Académique Documents
Professionnel Documents
Culture Documents
E- Shopping
Definition
The act of purchasing products or services over the Internet. Online shopping has grown in
popularity over the years, mainly because people find it convenient and easy to
bargain shop from the comfort of their home or office. One of the most enticing factor about
online shopping, particularly during a holiday season, is it alleviates the need to wait
in long lines or search from store to store for a particular item.
Online shopping is the process whereby consumers directly buy goods or services from a seller
in real-time, without an intermediary service, over the Internet. It is a form of electronic
commerce. An online shop, eshop, e-store, Internet shop, webshop, webstore, online store, or
virtual store evokes the physical analogy of buying products or services at a bricks-andmortar retailer or in a shopping center. The process is called business-to-consumer (B2C) online
shopping. When a business buys from another business, it is called business-to-business (B2B)
online shopping.
Online shopping has become a popular shopping method ever since the internet has declared a
takeover. There are many individuals that are looking for other amazing alternatives shopping
and online shipping is just the fix for that.
There are many advantages of online shopping; this is the reason why online stores are a
booming business today. Online shopping includes buying clothes, gadgets, shoes, appliances, or
even daily groceries. Listed below are several online shopping advantages and these are the
following.
Advantages of Online Shopping
Save Time Do you have the specific list that you want to buy? With just a couple of clicks of
the mouse, you can purchase your shopping orders and instantly move to other important things,
which can save time.
Save Fuel The market of fuel industries battles from increasing and decreasing its cost every
now and again, but no matter how much the cost of fuel are it does not affect your shopping
errands. One of the advantages of shopping online is that there is no need for vehicles, so no
purchase of fuel necessary.
Save Energy Admit it, it is tiresome to shop from one location and transfer to another
location. What is worse is that there are no available stocks for the merchandise you want to buy.
In online shopping, you do not need to waste your precious energy when buying.
Comparison of Prices The advanced innovation of search engine allows you to easily check
prices and compare with just a few clicks. It is very straightforward to conduct price
comparisons from one online shopping website to another. This gives you the freedom to
determine which online store offers the most affordable item you are going to buy.
24/7 Availability Online shopping stores are open round the clock of 24/7, 7 days a week and
365 days. It is very rare to find any conventional retail stores that are open 24/7. The availability
of online stores give you the freedom to shop at your own pace and convenience.
Hate Waiting in Lines When buying items online, there are no long lines you have to
endure, just to buy your merchandise. The idea of shopping online is cutting down those bad
habits of standing in a long line and just waiting. Every online store is designed with unique
individual ordering features to purchase the item.
Too Ashamed to Buy There are times that you want to purchase something out of the
ordinary that can be a bit embarrassing when seen by other people. Items like weird ornaments,
sexy lingerie, adult toys, etc. In online shopping, you do not need to be ashamed; your online
transactions are basically done privately.
Easy to Search Merchandise You Want to Buy You are able to look for specific
merchandise that includes model number, style, size, and color that you want to purchase. In
addition, it is easy to determine whether the products are available or out of stock.
different kind of things everyday. Today we can divide our life into two parts- 1. Physical life,
2. Virtual life.
In physical life, we meet each other physically. But, in virtual life we're using digital
technologies (like internet) to meet each other. Today virtual life is also very true as our real life,
we are doing almost everything in our virtual life. Yes! everything like- talking, communicating,
entertainment, business, banking, playing, shopping, educating and many more.
The History of Online shopping
Father of online shopping is- Michael Aldrich, who invented online shopping in the year of 1979
(according to the Wikipedia)
Online shopping started at 1994 by pizza Hut. In the same year a German company Intershop
Communication introduced world's first online shopping software . After that Amazon (1995)
and eBay (1996) was launched one by one. Now online shopping is so much popular that Ecommerce B2C product sale in USA touched around $200 billion, it is almost 1/10 of total retail
product sale in USA. Research says that online retailer in the USA will worth around $300
billion by 2015.
Not only in the USA, online shopping is now becoming too popular to all nations and all kinds of
people.
