Sub Code-311
Developed by
Prof. Nitin C. Kamat
On behalf of
Prin. L.N. Welingkar Institute of Management Development & Research
!
CONTENTS
Contents
! !2
INTRODUCTION OF INFORMATION TECHNOLOGY
Chapter 1
INTRODUCTION OF INFORMATION
TECHNOLOGY
Learning Objectives:
Structure:
1.1 Introduction
1.2 What is e-Commerce?
1.3 What is e-Business?
1.4 e-Commerce, e-Business, who e-Cares?
1.5 e-Distinction
1.6 What are Key Drivers?
1.7 The Impact of e-Commerce
1.8 The Benefits of e-Commerce
1.8.1 Benefits of e-Commerce to Consumers
1.8.2 Benefits of e-Commerce to Society
1.9 The Limitations of e-Commerce
1.9.1 Limitations of e-Commerce to Organisations
1.9.2 Limitations of e-Commerce to Consumers
1.9.3 Limitations of e-Commerce to Society
1.10 Short Case Study
1.11 Activities
1.12 Summary
1.13 Self Assessment Questions
! !3
INTRODUCTION OF INFORMATION TECHNOLOGY
1.1 INTRODUCTION
Even today, some considerable time after the so-called 'dot com/Internet
revolution’, electronic commerce (e-Commerce) remains a relatively new,
emerging and constantly changing area of business management and
information technology. There has been and continues to be much publicity
and discussion about e-Commerce.
Library catalogues and shelves are filled with books and articles on the
subject. However, there remains a sense of confusion, suspicion and
misunderstanding surrounding the area, which has been exacerbated by
the different contexts in which electronic commerce is used, coupled with
the myriad of related buzzwords and acronyms.
This book aims to consolidate the major themes that have arisen from the
new area of electronic commerce and to provide an understanding of its
application and importance to management.
It was not until the late 1970s that work began for national Electronic Data
Interchange (EDI) standards, which developed well into the early 1990s.
! !4
INTRODUCTION OF INFORMATION TECHNOLOGY
Before the widespread uptake and commercial use of the Internet, the EDI
system was very expensive to run mainly because of the high cost of the
private networks. Thus, uptake was limited largely to cash-rich
multinational corporations using their financial strength to pressure and
persuade (with subsidies) smaller suppliers to implement EDI systems,
often at a very high cost.
By 1996, no more than 50,000 companies in Europe and 44,000 in the USA
were using EDI, representing less than 1% of the total number of
companies in each of the respective continents. Electronic commerce has
been re-defined by the dynamics of the Internet and traditional e-
Commerce is rapidly moving to the Internet.
With the advent of the Internet, the term e-Commerce began to include:
! !5
INTRODUCTION OF INFORMATION TECHNOLOGY
Other terms that are used for online retail selling include e-tailing, virtual-
stores or cyber stores. A collection of these virtual stores is sometimes
gathered into a 'virtual mall' or 'cybermall'.
In its simplest form, e-commerce is the buying and selling of products and
services by businesses and consumers over the Internet. People use the
term "e-commerce" to describe encrypted payments on the Internet.
Sometimes these transactions include the real time transfer of funds from
buyer to seller, and sometimes this is handled manually through a PoS
terminal once a secure order is received by the merchant.
! !6
INTRODUCTION OF INFORMATION TECHNOLOGY
One of the first to use the term was IBM, in October 1997, when it
launched a campaign built around e-Business. Today, major corporations
are rethinking their businesses in terms of the Internet and its new culture
and capabilities and this is what some see as e-Business.
Some analysts and online business people have decided that e-Business is
infinitely superior as a moniker to e-Commerce. That's misleading and
distracts us from the business goals at hand. The effort to separate the e-
Commerce and e-Business concepts appears to have been driven by
marketing motives and is dreadfully thin in substance.
! !7
INTRODUCTION OF INFORMATION TECHNOLOGY
1.5 e-DISTINCTION
! !8
INTRODUCTION OF INFORMATION TECHNOLOGY
!
Figure 1.1: Electronic commerce and electronic business
! !9
INTRODUCTION OF INFORMATION TECHNOLOGY
Since a distinction has been made in this book between e-Commerce and
e-Business for consistency, the key drivers of e-Business are also
identified.
These are mainly at the level of the firm and are influenced by the macro-
environment and e-Commerce, which include:
! !10
INTRODUCTION OF INFORMATION TECHNOLOGY
• Bandwidth
! !11
INTRODUCTION OF INFORMATION TECHNOLOGY
• Average income
These key drivers for the implementation of e-Business can be put into the
context of the classic economic equation of supply and demand illustrated
in Figure 1.2. Thus, e-Commerce provides the infrastructure and
environment that enables and facilitates e-Business. Within this,
! !12
INTRODUCTION OF INFORMATION TECHNOLOGY
!
Figure 1.2: Key Drivers of e-Business
! !13
INTRODUCTION OF INFORMATION TECHNOLOGY
e-Commerce and e-Business are not solely the Internet, websites or dot
com companies. It is about a new business concept that incorporates all
previous business management and economic concepts. As such, e-
Business and e-Commerce impact on many areas of business and
disciplines of business management studies. For example:
! !14
INTRODUCTION OF INFORMATION TECHNOLOGY
Business law and ethics: The different legal and ethical issues that have
arisen as a result of a global 'virtual' market. Issues such as copyright
laws, privacy of customer information, legality of electronic contracts, etc.
! !15
INTRODUCTION OF INFORMATION TECHNOLOGY
for the sole use of the organisation and its authorised partners. It is also
cheaper to send a fax or e-mail via the Internet than direct dialing.
• More choices: Customers not only have a whole range of products that
they can choose from and customize, but also an international selection
of suppliers.
! !16
INTRODUCTION OF INFORMATION TECHNOLOGY
There was much hype surrounding the Internet and e-Commerce over the
last few years of the twentieth century. Much of it promoted the Internet
and e-Commerce as the panacea for all ills, which raises the question, are
there any limitations of e-Commerce and the Internet?
Isaac Newton's 3rd Law of Motion, 'For every action there is an equal and
opposite reaction’ suggests that for all the benefits there are limitations to
e-Commerce. These again will be dealt with according to the three major
stakeholders – organisations, consumers and society.
! !17
INTRODUCTION OF INFORMATION TECHNOLOGY
Cost of computing equipment. Not just the initial cost of buying equipment
but making sure that the technology is updated regularly to be compatible
with the changing requirement of the Internet, websites and applications.
Lack of security and privacy of personal data. There is no real control of
data that is collected over the Web or Internet. Data protection laws are
not universal and so websites hosted in different countries may or may not
have laws which protect privacy of personal data.
! !18
INTRODUCTION OF INFORMATION TECHNOLOGY
! !19
INTRODUCTION OF INFORMATION TECHNOLOGY
Welcome to 'Online Medical Consultation' with our specialist doctors from all
around the world. Medindia has currently over 1000 doctors listed on its panel.
Medindia's panel of doctors will provide you with an online solution to your
problem. Please note that we do not sell prescription drugs and do not provide
you with a prescription. We can only give you advice and recommendation on
their effectiveness. Consults will be only provided if considered safe.
If you are not happy with a consultation with your own doctor or specialist or if
you wish for a clarification, we welcome you to seek 'second consults' with us.
The doctors who answer your questions are mostly either American Board
certified or hold British qualifications. Your identity and the answers will be kept
totally confidential and not displayed anywhere.
Due to the demand for medical consults it is sometimes difficult to answer your
questions instantly; hence, a simple two-tier system is devised where you
choose if the consult is urgent or non-urgent. This way you get the best value
for your money.
The urgent consults are responded within 24 to 36 working hrs and the non-
urgent are responded within 72 hrs.
! !20
INTRODUCTION OF INFORMATION TECHNOLOGY
1.11 ACTIVITIES
……………………………………………………………………………………………………………….
……………………………………………………………………………………………………………….
……………………………………………………………………………………………………………….
……………………………………………………………………………………………………………….
2. Look at the facts available about eBay on the website. Evaluate and give
examples of the ways in which the acquisition of PayPal and Skype.
……………………………………………………………………………………………………………….
……………………………………………………………………………………………………………….
……………………………………………………………………………………………………………….
……………………………………………………………………………………………………………….
1.12 SUMMARY
! !21
INTRODUCTION OF INFORMATION TECHNOLOGY
In its simplest form e-commerce is the buying and selling of products and
services by businesses and consumers over the Internet. People use the
term "e-Commerce" to describe encrypted payments on the Internet.
Some analysts and online business people have decided that e-Business is
infinitely superior as a moniker to e-Commerce. That's misleading and
distracts us from the business goals at hand. The effort to separate e-
Commerce and e-Business concepts appears to have been driven by
marketing motives and is dreadfully thin in substance.
! !22
INTRODUCTION OF INFORMATION TECHNOLOGY
1. What is e-Commerce?
! !23
INTRODUCTION OF INFORMATION TECHNOLOGY
REFERENCE MATERIAL
Click on the links below to view additional reference material for this
chapter
Summary
PPT
MCQ
! !24
CREATING AN INTEGRATED E-COMMERCE STRATEGY
Chapter 2
CREATING AN INTEGRATED e-COMMERCE
STRATEGY
Objectives
Structure:
2.1 Introduction
2.2 Seven Dimensions of an e-Commerce Strategy
2.3 The Bonds of an e-Commerce Strategy
2.3.1 Leadership
2.3.2 Infrastructure
2.3.3 Organizational Learning
! !25
CREATING AN INTEGRATED E-COMMERCE STRATEGY
2.1 INTRODUCTION
The stock market took values from nothing to billions in the late 1990s.
Some investors made hundreds of millions of dollars. In early 2000, the
dot.com bubble burst, and many investors lost their dollars just as quickly.
Now that the hype is over, we can look back to see what worked and what
didn’t-and also apply what we know about business, about management,
about information technology (IT). What we know is that the Internet does
require some special considerations, but also that many principles that
apply to business in general have not been generally applied to e-
Commerce. For example, revenues, costs, and profits do count—not just
website hits!
What is the CEO to do today? What do senior managers need to know and
do when considering their companies’ involvement in e-Commerce?
! !26
CREATING AN INTEGRATED E-COMMERCE STRATEGY
The study of e-Commerce has unfolded in much the same way that e-
Commerce thrust itself on the business world–with a great deal is an
overstatement. After a long period of treating the topic of e-Commerce
with awe and confusion, we can now discuss the subject more objectively.
! !27
CREATING AN INTEGRATED E-COMMERCE STRATEGY
Many analysts have identified the tactics that led to the demise of the high-
profile e-Commerce failures filling the news pages. Methods such as
seeking revenues through online banner ads, indiscriminate customer
acquisition and partnerships, and deep discount pricing models have all
been exposed as doomed substitutes for sensible business models. Some
mistakes of the Internet boom were to be expected of experimentation in
the development of any new business model. Others were due to a lack of
attention to basic business principles. Discussions of an e-Commerce
strategy have yet to identify the elements of a successful e-Commerce
strategy and put those practices within the framework of traditional
business strategy.
! !28
CREATING AN INTEGRATED E-COMMERCE STRATEGY
!
Three Bonding Factors
! !29
CREATING AN INTEGRATED E-COMMERCE STRATEGY
!
Figure 2.1: The Seven Dimensions of an e-Commerce Strategy
It became clear that the differentiation between those companies that have
a successful e-Commerce strategy and those that do not is a function of
achieving balance among seven major factors (see Figure 2.1).
It can be argued that the model in Figure 2.1 can be applied to all forms of
organization in the traditional industrial and service sectors. This is in fact
true, and it is an intentional component of the model’s construction. The
model is based upon the understanding that all organisations need to
continuously address these seven issues, whether they are traditional
organisations addressing an investment decision regarding the deployment
of a new technology required to speed up a production line, a specialized
financial services company on Wall Street determining its ability to operate
in the electronic market, or a company born on the Internet that needs to
assess its branding.
! !30
CREATING AN INTEGRATED E-COMMERCE STRATEGY
The basic building blocks are consistent in their structure once the target
relationship is determined. For example, should an organization be in a
vertical B2G relationship, the dimensions of strategy formulation are no
different from those of a B2B relationship.
The decisions still involve branding, service levels, market space, and
technology, but the balance and focus of their interactions change. For
example, branding may be less of an issue in a B2G environment than in a
B2B environment.
However, global fulfillment and the ability to satisfy the agency's service
levels may be more of an issue. Thus, the aim is to present a flexible
framework for e-strategists that facilitates their gaining an understanding
of the interactions of the environment within which they are to operate,
and then developing a successful counterstrategy for their organizational
entity.
This will pave the way to consideration of the four focal points around
which a balanced strategy is created: technology, brand, market, and
service. Each of these areas presents complex and intricate issues of its
own, compounded through the need to achieve a balanced, integrated
solution overall—a complete analysis is presented in subsequent chapters.
! !31
CREATING AN INTEGRATED E-COMMERCE STRATEGY
2.3.1 Leadership
Previous research has shown that the primary drivers of change and the
creators of strategic vision in an organization are the CEO and senior
executives, a finding mirrored in this research. In every successful e-
Commerce project studied for this book, a strong project champion was
present in the form of a senior executive or someone in a position to
demonstrate to a senior executive the potential added value such a project
could bring to the organization.
! !32
CREATING AN INTEGRATED E-COMMERCE STRATEGY
!
Figure 2.2: The Bonds of an e-Commerce Strategy
Originally we had started back in the summer of 1994 and at that time-this
was even before we were aware of the Web-one of the things we were
looking at was trying to find a communications vehicle so we could better
communicate with our partners.
These are channel partners, folks who would sell or resell our equipment.
! !33
CREATING AN INTEGRATED E-COMMERCE STRATEGY
2. Don’t get isolated from new and experimental technologies that are
coming over the technology horizon.
2.3.2 Infrastructure
Once the need to develop e-Commerce in some form had been identified,
the single most important issue facing the executives and technologists
charged with developing Internet-based projects is infrastructure. This
spans the technology spectrum from a single Internet file server connected
to a commercial.
Internet service provider (ISP) all the way to the information-intense online
transaction processing of a company like UPS, the giant global parcel
delivery company. UPS’s site assisted customers in tracking 12.92 million
packages a day during 1999, hitting a peak of 18.7 million packages in a
single day during the busy holiday peak shipping season as customers
increasingly embraced the Internet and retail e-Commerce and tracked
their parcels online.
UPS’s infrastructure also includes a growing set of online partners and tools
utilized by over 15,000 of its customers to improve its efficiency at both
the B2C and B2B levels.
! !34
CREATING AN INTEGRATED E-COMMERCE STRATEGY
• Strategic
• Organizational
• Physical
The aim is to align future business planning initiatives with the new
technology challenges.
The first level at which the implications of technology and strategic change
become apparent is the organizational. At this level, the challenge is to
align the work practices, process flow, and structure of the organization to
execute the strategic goals effectively and efficiently.
The execution occurs through the physical layer: the hardware and
software of the computing environment, in conjunction with the
telecommunications infrastructure.
! !35
CREATING AN INTEGRATED E-COMMERCE STRATEGY
6. E x e c u t i v e s c a n n o t d i v o r c e t h e m s e l v e s f r o m t e c h n o l o g i c a l
understanding: the Techno- CEO is the leadership model of the future.
! !36
CREATING AN INTEGRATED E-COMMERCE STRATEGY
A few factors drive this: Senior executives place trust in their colleagues at
all levels; they stimulate an environment of intellectual curiosity; they
facilitate new concepts and technologies even when a traditional return-on-
investment metric may not be applicable.
Two of the keys behind the success of the leaders in e-Commerce are their
ability to understand the metrics that drive their e-Commerce market
space, and their ability to understand their own relationship with their
customers.
From these two issues, the leading organizations have determined how to
respond to those metrics and then improve the processes, structure, and
communication accordingly.
Many organizations start this process through the use of easily accessible
metrics; for example, Alamo Car-Rental measures the yield ratio between
metrics such as click-throughs and reservations, building upon its strong
organizational understanding of yield management.
! !37
CREATING AN INTEGRATED E-COMMERCE STRATEGY
through BMW's site, which attracts over 1 million hits a day. BMW then
builds this into retail connectivity. Burrows states, “We communicate with
retailers all the time. They are very, very complimentary of our site and
very pleased with the amount of individuals that come to our site and who
then use our link to their local retailer, to whom we refer someone for a
test drive and to get a close-up look of a car. We provide a kit for all of our
retailers to help them get online and to do it in a way that we think is
complimentary to the brand.”
Not only is BMW measuring its hit rate; it has also created a mechanism to
involve all dimensions of the organization in the creation of its site,
including customer service, dealer network, and financial services, to
provide reinforcement of the BMW brand. In doing so, BMW has aligned the
e-Commerce strategy with the organizational strategy as a whole.
! !38
CREATING AN INTEGRATED E-COMMERCE STRATEGY
This is not to say that change is not occurring; change in this arena is
inevitable and continuous, with victory coming to those who can adapt
fastest and be nimble in the face of change. The remainder of this chapter
will introduce the basic strategic issues in each of these leadership
propositions and consider some of the key interactions between them.
!
Figure 2.3: Integration of Four e-Commerce Leadership Propositions
! !39
CREATING AN INTEGRATED E-COMMERCE STRATEGY
This is a win-win strategy for both the utility and the customer, but it
simultaneously changes the nature of competition within the industry. No
longer is it based on the lowest-cost solution per kW-hour; it is based on a
technology added value strategy that allows the utilities to get closer to the
customer and create wider market coverage.
! !40
CREATING AN INTEGRATED E-COMMERCE STRATEGY
The customer is dealt with the way customers wish to be dealt with—as a
valued and familiar client with whom a store worker has built up a long-
term relationship.
! !41
CREATING AN INTEGRATED E-COMMERCE STRATEGY
The goal of being a leader and developer of Internet sales may not be the
goal of every organization. Many established organizations do not actually
wish to develop a new sales channel at the current time and hence have
determined that a brand reinforcement strategy is a suitable complement
to their existing corporate strategy. The goal of this channel is to reinforce
the organization in the eyes of the customer. In order to do this the
organization has to utilize the added value of “information provision” to its
viewers, providing information and building a quality relationship with the
customer on a continuing basis through that information content. This is
not a static information interchange relationship but a dynamic one in
which the customer will expect change and continual value from the
relationship or the linkage will be severed, potentially for a significant
amount of time. An example of a leading brand reinforcement strategy can
be found in the automotive area where BMW is continually stimulating its
customers through subtle incremental changes to its site. BMW utilizes the
technology to increase the involvement level of potential, current, and past
customers. In the past, the site has allowed customers to build their own
dream car or, at the launch of the M series Z3 roadster, to listen to its
engine.
However, unlike Amazon, BMW would prefer the potential new owner to
visit a traditional dealer subsequent to visiting the site. This is not because
BMW is not capable of creating the technology to sell a vehicle via the
Internet, but because the company feels that the interrelationship between
customer and organization is best served by human reinforcement and
bonding.
! !42
CREATING AN INTEGRATED E-COMMERCE STRATEGY
Even though this channel is not directly generating revenue, the brand
equity is developing tangible benefits to those that understand and execute
effectively in this market space.
The value adding effects of building virtual communities have been well
documented by management consultants John Hagel and Arthur Armstrong
in their 1997 book Net Gain.8. Their communities are developing in parallel
to the e-consortia relationship within the B2C and B2B environments. Over
time, e-consortia will attract more and more customers (and potential new
sellers to add to the consortia) through their service strength.
1. Make sure you have a market. Who is going to buy your products
online? The best place to start is your current customer base. Will going
online make life easier for them? Are you going to save them time and
money by allowing them to purchase online? You probably have a basic
! !43
CREATING AN INTEGRATED E-COMMERCE STRATEGY
website already; are you getting requests for online buying from
potential customers? It is never truly possible to judge in advance
whether a market exists, but there should be at least some indication of
a demand for an online presence.
