Vous êtes sur la page 1sur 19

1.

E- Shopping

Definition
The act of purchasing products or services over the Internet. Online shopping has grown in
popularity over the years, mainly because people find it convenient and easy to
bargain shop from the comfort of their home or office. One of the most enticing factor about
online shopping, particularly during a holiday season, is it alleviates the need to wait
in long lines or search from store to store for a particular item.
Online shopping is the process whereby consumers directly buy goods or services from a seller
in real-time, without an intermediary service, over the Internet. It is a form of electronic
commerce. An online shop, eshop, e-store, Internet shop, webshop, webstore, online store, or
virtual store evokes the physical analogy of buying products or services at a bricks-andmortar retailer or in a shopping center. The process is called business-to-consumer (B2C) online

shopping. When a business buys from another business, it is called business-to-business (B2B)
online shopping.
Online shopping has become a popular shopping method ever since the internet has declared a
takeover. There are many individuals that are looking for other amazing alternatives shopping
and online shipping is just the fix for that.
There are many advantages of online shopping; this is the reason why online stores are a
booming business today. Online shopping includes buying clothes, gadgets, shoes, appliances, or
even daily groceries. Listed below are several online shopping advantages and these are the
following.
Advantages of Online Shopping
Save Time Do you have the specific list that you want to buy? With just a couple of clicks of
the mouse, you can purchase your shopping orders and instantly move to other important things,
which can save time.
Save Fuel The market of fuel industries battles from increasing and decreasing its cost every
now and again, but no matter how much the cost of fuel are it does not affect your shopping
errands. One of the advantages of shopping online is that there is no need for vehicles, so no
purchase of fuel necessary.
Save Energy Admit it, it is tiresome to shop from one location and transfer to another
location. What is worse is that there are no available stocks for the merchandise you want to buy.
In online shopping, you do not need to waste your precious energy when buying.
Comparison of Prices The advanced innovation of search engine allows you to easily check
prices and compare with just a few clicks. It is very straightforward to conduct price
comparisons from one online shopping website to another. This gives you the freedom to
determine which online store offers the most affordable item you are going to buy.
24/7 Availability Online shopping stores are open round the clock of 24/7, 7 days a week and
365 days. It is very rare to find any conventional retail stores that are open 24/7. The availability
of online stores give you the freedom to shop at your own pace and convenience.
Hate Waiting in Lines When buying items online, there are no long lines you have to
endure, just to buy your merchandise. The idea of shopping online is cutting down those bad
habits of standing in a long line and just waiting. Every online store is designed with unique
individual ordering features to purchase the item.
Too Ashamed to Buy There are times that you want to purchase something out of the
ordinary that can be a bit embarrassing when seen by other people. Items like weird ornaments,

sexy lingerie, adult toys, etc. In online shopping, you do not need to be ashamed; your online
transactions are basically done privately.
Easy to Search Merchandise You Want to Buy You are able to look for specific
merchandise that includes model number, style, size, and color that you want to purchase. In
addition, it is easy to determine whether the products are available or out of stock.

Disadvantages of Online Shopping


If there are advantages, most likely there will be disadvantages. Despite the success of
purchasing through online shopping stores, there are still some disadvantages that most people
complain about. These include:
Personally Check the Item If you are one of those shoppers who want to touch, see, and test
the product personally, at online shopping, you are not able to do so. Online stores are only
showing product description and photos of the merchandise, which can be a disadvantage for
many online shoppers.
Diminished Instant Satisfaction Unlike buying at retail stores, you are able to use the
product instantly after you buy it, which can be satisfying. However, online shopping requires
patience to wait for the item to arrive at your door step about 2 to 3 days or even longer
depending on the location you've ordered it from.
Online shopping is continuously becoming more popular and improving every single day.
Knowing the advantages of online shopping and its disadvantages is additional knowledge for a
lot of online shoppers that are useful before shopping online.
Highlight of Information:
1.
2.
3.
4.
5.
6.

What is online shopping system.


The history of online shopping.
Advantages of online shopping.
Disadvantages of online shopping.
Online shopping security tips.
Top online shopping sites in the world.