Advantages of shopping online!
It is very easy to shop your favorite items from a large number of online shopping sites
available on the internet. You can perform an online shopping from your home comfort.
Here is no need to go to the crowed supermarkets or shopping malls during festival
seasons. You just need a PC or a laptop and one necessary payment sending option to shop
online.
It is very easy.
You will choose your favorite items from variety of online shopping sites comparing
price and quality.
No need to go physical shops. You will have more time for your family.
Just need a computer and a payment sending option (like-net banking, credit card, ATM
card).
Almost all kinds of items can be brought through online shopping system.
It is very secure.
There are also have many disadvantages of online shopping system. Those are
You can never verify your purchased goods using your own hands. Here you have to
depend on picture, videos and descriptions. But the chance of defects is low.
Sometime you will pay much higher price for a particular item.
If you using ATM card, debit card, credit card, then there will be a question about your
bank account security. Think twice before putting your card information into an unknown
shopping site (site without HTTPS).
Here is no guarantee that you will receive your goods at time. Shipping will be delayed.
You have to pay a lot of extra if you buy form foreign shopping site.
Advantages
Access - Online shopping allows you to shop from any vendor, at any time, anywhere in
the world. Virtual window shopping enables all users to shop at their leisure and across
multiple marketplaces.
Time Saver - You no longer have to get in your car and have to drive to the mall to shop.
There are no lines and you can come back to your cart whenever you want.
Online Deals and Promotions - Before you checkout, you can scour the Internet for
online coupon codes or special discounts. Many companies send coupons to their customers
who have opted into their email marketing campaigns, delivering them with the latest
product or service information and what current promotions they are currently holding.
Disadvantages
Shipping Rates - Though some companies offer free flat rate shipping, it still may come
at a cost. For instance, a clothing store may offer free shipping but at a minimum of a $50
purchase.
Waiting - If you're an impatient person, waiting for your product to be delivered can be a
pain. There is a lack of instant gratification and even possibilities of delay when it comes to
receiving your items.
Business process re-engineering refers to the analysis, control and development of a companys
systems and workflow. The principal idea behind business process re-engineering is that a
company is a collection of processes that evolves over time. Business processing re-engineering
engineering gained prominence in the 1990s, but has re-emerged as business software and
enterprise applications have provided more in-depth analytics with which to evaluate business
systems.
An important goal of ERP is to facilitate the flow of information so business decisions can
be data-driven. ERP software suites are built to collect and organize data from various levels of
an organization to provide management with insight into key performance indicators (KPIs)
in real time.
ERP software modules can help an organization's administrators monitor and manage supply
chain, procurement, inventory,finance, product lifecycle, projects, human resources and other
mission-critical components of a business through a series of interconnected executive
dashboards. In order for an ERP software deployment to be useful, however, it needs to be
integrated with other software systems the organization uses. For this reason, deployment of a
new ERP system in-house can involve considerable business process reengineering, employee
retraining and back-end information technology (IT) support for database integration, data
analytics and ad hoc reporting.
Legacy ERP systems tend to be architected as large, complex homogeneous systems which do
not lend themselves easily to a software-as-a-service (SaaS ERP) delivery model. As more
companys begin to store data in the cloud, however, ERP vendors are responding withcloudbased services to perform some functions of ERP -- particularly those relied upon
by mobile users. An ERP implementation that uses both on-premises ERP software and cloud
ERP services is called two-tiered ERP.
Business process re-engineering is a business management strategy, originally pioneered in the
early 1990s, focusing on the analysis and design of workflows and business processes within an
organization. BPR aimed to help organizations fundamentally rethink how they do their work in
order to dramatically improve customer service, cut operational costs, and become world-class
competitors.[1] In the mid-1990s, as many as 60% of the Fortune 500 companies claimed to either
have initiated reengineering efforts, or to have plans to do so.[2]
BPR seeks to help companies radically restructure their organizations by focusing on the groundup design of their business processes. According to Davenport (1990) a business process is a set
of logically related tasks performed to achieve a defined business outcome. Re-engineering
emphasized a holistic focus on business objectives and how processes related to them,
encouraging full-scale recreation of processes rather than iterative optimization of subprocesses.