4. Plan how you will deal with content, pricing, stock management,
fulfillment, support, payment, returns, support and security.
These are the basics of any business, but there can be added
complications online. You need to address the following:
• Pricing: If you are selling direct for the first time, you may have
problems with your distributors and retailers, who will not want you
to underprice them. If you are selling brands by other manufacturers,
there may be problems involved in selling in foreign marketplaces.
Are you going to offer prices in a range of currencies? If so, which?
• Stock Management: Are you going to use the same stock base to
sell online and through your physical distribution channels? If so, you
need an integrated stock management system.
! !44
CREATING AN INTEGRATED E-COMMERCE STRATEGY
• Payment: How will people pay? What credit cards will you accept?
How will you manage fraud?
• Support: How will you support the products you sell online? You
must plan for a support section on your website to answer basic
questions from customers. Will you also offer telephone and e-mail
support?
! !45
CREATING AN INTEGRATED E-COMMERCE STRATEGY
8. Make sure that you buy the right software. There is no need to do
all the work internally, as there is now a wide range of quality software
for e-Commerce.
! !46
CREATING AN INTEGRATED E-COMMERCE STRATEGY
You wouldn’t build a house without an architect and a blueprint, and you
shouldn’t build a website without a digital equivalent. If you want your
digital ‘house’ to crumble, the surest way to ensure failure online and
waste untold time and money is to skip proper planning and jump blindly
into implementation.
Avoid
2. Cart abandonment
4. Poor navigation
5. Slow performance
What will you gain through proper strategy and planning? A successful e-
commerce business that delivers real economic value, including:
! !47
CREATING AN INTEGRATED E-COMMERCE STRATEGY
How will you know if your e-Commerce site is successful at meeting your
business needs? The key success metrics for e-Commerce sites include:
2. Stickiness: The amount of time users spend on the site and the
number of pages they view
3. Conversion: The per cent of visitors who become customers and the
size of the average sales ticket
! !48
CREATING AN INTEGRATED E-COMMERCE STRATEGY
• A Project Manager
• An Information Architect
• An Art Director (to create the design style guide and give directions to
the designers)
2.11 ACTIVITIES
……………………………………………………………………………………………………………….
……………………………………………………………………………………………………………….
……………………………………………………………………………………………………………….
……………………………………………………………………………………………………………….
! !49
CREATING AN INTEGRATED E-COMMERCE STRATEGY
2. Browse eBay site and distinguish strategies used for different products.
……………………………………………………………………………………………………………….
……………………………………………………………………………………………………………….
……………………………………………………………………………………………………………….
……………………………………………………………………………………………………………….
2.12 SUMMARY
This is not to say that change is not occurring; change in this arena is
inevitable and continuous, with victory coming to those who can adapt
fastest and be nimble in the face of change. The remainder of this chapter
will introduce the basic strategic issues in each of these leadership
propositions and consider some of the key interactions between them.
! !50
CREATING AN INTEGRATED E-COMMERCE STRATEGY
Technology Leadership
Brand Leadership
! !51
CREATING AN INTEGRATED E-COMMERCE STRATEGY
4. Plan how you will deal with content, pricing, stock management,
fulfillment, support, payment, returns, support and security
! !52
CREATING AN INTEGRATED E-COMMERCE STRATEGY
REFERENCE MATERIAL
Click on the links below to view additional reference material for this
chapter
Summary
PPT
MCQ
! !53
CREATING AN INTEGRATED E-COMMERCE STRATEGY
Chapter 3
CONSTRUCTING AN e-BUSINESS
Objectives:
Structure:
3.1 Introduction
3.2 Types of e-Commerce Models
3.3 Major Business-to-Consumer (B2C) Models
3.3.1 Portal Model
3.3.2 Content Provider
3.3.3 Transaction Broker
3.3.4 Market Creator
3.3.5 Service Provider
3.4 Major Business-to-Business (B2B) Models
3.4.1 e-Distributor
3.4.2 e-Procurement
3.4.3 Exchanges
3.4.4 Industry Consortia
3.4.5 Private Industrial Networks
3.5 Different Types of e-Business Models
3.5.1 Brokerage
3.5.2 Infomediary
3.5.3 Advertising
3.5.4 Affiliate
3.5.5 m-Commerce
3.6 Dynamic Pricing Models for Electronic Business
3.7 Click Modeling for e-Commerce
3.8 Examples of e-Commerce Design Logical Flow Chart
3.9 Short Case Study: Priceline.com
3.10 Activities
3.11 Summary
3.12 Self Assessment Questions
! !54
CREATING AN INTEGRATED E-COMMERCE STRATEGY
3.1 INTRODUCTION
The business model is the center of the business plan. A business plan is a
document that describes a firms business model, it takes into account the
competitive environment.
For developing a successful business in any area, you need to make sure
that the model to effectively address the eight elements addressed in Table
3.1.
• Revenue models describes how firms earn revenue, produce profits, and
produce superior return on investment capital
! !55
CREATING AN INTEGRATED E-COMMERCE STRATEGY
• Market strategy is the plan you put together that exactly how you intend
to enter into new market and attract new customers
! !56
CREATING AN INTEGRATED E-COMMERCE STRATEGY
3.2 TYPES OF e-COMMERCE MODELS
! !57
CREATING AN INTEGRATED E-COMMERCE STRATEGY
• It can efficiently maintain the movement of the supply chain and the
manufacturing and procuring processes.
The B2B model is predicted to become the largest value sector of the
industry within a few years.
! !58
CREATING AN INTEGRATED E-COMMERCE STRATEGY
!
Figure 3.1: Business-to-Business (B2B) Model
!
Figure 3.2: Business-to-Consumer (B2C) Model
! !59
CREATING AN INTEGRATED E-COMMERCE STRATEGY
In addition, the consumer might doubt that his information is secured and
used effectively by the business organization. This is the main reason why
the B2C model is not very widely accepted. Therefore, it becomes very
essential for the business organizations to provide robust security
mechanisms that can guarantee a consumer for securing his information.
However, it is essential that both the seller and the buyer must register
with the auction site. While the seller needs to pay a fixed fee to the online
auction house to sell their products, the buyer can bid without paying any
fee. The site brings the buyer and seller together to conduct deals.
! !60
CREATING AN INTEGRATED E-COMMERCE STRATEGY
!
Figure 3.3: Consumer-to-Consumer (C2C) Model
Let us now look at the previous figure with respect to eBay. When a
customer plans to sell his products to other customers on the website of
eBay, he first needs to interact with an eBay site, which in this case acts as
a facilitator of the overall transaction. Then, the seller can host his product
on www.ebay.com, which in turn charges him for this. Any buyer can now
browse the site of eBay to search for the product he interested in.
If the buyer comes across such a product, he places an order for the same
on the website of eBay. eBay now purchase the product from the seller and
then, sells it to the buyer. In this way, though the transaction is between
two customers, an organization acts as an interface between the two
organizations.
! !61
CREATING AN INTEGRATED E-COMMERCE STRATEGY
Deshpande needs to buy an airline ticket for his journey from Mumbai to
New Jersey. Deshpande needs to travel immediately. Therefore, he
searches a website for a ticket. The website offers bidding facility to people
who want to buy tickets immediately. On the website, Deshpande quotes
the highest price and gets the ticket.
!
Figure 3.4: Consumer-to-Business (C2B) Model
In addition to the models discussed so far, five new models are being
worked on that involves transactions between the government and other
entities, such as consumer, business organizations, and other
governments.
All these transactions that involve government as one entity are called e-
governance. The various models in the e-governance scenario are:
! !62
CREATING AN INTEGRATED E-COMMERCE STRATEGY
Table 3.3 illustrates the major business models used in the B2C arena
! !63
CREATING AN INTEGRATED E-COMMERCE STRATEGY
! !64
CREATING AN INTEGRATED E-COMMERCE STRATEGY
These hubs would offer a doorway to the Internet for industry members
and would be vertically integrated; these planned enterprises were called
vertical portals or vortal. As with many electronic commerce predictions,
the prediction that vertical portals would change business forever did not
turn out to be exactly correct.
! !65
CREATING AN INTEGRATED E-COMMERCE STRATEGY
Private Stores and Customer Portals: Many of these large companies had
already invested heavily in Web sites that they believed would better meet
the needs of their major customers than any industry marketplace. For
example, Cisco and Dell offer private stores for each of their major
customers within their selling websites. Other companies, such as Grainger
and Milacron, provide additional services for customers on their sites.
Large companies that purchase from vendors that are relatively small can
exert great power over those vendors in purchasing negotiations. These
companies can invest in procurement software. Companies that implement
e-procurement software usually require their suppliers to bid for their
business.
Reserve best areas for paying customers, a broad range of topics, e.g.
search engines
! !66
CREATING AN INTEGRATED E-COMMERCE STRATEGY
! !67
CREATING AN INTEGRATED E-COMMERCE STRATEGY
3.4.1 e-Distributor
• Company that supplies products and services directly to individual
businesses
• Granger.com
• GE Electric Aircraft Engines (geae.com)
• Owned by one company seeking to serve many customers
• Revenue through sale of goods
3.4.2 e-Procurement
• Create and sell access to digital electronic markets
• Aruba
• CommerceOne
• B2B service provider is one type — offer purchasing firms sophisticated
set of sourcing and supply chain management tools
• Application service providers a subset of B2B service providers
• Revenue through fees (for market making services, supply chain
management)
3.4.3 Exchanges
• An electronic digital marketplace where suppliers and commercial
purchasers can conduct transactions
• Exchange.eSteel.com, GEPolymerland.com
• Usually owned by independent firms whose business is making a market
• Generate revenue by charging transaction fees
• Usually serve a single vertical industry
! !68
CREATING AN INTEGRATED E-COMMERCE STRATEGY
! !69
CREATING AN INTEGRATED E-COMMERCE STRATEGY
! !70
CREATING AN INTEGRATED E-COMMERCE STRATEGY
!
Figure 3.5
3.5.1 Brokerage
3.5.2 Infomediary
! !71
CREATING AN INTEGRATED E-COMMERCE STRATEGY
3.5.3 Advertising
The advertising e-Business model works in the same way as the convention
media broadcast version. The business may offer free or paid services,
such as e-mail, blogs or instant messaging. Many sites list ads, products or
services for sale. This model usually has banner or text ads, which may
constitute the primary source of revenue. Generally, this sort of model
requires a high volume of traffic. The model also works for highly
specialized traffic.
3.5.4 Affiliate
3.5.5 m-Commerce
It deals with conducting the transactions with the help of mobile. With the
mobile device consumers can interact with each other and can lead the
business. Mobile Commerce involves the change of ownership or rights to
utilize goods and related services.
!
Figure 3.6
! !72
CREATING AN INTEGRATED E-COMMERCE STRATEGY
These emerging networks of firms are more flexible and can respond to
changes in the economic environment much more quickly than
hierarchically structured businesses ever could.
• Electronic Data Interchange (EDI). EDI is a computer-to-computer
transfer of business information between two businesses that uses a
standard format. The two businesses that are exchanging information are
called trading partners. Firms that exchange data in specific standard
formats are said to be EDI-compatible.
! !73
CREATING AN INTEGRATED E-COMMERCE STRATEGY
• EDI on the Internet. Trading partners who had been using EDI began
to view the Internet as a potential replacement for the expensive leased
lines. The major roadblock to conducting EDI over the Internet was
security. As the TCP/IP was enhanced and SHTTP protocol was
developed, businesses worried less about security issues.
! !74
CREATING AN INTEGRATED E-COMMERCE STRATEGY
!
Figure 3.7: Product Delivery Information Flow without EDI
! !75
CREATING AN INTEGRATED E-COMMERCE STRATEGY
!
Figure 3.8: Product Delivery Information Flow with EDI
! !76
CREATING AN INTEGRATED E-COMMERCE STRATEGY
This change has been largely due to the wiring of the economy through the
Internet, corporate networks and wireless networks. Buyers are now able
to quickly and easily compare products and prices, putting them in a better
bargaining position.
At the same time, the technology is allowing sellers to collect detailed data
about customers'
buying habits, preferences, even spending limits, so they can customize
their products and prices. In the past, there was a significant cost
associated with changing prices, known as the menu cost. For a company
with a large product line, it could take months for price adjustments to
filter down to distributors, retailers and salespeople.
Emergence of network technology has reduced menu cost and time to near
zero. As buyers and sellers interact in the electronic world, the resulting
dynamic prices more closely reflect the true market value of the products
and services being traded.
! !77
CREATING AN INTEGRATED E-COMMERCE STRATEGY
! !78
CREATING AN INTEGRATED E-COMMERCE STRATEGY
The Dell model is the ultimate in price differentiation in the sense of being
implemented in terms of product differentiation. Dell quotes different prices
to different market segments for the same product, enabling the company
to increase the profitability. Dell and Cisco generate almost
50% of their sales through the Internet.
This has resulted in Buy.com register high volumes of trade, however due
to the low prices, the profits are low, often at times even negative. This
example illustrates that overly simplistic or incorrect model of buyer
behaviour can produce undesirable results.
! !79
CREATING AN INTEGRATED E-COMMERCE STRATEGY
Historical user click patterns on search result pages are considered a great
resource for algorithms that attempt to learn to rank search results. This
ranking method is a well-studied problem in the field of Information
Retrieval (IR).
! !80
CREATING AN INTEGRATED E-COMMERCE STRATEGY
The user searched for “Meaning of life”. A search result page (SRP) with 50
results was served back. The user then clicked on result #2, and we never
heard from him again.
1. The user looked at the SRP, read the snippet returned for result #1, and
then ignored it as irrelevant. The user then moved to result #2, read
the snippet, found it attractive, clicked through to the page, found the
meaning of life in there, and then stopped the search, satisfied with
what he found.
2. The user glanced at the SRP, chose result #2 randomly, read the
snippet, found it somewhat relevant, clicked-through to the page, and
found it completely irrelevant. Then his phone rang and he abandoned
the search.
The simplest class of click models is called position models. Position models
assume that search results have a probability of being examined by the
user that decays with the position of the result within the page. A click
depends on a result being examined and deemed relevant, so that P (click)
! !81
CREATING AN INTEGRATED E-COMMERCE STRATEGY
Cascade models are another class of click models, where the user is
assumed to examine the results sequentially: starting from the top,
clicking on the first relevant result examined, and stopping the search
immediately. Here the probability of a click depends on the relevance of a
result, as well as the irrelevance of all previous results. This model doesn't
account for abandoned searches, or searches with multiple clicks.
The DBN model assumes that users examine items in an SRP starting at
position 1 and working downwards: skipping items that appear irrelevant
and clicking on items that appear relevant, until either abandoning the
search or landing on a satisfactory page following a click from the SRP.
Bricks and clicks (aka clicks and bricks, click and mortar, or bricks, clicks
and flips) is a business model by which a company integrates both offline
(bricks) and online (clicks) presences, sometimes with the third extra flips
(physical catalogs). Additionally, many will also offer telephone
ordering as well, or at least provide telephone sales support.
A popular example of the bricks and clicks model is when a chain of stores
allows the customer to order products either online or physically in one of
their stores, also allowing them to either pick-up their order directly at a
local branch of the store or get it delivered to their home. There are many
alternative combinations of this model.
The bricks and clicks model has typically been used by traditional retailers
who have extensive logistics and supply chains, but are well known and
often respected for their traditional physical presence.
Part of the reason for its success is that it is far easier for a traditional
retailer to establish an online presence, than it is for a start-up company to
employ a successful purely online one, or for an online only retailer to
establish a traditional presence, including a strong and well recognized
brand, without having a large marketing budget.
Although the major factor in the success or failure of this business model is
in the control of costs, as usually maintaining a physical presence — paying
for many physical store premises and their staffing — requires larger
! !82
CREATING AN INTEGRATED E-COMMERCE STRATEGY
The success of the model in many sectors has lessened the credibility of
some analysts who argued that the Internet would render traditional
retailers obsolete through disintermediation. On the other hand, an online-
only service can remain a best-in-class operation because its
executives focus on just the online business. It has been argued that a
bricks and clicks business model is more difficult to implement than an
online only model. In the future, the bricks and clicks model may be more
successful, but in 2010 some online only businesses grew at a staggering
30%, while some bricks and clicks businesses grew at a paltry 3%. The key
factor for a bricks and clicks business model to be successful “will, to a
large extent, be determined by a company’s ability to manage the trade-
offs between separation and integration” of their retail and online
businesses.
Example 1
! !83
CREATING AN INTEGRATED E-COMMERCE STRATEGY
Example 2
For the case given in question, the customer has to visit the site of the
travel agency or a broker and get the status of the availability of tickets. If
ticket is available he/she will book the ticket and input the credit card
details. He/She will be given the details of delivery of ticket.
! !84
CREATING AN INTEGRATED E-COMMERCE STRATEGY
!
Example 3
Here the selling and purchasing is carried out between two individuals. One
is a seller and the other is a buyer. The items are usually used items, /
coins or antiques. The seller posts the description of the item and the
expected price of the item on a website maintained by a company which
acts as a middleman or broker.
! !85
CREATING AN INTEGRATED E-COMMERCE STRATEGY
Case I:
The broker Y can just act as an advertising agency and make the two
persons meet each other and carry out further transaction. For this it gets
some commission from both the parties.
! !86
CREATING AN INTEGRATED E-COMMERCE STRATEGY
Case II:
The broker Y can act as an advertising agency, make the two persons
negotiate the price. Then Y takes all responsibilities until the item is
delivered. For this it gets some commission from both the parties.
! !87
CREATING AN INTEGRATED E-COMMERCE STRATEGY
Case III:
The broker Y can act as an advertising agency and displays items posted
by the seller with prices. Both the buyer and seller will not have to
acknowledge each other. Y takes all responsibilities until the item is
delivered. For this he gets some commission from both the parties.
! !88
CREATING AN INTEGRATED E-COMMERCE STRATEGY
Priceline first gained prominence for its Name Your Own Price system,
where travellers would name their price for airline tickets, hotel rooms, car
rentals and vacation packages. While the purchaser can select a general
location, service level and price, the hotel, rental car company or airline (as
well as the exact location of the hotel and the exact flight itinerary) is
disclosed only after the purchase had gone through, with no rights to
cancel.
Priceline's cut of the proceeds was the difference between the price an
individual named and the price charged by the service establishment. More
recently, it has added a more traditional model where travelers are
presented prices and are also told the name of the establishment. Travelers
can still choose to name their price for airline tickets, hotel rooms and
rental cars. The number of airlines, hotels and car rental company
participants in the name your own price program has increased as these
suppliers utilize this opaque market Priceline created to sell their perishable
inventory without lowering prices through other traditional sales channels.
Priceline now also sells discounted cruises, as well as tours and attractions.
! !89
CREATING AN INTEGRATED E-COMMERCE STRATEGY
Name Your Own Rate system for home loans, continues under a license
with EverBank. In 2002 Priceline licensed its “Name Your Own Price” travel
system to eBay.
Priceline returned to its original focus on travel products, such airfares and
rental cars, with the addition of cruise sales and a special emphasis on
hotel bookings in its commercials. During November 2007, Priceline
“permanently” eliminated all booking fees on published airfares.
! !90
CREATING AN INTEGRATED E-COMMERCE STRATEGY
! !91
CREATING AN INTEGRATED E-COMMERCE STRATEGY
TravelJigsaw
Active Hotels
In November 2006, Active Hotels Limited merged some operations with
Booking.com. The company’s physical locations and personnel are not
affected by the name change. ActiveHotels.com became part of
Booking.com and forwards to Booking.com website.
Kayak
In November 2012, Priceline announced that it had agreed to acquire
Kayak in a stock and cash transaction, paying approximately $500 million
in cash and $1.3 billion in equity and assumed stock options. Kayak will
continue to operate independently as a Priceline Group company.
Priceline Branding
Priceline, Booking.com, Active Hotels and Agoda are separately branded for
dissimilar demographics. However each company is regulated and
integrated into the Priceline business model. Priceline is also the most
talked about travel booking site online in the Brand Passion Index.
