Documente Academic
Documente Profesional
Documente Cultură
1 INTRODUCTION
TO
E- COMMERCE
2 ELECTRONIC
PAYMENT
SYSTEM(EPS)
3 E – MARKETING
4 MOBILE
COMMERCE
5 E – SECURITY
CHAPTER – 1
INTRODUCTION
TO
E - COMMERCE
E-COMMERCE
E-commerce as anything that involves an online transaction. E-commerce provides
multiple benefits to the consumers in form of availability of goods at lower cost, wider
choice and saves time. The general category of e-commerce can be broken down into two
parts: E-merchandise: E-finance. E commerce involves conducting business using
modern communication instruments: telephone, fax, e-payment, money transfer systems,
e-data interchange and the Internet. Online businesses like financial services, travel,
entertainment, and groceries are all likely to grow. Forces influencing the distribution of
global e-commerce and its forms include economic factors, political factors, cultural
factors and supranational institutions.
E-commerce as anything that involves an online transaction. This can range from
ordering online, through online delivery of paid content, to financial transactions such as
movement of money between bank accounts.
1 E-merchandise: Selling goods and services electronically and moving items through
distribution channels, for example through Internet shopping for groceries, tickets, music,
clothes, hardware, travel, books, flowers or gifts.
2 E-finance: Banking, debit cards, smart cards, banking machines, telephone and Internet
banking, insurance, financial services and mortgages on-line.
Farooq Ahmed (2001) reported that the enormous flexibility of the internet has made
possible what is popularly called e-commerce which has made inroads in the traditional
methods of business management. All the facets the business tradition with which we are
accustomed in physical environment can be now executed over the internet including
online advertising, online ordering, publishing, banking, investment, auction and
professional services. E commerce involves conducting business using modern
communication instruments: telephone, fax, e-payment, money transfer systems, e-data
interchange and the internet. The WTO has recognized that commercial transactions can
be broken into 3 stages. 'The advertising and searching stage, the ordering, and payment
stage, and the delivery stage.'
BENEFITS OF E- COMMERCE
HISTORY OF E- COMMERCE
As per the findings of Internet and Mobile Association India the total value of E-
Commerce activities within India has Crossed Rs.570 Crore during 2004-05. Internet and
Mobile Association India a non-profit organization founded in January 2004 by leading
Indian Internet portals, projects that e-commerce revenues in the country will reach Rs
2,300 Crore in the 2007 financial year, growing at 95 percent over the year 2006. This
pertains to the Business-to-Consumer (B2C) segment.
1. BANKING INDUSTRY
New information technologies and emerging business forces have triggered a new wave
of financial innovation – electronic banking (e-banking). The banking and financial
industry is transforming itself in unpredictable ways (Crane and Bodie 1996), powered in
an important way by advances in information technology (Holland and Westwood 2001).
Since the 1980s, commercial banking has continuously innovated through technology-
enhanced products and services, such as multi-function ATM, tele-banking, electronic
transfers and electronic cash cards. Over the past decade, the Internet has clearly played a
critical role in providing online services and giving rise to a completely new channel. In
the internet age, the extension of commercial banking to the cyberspace is an inevitable
development (Liao and Cheung 2003).
E-banking creates unprecedented opportunities for the banks in the ways they organize
financial product development, delivery and marketing via the internet. While it offers
new opportunities to banks, it also poses many challenges such as the innovation of IT
applications, the blurring of market boundaries, the breaching of industrial barriers, the
entrance of new competitors and the emergence of new business models (Saatcioglu et al.
2001, Liao and Cheung 2003). Now the speed and scale of the challenge are rapidly
increasing with the pervasiveness of the internet and the extension of information
economy (Holland and Westwood 2001).
Products Offered:
All of the major banks in India have an internet presence offering a range of products
directly to consumers by way of proprietary internet sites. While the initial focus of the
banks has been in the retail-banking sector, there is a growing range of small to medium
enterprise ("SME") and corporate banking products and services being offered. The
products available include
(a) Funds Transfer and Payment Systems:-The major banks offer a range of online
financial services including
(iii) Remittances;
(b) B2B E-Commerce:-At least one of the major commercial banks offers an integrated
B2B e-commerce product directly through its website, involving product selection,
purchase order, invoice generation, and payment. However, integrated B2B products and
services are not as yet generally available directly from the banks.
(d) Securities Trading:- A full range of online securities services are provided by the
specialist securities subsidiaries of the major commercial banks including online trading.
