Académique Documents
Professionnel Documents
Culture Documents
E-Commerce
New Markets. The Internet has the potential to expand your business into
wider geographical locations
Role of E-Commerce
Server side
Internet Database
Intranet
Firewall
(Secure)
Advantages to Organizations
Advantages to Consumers
Advantages to Society
Advantages to Organizations
Database
Website(with all details)
Cookies
SSL(secure sockets layer)
Secure Certificate
Electronic payment system.
Merchant Account
Payment Gateway
Example of Electronic Commerce
B2C: www.amazon.com
C2C: www.eBay.com
B2B: www.tpn.com
C2B: www.priceline.com
Measuring Benefits
You can define a product with variations, for example, the same
shirt can have different colors. These are called a product
variants.
You can also create catalogs that display on your Web site in
different languages and different currencies.
You can link two products together, so that when one is viewed,
the other appears somewhere on your Web site page as an
alternate suggestion..
Catalog
Catalog
For example, if you have a large catalog, you can create a parent
category that includes several other categories, known as child
categories.
When customers navigate to the parent category, the child
categories appear; enabling customers to navigate quickly to the
category that contains the products they want.
For example, you could define an "alternate" relationship so that
when one product is viewed, another appears somewhere on
your Web site page as an alternate suggestion.
Merchant account
Every product that reaches an end user represents the cumulative effort of
multiple organizations. These organizations are referred to collectively as
the supply chain.
The entire chain of activities that ultimately delivered products to the final
customer. The result was disjointed and often ineffective supply chains.
Supply chain management, then, is the active management of
supply chain activities to maximize customer value and achieve a
sustainable competitive advantage. Supply chain activities cover
everything from product development, sourcing, production, and logistics,
as well as the information systems needed to coordinate these activities.
They are the most visible piece of the supply chain. But just as important
are information flows. Information flows allow the various supply chain
partners to coordinate their long-term plans, and to control the day-to-day
flow of goods and material up and down the supply chain.
What is Supply Chain Management?
If you have ever checked out a newspaper advertisement, driven to the
store, and purchased your favorite product at a ridiculously low price,
then you can thank supply chain managers for a job well done! Supply
chain management (SCM) is all the activities that take place to get a
product in your hands from the time of raw materials extraction to the
minute you pull out your credit card and take the final product home.
SCM focuses on planning and forecasting, purchasing, product
assembly, moving, storing, and keeping track of a product as it
flows toward you and other consumers.
Supply chains include all of the companies that participate in the design,
assembly, and delivery of products for buyers like you. Retailers,
manufacturers, transportation companies, and distributors are some of
the key players.
Enterprise resource planning
(ERP)
Enterprise resource planning (ERP) is a business management
softwareusually a suite of integrated applicationsthat a company can
use to collect, store, manage and interpret data from many business
activities, including:-
Product planning, cost and development
Manufacturing or service delivery
Marketing and sales
Inventory management
Shipping and payment
ERP provides an integrated view of core business processes, often in
real-time, using common databases maintained by a database
management system
ERP software is considered an enterprise application as it is
designed to be used by larger businesses and often requires
dedicated teams to customize and analyze the data and to
handle upgrades and deployment.
So Generally there are lot of ERP package vendors in the
market like,SAP,Oracle,BANN,JD Edwards,SIEBEl etc.Each
vendor is specialized in one or many resources.SAP comes
under ERP Package which gives business solutions to a
business setup in all areas like Finance,Sales,Costing and
materials etc.
SAP
All ERP vendor Like SAP oracle have also announced Web Ec
strategies and products like.
Peachtree software: complete package for web front and
managing order.
SBT corp Web trader is another c2b web ec package work in LAN
Great plain software:
a: Dynamic merchant for c2b, dynamic order for b2b
the fact that newspapers, television, radio, and the internet are
becoming less separate as technology develops: Media convergence
means that we can now watch a newspaper's video report on our
cellphone via the internet.
Four types of convergence:
Intranets
Private internal networks
Extranet
Used when companies want to collaborate with suppliers, partners,
or customers
Internet2
Experimental network built by a consortium of research universities
and businesses
61
Electronic Data Interchange
EDI is the computer-to-computer transfer of business
information between two businesses
EDI-compatible firms are firms that exchange data in
specific standard formats
Business information exchanged is often transaction data
Web Portals 62
Web directories and search engines were some of the first portals
Portals or Web portals
Yahoo!, AOL, Google, etc. are general purpose portals that are launch
points for many people into the web
Numerous portals are specialized for specific interest groups
Auction Overview
63
Yankee auctions
English auctions that offer multiple units of an item for
sale
Virtual Communities 65
A virtual community is a gathering place for people and
businesses that does not have a physical existence
Usenet newsgroups
Chat rooms
Web sites
Virtual Worlds and Gaming Communities
Summary
66
Two-Tier Client/Server
Architecture
Two-tier client/server architecture has one client and one
server
68
Two-Tier Client/Server
Architecture
Request message: Message that a Web client sends
to request a file or files from a Web server
Typical request message contains:
Request line
Contains a command, the name of the target resource, and the protocol
name and version number
Request headers
Can contain information about types of files that the client will accept in
response to a request
Entity body
Used to pass bulk information to the server
69
Spam
77
Spam
78
Spam
Spam is unsolicited or commercial e-mail
During one 24-hour period in 2005 researchers estimated that
106 billion spam e-mail messages were sent
79
Finger
Runs on UNIX operating systems
Allows users to obtain information about other network users
Command yields a list of users who are logged on to a network
Ping (Packet Internet Groper)
Tests connectivity between two computers connected to the
Internet
80
Add a message (if you want to), then click Send Money.