! !92
CREATING AN INTEGRATED E-COMMERCE STRATEGY
3.10 ACTIVITIES
(1) Rebates can help attract customers to your site. Many customers offer
“everyday low price” and specials to keep customers come back.
ebates.com is a shopping site where customers receive Debates on every
purchase Visit the above site and learn about how loyalty is built with
customers and develop trust over a period of time.
.........................................................................................................
.........................................................................................................
.........................................................................................................
.........................................................................................................
.........................................................................................................
.........................................................................................................
.........................................................................................................
…………………………………………………………………………………………………………………………
(2) Visit eCentives.com and compare how different from ebates.com site.
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………..............................................................
.........................................................................................................
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
3.11 SUMMARY
These are:
• Business-to-Business (B2B) model
• Business-to-Consumer (B2C) model
• Consumer-to-Consumer (C2C) model
• Consumer-to-Business (C2B) model
! !93
CREATING AN INTEGRATED E-COMMERCE STRATEGY
Portal Models
Content Provider
Transaction Broker
Market Creator
• Uses Internet technology to create markets that bring buyers and sellers
together
• where they can display products, search for products and establish prices
• Priceline.com (reverse auction), eBay.com
Service Provider
! !94
CREATING AN INTEGRATED E-COMMERCE STRATEGY
• e-Distributor
• e-Procurement
• Exchanges (B2B hubs)
• Industry Consortia
• Private Industrial Networks
! !95
CREATING AN INTEGRATED E-COMMERCE STRATEGY
These emerging networks of firms are more flexible and can respond to
changes in the economic environment much more quickly than
hierarchically structured businesses ever could.
Historical user click patterns on search result pages are considered a great
resource for algorithms that attempt to learn to rank search results. This
ranking method is a well-studied problem in the field of Information
Retrieval (IR).
! !96
CREATING AN INTEGRATED E-COMMERCE STRATEGY
REFERENCE MATERIAL
Click on the links below to view additional reference material for this
chapter
Summary
PPT
MCQ
! !97
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
Chapter 4
BUILDING AN e-BUSINESS: DESIGN,
DEVELOPMENT AND MANAGEMENT
Learning Objectives:
Structure:
4.1 Introduction
4.2 Generating Business Ideas
4.2.1 Business Processes, Knowledge Processes, and e-Business
Processes
4.2.2 Factors Considered for Successful Development of e-Business
Sites
4.3 Putting Your Plan into Action
4.3.1 Choosing a Domain Name
4.3.2 Selection of eBusiness Products and Services
4.4 e-Business/e-Commerce Websites and Portals
4.4.1 Difference between Website and Portal
4.4.2 Websites4.4.3 Web Portals
4.5 Website Hosting
4.6 Web Design
4.7 Enhancing the User Experience
4.7.1 Creating Excellence in User Experience
4.7.2 Key Elements in Increasing Effectiveness and Popularity
4.7.3 Protecting Your e-Business
4.7.4 End to End e-Business Solutions
4.7.5 Use of Streaming Media in Web page
4.7.6 Preparing for New Technologies
4.8 e-Business Consulting
4.9 Short Case Study
4.10 Activities
! !98
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
4.11 Summary
4.12 Self Assessment Questions
4.1 INTRODUCTION
All the deterrent factors are closely related to company size, which
influences not only financial resources, but also the availability of skills to
manage complex e-Business systems. The specific characteristics of SMEs
demand that e-Business systems are precisely tailored to their actual
operational requirements.
! !99
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
Before beginning to build an e-Business, you must have a solid idea of the
product and services you want to offer via the Web. Surf the web to
discover what exists. Are the websites you find providing exceptional
services or could they offer more.
Figure 4.1 illustrates the idea that any business process (including
knowledge and knowledge management processes) may be viewed as a
network of linked activities governed by validated rule sets, or knowledge.
A linked sequence of activities performed by one or more agents sharing at
least one objective is a Task. A linked, but not necessarily sequential set of
tasks governed by validated rule sets, producing results of measurable
value to the agent or agents performing the tasks, is a Task Pattern.
Any business process, task cluster, task pattern, or task must involve
decision cycles through which agents execute their part in a business
process or component. The phases of any decision/execution cycle are:
Planning, Acting, Monitoring, and Evaluating.
! !100
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
!
Figure 4.1: The Activity to Business Process Hierarchy
! !101
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
“Search engines want to provide the most relevant results possible when
people search. The original content rule applies to storefronts if they want
to succeed. Best practices for natural search engine ranking is to create
your own unique product descriptions and avoid copying
descriptions from manufacturers.”
“Shoppers don’t want clutter! Ideally there should be only 10 to15 products
on a page, no pop-ups or advertising, and a comparison feature to view
more product details.”
“Publish exclusive offers and discounts in the social networks (like Twitter,
Facebook or Google Orkut). It will consolidate your community and will
keep it active.”
“Content is still king. Dedicate a portion of your web team’s time and
budget to developing pure content that is compelling and relevant for your
users. Finding the right idea is key — it can be informational and help your
users make a more educated choice, or it can be simply for entertainment.
Compelling content will generate free traffic and links that your product
pages never will.”
! !102
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
• Global e-Commerce
“Know your global audience. Americans may want a quick and easy
checkout process, but consumers in Japan and Europe prefer to see more
details and options when shopping online. Eighty-five per cent of the local
German market uses bank transfers as the primary means of payment, not
credit cards. And, discounted products are often perceived in Japan as
being faulty instead of simply a good deal.”
“Don’t make product lists too long. Everything that goes ‘beyond the fold’
is too long. Spend more time to make a better category tree. If it’s
impossible in your case, make page navigation very obvious and easy for a
visitor.”
! !103
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
e-Business Plan
Primary Purpose
!
Strategy
Support
!
Business Model
Process
! !104
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
There are many important issues that must be addressed when creating an
e-Business plan. These issues are considered in separate chapters which
include accepting on line payments, setting up communication, hardware
and software technology used, Marketing your website, and managing your
consumer.
A domain name is the name used in the URL for your website. Choose a
concise name that people will be able to recognize and type easily.
1. Brainstorm Five Top Keywords: When you first begin your domain
name search, it helps to have five terms or phrases in mind that best
describe the domain you're seeking. Once you have this list, you can
start to pair them or add prefixes and suffixes to create good domain
ideas. For example, if you're launching a mortgage related domain, you
! !105
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
might start with words like “mortgage, finance, home equity, interest
rate, house payment” then play around until you can find a good match.
6. Keep the Name as Short as Possible: Short names are easy to type
and easy to remember (the previous two rules). They also allow for
more characters in the URL in the SERPs and a better fit on business
cards and other offline media.
! !106
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
11.Don’t Follow the Latest Trends: Website names that rely on odd mis-
spellings (like many Web 2.0 style sites), multiple hyphens (like the
SEO-optimized domains of the early 2000s), or uninspiring short
adjectives (like “top...x,” “best...x,” “hot...x”) aren’t always the best
choice. This isn’t a hard and fast rule, but in the world of naming
conventions in general, if everyone else is doing it, that doesn’t mean
it’s a surefire strategy. Just look at all the people who named their
businesses “AAA... x” over the last 50 years to be first in the phone
book; how many Fortune 2000s are named “AAA company?”
! !107
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
services. You can find a name you like that’s available, then go to your
registrar of choice.
The individual needs of a company on one hand, and the large number of
standard software solutions available on the other, will mean that the
selection process for the appropriate solution will involve matching the
individual company needs with the product features of the individual
software solutions. In most cases, there will not be 100% match and the
selection will have to be based on the “best” match. Furthermore, a
standard product may have to be configured to the company needs and
may have to be integrated. Often small and medium-sized companies will
not have the knowledge or resources available to carry out the
configuration, adaptation, or integration work by themselves. Not only a
product but also a service provider may need to be selected – and this
selection may become as important as the selection of a standard software
product itself.
! !108
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
Due to the fact that there is no “best” product (or service provider) in
general but only a “most appropriate” product based on individual company
requirements, a global benchmarking of e-Business products and services
is not possible. Instead, a company needs to define its individual
requirements and evaluate each product and service provider based on
these requirements. The ever-increasing importance and cost of the
product to be introduced and the project to be implemented, combined
with the comparative limited knowledge within the company itself, will lead
to increased involvement of external consultants.
! !109
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
! !110
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
• Select
products/
for
next step
• Project
manageme
nt
! !111
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
• List of
consultants
The table includes the individual activities for each step together with
stakeholders, appropriate tools and information sources. The table also
shows how the eBSN e-Business Solutions Guide supports the selection
process and individual activities.
The sixth step is the last step of the selection process but not of the end of
the product introduction.
The “selection phase” is followed by an “introduction phase”, which will
cover the following
additional tasks:
! !112
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
• Train employees
• Carry out organisational and process changes (or introduce new
processes)
• Carry out pilot test
• Start live operation and improvement
• Verify cost/benefit calculations or estimates
It is important to note that the whole process is not only about selecting
the right product or service provider. It is — at least — equally important to
design the appropriate future business processes and activities and
evaluate the product based on these process requirements.Moreover, one
of the most common mistakes within the whole selection process is that
products are selected based only on technical requirements and nice (but
unnecessary) product features, but not based on process and company
requirements. In this case, the future processes may have to be adapted to
the product, which may result in additional, unnecessary use of personal
resources and inefficient processes.
! !113
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
!
Picture 4.1 Website and Web Portal
Source: besttoolbars.net
! !114
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
4.4.2 Websites
! !115
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
!
Picture 4.2
! !116
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
!
Picture 4.3
Source: webmarketing.biz
The World Wide Web (WWW) was created in 1989 by CERN physicist Tim
Berners-Lee. On 30 April 1993, CERN announced that the World Wide Web
would be free to use for anyone. Before the introduction of HTML and HTTP,
other protocols such as file transfer protocol and the gopher protocol were
used to retrieve individual files from a server. These protocols offer a
simple directory structure which the user navigates and chooses files to
download. Documents were most often presented as plain text files without
formatting, or were encoded in word processor formats.
!
Figure 4.2
! !117
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
Static website: A static website is one that has web pages stored on the
server in the format that is sent to a client web browser. It is primarily
coded in Hypertext Markup Language, HTML. Simple forms or marketing
examples of websites, such as classic website, a five-page website or a
brochure website are often static websites, because they present pre-
defined, static information to the user. This may include information about
a company and its products and services via text, photos, animations,
audio/video and interactive menus and navigation. This type of website
usually displays the same information to all visitors. Similar to handing out
a printed brochure to customers or clients, a static website will generally
provide consistent, standard information for an extended period of time.
Although the website owner may make updates periodically, it is a manual
process to edit the text, photos and other content and may require basic
website design skills and software.
! !118
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
!
Picture 4.4
In summary, visitors are not able to control what information they receive
via a static website, and must instead settle for whatever content the
website owner has decided to offer at that time. They are edited using four
broad categories of software:
• WYSIWYG online editors which create media rich online presentation like
web pages, widgets, intro, blogs, and other documents.
! !119
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
!
Picture 4.5
Source: sitedynamics.ca
Dynamic code: The first type is a web page with a dynamic code. The
code is constructed dynamically on the fly using active programming
language instead of plain, static HTML.
! !120
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
for today's date. This type of dynamic website will automatically show the
most current news articles on any given date. Another example of dynamic
content is when a retail website with a database of media products allows a
user to input a search request for the keyword Beatles. In response, the
content of the web page will spontaneously change the way it looked
before, and will then display a list of Beatles products like CDs, DVDs and
books.
! !121
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
Picture 4.6
Source: blog.mydealbag.com
Types of websites:
Blogs: Sites generally used to post online diaries which may include
discussion forums (e.g., blogger, Xanga). Many bloggers use blogs like an
editorial section of a newspaper to express their ideas on anything ranging
! !122
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
!
Picture 4.7
! !123
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
!
Picture 4.8
!
Picture 4.9
Source: www.amitabh-bachchan.co.in
! !124
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
!
Picture 4.10
Source: tatamotors.com
Dating sites: These are site where users can find other single people
looking for long-range relationships, dating, or just friends.
e-Commerce sites: A site offering goods and services for online sale and
enabling online transactions for such sales.
! !125
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
!
Picture 4.11
Source: amwzon.com
!
Picture 4.12
Information sites: Most websites could fit in this type of website to some
extent many of them are not necessarily for commercial purposes.
! !126
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
Media sharing sites: A site that enables users to upload and view media
such as pictures, music, and videos.
!
Picture 4.13
Source: www.youtube.com
! !127
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
Torrent sites: Websites that index torrent files. This type of website is
different from a bit torrent client which is usually stand-alone software.
Political sites: A site on which people may voice political views, show
political humor, campaigning for elections, or show information about a
certain political party or ideology.
Porn sites: A site that shows sexually explicit content for enjoyment and
relaxation. They can be similar to a personal website when it's a website of
a porn actor/actress or a media sharing website where a user can upload
from their own sexually explicit material to movies made by adult studios.
Review sites: A site on which people can post reviews for products or
services.
!
Picture 4.14
Source: expedia.com
Social bookmarking sites: A site where users share other content from
the Internet and rate and comment on the content.
! !128
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
Social networking sites: A site where users could communicate with one
another and share media, such as pictures, videos, music, blogs, etc., with
other users. These may include games and web applications.
!
Picture 4.15
!
Picture 4.16
Source: http://webmail.vsnl.com/
! !129
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
!
Picture 4.17
! !130
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
A web portal or links page is a web site that functions as a point of access
to information on the World Wide Web. A portal presents information from
diverse sources in a unified way. Apart from the standard search engine
feature, web portals offer other services such as e-mail, news, stock prices,
information, databases and entertainment. Portals provide a way for
enterprises to provide a consistent look and feel with access control and
procedures for multiple applications and databases, which otherwise would
have been different entities altogether. Examples of public web portals are
AOL, Excite, iGoogle, MSN and Yahoo!.
!
Picture 4.18
Source: voaburmese.wordpress.com
! !131
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
In the late 1990s, the web portal was a hot commodity. After the
proliferation of web browsers in the late-1990s many companies tried to
build or acquire a portal to have a piece of the Internet market. The web
portal gained special attention because it was, for many users, the starting
point of their web browser. Netscape became a part of America Online, the
Walt Disney Company launched Go.com, IBM and others launched Prodigy,
and Excite and @Home became a part of AT&T during the late 1990s.
Some portal sites such as Yahoo! and those others first listed in this article
remain successful.
Types of Portals
Personal portals: A personal portal is a site on the World Wide Web that
typically provides personalized capabilities to its visitors, providing a
pathway to other content. It is designed to use distributed applications,
different numbers and types of middleware and hardware to provide
services from a number of different sources. In addition, business portals
are designed to share collaboration in workplaces. Personal portals can be
related to any specific topic such as providing friend information on a social
network or providing links to outside content that may help others beyond
your reach of services. Portals are not limited to simply providing links.
Information or content that you are putting on the internet creates a
portal, or a path to new knowledge and/or capabilities.
News portals: The traditional media rooms all around the world are fast
adapting to the new age technologies. This marks the beginning of news
portals by media houses across the globe. This new media channels give
them the opportunity to reach the viewers in a shorter span of time than
their print media counterparts.
Government web portals: At the end of the dot-com boom in the 1990s,
many governments had already committed to creating portal sites for their
! !132
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
!
Picture 4.19
! !133
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
! !134
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
The scope of web hosting services varies greatly. The most basic is web
page and small scale file hosting, where files can be uploaded via File
Transfer Protocol (FTP) or a Web interface. The files are usually delivered to
the Web “as is” or with minimal processing.
The host may also provide an interface or control panel for managing the
Web server and installing scripts, as well as other modules and service
applications like e-mail. Some hosts specialize in certain software or
! !135
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
One of the elements of good web design is a lack of the elements that
make bad web design. If you stay away from everything listed on the page
about dorky web pages, you've probably got a pretty nice website. In
addition, keep these concepts in mind:
Text
Navigation
Links
! !136
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
Graphics
General Design
Below are features that can make a web design look dorky.
Backgrounds
Text
! !137
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
Links
Graphics
Tables
! !138
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
Junk
Navigation
General Design
• Entry page or home page that does not fit within the standard browser
window (800 x 600 pixels)
• Frames that make you scroll sideways
• No focal point on the page
• Too many focal points on the page
• Navigation buttons as the only visual interest, especially when they're
large (and dorky)
• Cluttered, not enough alignment of elements
• Lack of contrast (in color, text, to create hierarchy of information, etc.)
• Pages that look okay in one browser but not in another
! !139
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
!
Figure 4.3
Source: homested.com
! !140
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
!
Figure 4.4
Source: healthlife.com
Some of the problems associated with site layout can be solved by adding
a search engine. Searching features to make it easy to find items on your
site can be added for free through www.freefind.com.
FreeFind has provided Web site owners with a quick and easy way to add a
powerful search engine to their own pages.
FreeFind is one of those rare free Web services that is so reliable and
efficient that it’s hard to believe that this is a free service. While there are
a number of other “set-up-a-search-engine” type free services out there,
FreeFind’s ease of use, speed and configurability places it in the top
division of the Web's free services.
! !141
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
You submit your e-mail address and URL, site then sends you the HTML
code via e-mail for implementing the search feature on your site.
FreeFind generates reports to get a better idea of what their visitors are
truly looking for and whether their expectations are being met.
“Life’s like a play; it’s not the length but the excellence of the acting that
matters” said Seneca, a Roman philosopher in mid-1st century AD.
! !142
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
The visitor on the website cannot see your physical company or its
employees. It is the content experience that determines the values of your
company. The content on the website either makes or breaks the website.
Optimize the user's experience and see how it benefits. It has been proven
an optimised Information Architecture (designing the organization and
navigation systems that help users find information. Adapted from
concepts of traditional architecture, user interface design and usability
studies) directly affects the ROI.
Assuming that competitor (or at least similar) sites are available, usability
comparisons tests should be undertaken. The analysis can benefit from
access to real end-users and therefore a quantitative approach to usability
perceptions can be adopted, and comparisons between sites undertaken.
! !143
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
Usability metric for both performance and satisfaction can be selected for
specific sites.
• Expert/heuristic evaluation
A simpler technique
If the above sounds tough maybe you could try out this simpler technique
You will need around 15-20 people of your target profile.
A spreadsheet to note down the reactions.
An independent panel of judges.
1. Determine Objectives
! !144
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
Before the session, set testers’ expectations and make them feel
comfortable. Explain that you want them to think out loud, telling you what
they are trying to accomplish and what they do and don't understand. Ask
them to read each task out loud before attempting it. Make clear that they
are not being tested, they are testing the Web site so you can learn how to
make it better. Tell testers you will be taking notes and will try not to talk
with them during the sessions.
3. Evaluate
Evaluate and respect the responses. Even better let a person not
associated with the site design evaluate the responses.
A well designed website can do wonders for your corporate image and
sales.
! !145
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
!
Figure 4.5: TimePro.Net before our 2012 revision
Source: SSWweb2casestudy)
!
Figure 4.6: TimePro.Net 2012 Metro
Source: SSWweb2casestudy
! !146
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
Your website should include private policy, detailing the intended use of
consumer’s private information. Additional legal and ethical issues are
discussed in detail in later subsequent chapter.
There are many websites that help you to build private policy. They provide
you with their seal.
!
Figure 4.7
Source: homested.com
! !147
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
!
Figure 4.8
Source: homested.com
Your Web pages should be able to provide such consumers simple, but
never the less effective Web pages.
! !148
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
!
Figure 4.9
Source: SSW consulting.com
! !149
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
SSW Consulting
WorleyParsons
SharePoint Website
!
Figure 4.10
Source: SSW consulting.com
! !150
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
Microsoft
!
Figure 4.11
Source: SSW consulting.com
CBP Lawyers
CBP Lawyers came to SSW to restructure their intranet. The portal had no
branding and was especially hard to navigate, so people simply didn't use
it. We had about a week to redesign and build it. So we did.