First learn the online shopping system:Introduction


Shopping is one of the essential part of our daily life. We're using different types of shops to buy

different kind of things everyday. Today we can divide our life into two parts- 1. Physical life,
2. Virtual life.
In physical life, we meet each other physically. But, in virtual life we're using digital
technologies (like internet) to meet each other. Today virtual life is also very true as our real life,
we are doing almost everything in our virtual life. Yes! everything like- talking, communicating,
entertainment, business, banking, playing, shopping, educating and many more.
The History of Online shopping
Father of online shopping is- Michael Aldrich, who invented online shopping in the year of 1979
(according to the Wikipedia)
Online shopping started at 1994 by pizza Hut. In the same year a German company Intershop
Communication introduced world's first online shopping software . After that Amazon (1995)
and eBay (1996) was launched one by one. Now online shopping is so much popular that Ecommerce B2C product sale in USA touched around $200 billion, it is almost 1/10 of total retail
product sale in USA. Research says that online retailer in the USA will worth around $300
billion by 2015.
Not only in the USA, online shopping is now becoming too popular to all nations and all kinds of
people.
Advantages of shopping online!
It is very easy to shop your favorite items from a large number of online shopping sites
available on the internet. You can perform an online shopping from your home comfort.
Here is no need to go to the crowed supermarkets or shopping malls during festival
seasons. You just need a PC or a laptop and one necessary payment sending option to shop
online.

All types of items like-cars, books, apparel,


jewellery, baby care, gifts, tools, etc. can be shipped
using online shopping system. Not only these, you
can also buy from foreign countries by few clicks on
your mouse. And of course you will get your ordered items at your door. Just take a look what
type of facilities you'll get by using the online shop-

It is very easy.
You will choose your favorite items from variety of online shopping sites comparing
price and quality.
No need to go physical shops. You will have more time for your family.

Just need a computer and a payment sending option (like-net banking, credit card, ATM
card).

Almost all kinds of items can be brought through online shopping system.

You can buy foreign goods from your bedroom.

You will get your goods at your home.

It is very secure.

Customer service is available.


Disadvantage of shopping online!

There are also have many disadvantages of online shopping system. Those are

You can never verify your purchased goods using your own hands. Here you have to
depend on picture, videos and descriptions. But the chance of defects is low.
Sometime you will pay much higher price for a particular item.
If you using ATM card, debit card, credit card, then there will be a question about your
bank account security. Think twice before putting your card information into an unknown
shopping site (site without HTTPS).
Here is no guarantee that you will receive your goods at time. Shipping will be delayed.

You have to pay a lot of extra if you buy form foreign shopping site.
Advantages

Access - Online shopping allows you to shop from any vendor, at any time, anywhere in
the world. Virtual window shopping enables all users to shop at their leisure and across
multiple marketplaces.

Time Saver - You no longer have to get in your car and have to drive to the mall to shop.
There are no lines and you can come back to your cart whenever you want.

Online Deals and Promotions - Before you checkout, you can scour the Internet for
online coupon codes or special discounts. Many companies send coupons to their customers
who have opted into their email marketing campaigns, delivering them with the latest
product or service information and what current promotions they are currently holding.

Disadvantages

Shipping Rates - Though some companies offer free flat rate shipping, it still may come
at a cost. For instance, a clothing store may offer free shipping but at a minimum of a $50
purchase.

Waiting - If you're an impatient person, waiting for your product to be delivered can be a
pain. There is a lack of instant gratification and even possibilities of delay when it comes to
receiving your items.

Refunds/Returns Disputes - If an item comes damaged or not as described, you will


want to return the item or be refunded your money. Depending on where you purchased your
item, there can be different policies for refunds and returns; this process is tedious and is
prolonged since you would have to ship back the item and wait on the buyer to refund your
payment.
2. The concept of business process reengineering and its relationship with the productivity
paradox and ERP
Enterprise resource planning (ERP) is an industry term for the broad set of
activities that helps an organization manage its business

2.Definition - What does Business Process Re-Engineering (BPR)mean?


