Anda di halaman 1dari 36

E-Commerce is the buying and selling of products and services by businesses and consumers over the Internet.

The term "e-commerce" is used to describe encrypted payments on the Internet.

Sometimes these transactions include the real-time transfer of funds from buyer to seller and sometimes this is handled manually through an eft-pos terminal

Reduced costs by reducing labour, reduced paper work, reduced errors in keying in data, reduce post costs Reduced time. Shorter lead times for payment and return on investment in advertising, faster delivery of product Flexibility with efficiency. The ability to handle complex situations, product ranges and customer profiles without the situation becoming unmanageable. Improve relationships with trading partners. Improved communication between trading partners leads to enhanced long-term relationships. Lock in Customers. The closer you are to your customer and the more you work with them to change from normal business practices to best practice e-commerce the harder it is for a competitor to upset your customer relationship.

New Markets. The Internet has the potential to expand your business into wider geographical locations.

All e-commerce sites require basic Web server software to answer HTTP requests from customers Apache is the leading Web server software; works only with UNIX operating systems Microsofts Internet Information Server (IIS) is the second major Web server software

Systems Development Life Cycle (SDLC) is a methodology for understanding the business objectives of a system and designing an appropriate solution Five major steps in the SDLC are: Systems analysis/planning Systems design Building the system Testing Implementation

System design specification: a description of the main components of a system and their relationship to one another System design can be broken down into two parts: Logical design Physical design

As you browse through the store, that runs an e-commerce server such as the HP domain commerce server or is part of an electronic mall, such as IBMs Net. Commerce, the server helps you select an item (say an Olympic souvenir mug), and place an order. Such servers carry software to verify transactions, perform accounting duties, guarantee payments, and even create digital money.

Wishing to pay for the item, you send an enciphered request for payment to your bank/third-party payment provider. Your bank will then remit to you, a secure packet of e-cash. Using Cyber cash's wallet application , you send an enciphered payment request to Cyber cash's server.

Once the credit is authorized by Cybercast over secure lines to your bank, money in Wallet is used to complete the purchase.

You then send the exact amount of e-cash needed to buy the Olympic souvenir to the virtual store. The server at the store then sends that packet of cash to its bank. The merchant bank then sends a request for transfer of funds to your bank, which the latter, after verification, performs. This is where actual funds are transmitted from your bank to the merchant bank.

How does a transaction take place??

Address bar

User ID and Password

Product

Confirming order

Confirming the shipping details

Final payment

An application which helps the shopper to browse through the product list and place an order. Application should be capable of maintaining the state information about the shopper purchase details and his ID.

It should also be able to maintain the product list.(Usually this is implemented with the help of components(COM OBJECTS)).
The components interact with the database for transaction processing.ASP provides support for this.(Cookies too can be used for this).

Shoppers can make payments through credit cards. Credit card No. is sent to the server which can be stored in the database which can be verified against a bank manually later. Another method is to use payment servers which allows on-line verification of credit card numbers with the bank. It also provides mechanisms for checksum verification.

Payments to the server is enabled with the help of a number of security mechanisms. Browser-to-Web server data encryption and integrity with SSL 3.0 Browser to database password authentication by use of encrypted digests (Kerberose,Identix,Cybersafe) Protection for corporate databases with protocol-enabled firewalls proxying and authenticating user connection requests (Oracle has supplied sql*net proxy to all firewall vendors). Web Application Server to Browser authentication by use of digital signatures.

Security Server provides a Certificate Authority (CA) function, including generation of public key/private key pairs and issuance of industry-standard X.509 certificates.

Types of online promotion Banner ads Banner exchange Referrer sites Blogs and blogads Pop-up and related ads Search engine placement Spam e-mail Targeted e-mail Opt-in e-mail

Publisher site Primary goal is selling advertising Rates can be based on: Frequency with which ad is displayed Clickthrough

Marketer site Advertises on a publisher site Clickthrough destination Sells products and/or services

Banner ad vocabulary Effective banner ads Banner ad sizes Choosing banner ad space Finding ad space

Full Size banner Full size banner with vertical navigation

Square button

Button 1
Half banner

Vertical banner

Button 2

micro

Why might this be the most effective position?

Pop-up ad types Pop-up: appears over current browser windows. Pop-under: appears under active browser window and is not seen until covering window is closed. Interstitial: appears as full window between current and target pages. Superstitial: preloads into browser cache; does not appear until fully cached

Search engines
Uses a spider to find Web sites

Directories
Requires manual submission of Web site

Keywords <META NAME="KEYWORDS" CONTENT="keyword1, keyword2, keyword3"> Description <META NAME="DESCRIPTION" CONTENT="This site provides recipes."> Robots <META NAME="ROBOTS" CONTENT="NOINDEX">

Search results are ranked according to relevance to the given search criteria
HTML <title> tag Query word(s) near top of document Frequency of query word(s)

Types of e-mail marketing Spam e-mail Targeted e-mail Opt-in e-mail E-mail filter concerns Source (From:) address Size of To: address list Keywords in message topic Keyword in message body

Tracking and payment Pay-per-click: advertiser pays a set amount for each click through Pay-per-lead: advertiser pays for each sales lead generated Pay-per-sale: advertiser pays for each sale resulting from a click through Pay-per-view: advertiser pays for users viewing the banner

Ravi Shankar Prasad - 43 Shraddha Amberkar - 03 Dipika Kolapte - 22 Asiwini Parab dont know Madhuri Thakare - 57 Priyanka Khot nahi pata

THANK YOU

Anda mungkin juga menyukai