! !151
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
eMove
Website
FastAs
Website
Carmody Group
Website
! !152
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
Bahai
Website
Australia BedBank
Website
Australia BedBank got to SSW to develop a hub where real time room
inventory for hundreds of hotels, resorts and cruises is stored, and
instantly confirmed and transmitted to inbound travel operators and travel
wholesalers globally.
The Guide
Website
DNN Skin
! !153
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
BCS Direction
Website
SSW
SSW website received a makeover. The new layout is designed for easier
navigation and provides first-time visitors with quick access to the most
sought-after content. The challenge was to create a home page that could
be understood and operated by a wider range of clients, not just the
technically minded.
LUKA TV
Concept Design
4.10 ACTIVITIES
(1)SQL Deploy is a fast and easy to use application that should be part of
every developer’s software deployment strategy, as it automatically
applies any pending SQL scripts and Database updates. SQL Deploy is
developed by SSW, so it’s nice looking, SEO friendly and an informative
website. Visit SSW website and collect more details
.........................................................................................................
.........................................................................................................
.........................................................................................................
! !154
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
(2) DispatchKing approached SSW to realize the idea that job delivery
shouldn’t be tracked on paper or spread sheets – it should be done in a
simple to use computer system. The result is a beautiful, state of the art
run-board tracking system combining ASP.NET MVC 2, Silverlight and Bing
Maps API. Visit DispatchKing to learn more about tracking system.
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………….
4.11 SUMMARY
Before beginning to build an e-Business, you must have a solid idea of the
product and services you want to offer via the Web. Surf the web to
discover what exists. Are the websites you find providing exceptional
services or could they offer more.
! !155
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
Websites
Static website: A static website is one that has web pages stored on the
server in the format that is sent to a client web browser. It is primarily
coded in Hypertext Markup Language, HTML.
! !156
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
Types of websites:
• Affiliate Archive
• Blogs Celebrity
• Community Content Corporate
• Dating e-Commerce
• Government Media Sharing Mirror
• Personal Phishing Torrent
Web Portals
A web portal or links page is a web site that functions as a point of access
to information on the World Wide Web. A portal presents information from
diverse sources in a unified way. Apart from the standard search engine
feature, web portals offer other services such as e-mail, news, stock prices,
information, databases and entertainment.
Types of portals:
Website Hosting
! !157
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
Web Design
Some of the problems associated with site layout can be solved by adding
a search engine. Searching features to make it easy to find items on your
site can be added for free through www.freefind.com.
Design directly affects our behavior towards objects, people and things. In
a website the design experience becomes even more important because
the website per se has to seduce the customer and make a sale (or sell
information).
A well designed website can do wonders for your corporate image and
sales.
! !158
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
e-Business Consulting
! !159
BUILDING AN E-BUSINESS: DESIGN, DEVELOPMENT AND MANAGEMENT
REFERENCE MATERIAL
Click on the links below to view additional reference material for this
chapter
Summary
PPT
MCQ
! !160
ONLINE MONETARY TRANSACTION
Chapter 5
ONLINE MONETARY TRANSACTION
Learning Objectives:
Structure:
5.1 Introduction
5.2 Credit Card Transactions
5.3 Online Credit Card Fraud and Security Issues
5.4 Digital Currency
5.4.1 Alignment with the Current Postal Service Mission and Role
5.5 Digital Wallets/e-Wallets
5.6 e-Billing/Invoicing
5.7 Online Stored Value Payment System
5.7.1 Smart Cards
5.8 Alternate Consumer Payment Options
5.8.1 Digital Accumulating Balance Payment System
5.8.2 Digital Checking Payment System
5.8.3 Wireless Payment System
5.9 Business-to-Business (B2B) Transactions
5.10 Short Case Study
5.11 Activities
5.12 Summary
5.13 Self Assessment Questions
! !161
ONLINE MONETARY TRANSACTION
5.1 INTRODUCTION
A credit card is different from a charge card: a charge card requires the
balance to be paid in full each month. In contrast, credit cards allow the
consumers a continuing balance of debt, subject to interest being charged.
A credit card also differs from a cash card, which can be used like currency
by the owner of the card.
Credit cards are issued by a credit card issuer, such as a bank or credit
union, after an account has been approved by the credit provider, after
! !162
ONLINE MONETARY TRANSACTION
When a purchase is made, the credit card user agrees to pay the card
issuer. The cardholder indicates consent to pay by signing a receipt with a
record of the card details and indicating the amount to be paid or by
entering a personal identification number (PIN). Also, many merchants now
accept verbal authorizations via telephone and electronic authorization
using the Internet, known as a card not present transaction (CNP).
Many banks now also offer the option of electronic statements, either in
lieu of or in addition to physical statements, which can be viewed at any
time by the cardholder via the issuer’s online website. Notification of the
availability of a new statement is generally sent to the cardholder’s e-mail
address. If the card issuer has chosen to allow it, the cardholder may have
other options for payment besides a physical check, such as an electronic
transfer of funds from a checking account. Depending on the issuer, the
cardholder may also be able to make multiple payments during a single
statement period, possibly enabling him or her to utilize the credit limit on
the card several times over.
Interest Charges
Credit card issuers usually waive interest charges if the balance is paid in
full each month, but typically will charge full interest on the entire
outstanding balance from the date of each purchase if the total balance is
not paid.
! !163
ONLINE MONETARY TRANSACTION
The credit card may simply serve as a form of revolving credit, or it may
become a complicated financial instrument with multiple balance segments
each at a different interest rate, possibly with a single umbrella credit limit,
or with separate credit limits applicable to the various balance segments.
Usually this compartmentalization is the result of special incentive offers
from the issuing bank, to encourage balance transfers from cards of other
issuers.
Grace Period
A credit card's grace period is the time the customer has to pay the
balance before interest is assessed on the outstanding balance. Grace
periods may vary, but usually range from 20 to 55 days depending on the
type of credit card and the issuing bank. Some policies allow for
reinstatement after certain conditions are met.
Benefits to Merchants
For merchants, a credit card transaction is often more secure than other
forms of payment, such as cheques, because the issuing bank commits to
pay the merchant the moment the transaction is authorized, regardless of
whether the consumer defaults on the credit card payment (except for
legitimate disputes, which are discussed below, and can result in charges
back to the merchant). In most cases, cards are even more secure than
cash, because they discourage theft by the merchant’s employees and
reduce the amount of cash on the premises. Finally, credit cards reduce the
back office expense of processing checks/cash and transporting them to
the bank.
Parties involved
! !164
ONLINE MONETARY TRANSACTION
! !165
ONLINE MONETARY TRANSACTION
Credit card security relies on the physical security of the plastic card as
well as the privacy of the credit card number. Therefore, whenever a
person other than the card owner has access to the card or its number,
security is potentially compromised. Once, merchants would often accept
credit card numbers without additional verification for mail order
purchases. It’s now common practice to only ship to confirmed addresses
as a security measure to minimise fraudulent purchases. Some merchants
will accept a credit card number for in-store purchases, whereupon access
to the number allows easy fraud, but many require the card itself to be
present, and require a signature. A lost or stolen card can be cancelled,
and if this is done quickly, will greatly limit the fraud that can take place in
this way. European banks can require a cardholder's security PIN be
entered for in-person purchases with the card.
The PCI DSS is the security standard issued by The PCI SSC (Payment
Card Industry Security Standards Council).
Credit card fraud is a wide-ranging term for theft and fraud committed
using a credit card or any similar payment mechanism as a fraudulent
source of funds in a transaction. The purpose may be to obtain goods
without paying, or to obtain unauthorized funds from an account. Credit
card fraud is also an adjunct to identity theft. According to the Federal
Trade Commission, while identity theft had been holding steady for the last
few years, it saw a 21% increase in 2008. However, credit card fraud, that
crime which most people associate with ID theft, decreased as a
percentage of all ID theft complaints for the sixth year in a row.
! !166
ONLINE MONETARY TRANSACTION
!
Figure 5.1: How an Online Credit Transaction Works
! !167
ONLINE MONETARY TRANSACTION
potentially safer, and less expensive than cash or checks, while providing
an indisputable proof of transaction.
These instruments are innovative in that they provide new ways to access
money, including through the Internet and mobile devices. However, their
users still need a bank account or a payment card, enabling traditional
bank and credit card networks to settle the payments.
Electronic fund transfers include any transfers of money between two bank
accounts initiated through an electronic terminal such as a computer; a
credit, debit, or prepaid card; an automated teller machine (ATM); a point-
of-sale (PoS) device; or a smart phone. In these cases, the intermediaries
are banks or other financial institutions where the sender and the receiver
hold an account. People who do not have a bank account generally send
and receive money through a variety of alternative providers,such as
Western Union®, Money Gram®, or the Postal Service, whose products
allow customers to conduct transfers in cash.
2. Payment Cards
All three card types allow holders to make purchases in stores or online
and to withdraw cash at an ATM. Credit and debit cards are tied to a bank
! !168
ONLINE MONETARY TRANSACTION
Figure 5.2: Primary Differences between Prepaid, Debit and Credit Cards
3. Internet Payments
! !169
ONLINE MONETARY TRANSACTION
4. Mobile Payments
5.4.1 Alignment with the Current Postal Service Mission and Role
! !170
ONLINE MONETARY TRANSACTION
Figure 5.3: The Evolution of the Postal Service’s Role in Serving the
Underbanked Market
A digital wallet functions is much like a physical wallet. The digital wallet
was first conceived as a method of storing various forms of electronic
money (e-cash), but with little popularity of such e-cash services, the
digital wallet has evolved into a service that provides internet users with a
convenient way to store and use online shopping information.
The term “digital wallet” is also increasingly being used to describe mobile
phones, especially smart phones, that store an individual's credentials and
utilize wireless technologies such as near field communication (NFC) to
carry out financial transactions.
! !171
ONLINE MONETARY TRANSACTION
Technology
A client side digital wallet requires minimal set up and is relatively easy to
use. Once the software is installed, the user begins by entering all the
pertinent information. The digital wallet is now set up. At the purchase/
check-out page of an e-Commerce site, the digital wallet software has the
ability to automatically enter the user information in the online form. By
default, most digital wallets prompt when the software recognizes a form in
which it can fill out, if you chose to fill out the form automatically, you will
be prompted for a password. This keeps unauthorised users from viewing
personal information stored on a particular computer.
ECML
! !172
ONLINE MONETARY TRANSACTION
checkout system, the digital wallet may fail to properly recognize the forms
fields. This problem has been eliminated by sites and wallet software that
use ECML technology. Electronic Commerce Modeling Language is a
protocol that dictates how online retailers structure and set up their
checkout forms. Participating e-Commerce vendors who incorporate both
digital wallet technology and ECML include: Microsoft, Discover, IBM,
Omaha Steaks and Dell Computers.
!
Electronic Wallet
! !173
ONLINE MONETARY TRANSACTION
!
Figure 5.4
It works almost like a Bluetooth where NFC enabled devices that are within
close proximity can choose to share and transfer files or information. Some
examples include:
• For example, when you take a picture from your phone, you can just
touch another phone and send the picture without any wired connection.
• You can send large document to another device just by touching them
together.
• You can download games and other kinds of application just by touching
the two gadgets together.
• It can also be used to send files that contain music from one computer to
another.
• You can make payments with an electronic wallet. Just as the name
suggest, it seems like a wallet because it is able to carry and store
! !174
ONLINE MONETARY TRANSACTION
The main purpose why the e-Wallet was developed was to make payments
faster, easier and more secure. As the payments are limited to your device,
and can only be processed in very close proximity to the second device, it
helps increase security that has been lacking in some other forms of
payment. Some key points of the electronic wallet are:
• It can store personal and important information in just one wallet such as
personal passwords and credit card information.
• It can also be used for online purchasing of items.
• It is very easy to use as it doesn't contain a large number of different
steps.
• It ensures that all your information is stored securely.
• It can be used very quickly to acquire the information you require.
• It works wirelessly, so no connections are necessary
! !175
ONLINE MONETARY TRANSACTION
• They are easy to use and very easy to understand how they work.
• They are mobile.
• They are widely accepted around the world, both online and in stores.
Having looked at the development of the e-Wallet and the advantages and
disadvantages of it, as well as for traditional debit/credit cards, it is
recommended that with the development of this new technology, people
start to look at incorporating an electronic wallet into their payment
options. However, the full benefits of this technology will not be realised
until it is more widely accepted by both seller and mobile manufacturers.
! !176
ONLINE MONETARY TRANSACTION
5.6 E-BILLING/INVOICING
Paytrust
• Users send bills directly to Paytrust which scans them and places them
online
• e-Mails customers about newly arrived bills and payment due dates
• Makes automatic payments on any bill up to a threshold amount
• Services to enable EBPP on a company's site
Derivion
Encirq
• Partners with banks that issue credit cards, presenting the consumer with
an illuminated statement (interactive statement, placing special offers
from retail merchants to correspond with the itemized charges on a
credit-card statement)
• Builds highly specific consumer profiles each time charges is received
! !177
ONLINE MONETARY TRANSACTION
!
Figure 5.5: Process and Optimisation Areas for Invoice/Bill Issuers
! !178
ONLINE MONETARY TRANSACTION
! !179
ONLINE MONETARY TRANSACTION
!
Figure 5.6: Process and Optimisation Areas for Invoice Recipients
!
Figure 5.7: Optimisation Scope for Organisations
! !180
ONLINE MONETARY TRANSACTION
Inbound
Source: Billentis
!
Figure 5.9: Supplier Direct Model
! !181
ONLINE MONETARY TRANSACTION
Source: Billentis
!
Figure 5.10: Buyer Direct Model
Source: Billentis
!
Figure 5.11: Consolidator Model
Source: Billentis
! !182
ONLINE MONETARY TRANSACTION
!
Figure 5.12: Total Invoice Management
Source: Billentis
!
Figure 5.13
! !183
ONLINE MONETARY TRANSACTION
There are two broad divisions in the taxonomy of these systems: offline
and online. Offline systems encode information electronically on a magnetic
strip or a computer chip and can be used to purchase goods or services.’
! !184
ONLINE MONETARY TRANSACTION
Online systems, on the other hand, use the encoding on the card to
identify the unique location of the cardholder’s “value store” in a
centralized data processing resource. This value store is maintained in an
electronic memory register. The card accepting terminal and the centralized
data processing resource are connected, either permanently or as required
at the time of the transaction, by means of a data communications channel
— hence the “online” designation.
Online stored value systems, where the cardholder is known to the system,
have found their primary application in campus card systems.
The crucial difference between online and offline systems is that copying a
card in an online system yields only an additional access device to a single
store of funds, while in an offline system, additional funds are created
fraudulently by duplication.
Card with computer chip embedded on its face, holds more information
than ordinary credit card with a magnetic strip.
! !185
ONLINE MONETARY TRANSACTION
• Have both a coiled antenna and a computer chip inside, enabling the
cards to transmit information
• Can require the user to have a password, giving the smart card a
security advantage over credit cards
• Information can be designated as “read only” or as “no access”
• Possibility of personal identity theft
! !186
ONLINE MONETARY TRANSACTION
• PaymentechTM
— Compatible with all enterprise resource planning (ERP) systems and can
adapt electronic records for companies, banks and each member of a
given transaction
! !187
ONLINE MONETARY TRANSACTION
• Order-fulfillment providers
!
Figure 5.14
TradeCard Feature
! !188
ONLINE MONETARY TRANSACTION
! !189
ONLINE MONETARY TRANSACTION
!
Figure 5.15
PayPal is a secure payments system that lets people buy online without
sharing their personal financial information. A PayPal user can purchase
goods or services online through their PayPal account with a credit card,
debit card, bank account or PayPal balance. PayPal enables businesses to
get paid electronically, in a number of different currencies. PayPal’s
advanced security techniques enable safe online transactions, offering both
businesses and consumers a convenient and safe way to pay and be paid
online. PayPal is an online payment processor now owned by eBay was the
first truly successful internet based e-Commerce payment system. The
PayPal Payments Standard Integration Guide (previously called Website
Payments Standard) describes how to integrate your website with PayPal
by using HTML buttons and forms. PayPal Payments Standard lets you
accept payments for:
! !190
ONLINE MONETARY TRANSACTION
• Single-item purchases with Buy Now buttons – Sell from websites that
offer single or mutually exclusive products.
• Multiple-item purchases with Add to Cart and View Cart buttons – Sell
from online stores with catalogs and shopping carts.
!
Figure 5.16
! !191
ONLINE MONETARY TRANSACTION
! !192
ONLINE MONETARY TRANSACTION
!
Figure 5.17
! !193
ONLINE MONETARY TRANSACTION
• Fills a niche that credit card companies avoided – individuals and small
merchants
5.11 ACTIVITIES
(a) According to tutorial which two links are necessary to use online Bill
Point online payment?
(b) What is the action taken by the seller at the close of the auction?
(c) Name three of the items required in the Bill Point Invoice?
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………….
(a) What must be four fields that must be filled out in the check payment
process?
! !194
ONLINE MONETARY TRANSACTION
…………………………………………………………………………………………………………………………
………………………....................................................................................
.........................................................................................................
.........................................................................................................
.........................................................................................................
........................................................................................................
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………….
5.12 SUMMARY
Credit card security relies on the physical security of the plastic card as
well as the privacy of the credit card number. Therefore, whenever a
person other than the card owner has access to the Security problems and
solutions.
! !195
ONLINE MONETARY TRANSACTION
A digital wallet functions much like a physical wallet. The digital wallet was
first conceived as a method of storing various forms of electronic money
(e-cash), but with little popularity of such e-cash services, the digital wallet
has evolved into a service that provides internet users with a convenient
way to store and use online shopping information.
Like a telephone bill, consumers are expected to pay the entire balance at
the end of month using checking or credit card account. Digital checking
payment system seeks to extend the functionality of existing checking
accounts for use as online shopping payment tool.
2. Explain with examples online credit card fraud and security issues.
! !196
ONLINE MONETARY TRANSACTION
REFERENCE MATERIAL
Click on the links below to view additional reference material for this
chapter
Summary
PPT
MCQ
! !197
ONLINE SECURITY
Chapter 6
ONLINE SECURITY
Learning Objectives:
Structure:
6.1 Introduction
6.2 Security Attacks and Threats
6.3 Information Security
6.4 Key Cryptography
6.5 Digital Signatures: Integrity in Public-key Systems
6.6 Short Case Study
6.7 Activities
6.8 Summary
6.9 Self Assessment Questions
! !198
ONLINE SECURITY
6.1 INTRODUCTION
A big problem with the Internet is that data is transmitted using telephone
technology, which means unauthorised users can intercept the data
relatively easily. Which is a bit of a pain, really?
2. The basic idea is that the retailer puts details of their products on a
website. Customers can put the stuff they want into an electronic basket
(by clicking on a button). They then pay using a credit card, and the
goods are delivered soon after.
3. Some people don’t like online shopping because they’re worried that
their credit card details might be intercepted and used to make
unauthorised purchases. Encryption software can reduce this risk.
! !199
ONLINE SECURITY
• The main way to reduce the risk of viruses is to use anti-virus software –
but it's important to use an up-to-date version because new viruses are
detected practically everyday.
! !200
ONLINE SECURITY
DNS Poisoning
! !201
ONLINE SECURITY
What is Phishing?
Phishers usually send you an e-mail in which they may ask you to ‘verify’
or ‘re-submit’ personal information by return.They could ask you to
complete an online form and may offer you something attractive like
money or a holiday if you do so.
Be alert for anyone requesting your bank account details, credit card
numbers, passwords, PIN numbers, Personal Public Service number (PPS)
or National Insurance number.
How will I know if I’ve been ‘phished’? Trust your instincts. If an e-mail
looks suspicious, delete it immediately or if it offers something that looks
too good to be true, it probably is. If it appears to come from your bank or
credit card company, inform their customer services department
immediately.