(e) Retail Banking:- All of the major commercial banks have established websites for
retail services. Typically such sites will offer the following services:
(i) A full range of personal account services, including foreign currency accounts;
E-Commerce has provided the platform that enables the implementation of core banking
solutions (CBS). Today all the major banks have gone on to implement CBS. And with
time being a premium among bank customers, banks have been ideating and developing
newer modes of delivering banking services. Today there is a whole plethora of such
platforms available ranging from the ATM to the mobile.
Banks like State Bank of India and its associates are recording over 100,000 transactions
on a daily basis through their 5,000 plus network of ATMs. Incidentally the profile and
usage pattern of ATMs in India matches that of ATMs abroad with an overwhelming
(more than 80%) being used for cash withdrawal. Today with over 20,000 ATMs, India is
recording one of the fastest growth in terms of ATM proliferation, though the per capita
availability of ATMs doesn't compare anywhere to markets like Japan or the US.
With most banks now providing Internet banking facility, bankers say that customers are
using the bank for a variety of purposes. One commonly used service being booking of
rail tickets. Bankers also say that customers are using bank networks for online shopping.
Most of the online banking channels are linked to major retailers. Estimates also indicate
that today over 40% of the share transactions are being put through the internet.
2. TRAVEL INDUSTRY
In India e-commerce is being driven by the growing online travel industry and online
travel bookings have increased substantially after the entry of low cost carriers. Currently,
online travel industry is contributing 50% to the revenue generated by e-commerce in
India. To boot, online travel industry is growing at 125% (compounded annual growth
rate) annually. Generating revenues of around $300-500 million (Rs.1,350-2,250 crore)
currently, the size of the online travel industry is around 2% of the entire travel industry.
Online travel industry is expected to become a $2 billion industry by 2008. In India, it is
basically low cost carriers like Air Deccan and the Railways, which have significantly led
to increased use of e-commerce.
Air Deccan launched its operations with a 100% web enabled ticketing service and in no
time became India's largest e-commerce site, with Rs.30 million worth transactions per
day. Electronic ticketing now accounts for 35%-40% of tickets sold by Air Deccan. E-
ticketing not only make tickets more accessible for travelers 24/7 but also eliminates the
need to invest in ticketing offices and other related infrastructure reducing operational
costs. Also travelers could avoid the long queues and save the service charges payable to
travel agents.
Being a 100% e-ticket enabled airline, Kingfisher not only offers e-ticketing but also
electronic check-in, wherein after printing the boarding card on-line the customer can use
web-enabled check-in on the airline's website and board the plane directly passing
through only mandatory security check at the airport. One of the biggest advantage of e-
ticketing is that one can neither lose an e-ticket nor destroy it by leaving it accidentally in
the pocket. Also e-ticketing environment offers much better degree of connectivity and
reachability.
OTHER E- COMMERCE APPLICATIONS:-
Training and continuing education in the field of information technology has evolved
from what was one defined by a necessity of spending hours outside an office in the
classroom, or hours in front of a computer reviewing flat, computer based training(CBT)
presentations to a flexible anytime anywhere convenience mode. Today internet is
empowering professionals with flexible training and customized learning, work
schedules, and budgets, through innovative technologies, flexible delivery methods,
engaging multimedia, and live audio.
E- learning has matured to the extent that the course developers, rather than being
preoccupied with the software and hardware behind the scenes, can pay more emphasis
on providing students a better experience than they might have had even with a
traditional instructor led class in a brick and mortar environment. As a result, learners feel
more at ease with e-learning and are able to move beyond the novel concept that the
person teaching them is not physically in the same building as they are. The focus in such
e-learning environment is on engaging them and keeping the learners engrossed in the
information being conveyed. The key behind good e-learning and bad e-learning solution
lies in the degree to which learners are engaged.
Video on demand
Remote banking
Procurement and purchasing
Online marketing and advertisement
Home shopping
Auctions
HOME PAGES OF COMMERICIAL ONLINE SHOPPING WEB
SITES
A) FUTURE BAZAAR.COM
B) UNCOMMON GOODS.COM
C)
D) INDIA VARTA.COM
CHAPTER - 2
ELECTRONIC
PAYMENT
SYSTEM (EPS)
Electronic payments first emerged with the development of wire transfers. Early wire
transfer services such as Western Union enabled an individual to deliver currency to a
clerk at one location, who then instructed a clerk at an-other location to disburse funds to
a party at that second location who was able to identify himself as the intended recipient.