1.Introduction:
Business Process Reengineering (BPR) is a management approach aiming at improvements by
means of elevating efficiency and effectiveness of the processes that exist within and across
organizations. The key to BPR is for organizations to look at their business processes from a
"clean slate" perspective and determine how they can best construct these processes to improve
how they conduct business.
Business process reengineering is also known as BPR, Business Process Redesign, Business
Transformation, or Business Process Change Management.
In 1990, Michael Hammer, a former professor of computer science at the Massachusetts Institute
of Technology (MIT), published an article in the Harvard Business Review, in which he claimed
that the major challenge for managers is to obliterate non-value adding work, rather than using
technology for automating it (Hammer 1990).
This statement implicitly accused managers of having focused on the wrong issues, namely that
technology in general, and more specifically information technology, has been used primarily for
automating existing work rather than using it as an enabler for making non-value adding work
obsolete.

Business process re-engineering refers to the analysis, control and development of a companys
systems and workflow. The principal idea behind business process re-engineering is that a

company is a collection of processes that evolves over time. Business processing re-engineering
engineering gained prominence in the 1990s, but has re-emerged as business software and
enterprise applications have provided more in-depth analytics with which to evaluate business
systems.
An important goal of ERP is to facilitate the flow of information so business decisions can
be data-driven. ERP software suites are built to collect and organize data from various levels of
an organization to provide management with insight into key performance indicators (KPIs)
in real time.
ERP software modules can help an organization's administrators monitor and manage supply
chain, procurement, inventory,finance, product lifecycle, projects, human resources and other
mission-critical components of a business through a series of interconnected executive
dashboards. In order for an ERP software deployment to be useful, however, it needs to be
integrated with other software systems the organization uses. For this reason, deployment of a
new ERP system in-house can involve considerable business process reengineering, employee
retraining and back-end information technology (IT) support for database integration, data
analytics and ad hoc reporting.
Legacy ERP systems tend to be architected as large, complex homogeneous systems which do
not lend themselves easily to a software-as-a-service (SaaS ERP) delivery model. As more
companys begin to store data in the cloud, however, ERP vendors are responding withcloudbased services to perform some functions of ERP -- particularly those relied upon
by mobile users. An ERP implementation that uses both on-premises ERP software and cloud
ERP services is called two-tiered ERP.
Business process re-engineering is a business management strategy, originally pioneered in the
early 1990s, focusing on the analysis and design of workflows and business processes within an
organization. BPR aimed to help organizations fundamentally rethink how they do their work in
order to dramatically improve customer service, cut operational costs, and become world-class
competitors.[1] In the mid-1990s, as many as 60% of the Fortune 500 companies claimed to either
have initiated reengineering efforts, or to have plans to do so.[2]
BPR seeks to help companies radically restructure their organizations by focusing on the groundup design of their business processes. According to Davenport (1990) a business process is a set
of logically related tasks performed to achieve a defined business outcome. Re-engineering
emphasized a holistic focus on business objectives and how processes related to them,
encouraging full-scale recreation of processes rather than iterative optimization of subprocesses.
[1]

Business process re-engineering is also known as business process redesign, business


transformation, or business process change management

3.security issues of e-commerce


Introduction
I. INTRODUCTION E-commerce Security is a part of the Information Security framework and
is specifically applied to the components that affect e-commerce that include Computer Security,
Data security and other wider realms of the Information Security framework. E-commerce
security has its own particular nuances and is one of the highest visible security components that
affect the end user through their daily payment interaction with business.
E-commerce is defined as the buying and selling of products or services over electronic systems
such as the Internet and to a lesser extent, other computer networks. It is generally regarded as
the sales and commercial function of eBusiness. There has been a massive increase in the level of
trade conducted electronically since the widespread penetration of the Internet. A wide variety of
commerce is conducted via ecommerce, including electronic funds transfer, supply chain
management, Internet marketing, online transaction processing, electronic data interchange
(EDI), inventory management systems, and automated data collection systems. US online retail
sales reached $175 billion in 2007 and are projected to grow to $335 billion by 2012 (Mulpuru,
2008).