Trust your instincts. Remember, no reputable company will ever ask you to
give out personal details by e-mail. Never give out personal details by e-
mail, fax or in response to a pop up advertisement or unexpected website
address. Always check your credit card and bank statements for any
! !202
ONLINE SECURITY
The field of information security has grown and evolved much in recent
years. As a career choice there are many ways of gaining entry into the
field. The field offers many areas for specialization including Information
! !203
ONLINE SECURITY
! !204
ONLINE SECURITY
Risk Management
The CISA Review Manual 2006, provides the following definition of risk
management:
! !205
ONLINE SECURITY
There are two things in this definition that may need some clarification.
First, the process of risk management is an ongoing iterative process. It
must be repeated indefinitely. The business environment is constantly
changing and new threats and vulnerabilities emerge everyday. Second,
the choice of countermeasures (controls) used to manage risks must strike
a balance between productivity, cost, effectiveness of the countermeasure,
and the value of the informational asset being protected.
Risk is the likelihood that something bad will happen that causes harm to
an informational asset (or the loss of the asset). Vulnerability is a
weakness that could be used to endanger or cause harm to an
informational asset. A threat is anything (man-made or act of nature) that
has the potential to cause harm.
The likelihood that a threat will use a vulnerability to cause harm creates a
risk. When a threat does use a vulnerability to inflict harm, it has an
impact. In the context of information security, the impact is a loss of
availability, integrity, and confidentiality, and possibly other losses (lost
income, loss of life, loss of real property). It should be pointed out that it is
not possible to identify all risks, nor is it possible to eliminate all risk. The
remaining risk is called residual risk.
! !206
ONLINE SECURITY
4. Calculate the impact that each threat would have on each asset. Use
qualitative analysis or quantitative analysis.
For any given risk, Executive Management can choose to accept the risk
based upon the relative low value of the asset, the relative low frequency
of occurrence, and the relative low impact on the business. Or, leadership
may choose to mitigate the risk by selecting and implementing appropriate
control measures to reduce the risk. In some cases, the risk can be
transferred to another business by buying insurance or outsourcing to
another business. The reality of some risks may be disputed. In such cases
leadership may choose to deny the risk. This is itself a potential risk.
! !207
ONLINE SECURITY
Administrative controls form the basis for the selection and implementation
of logical and physical controls. Logical and physical controls are
manifestations of administrative controls. Administrative controls are of
paramount importance.
Logical controls (also called technical controls) use software and data to
monitor and control access to information and computing systems. For
example: passwords, network and host-based firewalls, network intrusion
detection systems, access control lists, and data encryption are logical
controls.
Physical controls monitor and control the environment of the work place
and computing facilities. They also monitor and control access to and from
such facilities. For example, doors, locks, heating and air conditioning,
smoke and fire alarms, fire suppression systems, cameras, barricades,
fencing, security guards, cable locks, etc. Separating the network and work
place into functional areas are also physical controls.
! !208
ONLINE SECURITY
! !209
ONLINE SECURITY
!
Figure 6.1
Public-key Cryptography
• Relation between both keys: What one key encrypts, the other one
decrypts, and vice versa. That means that if you encrypt something with
my public-key (which you would know, because it's public:), I would
need my private key to decrypt the message.
! !210
ONLINE SECURITY
!
Figure 6.2: Key-based Asymmetric Algorithms
! !211
ONLINE SECURITY
key from theprivate key, but very hard to compute the private key from the
public-key (which is the one everyone knows). In fact, some algorithms
need several months (and even years) of constant computation to obtain
the private key from the public-key.
!
Figure 6.3: Public-key Generation
The main disadvantage of using public-key systems is that they are not as
fast as symmetric algorithms.
! !212
ONLINE SECURITY
2. The message digest is encrypted using the sender’s private key. The
resulting encrypted message digest is the digital signature.
The digital signature is attached to the message, and sent to the receiver.
The receiver then does the following:
!
Figure 6.4: Digital signatures
3. Compares both message digests (the one sent by the sender as a digital
signature, and the one generated by the receiver). If they are not
exactly the same, the message has been tampered with by a third
party. We can be sure that the digital signature was sent by the sender
(and not by a malicious user) because only the sender's public-key can
decrypt the digital signature (which was encrypted by the sender's
private key; remember that what one key encrypts, the other one
decrypts, and vice versa). If decrypting using the public-key renders a
! !213
ONLINE SECURITY
faulty message digest, this means that either the message or the
message digest are not exactly what the sender sent.
! !214
ONLINE SECURITY
!
Figure 6.5
All of the protected parts of our website now use 128 bit encryption. This is
the same level of encryption used by online shopping site’s and even
! !215
ONLINE SECURITY
banks! We’ve achieved this, with no cost, by establishing our own “Root
Certification Authority”. That is basically a computer that issues digital
certificates for encrypting data. Unfortunately this "Root CA" is not trusted
by your computer yet, so that means you get that annoying security
warning every time you enter our website. To avoid the security warning
you will need to tell your computer to trust our “Root CA” (see the last
section on this page).
You have a “public-key” that is known to everyone and a “private key” that
is known only to you. Everything that is encrypted using this “public-key”
can ONLY be decrypted by using your “private key”. This means that if I
encrypt some data using your “public-key”, you will be the only person able
to decrypt it, because only you have the equivalent “private key”.
It also works the other way around. Anything that you encrypt using your
“private key” can ONLY be decrypted using your “public-key” – therefore
proving that the data (normally an e-mail in this case) came from you and
not from someone posing as you.
It is important to note that once data is encrypted with one of these keys it
CANNOT be decrypted using the same key, but ONLY the other key in that
“public/private key pair”.
When your computer makes a connection to our website everything that
you send to our server is encrypted using our public-key. This is exactly
what happens when you send us you user name and password. In this way
everything you type in and click on can only be decrypted by our server.
! !216
ONLINE SECURITY
BUT, I hear you say, what about the other way around? I don’t have a
public/private key pair, do I?
Well, yes and no. You don’t have a digital certificate, but for encrypted
connections your computer has created it's own public/private key pair.
This key does not prove who you are, like a digital certificate, so it is only
used to establish encrypted connections to other computers. Your
computer then sends that public-key to our server and everything our
server sends to your computer is encrypted using your computer’s public-
key, so that only your computer can decrypt it.
Just in case you are interested, the public-key of our server is below. You
can see this for yourself if you click on the “View Certificate” button on the
security warning you receive when entering our site. Of course, we're not
going to show you our private key!
To avoid the security warning you will need to tell your computer to trust
our "Root CA”.
! !217
ONLINE SECURITY
! !218
ONLINE SECURITY
In order to use these keys to encrypt data a special one way mathematical
function is used. This function uses circular arithmetic such as we use on a
clock. If you start at 0 and count around the clock 50 hours you’ll end up at
2, but if you only know the answer it is impossible to get back to the
original number. This is called a modular function, where the “mod” is the
number of hours on the clock face. For example, the above calculation
would be shown:
50 (mod 12) = 2
C = Me (mod N)
where:
C is the resulting encrypted number,
N is the multiple of the two prime numbers that make your private key
In order to decrypt the number you need calculate your private key “d”
according to the following formula:
e x d = 1 (mod (p – 1) x (q – 1))
Once that is done you can decrypt the message using this formula:
M = Cd (mod N)
! !219
ONLINE SECURITY
N is the multiple of the two prime numbers that make your private key
And there you have it.... Your friend has transmitted a number to you
without having to transmit a secret key.
You need to install the digital certificate of the Cohn Family Root
Certification Authority into your computer. Follow these steps*:
2. Click on “Open”.
! !220
ONLINE SECURITY
! !221
ONLINE SECURITY
6. Click on “Finish”.
! !222
ONLINE SECURITY
7. Click on “Yes”.
6.7 ACTIVITIES
! !223
ONLINE SECURITY
6.8 SUMMARY
A big problem with the Internet is that data is transmitted using telephone
technology, which means unauthorised users can intercept the data
relatively easily. Which is a bit of a pain, really. Pharming is a derivate from
phishing. Phishing mean fishing ( the act of catching fish). In computer
slang, fish means user name and password. Both word use “ph” instead of
an “f” in this slang.
! !224
ONLINE SECURITY
! !225
ONLINE SECURITY
REFERENCE MATERIAL
Click on the links below to view additional reference material for this
chapter
Summary
PPT
MCQ
! !226
E-COMMERCE MARKETING CONCEPTS
Chapter 7
e-COMMERCE MARKETING CONCEPTS
Learning Objectives:
Structure:
7.1 Introduction
7.2 Defining Internet Marketing Basics
7.2.1 Marketing Basics Covered
7.2.2 Internet Marketing Defined
7.3 Role of the World Wide Web
7.3.1 Concept of World Wide Web Marketing
7.3.2 Consumers Online
7.3.3 Understanding the Online Customers
7.3.4 Online Marketer's Persuasion Tools
7.4 Internet Marketing Technologies
7.4.1 B2B Market
7.4.2 B2C Market
7.5 Creative e-Mail Marketing
7.5.1 e-Mail Marketing Benefits
7.5.2 Value of e-Mail
7.5.3 How to Use e-Mail Marketing
7.6 Data Base, Data Warehouse and Data Mining Concepts
7.6.1 What is a Data Warehouse?
7.6.2 What is Data Mining?
! !227
E-COMMERCE MARKETING CONCEPTS
7.1 INTRODUCTION
A wide range of industries are leveraging the power of the Internet and
World Wide Web to globalize their brick and mortar businesses. Every
industry be it Information Technology, Finance, Infrastructure or even
Transportation is affected by the Internet. For large software companies
such as Microsoft, Oracle, IBM and Dell the answer is ‘very significant’ –
Dell now gains over 90% of its multi-billion dollar global revenue online. It
also conducts many of its other business processes such as new product
development and technical customer service online.
! !228
E-COMMERCE MARKETING CONCEPTS
! !229
E-COMMERCE MARKETING CONCEPTS
!
Figure 7.1
! !230
E-COMMERCE MARKETING CONCEPTS
! !231
E-COMMERCE MARKETING CONCEPTS
!
Figure 7.2
The World Wide Web Marketing concept has gained rapid popularity, firstly
due to the lowcost and the global nature of the Internet. In these days of
vast World Wide Web use, people generally have the intention to attach
everything of their regular life to the Internet. So the concept of promotion
and marketing get co-related through the web. The second cause of the
popularity of this concept is the interactive nature of the Internet. World
Wide Web marketing is a procedure of establishing and promoting a group
using the online medium. The scope of this marketing is beyond the
website building or operating through the website.
! !232
E-COMMERCE MARKETING CONCEPTS
!
Figure 7.3: WWW Marketing Types
Blog Marketing: When the World Wide Web Marketing is done through the
uses of the webblogs, then that type of online marketing is called the Blog
Marketing.
! !233
E-COMMERCE MARKETING CONCEPTS
The main advantage of the World Wide Web Marketing is the one-on-one
interaction between the manufacturer and the customer. The mails or the
messages are sent to the customers in bulk but when the customers open
the mailboxes, they receive mail addressed directly to them. Among the
other advantages of World Wide Web Marketing we can include the
demographics targeting by the online marketers, measurability, customer
response and the immediate results.
A majority of people in India are not aware of the World Wide Web hence,
the Internet marketing strategy could go in vain. Another disadvantage is
that customers can demand seeing and feeling the product physically
rather than on the Internet.
Online shopping behavior (also called online buying behavior and Internet
shopping/buying behavior) refers to the process of purchasing products or
services via the Internet. The process consists of five steps similar to those
associated with traditional shopping behavior. In the typical online
shopping process, when potential consumers recognize a need for some
merchandise or service, they go to the Internet and search for need-
related information. However, rather than searching actively, at times
potential consumers are attracted by information about products or
services associated with the felt need. They then evaluate alternatives and
choose the one thatbest fits their criteria for meeting the felt need. Finally,
a transaction is conducted and post-sales services provided. Online
shopping attitude refers to consumers' psychological state in terms of
making purchases on the Internet.
! !234
E-COMMERCE MARKETING CONCEPTS
analytics that online businesses require, particularly when the website data
needs to be enriched with other enterprise data sources for a more
comprehensive story. This means building analytic applications that meet
your unique requirements.
Online consumers are time conscious and are often willing to gamble with
their money rather than time as it is impossible to recover lost time, where
a moderate financial loss can be compensated. Consumers will appreciate
businesses, which value for customer’s time by employing technology,
tools, information and customer service.
!
Figure 7.4
Source: mouthshut.com
! !235
E-COMMERCE MARKETING CONCEPTS
! !236
E-COMMERCE MARKETING CONCEPTS
The first step in developing your marketing strategy for B2B is similar to
the first step in a B2C strategy: identify who the customer is and why they
need to hear your message. From there, the marketing activities diverge.
The volume of B2B transactions is much higher than the volume of B2C
transactions. One reason for this is that businesses have adopted electronic
commerce technologies in greater numbers than consumers. Also, in a
typical supply chain there will be many B2B transactions but only one B2C
transaction, as the completed product is retailed to the end customer.
! !237
E-COMMERCE MARKETING CONCEPTS
B2B Standards
e-Marketplace
! !238
E-COMMERCE MARKETING CONCEPTS
Vertical e-Marketplace
Horizontal e-Marketplace
No-frills e-Marketplace
! !239
E-COMMERCE MARKETING CONCEPTS
efficiently and flexibly, to work more closely with suppliers and partners,
and to better satisfy the needs and expectations of their customers.
Subsets
5. VoIP
6. content management system
7. e-Mail
8. voice mail
9. Web conferencing
10. Digital work flows (or business process management)
! !240
E-COMMERCE MARKETING CONCEPTS
Models
! !241
E-COMMERCE MARKETING CONCEPTS
! !242
E-COMMERCE MARKETING CONCEPTS
!
Figure 7.6
Source: saleswork.com
• Relationship driven
• Maximize the value of the relationship
• Small, focused target market
• Multi-step buying process, longer sales cycle
• Brand identity created on personal relationship
• Educational and awareness building activities
• Rational buying decision based on business value
! !243
E-COMMERCE MARKETING CONCEPTS
e-markets are simply defined as websites where buyers and sellers interact
with each other and conduct transactions. The more common B2B
examples and best practice models are IBM, Hewlett Packard (HP), Cisco
and Dell. Cisco, for instance, receives over 90% of its product orders over
the Internet. Most B2B applications are in the areas of supplier
management (especially purchase order processing), inventory
management (i.e., managing order-ship-bill cycles), distribution
management (especially in the transmission of shipping documents),
channel management (i.e., information dissemination on changes in
operational conditions), and payment management (e.g., electronic
payment systems or EPS).
! !244
E-COMMERCE MARKETING CONCEPTS
!
Figure 7.7
Source: buzzle.com
• Product driven
• Maximize the value of the transaction
• Large target market
• Single step buying process, shorter sales cycle
• Brand identity created through repetition and imagery
• Merchandising and point of purchase activities
• Emotional buying decision based on status, desire, or price
! !245
E-COMMERCE MARKETING CONCEPTS
For example, the goal of an e-Mail campaign for a B2C company is to get
consumers to buy the product immediately. The e-Mail will take the
consumer to a landing page on the website that is designed to sell the
product and make purchasing very easy by integrating the shopping cart
and checkout page into the flow of the transaction. Any more than a couple
of clicks and the customer are likely to abandon the shopping cart.
The B2C buyer is usually looking for the best price and will research the
competition prior to shopping. Another factor that does come into play,
however, is whether the buyer trusts the retail outlet, either the store front
or on the Internet. Although you can find the products on the Internet at
many different price points, many consumers will still buy from a trusted
source. In that respect, B2C marketing needs to convince the person to
buy and build trust and loyalty with their customers.
! !246
E-COMMERCE MARKETING CONCEPTS
! !247
E-COMMERCE MARKETING CONCEPTS
e-Mail creates quick response cycles: e-Mail cuts response times down
from as much as six to eight weeks for direct mail to as little as 48 hours in
most cases.
!
Figure 7.8
Source: akshatinfotech.com
e-Mail has wide reach: e-Mail is the most widely used facet of the
Internet and is part of many people’s daily routine. It is a communication
! !248
E-COMMERCE MARKETING CONCEPTS
e-Mail can be highly customized: When e-Mail lists work together with
customer databases, even large-volume campaigns can be customized so
that messages include specific customer data. Database integration also
allows select customer groups to receive messages appropriate for only a
portion of database entries (for example, ZIP Code, gender, or income-
based mailings can be easily selected and targeted for delivery).
!
Figure 7.9
Source: keywordpictures.com
! !249
E-COMMERCE MARKETING CONCEPTS
However, if you choose print format to deliver the newsletter, there is very
little you can do to quantify what portions of the newsletter are popular
and are being read. e-Mail makes a difference. This is why more and more
organizations and companies are turning to e-Mail to conduct marketing
initiatives.
! !250
E-COMMERCE MARKETING CONCEPTS
! !251
E-COMMERCE MARKETING CONCEPTS
Account Notification!
Dear Adviser,
For more Information regarding this altert, please log into your account at:
https://marketingsolutions.login.yahoo.com/adju/displaySignin.do and click the
“View All” link in
the Alterts panel, for additional help, please visit our Help Center.
Sincerely,
Please do not directly to this email, as we are unable to receive replies at this
address. To contact Yahoo!
https://marketingsolutions.login.yahoo.com/adju/displaySignin.do and click the
Customer Support
link in the upper rights of the page.
Figure 7.10
Source: pagetrafficbuzz.com
! !252
E-COMMERCE MARKETING CONCEPTS
!
Figure 7.11
! !253
E-COMMERCE MARKETING CONCEPTS
• Technique for assembling and managing data from various sources for
the purpose of answering business questions. Thus making decisions that
were not previously possible
• A decision support database maintained separately from the
organization’s operational database.
! !254
E-COMMERCE MARKETING CONCEPTS
!
Figure 7.12
7.6.2 What is Data Mining?
! !255
E-COMMERCE MARKETING CONCEPTS
These are all the questions that can probably be answered if information
hidden among megabytes of data in your database can be found explicitly
and utilized. Modeling the investigated system, discovering relations that
connect variables in a database are the subject of data mining.
Modern computer data mining systems self learn from the previous history
of the investigated system, formulating and testing hypotheses about the
rules which this system obeys. When concise and valuable knowledge
about the system of interest had been discovered, it can and should be
incorporated into some decision support system which helps the manager
to make wise and informed business decisions.
Data might be one of the most valuable assets of your corporation – but
only if you know how to reveal valuable knowledge hidden in raw data.
Data mining allows you to extract diamonds of knowledge from your
historical data and predict outcomes of future situations. It will help you
optimize your business decisions, increase the value of each customer and
communication, and improve satisfaction of customer with your services.
! !256
E-COMMERCE MARKETING CONCEPTS
In all these cases data mining can help you reveal knowledge hidden in
data and turn this knowledge into a crucial competitive advantage. Today
increasingly more companies acknowledge the value of this new
opportunity and turn to Megaputer for leading edge data mining tools and
solutions that help optimizing their operations and increase your bottom
line.
!
Figure 7.13
Source: electronicbranding.blogspot.com
! !257
E-COMMERCE MARKETING CONCEPTS
! !258
E-COMMERCE MARKETING CONCEPTS
The Web page is not just another channel designed to increase visibility
and access; it is rapidly becoming the shop window for many players in the
information industry. The first impact that a digital information provider
makes on a potential user or customer, and the greeting that they provide
to returning customers is embedded in the home page, and the other parts
of the website those users frequently visit. A well designed digital
experience will also embed opportunities for e-Mail, telephone or personal
contact with service agents (i.e., people) and components of service
delivery (as embedded in functional elements of the website such as a
search engine, transactions to deliver print or electronic copies, or the
delivery of other items Online Information Review ordered through the
website). Service agents and service delivery can reinforce the initial
message or detract from it, but the initial message is communicated
through the relatively impersonal means of the Web page.
! !259
E-COMMERCE MARKETING CONCEPTS
!
