Sometimes these transactions include the real-time transfer of funds from buyer to seller and sometimes this is handled manually through an eft-pos terminal
Reduced costs by reducing labour, reduced paper work, reduced errors in keying in data, reduce post costs Reduced time. Shorter lead times for payment and return on investment in advertising, faster delivery of product Flexibility with efficiency. The ability to handle complex situations, product ranges and customer profiles without the situation becoming unmanageable. Improve relationships with trading partners. Improved communication between trading partners leads to enhanced long-term relationships. Lock in Customers. The closer you are to your customer and the more you work with them to change from normal business practices to best practice e-commerce the harder it is for a competitor to upset your customer relationship.
New Markets. The Internet has the potential to expand your business into wider geographical locations.
All e-commerce sites require basic Web server software to answer HTTP requests from customers Apache is the leading Web server software; works only with UNIX operating systems Microsofts Internet Information Server (IIS) is the second major Web server software
Systems Development Life Cycle (SDLC) is a methodology for understanding the business objectives of a system and designing an appropriate solution Five major steps in the SDLC are: Systems analysis/planning Systems design Building the system Testing Implementation
System design specification: a description of the main components of a system and their relationship to one another System design can be broken down into two parts: Logical design Physical design
As you browse through the store, that runs an e-commerce server such as the HP domain commerce server or is part of an electronic mall, such as IBMs Net. Commerce, the server helps you select an item (say an Olympic souvenir mug), and place an order. Such servers carry software to verify transactions, perform accounting duties, guarantee payments, and even create digital money.
Wishing to pay for the item, you send an enciphered request for payment to your bank/third-party payment provider. Your bank will then remit to you, a secure packet of e-cash. Using Cyber cash's wallet application , you send an enciphered payment request to Cyber cash's server.
Once the credit is authorized by Cybercast over secure lines to your bank, money in Wallet is used to complete the purchase.
You then send the exact amount of e-cash needed to buy the Olympic souvenir to the virtual store. The server at the store then sends that packet of cash to its bank. The merchant bank then sends a request for transfer of funds to your bank, which the latter, after verification, performs. This is where actual funds are transmitted from your bank to the merchant bank.
Address bar
Product
Confirming order
Final payment
An application which helps the shopper to browse through the product list and place an order. Application should be capable of maintaining the state information about the shopper purchase details and his ID.
It should also be able to maintain the product list.(Usually this is implemented with the help of components(COM OBJECTS)).
The components interact with the database for transaction processing.ASP provides support for this.(Cookies too can be used for this).
Shoppers can make payments through credit cards. Credit card No. is sent to the server which can be stored in the database which can be verified against a bank manually later. Another method is to use payment servers which allows on-line verification of credit card numbers with the bank. It also provides mechanisms for checksum verification.
Payments to the server is enabled with the help of a number of security mechanisms. Browser-to-Web server data encryption and integrity with SSL 3.0 Browser to database password authentication by use of encrypted digests (Kerberose,Identix,Cybersafe) Protection for corporate databases with protocol-enabled firewalls proxying and authenticating user connection requests (Oracle has supplied sql*net proxy to all firewall vendors). Web Application Server to Browser authentication by use of digital signatures.
Security Server provides a Certificate Authority (CA) function, including generation of public key/private key pairs and issuance of industry-standard X.509 certificates.
Types of online promotion Banner ads Banner exchange Referrer sites Blogs and blogads Pop-up and related ads Search engine placement Spam e-mail Targeted e-mail Opt-in e-mail
Publisher site Primary goal is selling advertising Rates can be based on: Frequency with which ad is displayed Clickthrough
Marketer site Advertises on a publisher site Clickthrough destination Sells products and/or services
Banner ad vocabulary Effective banner ads Banner ad sizes Choosing banner ad space Finding ad space
Square button
Button 1
Half banner
Vertical banner
Button 2
micro
Pop-up ad types Pop-up: appears over current browser windows. Pop-under: appears under active browser window and is not seen until covering window is closed. Interstitial: appears as full window between current and target pages. Superstitial: preloads into browser cache; does not appear until fully cached
Search engines
Uses a spider to find Web sites
Directories
Requires manual submission of Web site
Keywords <META NAME="KEYWORDS" CONTENT="keyword1, keyword2, keyword3"> Description <META NAME="DESCRIPTION" CONTENT="This site provides recipes."> Robots <META NAME="ROBOTS" CONTENT="NOINDEX">
Search results are ranked according to relevance to the given search criteria
HTML <title> tag Query word(s) near top of document Frequency of query word(s)
Types of e-mail marketing Spam e-mail Targeted e-mail Opt-in e-mail E-mail filter concerns Source (From:) address Size of To: address list Keywords in message topic Keyword in message body
Tracking and payment Pay-per-click: advertiser pays a set amount for each click through Pay-per-lead: advertiser pays for each sales lead generated Pay-per-sale: advertiser pays for each sale resulting from a click through Pay-per-view: advertiser pays for users viewing the banner
Ravi Shankar Prasad - 43 Shraddha Amberkar - 03 Dipika Kolapte - 22 Asiwini Parab dont know Madhuri Thakare - 57 Priyanka Khot nahi pata
THANK YOU