This massive increase in the uptake of ecommerce has led to a new generation of associated
security threats, but any ecommerce system must meet four integral requirements:
a) privacy information exchanged must be kept from unauthorized parties
b) integrity the exchanged information must not be altered or tampered with
c) authentication both sender and recipient must prove their identities to each other and
d) non-repudiation proof is required that the exchanged information was indeed received
(Holcombe, 2007).
These basic maxims of eCommerce are fundamental to the conduct of secure business online.
Further to the fundamental maxims of eCommerce above, eCommerce providers must also
protect against a number of different external security threats, most notably Denial of Service
(DoS). These are where an attempt is made to make a computer resource unavailable to its
intended users though a variety of mechanisms discussed below. The financial services sector
still bears the brunt of e-crime, accounting for 72% of all attacks. But the sector that experienced

the greatest increase in the number of attacks was eCommerce. Attacks in this sector have risen
by 15% from 2006 to 2007 (Symantec, 2007).
2. Privacy
Privacy has become a major concern for consumers with the rise of identity theft and
impersonation, and any concern for consumers must be treated as a major concern for
eCommerce providers. According to Consumer Reports Money Adviser (Perrotta, 2008), the US
Attorney General has announced multiple indictments relating to a massive international security
breach involving nine major retailers and more than 40 million credit- and debit-card numbers.
US attorneys think that this may be the largest hacking and identity-theft case ever prosecuted by
the justice department. Both EU and US legislation at both the federal and state levels mandates
certain organizations to inform customers about information uses and disclosures. Such
disclosures are typically accomplished through privacy policies, both online and offline (Vail et
al., 2008).
In a study by Lauer and Deng (2008), a model is presented linking privacy policy, through
trustworthiness, to online trust, and then to customers loyalty and their willingness to provide
truthful information. The model was tested using a sample of 269 responses. The findings
suggested that consumers trust in a company is closely linked with the perception of the
companys respect for customer privacy (Lauer and Deng, 2007). Trust in turn is linked to
increased customer loyalty that can be manifested through increased purchases, openness to
trying new products, and willingness to participate in programs that use additional personal
information. Privacy now forms an integral part of any e-commerce strategy and investment in
privacy protection has been shown to increase consumers spend, trustworthiness and loyalty.
The converse of this can be shown to be true when things go wrong. In March 2008, the Irish
online jobs board, jobs.ie, was compromised by criminals and users personal data (in the form of
CVs) were taken (Ryan, 2008). Looking at the real-time responses of users to this event on the
popular Irish forum, Boards.ie, we can see that privacy is of major concern to users and in the
event of their privacy being compromised users become very agitated and there is an overall
negative effect on trust in e-commerce. User comments in the forum included: Im well p*ssed
off about them keeping my CV on the sly; I am just angry that this could have happened and to
so many people; Mine was taken too. How do I terminate my acc with jobs.ie; Grr, so
annoyed, feel I should report it to the Gardai now (Boards.ie, 2008).
3. Integrity, Authentication & Non-Repudiation
In any e-commence system the factors of data integrity, customer & client authentication and
non-repudiation are critical to the success of any online business. Data integrity is the assurance
that data transmitted is consistent and correct, that is, it has not been tampered or altered in any
way during transmission. Authentication is a means by which both parties in an online
transaction can be confident that they are who they say they are and non-repudiation is the idea

that no party can dispute that an actual event online took place. Proof of data integrity is typically
the easiest of these factors to successfully accomplish. A data hash or checksum, such as MD5 or
CRC, is usually sufficient to establish that the likelihood of data being undetectably changed is
extremely low (Schlaeger and Pernul, 2005). Notwithstanding these security measures, it is still
possible to compromise data in transit through techniques such as phishing or man-in- themiddle attacks (Desmedt, 2005). These flaws have led to the need for the development of strong
verification and security measurements such as digital signatures and public key infrastructures
(PKI).
One of the key developments in e-commerce security and one which has led to the widespread
growth of e-commerce is the introduction of digital signatures as a means of verification of data
integrity and authentication. In 1995, Utah became the first jurisdiction in the world to enact an
electronic signature law. An electronic signature may be defined as any letters, characters, or
symbols manifested by electronic or similar means and executed or adopted by a party with the
intent to authenticate a writing (Blythe, 2006). In order for a digital signature to attain the same
legal status as an ink-on-paper signature, asymmetric key cryptology must have been employed
in its production (Blythe, 2006). Such a system employs double keys; one key is used to encrypt
the message by the sender, and a different, albeit mathematically related, key is used by the
recipient to decrypt the message (Antoniou et al., 2008). This is a very good system for
electronic transactions, since two stranger-parties, perhaps living far apart, can confirm each
others identity and thereby reduce the likelihood of fraud in the transaction. Non-repudiation
techniques prevent the sender of a message from subsequently denying that they sent the
message. Digital Signatures using public-key cryptography and hash functions are the generally
accepted means of providing non-repudiation of communications
4. Technical Attacks
Technical attacks are one of the most challenging types of security compromise an e-commerce
provider must face. Perpetrators of technical attacks, and in particular Denial-of-Service attacks,
typically target sites or services hosted on high-profile web servers such as banks, credit card
payment gateways, large online retailers and popular social networking sites.
Denial of Service Attacks
Denial of Service (DoS) attacks consist of overwhelming a server, a network or a website in
order to paralyze its normal activity (Lejeune, 2002). Defending against DoS attacks is one of the
most challenging security problems on the Internet today. A major difficulty in thwarting these
attacks is to trace the source of the attack, as they often use incorrect or spoofed IP source
addresses to disguise the true origin of the attack (Kim and Kim, 2006).
The United States Computer Emergency Readiness Team defines symptoms of denial-of-service
attacks to include (McDowell, 2007):