[1]
This massive increase in the uptake of ecommerce has led to a new generation of associated
security threats, but any ecommerce system must meet four integral requirements:
a) privacy information exchanged must be kept from unauthorized parties
b) integrity the exchanged information must not be altered or tampered with
c) authentication both sender and recipient must prove their identities to each other and
d) non-repudiation proof is required that the exchanged information was indeed received
(Holcombe, 2007).
These basic maxims of eCommerce are fundamental to the conduct of secure business online.
Further to the fundamental maxims of eCommerce above, eCommerce providers must also
protect against a number of different external security threats, most notably Denial of Service
(DoS). These are where an attempt is made to make a computer resource unavailable to its
intended users though a variety of mechanisms discussed below. The financial services sector
still bears the brunt of e-crime, accounting for 72% of all attacks. But the sector that experienced
the greatest increase in the number of attacks was eCommerce. Attacks in this sector have risen
by 15% from 2006 to 2007 (Symantec, 2007).
2. Privacy
Privacy has become a major concern for consumers with the rise of identity theft and
impersonation, and any concern for consumers must be treated as a major concern for
eCommerce providers. According to Consumer Reports Money Adviser (Perrotta, 2008), the US
Attorney General has announced multiple indictments relating to a massive international security
breach involving nine major retailers and more than 40 million credit- and debit-card numbers.
US attorneys think that this may be the largest hacking and identity-theft case ever prosecuted by
the justice department. Both EU and US legislation at both the federal and state levels mandates
certain organizations to inform customers about information uses and disclosures. Such
disclosures are typically accomplished through privacy policies, both online and offline (Vail et
al., 2008).
In a study by Lauer and Deng (2008), a model is presented linking privacy policy, through
trustworthiness, to online trust, and then to customers loyalty and their willingness to provide
truthful information. The model was tested using a sample of 269 responses. The findings
suggested that consumers trust in a company is closely linked with the perception of the
companys respect for customer privacy (Lauer and Deng, 2007). Trust in turn is linked to
increased customer loyalty that can be manifested through increased purchases, openness to
trying new products, and willingness to participate in programs that use additional personal
information. Privacy now forms an integral part of any e-commerce strategy and investment in
privacy protection has been shown to increase consumers spend, trustworthiness and loyalty.
The converse of this can be shown to be true when things go wrong. In March 2008, the Irish
online jobs board, jobs.ie, was compromised by criminals and users personal data (in the form of
CVs) were taken (Ryan, 2008). Looking at the real-time responses of users to this event on the
popular Irish forum, Boards.ie, we can see that privacy is of major concern to users and in the
event of their privacy being compromised users become very agitated and there is an overall
negative effect on trust in e-commerce. User comments in the forum included: Im well p*ssed
off about them keeping my CV on the sly; I am just angry that this could have happened and to
so many people; Mine was taken too. How do I terminate my acc with jobs.ie; Grr, so
annoyed, feel I should report it to the Gardai now (Boards.ie, 2008).
3. Integrity, Authentication & Non-Repudiation
In any e-commence system the factors of data integrity, customer & client authentication and
non-repudiation are critical to the success of any online business. Data integrity is the assurance
that data transmitted is consistent and correct, that is, it has not been tampered or altered in any
way during transmission. Authentication is a means by which both parties in an online
transaction can be confident that they are who they say they are and non-repudiation is the idea
that no party can dispute that an actual event online took place. Proof of data integrity is typically
the easiest of these factors to successfully accomplish. A data hash or checksum, such as MD5 or
CRC, is usually sufficient to establish that the likelihood of data being undetectably changed is
extremely low (Schlaeger and Pernul, 2005). Notwithstanding these security measures, it is still
possible to compromise data in transit through techniques such as phishing or man-in- themiddle attacks (Desmedt, 2005). These flaws have led to the need for the development of strong
verification and security measurements such as digital signatures and public key infrastructures
(PKI).
