting a city website to communicate
and interact with city employees via the
Internet in more sophisticated way than
sending a E-Mail.
OBJECTIVES OF E-GOVERNANCE
• To support and simply governance for all
stakeholders
• To increase the efficiency and speed in a
transparent manner
• To interconnect citizens, businesses
government to save significant cost
and
• Citizens have access to information
knowledge about the political.
and
STAGES OF E-GOVERNANCE
• Computerization
• Networking
• On-line presence
• On-line interactivity
TYPES OF E-GOVERNANCE INTERACTIONS
• G2G (Government to Government)
– Ex: egovstandards.gov.in
• G2C (Government to Citizens)
– Ex: India.gov.in
• G2B (Government to Business)
– Ex: Business.gov.in
• G2E (Government to Employees)
– Ex: Egovonline.net
EDI
• Electronic data interchange (EDI) is the
structured transmission of data between
organizations by electronic means.
• It is used to transfer electronic documents or
business data from one computer to another,
i.e. from one trading partner to another
trading partner without human intervention.
PROCESS OF EDI
SOME MAJOR SETS OF EDI
STANDARDS
• UN/EDIFACT - Electronic Data Interchange for
Administration Commerce and Transport
• ANSI ASC X12 (X12) is predominant in North
America
• TRADACOMS -Trading Data Communications
• ODETTE - Organisation for Data Exchange
through Tele-Transmission in Europe
BENEFITS OF EDI
• EDI can streamline companies' interactions with trading
partners.
• It increases inventory turns.
• It decreases inventory
• Improves speed flow of information between businesses.
• Improved product and sales forecasting
• Improved time-to-market
• Increased customer satisfaction
• Decreases shipping costs
• Reduced product returns
• Improve cash flow
• Integrate supply chain, and
• Improved relationships with trading partners
SCM
• Supply chain management (SCM) is the
management of a network of interconnected
businesses involved in the provision of
product and service packages required by the
end customers in a supply chain.
• Supply chain management spans all
movement and storage of raw materials,
work-in-process inventory, and finished
goods from point of origin to point of
consumption.
BENEFITS OF E-SCM
• It is Web-based (client and server), not Web-enabled
• It incorporates broadcast and active messaging to proactively notify an
individual of a condition that requires attention
• It supports the exchange of “real-time” information through trading
communities such as employees, customers, suppliers, distributors and
manufacturers
• It has open Internet Application Architecture which allows for rapid
deployment and scalability, combining unlimited internal/external users in
a “real-time” environment
• It has an interface capability with any third party software
• It is platform independent and fully integrated system
• It has Web visibility and processing capability – 24 x 7.
COMPONENTS OF E-SCM
WEB AUCTIONS
• An online auction is an auction which is
held over the internet.
• Virtual auctions on the internet.
• The seller sells the product or service to
the person who bids the highest price.
TYPES OF ONLINE AUCTIONS
English auctions
• English auctions are where bids are announced by either an
auctioneer or by the bidders and winners pay what they bid to
receive the object.
• English auctions are claimed to be the most common form of thirdparty on-line auction
• Most simplistic of all the forms.
• It is an ascending bid auction in which bids are open for all to see.
• The winner is the highest bidder and the price is the highest bid.
Dutch auctions
• Dutch auctions are the reverse of English auctions whereby the price
begins high and is systematically lowered until a buyer accepts the
price.
• Sites that offer Dutch auction services are usually misleading
• It is originally intended for that of a declining price auction.
TYPES OF ONLINE AUCTIONS
First-price sealed-bid
• First-price sealed-bid auctions are when a single bid is
made by all bidding parties and the single highest
bidder wins, and pays what they bid.
• The main difference between this and English
auctions is that bids are not openly viewable or
announced
Vickrey Auction (Second-price sealed-bid auction)
• A Vickrey auction, sometimes known as a Secondprice sealed-bid auction, uses very much the same
principle as a first-price sealed bid.
• The highest bidder and winner will only pay what the
second highest bidder had bid.
TYPES OF ONLINE AUCTIONS
Reverse auction
• Reverse auctions are where the roles of buyer and seller are
reversed. Multiple sellers compete to obtain the buyer's business
and prices typically decrease over time as new offers are made.
• They do not follow the typical auction format in that the buyer can
see all the offers and may choose which they would prefer.
• The term reverse auction is often confused with Unique bid
auctions, which are more similar to traditional auctions as there is
only one seller and multiple buyers. However, they follow a
similar price reduction concept except the lowest unique bid
always wins, and each bid is confidential.
Bidding fee auction
• A Bidding fee auction (also known as a penny auction) requires
customers to pay for bids which they can increment an auction
price one unit of currency at a time.
• The auction owner (typically the owner of the website) makes
money in two ways, the purchasing of bids and the actual amount
made from the final cost of the item.
LEGALITIES
• Shill Bidding
• Fraud
• Sale of Stolen Goods
VIRTUAL COMMUNITIES
A virtual community, also called a Web community
or an online community, is a gathering place for
people and businesses that do not have a physical
existence.
Virtual communities exist on the Internet today in
various forms, including Usenet newsgroups, chat
rooms, and Web sites. These communities offer
people a way to connect with each other and discuss
common issues and interests.
WEB LOGS (BLOGS)
• Web logs, or blogs, are Web sites that contain
commentary on current events or specific
issues written by individuals.
• Many blogs invite visitors to add comments,
which the blog owner may or may not edit.
• The result is a continuing discussion of the
topic with the possibility of many interested
persons contributing to that discussion.
WEBPORTALS
• A web portal is a web site that brings information
from diverse sources in a unified way.
• web portals offer other services such as e-mail, news,
stock
prices,
information,
databases
and
entertainment.