Figure 7.14
Source: newscrash.blogspot.com
! !260
E-COMMERCE MARKETING CONCEPTS
and fresh identity online, e.g. smile.co.uk. There are also a limited number
of successful online brands, such as Amazon.com, yahoo.com, and
Google.com. A key agenda has been to balance the need to protect and not
corrupt established brands as established organizations enter risky “new
marketplaces” whilst leveraging the brand equity of existing brands. In
other words the issue has been to create a sense of “the same credibility,
but a different presentation”. For example, at the symbolic level, Barnes &
Noble achieved this by retaining the offline parent brand Barnes & Noble,
but launched using the same name, but in a different presentation,
barnesandnoble.com.
The earlier click vs. brick debate has now been replaced by a recognition
that businesses need to take a new look at their channels strategies, and
to understand both the service and the marketing communication that
customers want delivered through each channel, and to develop a robust
multi-channel strategy.
! !261
E-COMMERCE MARKETING CONCEPTS
!
Figure 7.15
Source: intechventure.com.
! !262
E-COMMERCE MARKETING CONCEPTS
Horizontal Integration occurs across the marketing mix and across business
functions – for example, production, finance, distribution and
communications should work together and be conscious that their decisions
and actions send messages to customers.
While different departments such as sales, direct mail and advertising can
help each other through Data Integration. This requires a marketing
information system which collects and shares relevant data across different
departments.
! !263
E-COMMERCE MARKETING CONCEPTS
!
Figure 7.16: Model for communication migration
The Internet has changed the way business is done in the current world.
The variables of segmentation, targeting and positioning are addressed
differently. The way new products and services are marketed have changed
even though the aim of business in bringing economic and social values
remain unchanged. Indeed, the bottom line of increasing revenue and
profit are still the same. Marketing has evolved to more of connectedness,
due to the new characteristics brought in by the Internet. Marketing was
! !264
E-COMMERCE MARKETING CONCEPTS
once seen as a one way, with firms broadcasting their offerings and value
proposition. Now it is seen more and more as a conversation between
marketers and customers. Marketing efforts incorporate the “marketing
mix”. Promotion is one element of the marketing mix. Promotional
activities include advertising (by using different media), sales promotion
(sales and trades promotion), and personal selling activities. It also
includes Internet marketing, sponsorship marketing, direct marketing,
database marketing and public relations. Integration of all these
promotional tools, along with other components of the marketing mix, is a
way to gain an edge over a competitor.
The starting point of the IMC process is the marketing mix that includes
different types of marketing, advertising, and sales efforts. Without a
complete IMC plan there is no integration or harmony between client and
customers. The goal of an organization is to create and maintain
communication throughout its own employees and throughout its
customers.
1. Situation analysis
2. Marketing objectives
3. Marketing budget
! !265
E-COMMERCE MARKETING CONCEPTS
Several shifts in the advertising and media industry have caused IMC to
develop into a primary strategy for marketers:
2. From mass media to more specialized (niche) media, which are centered
on specific target audiences?
! !266
E-COMMERCE MARKETING CONCEPTS
!
Figure 7.17
Source: moontravel.co.cc
Search Engine Marketing puts you in front of the people who are searching
for what you are selling. We place advertisements on the world’s leading
search engines that are triggered to display when people search for certain
“keywords” or phrases. This allows you to drive traffic to your website and
show them why their search should end with your company. Just as each
company has unique needs, Renewal Marketing offers various online
marketing services designed for our client'’ specific goals.
Objectives:
It does most of its business online, and just like any online retailer it was
interested in driving more traffic to its site. It came to Renewal Marketing
looking for help with its internet marketing campaigns.
! !267
E-COMMERCE MARKETING CONCEPTS
packages, it only truly benefits from increased traffic when that traffic is
comprised of people planning a vacation.
Renewal Marketing designed pay per click campaigns with these specific
needs of Air Consolidators, in mind.
Source: www.airconsolidators.com.
7.10 ACTIVITIES
(1) www sane.com Sane Solutions offers Net Tracker, a log file analysis
tools. Visit the site for on line demo.
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
! !268
E-COMMERCE MARKETING CONCEPTS
7.11 SUMMARY
A wide range of industries are leveraging the power of the Internet and
World Wide Web to globalize their brick and mortar businesses. Every
industry be it Information Technology, Finance, Infrastructure or even
Transportation is affected by the Internet.
The World Wide Web marketing concept has gained rapid popularity, firstly
due to the lowcost and the global nature of the Internet. In these days of
vast World Wide Web use, people generally have the intention to attach
everything of their regular life to the Internet. So the concept of promotion
and marketing get co-related through the web. The second cause of the
popularity of this concept is the interactive nature of the Internet.
! !269
E-COMMERCE MARKETING CONCEPTS
Online shopping behavior (also called online buying behavior and Internet
shopping/buying behavior) refers to the process of purchasing products or
services via the Internet. The process consists of five steps similar to those
associated with traditional shopping behavior. In the typical online
shopping process, when potential consumers recognize a need for some
merchandise or service, they go to the Internet and search for need-
related information. However, rather than searching actively, at times
potential consumers are attracted by information about products or
services associated with the felt need.
Online consumers are time conscious and are often willing to gamble with
their money rather than time as it is impossible to recover lost time, where
a moderate financial loss can be compensated. Consumers will appreciate
businesses, which value for customer's time by employing technology,
tools, information and customer service.
! !270
E-COMMERCE MARKETING CONCEPTS
about the system you study from the collected data. Managers need to
take a systematic approach to the development of brands in the online
marketplace. A model for an online brand development process is
proposed, and its stages are discussed below. It is however important to
remember that this model focuses on what the business can do to build the
brand. Ultimately, a brand is only as good as the brand image that it
generates in the minds of consumers.
Horizontal Integration occurs across the marketing mix and across business
functions – for example, production, finance, distribution and
communications should work together and be conscious that their decisions
and actions send messages to customers.
The Internet has changed the way business is done in the current world.
The variables of segmentation, targeting and positioning are addressed
differently. The way new products and services are marketed have changed
even though the aim of business in bringing economic and social values
remain unchanged. Indeed, the bottom line of increasing revenue and
profit are still the same. Marketing has evolved to more of connectedness,
due to the new characteristics brought in by the Internet.
! !271
E-COMMERCE MARKETING CONCEPTS
! !272
E-COMMERCE MARKETING CONCEPTS
REFERENCE MATERIAL
Click on the links below to view additional reference material for this
chapter
Summary
PPT
MCQ
! !273
LEGAL, ETHICAL, SOCIAL AND GLOBAL ISSUES
Chapter 8
LEGAL, ETHICAL, SOCIAL AND GLOBAL
ISSUES
Learning Objectives:
Structure:
8.1 Introduction
8.2 Understanding Various Legal, Ethical and Social Issues
8.3 Legal Issues Specific to e-Commerce
8.4 Privacy and Information Rights
8.5 Intellectual Property Rights
8.6 Cybercrime
8.7 Social and Political Issues
8.8 Short Case Study
8.9 Activities
8.10 Summary
8.11 Self Assessment Questions
! !274
LEGAL, ETHICAL, SOCIAL AND GLOBAL ISSUES
8.1 INTRODUCTION
Confidentiality is the term refer as the ethical and professional duty which
is performed on not to disclose any inappropriate information to a third
party. Certain professionals who hold Certified Confidentiality Officer (CCO)
certification apply for the confidentiality clause because of their legal or
ethical requirements.
! !275
LEGAL, ETHICAL, SOCIAL AND GLOBAL ISSUES
Ethics in e-Business
It is hard to gain trust on the web because customers do not know you.
Thus, ethics is important in e-Business if an organization wants people to
trust it and do business with it.
! !276
LEGAL, ETHICAL, SOCIAL AND GLOBAL ISSUES
Ethical Issues
Ethics is the study of principles that individuals and organizations can use
to determine right and wrong course of action. Basic ethical concepts are
responsibility, accountability and liability.
! !277
LEGAL, ETHICAL, SOCIAL AND GLOBAL ISSUES
Web Tracking
e-Businesses draw information on how visitors use a site through log files.
Analysis of log file means turning log data into application service or
installing software that can pluck relevant information from files in-house.
Companies track individual’s movement through tracking software and
cookie analysis. Programs such as cookies raise a batch of privacy
concerns. The tracking history is stored on your PC’s hard disk, and any
time you revisit a website, the computer knows it. Many smart end-users
install programs such as Cookie cutters, Spam Butcher, etc., which can
provide users some control over the cookies.
The battle between computer end users and web trackers is always going
on with a range of application programs. For example, software such as
Privacy Guardian, My Privacy, etc., can protect user’s online privacy by
erasing browser’s cache, surfing history and cookies. To detect and remove
spyware specially designed programs like Ad-Aware are present. A data
miner application, SahAgent collects and combines Internet browsing
history of users and sends it to servers. The battle goes on!
Privacy
! !278
LEGAL, ETHICAL, SOCIAL AND GLOBAL ISSUES
The first type of service (matching and providing information) can be fully
automated, and this service is likely to be in e-marketplaces and portals
that provide free services. The value added service requires expertise and
this can only be partially automated. The phenomenon by which
Intermediaries, who provide mainly matching and providing information
services, are eliminated is called Disintermediation.
The brokers who provide value added services or who manage electronic
intermediation (also known as info mediation), are not only surviving but
may actually prosper; this phenomenon is called Reinter mediation.
T h e t ra d i t i o n a l s a l e s c h a n n e l w i l l b e n e g a t i ve l y a f f e c t e d by
disintermediation. The services required to support or complement e-
Commerce are provided by the web as new opportunities for reinter
mediation. The factors that should be considered here are the enormous
number of participants, extensive information processing, delicate
negotiations, etc. They need a computer mediator to be more predictable.
Legal Issues
! !279
LEGAL, ETHICAL, SOCIAL AND GLOBAL ISSUES
Copyright
The copyright laws protect Intellectual property in its various forms, and
cannot be used freely. It is very difficult to protect Intellectual property in
e-Commerce. For example, if you buy software you have the right to use it
and not the right to distribute it. The distribution rights are with the
copyright holder. Also, copying contents from the website also violates copy
right laws.
Domain Names
Another issue to look out for is Cyber squatting, which refers to the
practice of registering domain names with the desire of selling it at higher
prices.
! !280
LEGAL, ETHICAL, SOCIAL AND GLOBAL ISSUES
The Internet has reduced the geographic boundaries which help the
organizations to conduct extensive research and planning to enter the e-
Commerce arena. Internet technology has a great effect on the global
trade which includes multitude of products and services.
e-Marketing tools used by the online travel industry helps the consumers to
purchase travel services in a convenient manner. However, many
businesses and consumers are still wary of conducting their business over
the Internet because of the shortfall of the predictable legal environment
governing transactions.
! !281
LEGAL, ETHICAL, SOCIAL AND GLOBAL ISSUES
The law makes parents to control the information that is being collected by
their children online and how such types of information are used by them.
(FTC, 2006) Industry practices of web developers in the United States,
Canada and Europe were studied by the Federal Trade Commission (FTC).
In a FTC report to Congress “four widely accepted fair information practices
regarding the collection of personal identifying information from or about
consumers online are Notice, Choice, Access and Security.” (FTC, 1998)
FTC guidelines help the consumer-oriented commercial websites to adopt
four widely accepted information practices:
! !282
LEGAL, ETHICAL, SOCIAL AND GLOBAL ISSUES
For example, if you want to book reservations at a Holiday Inn hotel and
you go to holidayinn.com, you get the website for a hotel at Niagara Falls,
New York; to get to the hotel chain’s website, you have to go to holiday-
inn.com. Several cases of disputed names are already in court. An
international arbitration organization is available as an alternative to the
courts. The problem of domain names was alleviated somewhat in 2001,
after several upper-level names were added to “com” (such as “info” and
“coop”).
Taxes and other fees, federal, state, and local authorities are scrambling to
figure out how to get a piece of the revenue created electronically. The
problem is particularly complex for interstate and international commerce.
For example, some claim that even the state in which a server is located
deserves to receive some sales tax from an e-Commerce transaction.
Others say that the state in which the seller is located deserves the entire
sales tax (or value-added tax, VAT, in some countries).
! !283
LEGAL, ETHICAL, SOCIAL AND GLOBAL ISSUES
the Internet in the United States and many other countries (sales tax
only),which could remain valid until fall 2006.
! !284
LEGAL, ETHICAL, SOCIAL AND GLOBAL ISSUES
Board members are being trusted and it is their fiduciary duty to honor the
business’s need to keep certain information confidential.
The second postulate says that these security mechanisms must involve:
• Prevention
• Tracking
• Corrective actions.
The third postulate says that the security mechanism need real time
exposure and the tactical assessments that have been taken into account
are:
• The risk or threat to the whole business;
• The acceptable level of risk or threat;
! !285
LEGAL, ETHICAL, SOCIAL AND GLOBAL ISSUES
The fourth postulate says that the security mechanism must specially
address the following policies and procedures to produce effective and
tangible results.
The sixth postulate says that the current business risks linked to each
other create a complex co-dependency. Therefore the management of
initial frontline responses (e.g., guard actions and responsibilities at a
building entrance) has passed into the arena of comprehensive security
management.
The seventh postulate says that the security strategy must determine the
nature of Legal and Ethical Issues risk in detail, in addition to specifying
the response plan.
The eighth postulate says that the security mechanism must collect and
spread information about security-related business processes so as to
manage the flow of information and the reputation of the business.
The ninth postulate says that if the security mechanism becomes effective
it has to analyze recruiting information from different sources and use this
information to protect the business.
The tenth postulate says that the security mechanism must be planned-in
advance to analyze what happens on the next business day after a serious
adverse event.
! !286
LEGAL, ETHICAL, SOCIAL AND GLOBAL ISSUES
Intellectual property rights are the rights given to persons over the
creations of their minds. They usually give the creator an exclusive right
over the use of his/her creation for a certain period of time.
• Patents
• Trademarks
• Copyrights
• Geographical Indications
• Industrial Designs
The basic obligation in the area of patents is that, invention in all branches
of technology whether products or processes shall be patentable if they
meet the three tests of being new, involving an inventive step and being
capable of industrial application. In addition to the general security
exemption which applied to the entire TRIPS Agreement, specific
exclusions are permissible from the scope of patentability of inventions, the
prevention of whose commercial exploitation is necessary to protect public
order or morality, human, animal, plant life or health or to avoid serious
prejudice to the environment. Further, members may also exclude from
patentability of diagnostic, therapeutic and surgical methods of the
treatment of human and animals and plants and animal other than
! !287
LEGAL, ETHICAL, SOCIAL AND GLOBAL ISSUES
India had already implemented its obligations under Articles 70.8 and 70.9
of TRIP Agreement.
Trademarks
Intellectual property rights are customarily divided into two main areas:
The rights of authors of literary and artistic works (such as books and other
writings, musical compositions, paintings, sculpture, computer programs
and films) are protected by copyright, for a minimum period of 50 years
after the death of the author.
! !288
LEGAL, ETHICAL, SOCIAL AND GLOBAL ISSUES
Industrial property can usefully be divided into two main areas. One area
can be characterized as the protection of distinctive signs, in particular
trademarks (which distinguish the goods or services of one undertaking
from those of other undertakings) and geographical indications (which
identify a good as originating in a place where a given characteristic of the
good is essentially attributable to its geographical origin).
The protection of such distinctive signs aims to stimulate and ensure fair
competition and to protect consumers, by enabling them to make informed
choices between various goods and services. The protection may last
indefinitely, provided the sign in question continues to be distinctive.
! !289
LEGAL, ETHICAL, SOCIAL AND GLOBAL ISSUES
8.6 CYBERCRIME
Examples of Cybercrime
Data Crimes
! !290
LEGAL, ETHICAL, SOCIAL AND GLOBAL ISSUES
Network Crimes
Access Crimes
Related Crimes
! !291
LEGAL, ETHICAL, SOCIAL AND GLOBAL ISSUES
But few have the legal and technical resources necessary to address the
complexities of adapting terrestrial criminal statutes to cyberspace. A
coordinated, public-private partnership to produce a model approach can
help eliminate the potential danger from the inadvertent creation of cyber
crime havens.
The weak state of global legal protections against cyber crime suggests
three kinds of action.
! !292
LEGAL, ETHICAL, SOCIAL AND GLOBAL ISSUES
!
Figure 8.1: The moral dimension of an internet society
! !293
LEGAL, ETHICAL, SOCIAL AND GLOBAL ISSUES
e-Commerce and the Internet have raised so many ethical, social and
political issues that it is difficult to classify them all and hence complicated
to see their relationship to one another. Clearly ethical, social, and political
issues are interrelated. One way to organize the ethical, social, and political
dimensions surrounding e-Commerce is shown in Fig 8.1
The ethical dilemmas you face as a manager of business using the web
reverberate and are reflected in social and political debates. The major
ethical, social, and political issues that have developed around e-
Commerce over last ten years can be categorized into four major
dimensions as follows.
Information rights
Property rights
Governance
! !294
LEGAL, ETHICAL, SOCIAL AND GLOBAL ISSUES
Governance has to do with social control. Who will control the internet?
Who will control the process of e-Commerce, the content, and the
activities? Because internet and e-Commerce are so closely interconnected,
controlling e-Commerce also involves regulating Internet protocols.
Expedia is very much concerned with security and privacy of its customers.
Travelocity
! !295
LEGAL, ETHICAL, SOCIAL AND GLOBAL ISSUES
Firewall that act as shields to our computer networks makes the Travelocity
systems very much protected.
International issues and global barriers help the Travelocity to improve its
infrastructure to provide support to global pricing and taxation by its
leveraging parent company Sabre’s back-end system, which already
ensures proper handling of international pricing. These improvements
make Travelocity offer services to customers in 94 countries. (Goodridge
E., 2000).
Orbitz
Their privacy policy explains the principles and practices that apply to the
Information collected from users which are personal in nature for services
on the company site, in telephone or e-mail communications or in
interviews, surveys, sweepstakes, contests or raffles. Simply put, without
the consumer’s knowledge and permission, Orbitz will not collect their
personal information; nor disclose their personal information to third
parties.
! !296
LEGAL, ETHICAL, SOCIAL AND GLOBAL ISSUES
Personal Information
A company could risk its success and livelihood by not abiding by the law
or allowing private information or data to become compromised. Expedia,
Travelocity and Orbitz, e-Commerce sites do business in international
markets and have addressed these issues by working with local countries
and regions on how to best address the regulations of their respective
geographic areas to ensure that each is compliant and are acting within the
local laws.
8.9 ACTIVITIES
(1)Visit eGroups.com.
This site allows joining e-mail with people having interests similar to one.
When the e-mail is sent. It is distributed to whole group. Users can select
their own group by selecting members. Form your own group on any hobby
or subject of your interest.
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
! !297
LEGAL, ETHICAL, SOCIAL AND GLOBAL ISSUES
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
8.10 SUMMARY
Confidentiality is the term refer as the ethical and professional duty which
is performed on not to disclose any inappropriate information to a third
party. Certain professionals who hold Certified Confidentiality Officer (CCO)
certification apply for the confidentiality because of their legal or ethical
requirements.
! !298
LEGAL, ETHICAL, SOCIAL AND GLOBAL ISSUES
e-Businesses draw information on how visitors use a site through log files.
Analysis of log file means turning log data into application service or
installing software that can pluck relevant information from files in-house.
Companies track individual’s movement through tracking software and
cookie analysis. Programs such as cookies raise a batch of privacy
concerns. The tracking history is stored on your PC’s hard disk, and any
time you revisit a website, the computer knows it. Many smart end-users
install programs such as Cookie cutters, Spam Butcher, etc which can
provide users some control over the cookies.
The copyright laws protect Intellectual property in its various forms, and
cannot be used freely. It is very difficult to protect Intellectual property in
e-Commerce. For example, if you buy software you have the right to use it
and not the right to distribute it.