Cash was delivered to the customer only after identity was established. In this scenario,
there was no banking environment; Western Union was a telegraph company. Assurance
of payment relied on the financial stability of the firm. Security was pro-vided to the
extent that Western Union was a privately controlled transmission facility used to send
messages about funds transfer; its lines were not shared with the public, and transactions
were private. Authentication was provided only by a signature at the other end of the
transmission that verified that the intended party had indeed received the funds.
During the 1960s and early 1970s, private networking technology has enabled the
development of alternative electronic funds transfer (EFT) systems. Electronic funds
transfer systems have shortened the time of payment instruction transfer between banks,
and in the process have reduced float. However, EFT systems have not changed the
fundamental structure of the payment system. Many of the so-called payment innovations
over the past two decades have been aimed at minimizing banking costs such as reserve
requirements, speeding up check clearing, and minimizing fraud. However, the consumer
rarely interacted with the early EFT systems. Recent innovations in electronic commerce
aim to affect the way consumers deal with payments and appear to be in the direction of a
real-time electronic trans-mission, clearing, and settlement system.
Consumer electronic payment systems are growing rapidly, but the opportunities are
scarcely tapped. In the United States, it is estimated that only 3 percent of the $460
billion supermarket industry is transacted on credit or debit cards. Only 1 percent of the
$300 billion professional services area is transacted electronically. Less than 12 percent
of business at gasoline service stations is electronic and less than 1 percent of fast food
restaurants have magstripe readers. The educational market alone is more than $100
billion today, only 6 percent of which is transacted electronically. Even more important is
the predicted growth ahead. Consumer payments at the point of sale were $3.6 trillion in
1994, 19 percent of which was on credit and debit cards. Recently, several innovations
helped to simplify consumer payments. These include:
· Innovations Affecting Consumers: Credit and debit cards, automated teller machines
(ATMs), stored-value cards, and electronic banking.
· Innovations Enabling Online Commerce: Digital cash, electronic checks, smart cards
(also called electronic purses), and encrypted credit cards.
· Innovations Affecting Companies: The payment mechanisms that banks provide to
corporate customers, such as inter bank transfers through automated clearing houses
(ACHs) that allow companies to pay workers by direct deposits.
Direct Benefits
The transfer of information from computer to computer is automatic.
Cost of processing EDI documents is much smaller than that of processing paper
documents.
Customer service is improved. The quick transfer of business documents and
marked decrease in errors allow orders to be fulfilled faster.
Information is managed more effectively.
There is an improved job satisfaction among the data entry operators, clerks etc.
When redeployed in more creative activities.
Strategic Benefits
Customer relations are improved through better quality and speed of services.
Competitive edge is maintained and enhanced.
Reduction in product costs can be achieved.
Business relations with trading partners are improved.
More accurate sales forecasting and business planning is possible due to
information availability at the right place at the right time.
Networking Infrastructure for EDI
For the successful functioning EDI, it assumes availability of a wide area network to
which organization can subscribe. All organization that is willing to join EDI services
must subscribe to the common network. In addition, all organization participating in a
EDI service-group that they will use, and load appropriate EDI software on their compute
systems. This software is responsible for providing translation services. EDI services and
network access services as shown in figure.
FUNCTIONING OF EDI
Any organization using EDI communicates with their Trading partners, in one of the two
ways:
a) Exchange of date with several trading partners directly
b) Interaction with multiple companies through a central information- clearing
house.
Smart Cards
Smart cards, also called stored value cards, use magnetic stripe technology or integrated
circuit chips to store customer-specific information, including electronic money. The
cards can be used to purchase goods or services, store information, control access to
accounts, and perform many other functions.
Smart cards offer clear benefits to both merchants and consumers. They reduce cash-
handling expenses and losses caused by fraud, expedite customer transactions at the
checkout counter, and enhance consumer convenience and safety. In addition, many state
and federal governments are considering stored value cards as an efficient option for
dispersing government entitlements. Other private sector institutions market stored value
products to transit riders, university students, telephone customers, vending customers,
and retail customers.
The transaction works much like a credit card transaction. For example, a customer gives
an ATM card to the merchant for the purchase. The merchant swipes the card through a
transaction terminal, which reads the information; the customer enters his personal
identification number (PIN); and the terminal routes the transaction through the ATM
network back to the customers bank for authorization against the customers demand
deposit account. The funds, once approved, are transferred from the customers bank to
the merchants bank.