• Examples of public web portals are AOL, iGoogle,
MSN, and Yahoo!.
TYPES OF WEB PORTALS
•
•
•
•
•
•
•
•
•
•
Personal portals
News portals
Government web portals
Cultural Portals
Corporate web portals
Stock portals
Search portals
Tender's portals
Hosted web portals
Domain-specific portals
LEGAL, ETHICS AND PRIVACY ISSUES
• Illegal acts break the law while unethical acts may
not be illegal
• Ethics
– Branch of philosophy that deals with what is considered
right or wrong
– Right and wrong not always clear
– Consider
• Company sells profiles of customers with information collected
through cookies
• Company allows personal use of Web but secretly monitors
activity
• Company knowingly sells tax software with bugs
ETHICAL ISSUES
• Web tracking
• Disintermediation and Reintermediation
LEGAL ISSUES IN E-COMMERCE
• Fraud on the Internet
• Copyright
• Domain Names
CYBER LAWS
Cyber Law is the law governing cyber
space.
Cyber space is a very wide term and
includes computers, networks, software,
data storage devices the Internet, websites,
emails and even electronic devices such as
cell phones, ATM machines etc.
CYBER LAW
• Cyber crimes
• Electronic signatures
• Intellectual property
• Copyright Law
– Trademark law
– Semiconductor law
– Patent law
• Data protection and privacy
CONSUMER PROTECTION LAWS
• Consumer Protection Act enacted , to provide
for the protection of the interest of
consumers.
• Enabling the Consumer to participate directly
in market economy.
• Remove the helplessness of a consumer
against powerful business
• Amount to unfair trade practice in clause (r)
and even to define ‘defect’ and ‘deficiency’ by
clauses (f) and (g)
CONSUMER PROTECTION LAWS
• A constructive approach subject to that it
should not do violence to the language of the
provisions and is not contrary to the
attempted objective of the enactment.
• Caring pieces of legislation intended to
protect a large body of consumers from
exploitation.
TYPE OF COMPUTER CRIMINALS
• Hacker-is a person who has good knowledge about computers and
tries to open the data packets and steal the information transmitted
through the Internet.
• Cracker-is someone who specifically breaks into computer systems
by bypassing or by guessing login passwords. These persons enter
into the network as authenticated users and can cause any harm to
the system.
• Phreaks-are persons who hack phone systems. These people
specifically try to scam long distance phone-time for them to control
phone switch capability or to hack company automated EBX
systems to get free voice-mail accounts or to raid companies existing
voice-mail messages.
• Phracker-is the combination of freak and cracker. A phracker breaks
into phone systems and computer systems and specializes in total
network destruction
TAXATION
• Business conducted through the internet
caters to globally located customers.
• Raises cross border legal issues.
• Creation of wealth through cyber space
would also entail the use of "offshore"
financial institutions to store this wealth.
• This is not only a threat to national
sovereignty but also overrides traditional
principles of taxation
TAXATION
• Aspects of Internet Electronic Commerce
Relevant For Tax Policy Makers
(i) Lack of any user control to the location of
activity
(ii) No means of identification of users
(iii) Reduced use of information reporting and
withholding
TAXATION
• Internet Tax Moratorium Act (1998-2001)
– It prohibits states from taxing the fees that
Internet service providers collect for providing
Internet service and from collecting Internetspecific taxes on e-commerce transactions.
• Discriminatory Taxes
– If an ecommerce transaction is subject to a tax
that is any different from a tax imposed on
similar property, goods or services through other
means, then the tax is discriminatory.
– Example: If the purchase of a book over the
internet is subject to a tax that is different from
purchasing a book in a bookstore, the tax is
discriminatory.
ENCRYPTION POLICY
• Encryption is a technique for hiding data.
• Secret-key cryptography
• Public-key cryptography
DATA ENCRYPTION STANDARD (DES)
• A widely-adopted implementation of secretkey cryptography is Data Encryption
Standard (DES).
• DES is secret-key, symmetric cryptosystem.
• When used for communication, both sender
and receiver must know the same secret key,
which is used both to encrypt and decrypt the
message.
CONTRACTS
• Any contract includes three essential elements: an offer,
an acceptance and consideration.
• The Contract is formed when one party accepts the offer
of another party.
• An offer is a commitment with certain terms made to
another party such as declaration of willingness to buy or
sell a product or service.
• An acceptance is the expression of willingness to take an
offer, including all of its stated terms.
• Consideration is the agreed upon exchange of something
valuable, such as money, property or future services.
• Contracts are a key element of traditional
business practice, and they are equally important
on the Internet. Offers and acceptances can occur
when parties exchange email messages, engage
in electronic data interchange (EDI) or fill out
forms on web pages.
• For example, courts have held the various
actions—including mailing a cheque, shipping
goods, shaking hands, nodding one’s head,
taking an item off a shelf, or opening a wrapped
package—are all, in some circumstances, legally
binding acceptances of offers.
WRITING CONTRACTS ON THE WEB
• An early decision in the 1800’s held that a telegraph
transmission was writing.
• Later courts have held that tape recordings of spoken
words, computer files on disks and faxes are writings.
• Thus the parties to an electronic commerce contract
should find it relatively easy to satisfy the writing
requirement.
• Courts have generous in determining what constitutes a
signature.
• A signature is any symbol executed or adopted for the
purpose of authenticating writing.
WARRANTIES ON THE WEB
• Any contract for the sale of goods includes
implied warranties.
• A seller implicitly warrants that the goods it
offers for sale are fit for the purposes.
• Sellers could create explicit warranties, often
unintentionally,
by
making
general
statements in brochures or other advertising
materials about product performance or
suitability for particular tasks.
• Electronic data interchange (EDI) or fill out
forms on web pages.
Download