Unusually slow network performance


Unavailability of a particular web site
Inability to access any web site
Dramatic increase in the number of spam emails received
DoS attacks can be executed in a number of different ways including:
ICMP Flood (Smurf Attack) where perpetrators will send large numbers of IP packets with the
source address faked to appear to be the address of the victim. The networks bandwidth is
quickly used up, preventing legitimate packets from getting through to their destination
Teardrop Attack A Teardrop attack involves sending mangled IP fragments with overlapping,
over-sized, payloads to the target machine. A bug in the TCP/IP fragmentation re-assembly code
of various operating systems causes the fragments to be improperly handled, crashing them as a
result of this.
Phlashing Also known as a Permanent denial-of-service (PDoS) is an attack that damages a
system so badly that it requires replacement or reinstallation of hardware. Perpetrators exploit
security flaws in the remote management interfaces of the victims hardware, be it routers,
printers, or other networking hardware. These flaws leave the door open for an attacker to
remotely update the device firmware to a modified, corrupt or defective firmware image,
therefore bricking the device and making it permanently unusable for its original purpose.
Distributed Denial-of-Service Attacks
Distributed Denial of Service (DDoS) attacks are one of the greatest security fear for IT
managers. In a matter of minutes, thousands of vulnerable computers can flood the victim
website by choking legitimate traffic (Tariq et al., 2006). A distributed denial of service attack
(DDoS) occurs when multiple compromised systems flood the bandwidth or resources of a
targeted system, usually one or more web servers. The most famous DDoS attacks occurred in
February 2000 where websites including Yahoo, Buy.com, eBay, Amazon and CNN were
attacked and left unreachable for several hours each (Todd, 2000).
Brute Force Attacks A brute force attack is a method of defeating a cryptographic scheme by
trying a large number of possibilities; for example, a large number of the possible keys in a key
space in order to decrypt a message. Brute Force Attacks, although perceived to be low-tech in
nature are not a thing of the past. In May 2007 the internet infrastructure in Estonia was crippled
by multiple sustained brute force attacks against government and commercial institutions in the
country (Sausner, 2008). The attacks followed the relocation of a Soviet World War II memorial
in Tallinn in late April made news around the world.
5. Non-Technical Attacks