Electronic Checks
Electronic checks are designed to accommodate the many individuals and entities that
might prefer to pay on credit or through some mechanism other than cash. Electronic
checks are modeled on paper checks, except that they are initiated electronically, use
digital signatures for signing and endorsing, and require the use of digital certificates to
authenticate the payer, the payers bank, and bank account. The security/authentication
aspects of digital checks are supported via digital signatures using public-key
cryptography.
Ideally, electronic checks will facilitate new online services by: allowing new payment
flows (the payee can verify funds availability at the payers bank); enhancing security at
each step of the transaction through automatic validation of the electronic signature by
each party (payee and banks); and facilitating payment integration with widely used EDI-
based electronic ordering and billing processes.
ONLINE SHOPPING
Placing an order with Amazon.com is easy. There's no need to create an account first. You
automatically create an account when you place your first order online. (They cannot
accept orders by phone, fax, or e-mail. All orders must be placed online.)
Here are the steps you need to follow to place an order. If you have any problems when
following these steps, please read the Troubleshooting Tips.
First you will need to browse or search for the items you would like to order. Keyword
search boxes are located on nearly every page of the store. You will also find links to
browse lists and more detailed product-specific searches in the top navigation bar of each
store. When you find an item that interests you, click the title or name of the item to see
its product detail page. Here you will find more information about the item, including
an availability estimate of how long it will take before the item will be ready to leave
our fulfillment center.
If you want to order an item from Amazon.com, click the "Add to Shopping Cart"
button on the item's product detail page. (If you want to buy the product from another
seller, click the link in the More Buying Choices box instead and follow the directions.)
Once you've added an item to your Shopping Cart, keep searching or browsing until your
cart contains all of the items you want to order. You can access the contents of your
Shopping Cart at any time by clicking the at the top of every page of our website.
3. Proceed to Checkout
Take a moment to review all of the items you've placed in your Shopping Cart. If you
decide that you don't want to purchase a particular item right away, click the "save for
later" button next to the title. The item will move from your current Shopping Cart to the
"Saved Items--To Buy Later" list below. If any of the items are to be gifts, click the
"add gift-wrap/note" checkbox under the item. (You'll be given a chance to order gift-
wrap and/or add a note during the checkout process.)
When you're ready to place an order for everything in the "Shopping Cart Items--To Buy
Now" section of your cart, click the "Proceed to checkout" button. You will be taken to
the first page of the order form.
The instructions below outline each step of their online order form. If at any point you
encounter difficulty or receive an error message, please consult their troubleshooting tips.
4. Sign In
Enter your e-mail address. (Keep in mind that the e-mail address you provide here will be
the only e-mail address to which they can send information about subsequent orders.)
Indicate that you are a new customer. (Do not fill in the password field; you will be asked
to provide a password for your account later in the process.) Click the "Sign in" button.
Tell us where you would like to ship your order. If you are shipping to an APO or FPO
address, click here for further instructions. If you are shipping to a post office box, please
enter the words "PO BOX" before your box number to ensure that the order is delivered
by the U.S. Postal Service.
Consider how quickly you would like to receive your order, and choose a shipping
method. If you would like to take advantage of FREE Super Saver Shipping and your
order qualifies, be sure to select it as your shipping option; you will not receive free
shipping automatically. Please note that it's not possible to request a specific carrier.
They will estimate shipment dates for you on the order form, just before you submit your
order. You will see estimated shipment and delivery dates in the e-mail they send you to
confirm your order.
If there is more than one item in your order, you will be given the following options:
Group my items into as few shipments as possible
I want my items faster. Ship them as soon as they become available (at additional
cost)
If you choose the first option, they consolidate your items into the fewest shipments
possible. They show you the minimum number of shipments needed to complete your
order. If you choose the second option, they will ship items to you as they become
available, beginning with those already in stock. You'll be charged a per-shipment fee for
each shipment.
The shipping charge for your order will be displayed on the order summary page just
before you submit your order.
Next, let us know how you would like to pay for your order. Amazon.com accepts
American Express, Diners Club, Discover, JCB, MasterCard, Eurocard, Visa, Visa Check
Cards, payment from your bank account, Amazon.com gift cards, Amazon Store Card,
and Web certificates. All orders must be prepaid. If you're paying with a credit card, enter
the number without spaces or dashes.
Choose a password for your account so that when you come back to Amazon.com in the
future, you can use the same shipping address and method of payment you provided
during this first order. You will also be able to use your password to make changes to
your order and account information. Make sure to choose something you will remember
the next time you want to place an order.