One of the key developments in e-commerce security and one which has led to the widespread
growth of e-commerce is the introduction of digital signatures as a means of verification of data
integrity and authentication. In 1995, Utah became the first jurisdiction in the world to enact an
electronic signature law. An electronic signature may be defined as any letters, characters, or
symbols manifested by electronic or similar means and executed or adopted by a party with the
intent to authenticate a writing (Blythe, 2006). In order for a digital signature to attain the same
legal status as an ink-on-paper signature, asymmetric key cryptology must have been employed
in its production (Blythe, 2006). Such a system employs double keys; one key is used to encrypt
the message by the sender, and a different, albeit mathematically related, key is used by the
recipient to decrypt the message (Antoniou et al., 2008). This is a very good system for
electronic transactions, since two stranger-parties, perhaps living far apart, can confirm each
others identity and thereby reduce the likelihood of fraud in the transaction. Non-repudiation
techniques prevent the sender of a message from subsequently denying that they sent the
message. Digital Signatures using public-key cryptography and hash functions are the generally
accepted means of providing non-repudiation of communications
4. Technical Attacks
Technical attacks are one of the most challenging types of security compromise an e-commerce
provider must face. Perpetrators of technical attacks, and in particular Denial-of-Service attacks,
typically target sites or services hosted on high-profile web servers such as banks, credit card
payment gateways, large online retailers and popular social networking sites.
Denial of Service Attacks
Denial of Service (DoS) attacks consist of overwhelming a server, a network or a website in
order to paralyze its normal activity (Lejeune, 2002). Defending against DoS attacks is one of the
most challenging security problems on the Internet today. A major difficulty in thwarting these
attacks is to trace the source of the attack, as they often use incorrect or spoofed IP source
addresses to disguise the true origin of the attack (Kim and Kim, 2006).
The United States Computer Emergency Readiness Team defines symptoms of denial-of-service
attacks to include (McDowell, 2007):
Phishing Attacks
Phishing is the criminally fraudulent process of attempting to acquire sensitive information such
as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an
electronic communication. Phishing scams generally are carried out by emailing the victim with
a fraudulent email from what purports to be a legitimate organization requesting sensitive
information. When the victim follows the link embedded within the email they are brought to an
elaborate and sophisticated duplicate of the legitimate organizations website. Phishing attacks
generally target bank customers, online auction sites (such as eBay), online retailers (such as
amazon) and services providers (such as PayPal). According to community banker (Swann,
2008), in more recent times cybercriminals have got more sophisticated in the timing of their
attacks with them posing as charities in times of natural disaster.
Social Engineering
Social engineering is the art of manipulating people into performing actions or divulging
confidential information. Social engineering techniques include pretexting (where the fraudster
creates an invented scenario to get the victim to divulge information), Interactive voice recording
(IVR) or phone phishing (where the fraudster gets the victim to divulge sensitive information
over the phone) and baiting with Trojans horses (where the fraudster baits the victim to load
malware unto a system). Social engineering has become a serious threat to e-commerce security
since it is difficult to detect and to combat as it involves human factors which cannot be
patched akin to hardware or software, albeit staff training and education can somewhat thwart the
attack (Hasle et al., 2005).
6. Conclusions
In conclusion the e-commerce industry faces a challenging future in terms of the security risks it
must avert. With increasing technical knowledge, and its widespread availability on the internet,
criminals are becoming more and more sophisticated in the deceptions and attacks they can
perform. Novel attack strategies and vulnerabilities only really become known once a perpetrator
has uncovered and exploited them. In saying this, there are multiple security strategies which any
e-commerce provider can instigate to reduce the risk of attack and compromise significantly.
Awareness of the risks and the implementation of multi-layered security protocols, detailed and
open privacy policies and strong authentication and encryption measures will go a long way to
assure the consumer and insure the risk of compromise is kept minimal.
4.what is E-Payment?
E payment is a subset of an e-commerce transaction to include electronic payment for buying
and selling goods or services offered through the Internet. Generally we think of electronic
payments as referring to online transactions on the internet, there are actually many forms
of electronic payments.