Phishing Attacks
Phishing is the criminally fraudulent process of attempting to acquire sensitive information such
as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an
electronic communication. Phishing scams generally are carried out by emailing the victim with
a fraudulent email from what purports to be a legitimate organization requesting sensitive
information. When the victim follows the link embedded within the email they are brought to an
elaborate and sophisticated duplicate of the legitimate organizations website. Phishing attacks
generally target bank customers, online auction sites (such as eBay), online retailers (such as
amazon) and services providers (such as PayPal). According to community banker (Swann,
2008), in more recent times cybercriminals have got more sophisticated in the timing of their
attacks with them posing as charities in times of natural disaster.
Social Engineering
Social engineering is the art of manipulating people into performing actions or divulging
confidential information. Social engineering techniques include pretexting (where the fraudster
creates an invented scenario to get the victim to divulge information), Interactive voice recording
(IVR) or phone phishing (where the fraudster gets the victim to divulge sensitive information
over the phone) and baiting with Trojans horses (where the fraudster baits the victim to load
malware unto a system). Social engineering has become a serious threat to e-commerce security
since it is difficult to detect and to combat as it involves human factors which cannot be
patched akin to hardware or software, albeit staff training and education can somewhat thwart the
attack (Hasle et al., 2005).
6. Conclusions
In conclusion the e-commerce industry faces a challenging future in terms of the security risks it
must avert. With increasing technical knowledge, and its widespread availability on the internet,
criminals are becoming more and more sophisticated in the deceptions and attacks they can
perform. Novel attack strategies and vulnerabilities only really become known once a perpetrator
has uncovered and exploited them. In saying this, there are multiple security strategies which any
e-commerce provider can instigate to reduce the risk of attack and compromise significantly.
Awareness of the risks and the implementation of multi-layered security protocols, detailed and
open privacy policies and strong authentication and encryption measures will go a long way to
assure the consumer and insure the risk of compromise is kept minimal.
4.what is E-Payment?
E payment is a subset of an e-commerce transaction to include electronic payment for buying
and selling goods or services offered through the Internet. Generally we think of electronic
payments as referring to online transactions on the internet, there are actually many forms
of electronic payments.

As technology developing, the range of devices and processes to transact electronically


continues to increase while the percentage of cash and check transactions continues to decrease.
In the US, for example, checks have declined from 85% of non-cash payments in 1979 to 59% in
2002, and electronic payments have grown to 41%.
The Internet has the potential to become the most active trade intermediary within a decade.
Also, Internet shopping may revolutionize retailing by allowing consumers to sit in their homes
and buy an enormous variety of products and services from all over the worlds. Many businesses
and consumers are still wary of conducting extensive business electronically. However, almost
everyone will use the form of E Commerce in near future.
The standardised ISO 20022 CGI message format (based on XML1 ) for global payments is
increasingly gaining ground and provides many benefits to companies. These include, among
others: uniform communication with numerous banks, standardised and automated processes
across the group, lower costs for payments, faster transactions even if business volume increases,
and a future-proof format due to interoperability with other standards. Based on these
advantages, there is a marked trend towards utilisation of standardised formats for payments by
both corporates and banks. This whitepaper will provide an introduction to ISO 20022 CGI for
all interested companies and will highlight how companies can benefit from going beyond SEPA
and choosing ISO 20022 CGI for SEPA and world-wide payments.
3.2. Functional Requirements
1) System must be able to add/modify customer. 2) Customer must be able to view his/her
personal details only. 3) System must be able to accept orders from the customer via email or
online form. 4) Customer must be able to view his/her orders history. 5) Each customer must be
able to view placed order status. 6) System must alert Fortex AB for new orders. 7) Fortex
should be able to change the status of the order between order executions. 8) System must
generate pro forma and customer invoice against an order. 9) Customer should be able to validate
and confirm their invoice. 10) Fortex AB must be able to view pro forma invoice and packing list
sent by the mill. 11) Fortex AB must be able to view order history of a customer. 12) Fortex AB
must be able to validate and manage customers order against payments. 13) System must store
information related to shipment and banking for each order. 14) The system must guarantee
secure access to the stored data, managing the permissions according to the user profile. 15) The
system must support easy addition of functionalities and enhancements 16) The system should
support device upgrading or changing of devices.

6.what do u understand by www? What is the use of hypertext links in internet access:

The World Wide Web is a system of Internet servers that supportspecially formatted documents.
The documents are formatted in a markup language called HTML (HyperText Markup
Language) that supports links to other documents, as well as graphics, audio, and video files.
This means you can jump from one document to another simply by clicking on hot spots. Not all
Internet servers are part of the World Wide Web.