Paypal will send the recipient an email to let them know that you sent them money. If they
dont have a PayPal account, we explain how to sign up for one. PayPal members must
confirm their email address before the money will be credited to their PayPal account.
When you send money, Paypal use your PayPal balance first. If you dont have enough
money in your PayPal balance, paypal will use the payment method you select.
PayPal acts as the middleman holder of money.
How will the person who paid know that I got theirpayment?
A notification of payment will go to the email address
PayPal Requirements
PayPal is Free for Buyers and for Sending Money to Someone Else.
Once a buyer sets up a Paypal account, then it costs nothing to send money
to a vendor. The funds are withdrawn from the user's credit card or bank
account, or both. PayPal does not charge buyers to send money.
PayPal Commonly Charges Money from Receivers (Sellers) :PayPal
will only charge you to receive funds(money is received by the seller so
paypal only charge from seller not the buyer but for using paypal buyer
If you are sending money to a friend or family member (someone who is not
a registered seller), you can opt to pay for the PayPal surcharge yourself.
Branding
Shared Hosting
Dedicated server
Clustered hosting
Determine which tasks are more important and have the largest
impact on the ability of the company to do business,
and then organize the e-marketing plan to accommodate these
priorities. Y
our priority list will depend on what you hope to accomplish with
your strategic plan.
Expand and cost
Once you have the focus of your e-marketing plan figured out it's
time to determine the cost.
Not only will you need to figure in the cost of online advertising
and Web hosting, but there will also be the cost of the time spent
by your employees in developing and executing the plan.
After you have developed your cost estimates compare them to
your budget.
Diversify
Commerce
Electronic
Prentice Hall 2006
The Strategic Planning Process
Strategy initiation.
Strategy formulation.
Strategy implementation.
Strategy assessment.
E-Strategy Implementation 11
8
Commerce
Electronic
Prentice Hall 2006
Strategy Implementation Issues
Application Development
Should site development be done internally, externally, or by a
combination of internal and external development?
Should the software application be built or will commercially available
software be satisfactory?
If a commercial package will suit, should it be purchased from the
vendor or rented from an ASP?
Will the company or an external ISP host the Web site?
If hosted externally, who will be responsible for monitoring and
maintaining the information and system?
How does a firewall work?
What is a "tier"?
A "tier" can also be referred to as a "layer".
n the software world Tiers/Layers should have some or all of the
following characteristics:
Each tier/layer should be able to be constructed separately,
possibly by different teams of people with different skills.
Several tiers/layers should be able to be joined together to make
a whole "something".
Each tier/layer should contribute something different to the
whole. A chocolate layer cake, for example, has layers of
chocolate and cake.
There must also be some sort of boundary between one tier and
another. You cannot take a single piece of cake, chop it up into
smaller units and call that a layer cake because each unit is
indistinguishable from the other units.
Each tier/layer should not be able to operate independently
without interaction with other tiers/layers.
Presentation logic - the user interface (UI) which displays data to the user and
accepts input from the user. In a web application this is the part which
receives the HTTP request and returns the HTML response.
Business logic - handles data validation, business rules and task-specific
behaviour.
Data Access logic - communicates with the database by constructing SQL
queries and executing them via the relevant API.
Three tier ecommerce
architecture
E-commerce Framework
1:- Infrastructure,
2:- Services, and
3:- Products and structures
and
seven functional levels
This model clearly builds upon the work undertaken by
the developers of the various layered network protocols
or architectures, which have been developed to explain the
inter-connection of telecommunications networking, such as the
OSI Reference Model.
which use a similar layering approach, where each layer has a
clearly defined area of functionality.
This separation of tasks means that a change at one layer does
not normally affect the other layers, with significant positive
implications for software developers.
The 3-Tier Architecture
This is where the code for each area of responsibility can be cleanly split away from the others
Note here that the presentation layer has no direct communication with the
data access layer - it can only talk to the business layer.
Requests and Responses in the 3
Tier Architecture
The Rules of the 3 Tier Architecture
The code for each layer must be contained with separate files
which can be maintained separately.
Each layer may only contain code which belongs in that layer.
Thus business logic can only reside in the Business layer,
presentation logic in the Presentation layer, and data access logic
in the Data Access layer.
The Presentation layer can only receive requests from, and return
responses to, an outside agent. This is usually a person, but may
be another piece of software.
The Presentation layer can only send requests to, and receive
responses from, the Business layer. It cannot have direct access
to either the database or the Data Access layer.
The Business layer can only receive requests from, and return
response to, the Presentation layer.
The Business layer can only send requests to, and receive
responses from, the Data Access layer. It cannot access the
database directly.
The Data Access layer can only receive requests from, and return
responses to, the Business layer. It cannot issue requests to
anything other than the DBMS which it supports.
Disadvantage of this approach