6.what do u understand by www? What is the use of hypertext links in internet access:
The World Wide Web is a system of Internet servers that supportspecially formatted documents.
The documents are formatted in a markup language called HTML (HyperText Markup
Language) that supports links to other documents, as well as graphics, audio, and video files.
This means you can jump from one document to another simply by clicking on hot spots. Not all
Internet servers are part of the World Wide Web.
Def:
The term WWWrefers to the World Wide Webor simply the Web. The World Wide Web consists of
all the public Web sites connected to the Internet worldwide,including the client devices (such as
computers and cell phones) that access Web content. The WWW is justone of many
applications of the Internet and computer networks.
The World Wide Web (www, W3) is an information space where documents and other web
resources are identified by URLs, interlinked by hypertext links, and can be accessed via the
Internet. It has become known simply as the Web.
The World Wide Web (www, W3) is an information space where documents and other web
resources are identified by URLs, interlinked by hypertext links, and can be accessed via
the Internet.[1] It has become known simply as the Web.
The World Wide Web was invented by English scientist Tim Berners-Lee in 1989. He wrote the
first web browser in 1990 [2][3].
The World Wide Web is the primary tool billions use to interact on the Internet, and it has
changed people's lives immeasurably.[4][5][6] Web pages are primarily text documents formatted
and annotated with Hypertext Markup Language (HTML). In addition to formatted text, web
pages may contain images, video, and software components that are rendered in the user's web
browser as coherent pages of multimedia content. Embedded hyperlinks permit users
to navigate between web pages. Multiple web pages with a common theme, a common domain
name, or both, may be called a website. Website content can largely be provided by the publisher,
or interactive where users contribute content or the content depends upon the user or their
actions. Websites may be mostly informative, primarily for entertainment, or largely for
commercial purposes.
In March 1989 Tim Berners-Lee distributed the first written proposal for the Web, which was
then called "Mesh". [7][8] The initial proposal was presented as a more efficient system for CERN
to communicate, but Berners-Lee also realized the concept could be a "boon" to the academic
world in general.[9] In November 1990 during the coding of the first browser Berners-Lee and his
colleague Robert Cailliau proposed to use hypertext "to link and access information of various
kinds as a web of nodes in which the user can browse at will",[9] and Berners-Lee finished the
first website in December of that year.[10] The first test was completed around 20 December 1990
and Berners-Lee reported about the project on the newsgroup alt.hypertext on 7 August 1991.
8.what are the key technologies for B2B E-Commerce? Explain architectural models of
B2B E-Commerce
B2B buyers have special needs when purchasing online. FitForCommerce founder and
CEO explains how to make B2B e-commerce sites effective purchasing tools for customers.
Recent growth of business-to-business e-commerce is led by higher buyer expectations and
technological advances. Most business buyers have adopted e-commerce as private consumers
and are, therefore, increasingly demanding the same convenience and options from B2B
organizations.
However, an optimal B2B multichannel selling approach cannot be obtained by simply providing
a business-to-consumer way to buy online. This is because B2B selling typically involves much
more complex processes, such as configurable product offerings, pricing and promotions based
on the needs of the individual business buyer, and often with the cooperation of teams of sales
reps.
Beyond basic commerce capabilities, such as product merchandising and order processing, B2B
enterprise commerce platforms should include these five key criteria for B2B commerce
effectiveness:
1. B2C best practices to meet buyer expectations for superior online product research
and purchasing
Advances in B2C online shopping have changed the expectations of the business buyer. B2B
commerce platforms can no longer simply replicate an offline catalog; they need to include more
and better product content, personalization, dynamic on-site searching, user reviews, social
integration, video, and even mobile sites and apps. Effective B2B commerce platforms
incorporate best practices from B2C commerce, such as presenting products in a way
personalized to a customers needs. On a B2B site, this can mean configuring product displays
and prices according to a client companys business rules, permitting the companys buyers to
choose only among approved products and make purchases within spending limits. Furthermore,
the platform must capture proprietary customer purchasing information such as Cost Center, Job
Code or Purchase Order Number, and include reporting tools that provide customers a variety of
selection and sorting criteria to review past purchases in detail or summary form.