Def:
The term WWWrefers to the World Wide Webor simply the Web. The World Wide Web consists of
all the public Web sites connected to the Internet worldwide,including the client devices (such as
computers and cell phones) that access Web content. The WWW is justone of many
applications of the Internet and computer networks.
The World Wide Web (www, W3) is an information space where documents and other web
resources are identified by URLs, interlinked by hypertext links, and can be accessed via the
Internet. It has become known simply as the Web.
The World Wide Web (www, W3) is an information space where documents and other web
resources are identified by URLs, interlinked by hypertext links, and can be accessed via
the Internet.[1] It has become known simply as the Web.
The World Wide Web was invented by English scientist Tim Berners-Lee in 1989. He wrote the
first web browser in 1990 [2][3].
The World Wide Web is the primary tool billions use to interact on the Internet, and it has
changed people's lives immeasurably.[4][5][6] Web pages are primarily text documents formatted
and annotated with Hypertext Markup Language (HTML). In addition to formatted text, web
pages may contain images, video, and software components that are rendered in the user's web
browser as coherent pages of multimedia content. Embedded hyperlinks permit users
to navigate between web pages. Multiple web pages with a common theme, a common domain
name, or both, may be called a website. Website content can largely be provided by the publisher,
or interactive where users contribute content or the content depends upon the user or their
actions. Websites may be mostly informative, primarily for entertainment, or largely for
commercial purposes.
In March 1989 Tim Berners-Lee distributed the first written proposal for the Web, which was
then called "Mesh". [7][8] The initial proposal was presented as a more efficient system for CERN
to communicate, but Berners-Lee also realized the concept could be a "boon" to the academic
world in general.[9] In November 1990 during the coding of the first browser Berners-Lee and his
colleague Robert Cailliau proposed to use hypertext "to link and access information of various
kinds as a web of nodes in which the user can browse at will",[9] and Berners-Lee finished the

first website in December of that year.[10] The first test was completed around 20 December 1990
and Berners-Lee reported about the project on the newsgroup alt.hypertext on 7 August 1991.
8.what are the key technologies for B2B E-Commerce? Explain architectural models of
B2B E-Commerce
B2B buyers have special needs when purchasing online. FitForCommerce founder and
CEO explains how to make B2B e-commerce sites effective purchasing tools for customers.
Recent growth of business-to-business e-commerce is led by higher buyer expectations and
technological advances. Most business buyers have adopted e-commerce as private consumers
and are, therefore, increasingly demanding the same convenience and options from B2B
organizations.
However, an optimal B2B multichannel selling approach cannot be obtained by simply providing
a business-to-consumer way to buy online. This is because B2B selling typically involves much
more complex processes, such as configurable product offerings, pricing and promotions based
on the needs of the individual business buyer, and often with the cooperation of teams of sales
reps.
Beyond basic commerce capabilities, such as product merchandising and order processing, B2B
enterprise commerce platforms should include these five key criteria for B2B commerce
effectiveness:
1. B2C best practices to meet buyer expectations for superior online product research
and purchasing
Advances in B2C online shopping have changed the expectations of the business buyer. B2B
commerce platforms can no longer simply replicate an offline catalog; they need to include more
and better product content, personalization, dynamic on-site searching, user reviews, social
integration, video, and even mobile sites and apps. Effective B2B commerce platforms
incorporate best practices from B2C commerce, such as presenting products in a way
personalized to a customers needs. On a B2B site, this can mean configuring product displays
and prices according to a client companys business rules, permitting the companys buyers to
choose only among approved products and make purchases within spending limits. Furthermore,
the platform must capture proprietary customer purchasing information such as Cost Center, Job
Code or Purchase Order Number, and include reporting tools that provide customers a variety of
selection and sorting criteria to review past purchases in detail or summary form.
2. Advanced configurability, not only of end-user capabilities and pricing options, but
also of complex product and service combinations for quoting and ordering