! !299
LEGAL, ETHICAL, SOCIAL AND GLOBAL ISSUES
Intellectual property rights are the rights given to persons over the
creations of their minds. They usually give the creator an exclusive right
over the use of his/her creation for a certain period of time.
• Patents
• Trademarks
• Copyrights
• Geographical Indications
• Industrial Designs
e-Commerce and the Internet have raised so many ethical, social and
political issues that it is difficult to classify them all and hence complicated
to see their relationship to one another. Clearly ethical, social, and political
issues are interrelated.
Governance has to do with social control. Who will control the internet?
Who will control the process of e-Commerce, the content, and the
activities? Because internet and e-Commerce are so closely
interconnected,controlling e-Commerce also involves regulating internet
protocols.
! !300
LEGAL, ETHICAL, SOCIAL AND GLOBAL ISSUES
! !301
LEGAL, ETHICAL, SOCIAL AND GLOBAL ISSUES
REFERENCE MATERIAL
Click on the links below to view additional reference material for this
chapter
Summary
PPT
MCQ
! !302
SOCIAL NETWORKS AND PORTALS
Chapter 9
SOCIAL NETWORKS AND PORTALS
Learning Objectives:
Structure:
9.1 Introduction
9.2 Social Networks and Online Communities
9.2.1 Facebook
9.2.2 Orkut
9.2.3 Linkedin
9.3 Blogs
9.4 Web Portal Sites
9.5 Short Case Study
9.6 Activities
9.7 Summary
9.8 Self Assessment Questions
! !303
SOCIAL NETWORKS AND PORTALS
9.1 INTRODUCTION
Most social network services are web-based and provide means for users
to interact over the internet, such as e-mail and instant messaging. Online
community services are sometimes considered as a social network service,
though in a broader sense, social network service usually means an
individual-centered service whereas online community services are
groupcentered. Social networking sites allow users to share ideas,
activities, events, and interests within their individual networks.
For success online, businesses need to try and make use of all of the latest
tools and tricks of the trade that are now associated with internet
marketing. While this may involve a wide variety of different tactics, one of
the most popular is social networking. This has almost become expected in
many cases, as consumers are used to being able to find their favorite
businesses or brands online.
!
Picture 9.1
Source: blog.engagepr.com
! !304
SOCIAL NETWORKS AND PORTALS
The first step in utilizing internet marketing with the help of social
networking sites is to investigate which sites are currently the most
popular. This can be achieved by analyzing the latest social trends, and
then using this information to come up with the profiles that you think may
be the most beneficial for your company’s image. If you are unsure about
this, it can be a good idea to speak to a marketing professional or branding
consultant.
Setting up a profile for your business is not difficult, because the way that
social networking sites are set up is meant to be all-inclusive. That is why
so many of them have attracted fans of all ages these, fans will then have
access to your business information. It’s such a simple way to advertise,
that it almost seems remarkable that it doesn’t cost any money in most
cases. This is one of the simplest methods of internet marketing, as a
result.
Once you have established your profile with all of its pertinent information
online, the next step is to think about how to go about the process of
finding friends or fans that will have access to your business’s information.
Sending out newsletters or e-mail blasts is also easy this way, which are
two of the most effective forms of internet marketing in the past.
In a rapidly changing world, it’s vital to stay on top of the latest advertising
and internet marketing trends, in order to make sure that potential
customers are able to find you. This process is made quite simple with the
process of using social networking sites that have been put into place as a
bit of a social experiment at first. That experiment has blossomed and is
now the primary way in which the world is able to connect on a personal
level. Beyond that, it can also be taken over by businesses to relate to
their customers on a more personal level as well. This ends up changing
the way that we do business.
The main types of social networking services are those which contain
category places (such as former school year or classmates), means to
connect with friends (usually with selfdescription pages) and a
recommendation system linked to trust. Popular methods now combine
many of these, with Facebook and Twitter widely used worldwide and Orkut
in India.
! !305
SOCIAL NETWORKS AND PORTALS
One popular use for this new technology is social networking between
businesses. Companies have found that social networking sites such as
Facebook and Twitter are great ways to build their brand image. According
to Jody Nimetz, author of Marketing Jive, there are five major uses for
businesses and social media: to create brand awareness, as an online
reputation management tool, for recruiting, to learn about new
technologies and competitors, and as a lead gen tool to intercept potential
prospects. These companies are able to drive traffic to their own online
sites while encouraging their consumers and clients to have discussions on
how to improve or change products or services.
One other use that is being discussed is the use of Social Networks in the
Science communities. Julia Porter Liebeskind et al., have published a study
on how New Biotechnology Firms are using social networking sites to share
exchanges in scientific knowledge. They state in their study that by sharing
information and knowledge with one another, they are able to “increase
both their learning and their flexibility in ways that would not be possible
within a selfcontained hierarchical organization.” Social networking is
allowing scientific groups to expand their knowledge base and share ideas,
! !306
SOCIAL NETWORKS AND PORTALS
A final rise in social network use is being driven by college students using
the services to network with professionals for internship and job
opportunities. Many studies have been done on the effectiveness of
networking online in a college setting, and one notable one is by Phipps
Arabie and Yoram Wind published in Advances in Social Network Analysis.
9.2.1 Facebook
Facebook – Facebook has grown massively over the last few years, with a
143% growth in US accounts from $42m in 2009 to $103m in 2010. The
network was founded by Mark Zuckerberg and was inspired by an offline
yearbook that was informally known as ‘the face book’. Before 2006, users
had to provide a college or university address in order to access the site.
! !307
SOCIAL NETWORKS AND PORTALS
Since that restriction was lifted, the site’s growth in popularity has been
unstoppable.
!
Picture 9.2
Source: www.facebook.com
Facebook was founded by Mark Zuckerberg with his college roommates and
fellow computer science students Eduardo Saverin, Dustin Moskovitz and
Chris Hughes. The website’s membership was initially limited by the
founders to Harvard students, but was expanded to other colleges in the
Boston area, the Ivy League, and Stanford University. It gradually added
support for students at various other universities before opening to high
school students, and, finally, to anyone aged 13 and over.
! !308
SOCIAL NETWORKS AND PORTALS
! !309
SOCIAL NETWORKS AND PORTALS
!
Picture 9.3
Twitter – Twitter is a micro-blogging service that has had an incredible
growth since its launch in 2006. It was created by Jack Dorsey and now
has about 26m users in the USA. Twitter is relatively unique because so
many of its users access the service via third party software and/ or
remote devices. Twitter is also well known for its high profile users – many
celebrities and politicians use the site and attract many millions of
followers.
!
Picture 9.4
Source: twitter.com, specht.com.au
! !310
SOCIAL NETWORKS AND PORTALS
!
Picture 9.5
Ching’s Secret, which spends more than 50% of its marketing budget on
online media and is pretty active on Facebook (Facebook.com/
chingssecret), is now all set to experiment with interactive advertising on
the direct-to-home (DTH) TV platform.
To begin with, the manufacturer of instant noodles, soups and sauces will
place a full-page banner ad as branded skin in the background on the
Electronic Programming Guide (EPG) page/ home screen of Airtel digital TV
(DTH) platform. Branded skin ads will be shown as a default background
image on the EPG page of all (more than 5 million) Airtel digital TV (DTH)
subscribers.
Later, the company will integrate Twitter and add interactive options to the
branded skin, a spokesperson from Capital Foods, the owner of Ching’s
Secret brand, tells afaqs! The branded skin will be used to run interactive
contests. Participants will be required to send their answers on the Twitter
address of Ching’s Secret (Twitter.com/chingssecret), instead of sending
SMSes to a mobile number.
! !311
SOCIAL NETWORKS AND PORTALS
This is the first time that Ching’s Secret will use EPG branding on the main
menu of a DTH player, the spokesperson adds. Ching’s Secret also plans to
promote all its sub-brands - instant noodles, and soups and sauces –
through the interactive branded skin.
MySpace – 2 years ago, MySpace would’ve been top of this list. Today, it
still has a strong user-base of around 57 million, particularly among
teenagers and musicians, but has lost out massively in terms of market
share. It was founded by eUniverse employees after the success of
Friendster and grew quickly. It has been widely criticized for giving too
much control to the user, resulting in badly designed profile pages.
!
Picture 9.6
Source: www.myspace.com
! !312
SOCIAL NETWORKS AND PORTALS
9.2.2 Orkut
By August 30, 2007, most users on Orkut could see changes on their
profile pages as per the new redesign. On August 31, 2007, Orkut
announced its new features including improvements to the way you view
your friends, 9 rather than 8 of your friends displayed on your homepage
and profile page and basic links to your friends’ content right under their
profile picture as you browse through their different pages. It also
announced the initial release of Orkut in 6 new languages: Hindi, Bengali,
Marathi, Tamil, Kannada and Telugu. Profile editing can take place by
clicking the settings button under the user profile photo (or alternatively,
clicking the blue settings link at the top of any page).
!
Picture 9.7
Source: www.orkut.com
! !313
SOCIAL NETWORKS AND PORTALS
Google stated the new Orkut is faster, simpler and more customizable.
More particular features include video chat, promotions and easy
navigation. The look is completely new, leaving all traces of past designs.
User interface and workflow are also drastically changed. As part of “more
customizable”, Orkut added many different colors for the profile. The
Themes were removed and an Orkut badge is visible for those who haven’t
changed to the new Orkut. The new logo also has the word “My” in it, as in
My Orkut.
Orkut allows users to sign in with their Google Mail, or Gmail, credentials.
As described on http://orkutlogin.me, to login to Orkut always type the
URL http://www.orkut.com/ instead of clicking any links to open it. This is
the safest way to open Orkut. Originally hosted in California, in August
2008 Google announced that Orkut would be fully managed and operated
in Brazil, by Google Brazil, in the city of Belo Horizonte. This was decided
due to the large Brazilian user base and growth of legal issues.
! !314
SOCIAL NETWORKS AND PORTALS
An Orkut user can also add videos to their profile from either YouTube or
Google Video with the additional option of creating either restricted or
unrestricted polls for polling a community of users. There is an option to
integrate GTalk (An instant messenger from Google) with Orkut enabling
chatting and file sharing. Currently GTalk has been integrated in Orkut –
users can directly chat from their Orkut page. Similar to facebook, users
may also use a “like” button to share interests with friends.
Themes:
When a user logs in, they see the people in their friends list in the order of
their logging in to the site, the first person being the latest one to do so.
Orkut’s competitors are other social networking sites including MySpace
and Facebook. Ning is a more direct competitor, as they allow creation of
social networks which are similar to Orkut’s communities.
! !315
SOCIAL NETWORKS AND PORTALS
9.2.3 Linkedin
!
Picture 9.8
Source: www.linkedin.com
! !316
SOCIAL NETWORKS AND PORTALS
Features
Linkedin also allows users to research companies with which they may be
interested in working. When typing the name of a given company in the
search box, statistics about the company are provided. These may include
the ratio of female to male employees, the percentage of the most
common titles/positions held within the company, the location of the
! !317
SOCIAL NETWORKS AND PORTALS
Another Linkedin feature is Linkedin Polls. A mobile version of the site was
launched in February 2008 which gives access to a reduced feature set
over a mobile phone. The mobile service is available in six languages:
Chinese, English, French, German, Japanese and Spanish.
! !318
SOCIAL NETWORKS AND PORTALS
Navigation
The main difference is that Linkedin has replaced the previous tab-style
header with a number of drop-down menus:
!
Picture 9.9
The menu also stays on even when you move the cursor away, which
makes it easier to use. The new navigation style has been pushed out
across the entire site, which ensures a consistent look:
!
Picture 9.10
Source: blog.linkedin.com
! !319
SOCIAL NETWORKS AND PORTALS
Widgets
Groups
9.3 BLOGS
! !320
SOCIAL NETWORKS AND PORTALS
Most blogs are interactive, allowing visitors to leave comments and even
message each other via widgets on the blogs and it is this interactivity that
distinguishes them from other static websites.
After a slow start, blogging rapidly gained in popularity. Blog usage spread
during 1999 and the years following, being further popularized by the near-
simultaneous arrival of the first hosted blog tools:
Bruce Ableson launched Open Diary in October 1998, which soon grew to
thousands of online diaries. Open Diary innovated the reader comment,
becoming the first blog community where readers could add comments to
other writers’ blog entries.
! !321
SOCIAL NETWORKS AND PORTALS
Types of Blogs
Picture 9.11
Source: modernl.com
There are many different types of blogs, differing not only in the type of
content, but also in the way that content is delivered or written.
! !322
SOCIAL NETWORKS AND PORTALS
Web portal sites: A site that provides a starting point or a gateway to other
resources on the Internet or an intranet.
! !323
SOCIAL NETWORKS AND PORTALS
Types of portals:
Personal portals: A personal portal is a site on the World Wide Web that
typically provides personalized capabilities to its visitors, providing a
pathway to other content. It is designed to use distributed applications,
different numbers and types of middleware and hardware to provide
services from a number of different sources. In addition, business portals
are designed to share collaboration in workplaces. Personal portals can be
related to any specific topic such as providing friend information on a social
network or providing links to outside content that may help others beyond
your reach of services. Portals are not limited to simply providing links.
Information or content that you are putting on the internet creates a
portal, or a path to new knowledge and/or
capabilities.
News portals: The traditional media rooms all around the world are fast
adapting to the new age technologies. This marks the beginning of news
portals by media houses across the globe. This new media channels give
them the opportunity to reach the viewers in a shorter span of time than
their print media counterparts.
Government web portals: At the end of the dot-com boom in the 1990s,
many governments had already committed to creating portal sites for their
citizens. These included primary portals to the Governments as well as
portals developed for specific audiences. Examples of Government web
portals include;
! !324
SOCIAL NETWORKS AND PORTALS
Health-EU portal gathers all relevant health topics from across Europe.
!
Picture 9.12
Source: Micrtosoft.com
! !325
SOCIAL NETWORKS AND PORTALS
! !326
SOCIAL NETWORKS AND PORTALS
and solicitors that offer conveyancing. Along the same lines, industry-
specific news and information portals have appeared, such as the clinical
trials specific portal: IFPMA Clinical Trials Portal.
Abstract
Situation
Before this project was outsourced to us, two Russian teams had already
spent almost one year on the development.
! !327
SOCIAL NETWORKS AND PORTALS
It was just the first release of this project when we took over the
development. This 1.0 version was difficult to be maintained, because this
version was built on .NET 1.1, and the code style was not original ASP.NET
style. We even had to work on the new development tasks including
developing the widget for MySpace and Facebook. Therefore the time was
very tight.
In the mean time, the client had not enough experience in software
engineering. At first the requirements were not clear enough, so there
were some difficulties for us to have a good grasp of the requirements and
estimate the total workload.
Before long we found that the goal of this website development was to
attract users. However the web site itself was not attractive enough and
the user experience was not good enough either, which would cause
negative impact on the operation of this website.
Solutions
Technology required:
In the first place, we helped the client release the 1.0 version.
After 1.0 version was released, we redesigned the project taking advantage
of ASP.NET 2.0, and reconstructed the website. In the mean time, we
developed the widgets in MySpace and Facebook.
! !328
SOCIAL NETWORKS AND PORTALS
For the Flash, we implemented the MVC pattern.We helped the client
analyze this project and channeled their indistinct requirements into
refined specification using our rich experience. Accordingly we have
considerably reduced the time spent on workload estimation and
successfully avoided reduplicative and invalid efforts arising from
ambiguous requirements.
! !329
SOCIAL NETWORKS AND PORTALS
Benefits to Client
9.6 ACTIVITIES
! !330
SOCIAL NETWORKS AND PORTALS
9.7 SUMMARY
A web portal or links page is a web site that functions as a point of access
to information on the World Wide Web. A portal presents information from
diverse sources in a unified way.
MySpace – 2 years ago, MySpace would’ve been top of this list. Today, it
still has a strong user-base of around 57 million, particularly among
teenagers and musicians, but has lost out massively in terms of market
share.
Orkut – The social network is owned and operated by Google and is named
after its creator, Orkut Büyükk.kten.
! !331
SOCIAL NETWORKS AND PORTALS
! !332
SOCIAL NETWORKS AND PORTALS
REFERENCE MATERIAL
Click on the links below to view additional reference material for this
chapter
Summary
PPT
MCQ
Video Lecture
! !333
E-BUSINESS AND E-COMMERCE CASE STUDIES
Chapter 10
e-BUSINESS AND e-COMMERCE CASE
STUDIES
Learning Objectives:
Structure:
10.1 Introduction
10.2 Online Industries
10.2.1 Medical Services Online
10.2.2 Online Travel
10.2.3 Transportation and Shipping
10.2.4 Online Automation Sites
10.2.5 Energy Online
10.2.6 Selling Brainpower Online
10.2.7 Online Art Dealers
10.2.8 Online Grocery Stores
10.2.9 Online Real Estate
10.2.10 Online Trading
10.2.11 Government Online
10.2.12 Insurance Online
10.2.13 Online Retail
10.2.14 Children Online
10.3 Banking and Investing
10.4 e-Learning
10.5 e-Publishing
10.6 Online Auction
10.7 Online Career Services
! !334
E-BUSINESS AND E-COMMERCE CASE STUDIES
10.1 INTRODUCTION
The site was quickly ranked the No. 1 health care content site on the
Internet, with an average of about 1.4 million unique visitors per month in
1999. Drkoop.com attracted the attention of AOL a month after going
public when the drkoop.com’s stock hit a high of $45.75 a share. The two
companies entered a $89 million four-year strategic partnership to display
drkoop.com content on AOL’s portal. Before there was WebMd, there was
drkoop.com.
But drkoop.com didn’t last quite that long. The dot.com bubble burst, and
investors became increasingly skeptical about the prospects of a health
content provider that relied on advertising revenue to build its
business.The company began to lose tens of millions of dollars per quarter
in 2000, and it announced it would shut down its operations in December
2001.
! !335
E-BUSINESS AND E-COMMERCE CASE STUDIES
!
Figure 10.1: Industry Medical Portal
!
Figure 10.2
Source: WebHealthcentre.com
! !336
E-BUSINESS AND E-COMMERCE CASE STUDIES
Companies like Boeing and Airbus build civilian and military aircraft. Many
planes take off without being filled to capacity. Since relatively fixed
overheads are spread over fewer people, ticket prices are higher. Internet
helps to commercialize the industry to fill more seats and reduce cost.
People can save time and money by booking travel arrangements through
travel agents and various web portals provided on the internet.
Site59.com was an online travel agency that aimed to make “the best deals
available at the last minute.” The site was launched in May 2000 by travel
and tourism professionals from The Boston Consulting Group (BCG), and
was further developed and backed by iFormation Group, a partnership
between BCG, Goldman Sachs and General Atlantic Partners.
Named for the 59th minute, Site59 assembled inventory in real time from
thousands of industry suppliers, including major airlines, hotel companies,
car rental companies and hundreds of specialty providers worldwide. In
addition to its own website, Site59 operated a private label distribution
(ASP) product, powering last-minute sections of Travelocity, AOL Travel,
CheapTickets, Yahoo! Travel, American Airlines Vacations, Delta Air Lines
Vacations, Continental Airlines Vacations, Northwest’s nwa.com, and
Bestfares.com, among others.
In March 2002, Travelocity acquired Site59 for $43 million in cash. Site59’s
CEO and founder, Michelle Peluso joined Travelocity with the acquisition as
senior vice president, product strategy and distribution. Peluso became
Travelocity’s COO in April 2003 and was then named president and chief
executive officer of Travelocity in December 2003.
! !337
E-BUSINESS AND E-COMMERCE CASE STUDIES
!
Figure 10.3
Source: site59.com
! !338
E-BUSINESS AND E-COMMERCE CASE STUDIES
Site59
General travel Websites and portals, such as AAA, AARP, American Express,
AOL Travel, Best Fares, Compuserve, MySabre, Netscape, Worldchoice
Travel, Worldspan Go and Yahoo! Travel
!