2. Advanced configurability, not only of end-user capabilities and pricing options, but
also of complex product and service combinations for quoting and ordering
The complexities of B2B online selling translate into customer hierarchies, with differing pricing
for each, contract terms, multiple payment options, purchase authorization rules and approval
workflows, product portfolios, product configuration and marketing. The result is a complicated
purchasing environment that requires unique processes and technology capabilities. The B2B
channel requires advanced functionality to support sophisticated pricing and product
configurations. This includes business rules and workflows that dictate specific pricing for
individual customers, approval processes and governance rules in order to execute the sales and
marketing strategy across all channels. Furthermore, authorized users should have access to the
system and be empowered to set business rules, by segment and channels, without I.T.
involvement, to ensure that sales representatives do not spend unnecessary time on internal
processes and instead can focus on current and new customer sales.
3. Analytics and segmentation for creating separate and distinct product offerings and
pricing, quotation and contracts
Most B2B organizations dedicate resources to analyzing product, customer and sales data.
Leveraging this data enables the B2B seller to develop segmented strategies to offer the optimal
pricing and product mix personalized to each customers needs. However, many B2B
organizations find that their customer-facing commerce platforms are not fully capable of
displaying products and pricing based on real-time updates of data on available products and
customer demand. If such data on product, pricing and governance rules are not included in the
offer, then the analytics and segmentation efforts will be wasted. An effective B2B enterprise
commerce platform must include tools that can execute strategies and rules based on advanced
analytics and segmentation to enable guided selling through the online channel.
4. Sophisticated workflows to support complex buying cycles and selling execution across
multiple channels and markets
B2B enterprise commerce platforms need to be able to handle the complexities of selling through
both a companys own sites and its channel partners sites, which requires tight integration of and
visibility into the technology systems of all supply chain partners. An effective B2B enterprise
commerce platform must have capabilities to provide insights into all aspects of the order across
channels. This includes delivery dates for products and services, monitoring of order processes,
and automatic notifications to customers regarding their order status. The commerce platform
should be the single source of truth across business units, divisions and brands, and provide
consistent product and order information regardless of whether the customer is interacting with a
field sales rep, a call center rep, or the web site. Additionally, no matter how the seller manages
inventory and processes and fulfills a customers order, it should provide customers with the
same ease of placing orders and receiving order confirmations.
5.
B2B enterprises that target multiple markets will likely have sales and marketing strategies that
are tailored to local market conditions. This typically includes offers and pricing that vary by
geography or market segments. Organizations should deploy a centralized platform that allows
for global control of product information and customer orders, yet offers the flexibility to adapt
product information, marketing campaigns and order processes according to the interests and
needs of customers in each targeted market.
Bernardine Wu is founder and CEO of FitForCommerce, a multichannel consulting firm that
helps B2B companies and retailers define and execute growth strategies and select technologies.
Other professionals at FitForCommerce also contributed to this article. Follow Wu and other
FitForCommerce B2B commerce experts @FitForCommerce.
Website following B2B business model sells its product to an intermediate buyer who then sells
the product to the final customer. As an example, a wholesaler places an order from a company's
website and after receiving the consignment, sells the end product to final customer who comes
to buy the product at wholesaler's retail outlet.
DAIGRAM
B2B implies that seller as well as buyer is business entity. B2B covers large number of
applications which enables business to form relationships with their distributors, resellers,
suppliers etc. Following are the leading items in B2B e-Commerce.
Electronics
Motor Vehicles
Petrochemicals
Paper
Office products
Food
Agriculture
Key technologies
Following are the key technologies used in B2B e-commerce
Intranet
Intranet represents a dedicated network of computers within a single organization
Architectural Models
Following are the architectural models in B2B e-commerce
Buyer Oriented marketplace In this type of model, buyer has his/her own market
place or e-market. He invites suppliers to bid on product's catalog. A Buyer company
opens a bidding site.