The complexities of B2B online selling translate into customer hierarchies, with differing pricing
for each, contract terms, multiple payment options, purchase authorization rules and approval
workflows, product portfolios, product configuration and marketing. The result is a complicated
purchasing environment that requires unique processes and technology capabilities. The B2B
channel requires advanced functionality to support sophisticated pricing and product
configurations. This includes business rules and workflows that dictate specific pricing for
individual customers, approval processes and governance rules in order to execute the sales and
marketing strategy across all channels. Furthermore, authorized users should have access to the
system and be empowered to set business rules, by segment and channels, without I.T.
involvement, to ensure that sales representatives do not spend unnecessary time on internal
processes and instead can focus on current and new customer sales.
3. Analytics and segmentation for creating separate and distinct product offerings and
pricing, quotation and contracts
Most B2B organizations dedicate resources to analyzing product, customer and sales data.
Leveraging this data enables the B2B seller to develop segmented strategies to offer the optimal
pricing and product mix personalized to each customers needs. However, many B2B
organizations find that their customer-facing commerce platforms are not fully capable of
displaying products and pricing based on real-time updates of data on available products and
customer demand. If such data on product, pricing and governance rules are not included in the
offer, then the analytics and segmentation efforts will be wasted. An effective B2B enterprise
commerce platform must include tools that can execute strategies and rules based on advanced
analytics and segmentation to enable guided selling through the online channel.
4. Sophisticated workflows to support complex buying cycles and selling execution across
multiple channels and markets
B2B enterprise commerce platforms need to be able to handle the complexities of selling through
both a companys own sites and its channel partners sites, which requires tight integration of and
visibility into the technology systems of all supply chain partners. An effective B2B enterprise
commerce platform must have capabilities to provide insights into all aspects of the order across
channels. This includes delivery dates for products and services, monitoring of order processes,
and automatic notifications to customers regarding their order status. The commerce platform
should be the single source of truth across business units, divisions and brands, and provide
consistent product and order information regardless of whether the customer is interacting with a
field sales rep, a call center rep, or the web site. Additionally, no matter how the seller manages
inventory and processes and fulfills a customers order, it should provide customers with the
same ease of placing orders and receiving order confirmations.
5.

Single, global platform that can adapt to local market execution

B2B enterprises that target multiple markets will likely have sales and marketing strategies that
are tailored to local market conditions. This typically includes offers and pricing that vary by
geography or market segments. Organizations should deploy a centralized platform that allows
for global control of product information and customer orders, yet offers the flexibility to adapt
product information, marketing campaigns and order processes according to the interests and
needs of customers in each targeted market.
Bernardine Wu is founder and CEO of FitForCommerce, a multichannel consulting firm that
helps B2B companies and retailers define and execute growth strategies and select technologies.
Other professionals at FitForCommerce also contributed to this article. Follow Wu and other
FitForCommerce B2B commerce experts @FitForCommerce.

Electronic Data Interchange (EDI) EDI is an inter organizational exchange of


business documents in a structured and machine processable format.
Internet Internet represents World Wide Web or network of networks connecting
computers across the world.
Intranet
Intranet represents a dedicated network of computers within a single organization
Extranet Extranet represents a network where outside business partners, supplier or
customers can have limited access to a portion of enterprise intranet/network.
Back-End Information System Integration Back End information systems are
database management systems used to manage the business data.

E-Commerce - B2B Model


Advertisements

Website following B2B business model sells its product to an intermediate buyer who then sells
the product to the final customer. As an example, a wholesaler places an order from a company's
website and after receiving the consignment, sells the end product to final customer who comes
to buy the product at wholesaler's retail outlet.
DAIGRAM

B2B implies that seller as well as buyer is business entity. B2B covers large number of
applications which enables business to form relationships with their distributors, resellers,
suppliers etc. Following are the leading items in B2B e-Commerce.

Electronics

Shipping and Warehousing

Motor Vehicles

Petrochemicals

Paper

Office products

Food

Agriculture

Key technologies
Following are the key technologies used in B2B e-commerce

Electronic Data Interchange (EDI) EDI is an inter organizational exchange of


business documents in a structured and machine processable format.

Internet Internet represents world wide web or network of networks connecting


computers across the world.

Intranet
Intranet represents a dedicated network of computers within a single organization

Extranet Extranet represents a network where outside business partners, supplier or


customers can have limited access to a portion of enterprise intranet/network.
.

Back-End Information System Integration Back End information systems are


database management systems used to manage the business data.

Architectural Models
Following are the architectural models in B2B e-commerce

Supplier Oriented marketplace In this type of model, a common marketplace


provided by supplier is used by both individual customers as well as business users. A
supplier offers an e-stores for sales promotion.

Buyer Oriented marketplace In this type of model, buyer has his/her own market
place or e-market. He invites suppliers to bid on product's catalog. A Buyer company
opens a bidding site.

Intermediary Oriented marketplace In this type of model, an intermediary company


runs a market place where business buyers and sellers can transact with each other.

Models for B2B e-commerce


searching the Web for new suppliers/customers
Company Web site
Communities
improving the sales process
E-procurement
Extranet applications with chosen suppliers
participating in electronic marketplaces

Vous aimerez peut-être aussi