Figure 10.4
Source: Site59.com
! !339
E-BUSINESS AND E-COMMERCE CASE STUDIES
! !340
E-BUSINESS AND E-COMMERCE CASE STUDIES
!
Figure 10.5
Source: fedex.com
!
Figure 10.6: (ups.com)
Many sites allow users to research and purchase new and used cars.
Whether or not you make final arrangement for the purchase of vehicle
online, many of the preliminary steps can be completed on the web. Users
can explore options more efficiently than by travelling to geographically
dispersed dealership. The Web gives easy access to information so dealers
can search online database for cars to boost their inventories.
! !341
E-BUSINESS AND E-COMMERCE CASE STUDIES
!
Figure 10.7
Source: Autobytel.com
! !342
E-BUSINESS AND E-COMMERCE CASE STUDIES
Autobytel.com
! !343
E-BUSINESS AND E-COMMERCE CASE STUDIES
!
Figure 10.8
Source: autobytel.com
Unlike other Internet commodity service providers, Enron Online did not
match buyers with sellers. Instead, commodity consumers and producers
around the world were able to instantaneously conduct transactions
directly with an Enron company as a principal dealer. Enron Online was
! !344
E-BUSINESS AND E-COMMERCE CASE STUDIES
Enron Online ran on an Oracle database and Web Logic Java application
servers that ran on Windows NT. Portions of the site took advantage of
Macromedia shockwave, and transactions were secure using SSL
encryption.
Finding people qualified enough to turn a good business idea into reality is
often a major challenge. In many cases the business is started by
technically adept individuals with little management experience.
! !345
E-BUSINESS AND E-COMMERCE CASE STUDIES
!
Figure 10.9
Source: HellowBrain.com
Art.com sells fine art, photography, posters and paint. You can search by
artist, medium, décor, size and subject.Art.com uses a shopping cart model
and can have a piece delivered to the customer in a few days.
! !346
E-BUSINESS AND E-COMMERCE CASE STUDIES
Guild.com is another art dealer offering more than 7000 various products
online.
One of my sister’s from Mumbai, Mrs Jyoti Raut is a commercial artist and
has spent her life in drawing beautiful paintings, posters and is
instrumental in textile design. The Internet is a platform for such unknown
Artist to reach globally.
Jyoti has created her Blog “jyotiraut” and received many online enquires
and orders from US and all over world. View Roop Ganesh displayed on her
block. While painting this picture she was not able to draw two eyes so, she
drew only one! To her surprise if you look from any angle, it seems Roop
Ganesh looks at you! You also experience the same.
!
Figure 10.10
Source: indiaart.com
! !347
E-BUSINESS AND E-COMMERCE CASE STUDIES
Buying groceries online, especially staple items is a time saver. You can
create an electronic shopping list and make small edits to reflect your
special needs each week.Webvan.com recently purchased competitor
Homegrocer.com in a billion-dollar stock swap to become the largest home
delivery company.
!
Figure 10.11
Source: homegrocer.com
! !348
E-BUSINESS AND E-COMMERCE CASE STUDIES
!
Figure 10.12
Source: Homegrocer.com
Real estate transactions are an ideal area for e-Commerce, for the
following reasons. First, you can view many properties on the screen,
saving time for you and the broker. Second, you can sort and organize
properties according to your criteria and preview the exterior and interior
designs of the properties, shortening the search process. Finally, you can
find detailed information about the properties and frequently get even
more detail than brokers will provide. In some locations brokers allow the
use of such databases only from their offices, but considerable information
is now available on the Internet. For example, Realtor.com allows you to
search a database of over one million homes across the United States. The
database is composed of local “multiple listings” of all available properties
and properties just sold, in hundreds of locations.
They use virtual models that enable buyers to walk through mockups of
homes.
! !349
E-BUSINESS AND E-COMMERCE CASE STUDIES
!
Figure 10.13
Investing is one of the most popular industries on the internet. There are
variety of sites providing full services and discount brokerage online trading
services.
!
Figure 10.14
Source: MDchoice.com
! !350
E-BUSINESS AND E-COMMERCE CASE STUDIES
!
Figure 10.15
Source: ingdirect.com
! !351
E-BUSINESS AND E-COMMERCE CASE STUDIES
!
Figure 10.16
Source: tazza.com
! !352
E-BUSINESS AND E-COMMERCE CASE STUDIES
! !353
E-BUSINESS AND E-COMMERCE CASE STUDIES
• Government-to-Business (G2B)
• Government-to-Government (G2G)
• Government-to-Employees (G2E)
! !354
E-BUSINESS AND E-COMMERCE CASE STUDIES
!
Figure 10.17
Source: easyinsuranceindia.com
! !355
E-BUSINESS AND E-COMMERCE CASE STUDIES
!
Figure 10.18
Source: hdfcbank.com
! !356
E-BUSINESS AND E-COMMERCE CASE STUDIES
!
Figure 10.19
Source: ebay.com
! !357
E-BUSINESS AND E-COMMERCE CASE STUDIES
!
Figure 10.20
Source: flipcart.com
!
Figure 10.21
Source: oecd.org
! !358
E-BUSINESS AND E-COMMERCE CASE STUDIES
Features
! !359
E-BUSINESS AND E-COMMERCE CASE STUDIES
• Paying third parties, including bill payments (see, e.g., BPAY) and
telegraphic/wire transfers
• Investment purchase or sale
• Loan applications and transactions, such as repayments of enrollments
• Register utility billers and make bill payments
• Financial institution administration
• Management of multiple users having varying levels of authority
• Transaction approval process
Security
! !360
E-BUSINESS AND E-COMMERCE CASE STUDIES
The PIN/TAN system where the PIN represents a password, used for the
login and TANs representing one-time passwords to authenticate
transactions. TANs can be distributed in different ways; the most popular
one is to send a list of TANs to the online banking user by postal letter. The
most secure way of using TANs is to generate them by need using a
security token [citation needed]. These token generated TANs depend on
the time and a unique secret, stored in the security token (two-factor
authentication or 2FA). Usually online banking with PIN/TAN is done via a
web browser using SSL secured connections, so that there is no additional
encryption needed.
Another way to provide TANs to an online banking user is to send the TAN
of the current bank transaction to the user’s (GSM) mobile phone via SMS.
The SMS text usually quotes the transaction amount and details; the TAN is
only valid for a short period of time. Especially in Germany, Austria and The
Netherlands, many banks have adopted this “SMS TAN” service as it is
considered very secure.
Signature based online banking where all transactions are signed and
encrypted digitally. The Keys for the signature generation and encryption
can be stored on smartcards or any memory medium, depending on the
concrete implementation.
Attacks
Most of the attacks on online banking used today are based on deceiving
the user to steal login data and valid TANs. Two well known examples for
those attacks are phishing and pharming. Cross-site scripting and key
logger/Trojan horses can also be used to steal login information.
! !361
E-BUSINESS AND E-COMMERCE CASE STUDIES
The most recent kind of attack is the so-called Man in the Browser attack,
where a Trojan horse permits a remote attacker to modify the destination
account number and also the amount.
Countermeasures
! !362
E-BUSINESS AND E-COMMERCE CASE STUDIES
!
Figure 10.22
Source: icicibank.com
10.4 e-LEARNING
Gone are the days when you had to travel long distance to attend classes.
Now with the aid of technology and with several institutes offering a slew
of professional distance learning courses, you can study and enhance your
qualifications from the comfort of your home. Open and Distance Learning
System (ODL) has gained impetus in India during the last two and half
decades particularly since the establishment of Indira Gandhi National
Open University (IGNOU) in the year 1985, as a result it has witnessed
exceptional growth in terms of enrolment.
! !363
E-BUSINESS AND E-COMMERCE CASE STUDIES
Therefore the growing awareness has posed serious challenges before the
educationists, planners and policymakers. Consequently necessary
adjustments have to be made to cope up with the ever-increasing demand
for online support services, analysing its pros and cons.
Open and Distance Learning System (ODL) has gained impetus in India
during the last two and half decades particularly since the establishment of
Indira Gandhi National Open University (IGNOU) in the year 1985, as a
result it has witnessed exceptional growth in terms of enrolment. In IGNOU
alone 0.636 million learners were registered during 2009 and 2.47 million
were on the roll of the university. It has also been estimated that about
one third learners among college entrants would be accommodated in the
ODL system. Shift of learners to ODL system in their pursuit to higher
learning is mainly due to relaxed and flexible rules and regulations in terms
of place, pace and duration of the study as well as availability of diversified
learning packages including print and audio-video material etc. ODL system
also provides opportunity to the learners to interact with the teachers in
face to face (f2f) counseling and discussion with the peers during their visit
to Learners Support Centers (LSCs). The use of Information and
Communication Technologies (ICTs) has opened up the new channel of e-
learning, e-board, e-gyankosh (digital library) and online discussion among
divergent groups including teacher, taught and peer. World Wide Web
(WWW) has become a common utterance for distance learners because
! !364
E-BUSINESS AND E-COMMERCE CASE STUDIES
Paradigm Shift
! !365
E-BUSINESS AND E-COMMERCE CASE STUDIES
work in the country, especially those who are in the far-flung areas need
opportunities to upgrade their expertise and qualifications, the ODL mode
can provide opportunities for updating, broadening and diversifying their
knowledge and skills so that they can also contribute in the development of
the nation. Education, particularly the ODL system has all the
characteristics of entrepreneurship and developing such skills is the
learners right from the college stage, will provide them opportunities of
creativity, freedom and ability to generate wealth through setting up
ventures, producing marketable products. Open Universities (OUs) are
making this possible by introducing such programmes and imparting
training in productive skills that are relevant to the world of work. The last
decade has seen a phenomenal growth in the enrolment of distance
learners as DE institutions particularly OUs have joined the bandwagon to
meet the increasing demand for such type of education. Distance
Education, variously known as open learning, distance learning, flexible
learning, distributed learning, online learning, e-learning, resource-based
learning, technology mediated learning and such other nomenclature, with
different shades of meaning and also used interchangeably has come to
stay as an important philosophy and form of education in the 21st century.
Ever increasing enrolment share of ODL in higher education at tertiary level
has encouraged the ODL educationalists and manager to predict its share
as high as 40% at tertiary level. This phenomenon shift will necessitate
continuous need for skill development, regular monitoring and
strengthening of support services to ensure quality, efficacy and efficiency.
This is an indication of the important place, distance education has come to
occupy in India’s education and human resource development efforts. At
the same time, there is insufficient public understanding of distance
education functions and awareness about concerns regarding its quality
assurance. Even though distance education systems and practices greatly
vary and are context specific, the experts in the field consider quality
assurance as the common priority. Therefore, the ODL system has
emerged as an alternative as well as complementary channel of education
and training in India. It has already established its credibility and
recognition. The growth of distance education, both quantitatively and
qualitatively, has been phenomenal during the last two decades,
particularly after the introduction of the single mode open universities in
the country. Further, the application of ICTs gave a major Flip to the
accelerated development of distance education (Panda et.al., 2005). But,
so far the progress in this direction has been quite limited. Use of ICT has
become an essential requirement of distance education for delivery of
! !366
E-BUSINESS AND E-COMMERCE CASE STUDIES
! !367
E-BUSINESS AND E-COMMERCE CASE STUDIES
There are collaborative efforts with the industry, which provides course
material, case studies as well as training to lecturers on new areas like chip
design, radio frequency identification. This collaboration pays off in
reducing training time from 76 days to 52 days.
Strongly believing in the theory that education knows no barriers, not even
geographic this institute is one of the most sought after distance Education
University in India. With a wide range of distance courses, it is mostly
known for its distance education programs in MBA, Executive MBA and
MSC.
Annamalai University
Annamalai University founded in the year 1929 by Dr. Rajah Sir Annamalai
Chettiar is the second best distance education university in India. Spread
over forty nine departments with 2500 professionally trained staff, this
university offers a wide range of post-graduate courses.
Osmania University
! !368
E-BUSINESS AND E-COMMERCE CASE STUDIES
service personnel, and people living in remote areas and to the physically
disabled.
University of Madras
ICFAI University
One of the latest universities offering degrees in MBA, MCA, BA, and BBA
via distance education ICFAI University is counted among the top ten
distance education universities in India. Educating its students via the
medium of audio visuals on the internet, this university also helps its
students find good jobs.
IMT-CDL
! !369
E-BUSINESS AND E-COMMERCE CASE STUDIES
SYMBIOSIS
NMIMS
MITCOM
Welingkar
! !370
E-BUSINESS AND E-COMMERCE CASE STUDIES
10.5 e-PUBLISHING
The internet and the web gives freelance writers access to the global
audience. Many writers do not have the technical expertise or business
savvy to sell their book on the web. One option for these writers is subsidy
e-Publishing.
! !371
E-BUSINESS AND E-COMMERCE CASE STUDIES
• English auctions. Buyers bid on one item at a time. The bidding price
increases with additional bids. The highest bidder wins (if price is the
only criterion).
• Dutch auctions. These are usually for multiple, identical items (e.g.,
flowers). Prices are set high and are reduced as the auction clock runs
down until a bid for a specific quantity is submitted. The first bidder wins.
Auctions are used in B2C, B2B, C2B, e-Government, and C2C commerce,
and they are becoming popular in many countries.
! !372
E-BUSINESS AND E-COMMERCE CASE STUDIES
bulletin boards, and chat rooms, there are several intermediaries that
arrange for corporate bartering (e.g., barterbrokers.com).
The online job market. The Internet offers a perfect environment for job
seekers and for companies searching for hard-to-find employees. The
online job market is especially effective for technology-oriented jobs.
However, there are thousands of companies and government agencies that
advertise available positions in all types of jobs, accept resumes, and take
applications via the Internet. The online job market is used by:
1. Job seekers. Job seekers can reply to employment ads online. Or they
can take the initiative and place resumes on their own home pages or
on others’ websites, send messages to members of newsgroups asking
for referrals, and use recruiting firms such as Career Mosaic
(careermosaic.com), Job Center (jobcenter.com), and Monster Board
(monster.com). For entrylevel jobs and internships for newly minted
graduates, job seekers can use jobdirect.com. Need help writing your
resume? Try resume-link.com or jobweb.com.
! !373
E-BUSINESS AND E-COMMERCE CASE STUDIES
Competition for volume has led to the packaging of free content and
services, such as e-Mail, stock portfolio, message boards, chat, news, and
local information.
Examples:
The profitability of this portal is based on volume and possibly the value of
information derived from user choices. Personalization can support a
“specialized portal” model.
! !374
E-BUSINESS AND E-COMMERCE CASE STUDIES
(my.netscape.com).
Example: iVillage.com
(www.ivillage.com).
!
Figure 10.23
Source: ivillage.com
! !375
E-BUSINESS AND E-COMMERCE CASE STUDIES
Classifieds
List items for sale or wanted for purchase. Listing fees are common, but
there also may be a membership fee.
Examples:
!
Figure 10.24
Source: monster.com
! !376
E-BUSINESS AND E-COMMERCE CASE STUDIES
Contextual Advertising
Freeware developers which bundle ads with their product. For example, a
browser extension that automates authentication and form fill-ins, also
delivers advertising links or pop-ups as the user surfs the web.
Example:
!
Figure 10.25
Source: gator.com
! !377
E-BUSINESS AND E-COMMERCE CASE STUDIES
10.9 ACTIVITIES
2. Visit the E Ink home page (www.eink.com) and view the demo.
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
10.10 SUMMARY
Companies like Boeing and Airbus build civilian and military aircraft. Many
planes take off without being filled to capacity. Since relatively fixed
overheads are spread over fewer people, ticket prices are higher. Internet
helps to commercial industry to fill more seats and reduce cost. People can
! !378
E-BUSINESS AND E-COMMERCE CASE STUDIES
Many sites allow users to research and purchase new and used cars.
Whether or not you make final arrangement for the purchase of vehicle
online, many of the preliminary steps can be completed on the web. Users
can explore options more efficiently than by travelling to geographically
dispersed dealership. The Web gives easy access to information.
Finding people qualified enough to turn a good business idea into a reality
is often a major challenge. In many cases business is started by technically
adept individuals with little management experience.
Outsourcing is the process of hiring another company or individual to do a
job when there is lack of qualified resources within company (see Hello
Brain.com).
Buying groceries online, especially staple items is a time saver. You can
create electronic shopping list and make small edits to reflect your special
needs each week. Webvan.com recently purchased competitor
Homegrocer.com in a billion-dollar stock swap to become largest home
delivery company. Real estate transactions are an ideal area for e-
Commerce, for the following reasons. First, you can view many properties
on the screen, saving time for you and the broker. Second, you can sort
and organize properties according to your criteria and preview the exterior
and interior designs of the properties, shortening the search process.
! !379
E-BUSINESS AND E-COMMERCE CASE STUDIES
Gone are the days when you had to travel long distance to attend classes.
Now with the aid of technology and with several institutes offering slew of
professional distance learning courses, you can study and enhance your
qualifications from the comfort of your home. Open and Distance Learning
System (ODL) has gain impetus in India during the last two and half
decades particularly since the establishment of Indira Gandhi National
Open University (IGNOU) in the year 1985, as a result it has witnessed
exceptional growth in terms of enrolment.
The online job market. The Internet offers a perfect environment for job
seekers and for companies searching for hard-to-find employees. The
online job market is especially effective for technology-oriented jobs.
! !380
E-BUSINESS AND E-COMMERCE CASE STUDIES
! !381
E-BUSINESS AND E-COMMERCE CASE STUDIES
REFERENCE MATERIAL
Click on the links below to view additional reference material for this
chapter
Summary
PPT
MCQ
Video Lecture
! !382
APPENDIX A
APPENDIX A
Inspirational e-Commerce Website Designs
Many e-Commerce sites aren’t the most attractive websites. There’s often
a lot of clutter with little to distinguish the design from any other site. Of
course, selling products is more important to an e-Commerce site than
having a pretty design, but these examples show that some e-Commerce
sites display excellent design
Morphica
Me & Mommy-to-be
! !383
APPENDIX A
Bridge 55
UNIQLO
! !384
APPENDIX A
Little Catwalk
! !385
APPENDIX A
Shoon
Keedo
! !386
APPENDIX A
Bagolitas
Shop Curious
! !387
APPENDIX A
Itself
CellyShop
! !388
APPENDIX A
Wunderbloc
Tilly Moss
! !389
APPENDIX A
Cacties
La Licious
!
Mozilla Store
! !390
APPENDIX A
Habitat Shoe
A Better Tomorrow
! !391
APPENDIX A
Subnormals
Bored
! !392
APPENDIX A
Brand Neusense
Martique
! !393
APPENDIX A
Galante
Von Dutch
! !394
APPENDIX A
RedisWhite
! !395
APPENDIX A
Composition
Wire&Twine
! !396
APPENDIX A
like.com
Fugitive Toys
! !397
APPENDIX A
Cosmic soda
! !398
APPENDIX A
Threadless
EvelMerch
! !399
APPENDIX A
ShoeGuru
Urban Originals
! !400
APPENDIX B
APPENDIX B : PORTALS
Sponsored Links
• AllIndianSite: All Indian Site is a news portal. It gives you all information
about National, International, Business, Sports News and many more
informations.
! !401
APPENDIX B
! !402
APPENDIX B
! !403
APPENDIX B
! !404
APPENDIX B
• nadar.org: This website is one of the leading web portals for Nadar
Community.
• Shivaji Park: Shivaji Park has seen it all – the fight for independence, the
quest for Sanyukta Maharashtra, to the big rallies of the day, meetings
and demonstrations, the huge park or rather ground is almost like a
historical monument by itself.
! !405
APPENDIX B
!
! !406
APPENDIX C
APPENDIX C: REFERENCE
1. e-Business and e-Commerce for Managers, Harvey M. Deitel, Paul J.
Deitel and Kate Steinbuhler
4. Website WKm13
6. www.paypal.com/security
17.HelloBrain.com Corp.
! !407
APPENDIX C
! !408