Passwords are case sensitive. For instance, "PASSWORD" and "Password" are
two different passwords. When choosing a password, remember the capitalization
you use.
Passwords must be a minimum of 6 characters.
It's best to avoid passwords that are easy to guess, such as "secret," "password," or
"letmein." We also suggest that you avoid using your name, e-mail address, or
other personal information that is easily obtained.
Though it's not a requirement, adding numbers or special characters to your
password will make it even stronger. For example, the password "rivers2!%" is a
much stronger password than "rivers."
Guard your password carefully. Remember, anyone who knows your password
may access your account.
Check the accuracy all of the information you provided and make any necessary
adjustments. When you are ready, click the "Place Your Order" button to submit your
order. Once you place your order, they will send you a confirmation e-mail message.
They will send you another e-mail message at the time of shipment. 1-Click shopping is
automatically turned on for you so that it's even easier to order in the future.
If you would like to review or change something about the order you placed before it
enters the shipping process, click the Your Account link in the top right corner of most
pages on the site. Here you will be able to change the particulars of your order without
having to contact them.
CHAPTER - 3
E - MARKETING
E - MARKETING
At its core, the mission of marketing is to attract and retain customers. To accomplish this
goal, a traditional bricks-and mortar marketer uses a variety of marketing variables-
including pricing, advertising, and channel choice-to satisfy cur-rent and new customers.
In this context, the standard marketing-mix toolkit includes such mass-marketing levers
as television advertising, direct mail, and public relations, as well as customer-specific
marketing techniques such as the use of sales reps.
With the emergence of the Internet and its associated technology-enabled, screen-ta-face
interfaces (e.g., mobile phones, interactive television), a new era of marketing has
emerged. Well-respected academics and practitioners have called for new rules and urged
debate about fundamental tenets of marketing, including segmentation, mass marketing,
and regionalized programs.) At the ‘other extreme, pundits and academics alike have
argued that both the basic building blocks of marketing strategy and the pathways to
competitive advantage have remained the same.
The approach taken in the current volume falls between these polar views. That is, new
levers have been added to the marketing mix, segments have been narrowed to finer
gradations, consumer expectations about convenience have forever been altered, and
competitive responses happen in real time. In short, these are new, exciting changes that
have a profound impact on the practice of marketing. At the same time, some of the
fundamentals of business strategy-seeking competitive advantage based on superior
value, building unique resources, and positioning in the minds of customers-have
remained the same.
The intent of this text is to provide a clear indication of what has changed and what has
not changed. At the same time, the text would not be complete (and indeed might be
actionable from the standpoint of business practice!) if it did not propose a broader
framework to understanding the practice of Internet marketing. Frameworks such as the
4Ps of marketing or the five forces of competitive analysis are important because they
provide easy-to-remember, simplifying structures for complex problems. They also serve
as guides to managerial action. Thus, under-standing the five forces enables firms to
comprehensively map their competitive environment while simultaneously identifying
specific actions for their managers (e.g., reduce buyer power by increasing the number of
buyers). This opening chapter provides a simple seven-stage framework for Internet
marketing. But first it offers a brief review of the basics of marketing and the scope of
Internet marketing.
3. It is about Exchange
Marketing is not successful unless two parties exchange something of value. The buyer
may exchange time, money, or services, while the seller must exchange something of
value to the buyer. The traditional retail context pro-vides the simplest illustration of this
principle. A given consumer exchanges money for a particular good or service. However,
exchange also occurs in a wide variety of contexts, many of which are non monetary.
These include bartering, volunteering services, and political donations.
Retailers will need to concentrate on value by offering new product mixes. By this we
mean a product mix that includes not only merchandise but also bundles in entertainment
and “recreational” shopping with movie theaters, restaurants, bookstores, libraries, and
community meeting facilities. This sort of change is already occurring in bookstore
design (such as Borders Bookstores and Barnes and Noble), which include a variety of
facilities such as coffee shops. However, building shopping malls based on these new
business models is a risky venture and requires huge investments.
Consumer Behavior
Consumer behavior is more volatile than ever before, and companies need new ways of
responding to consumer needs and satisfying demand. According to one survey, the
typical consumer spent only four hours a month in a shopping mall in 1990 versus ten
hours in 1985, and sales per square foot dropped. Specialty retailing-power centers,
discount malls, discount stores, and catalog shopping-has become one solution for closely
monitoring consumer trends and reacting to them quickly. All of these alter-natives have
one thing in common: they provide consumers with a very large selection of producers
priced with deep discounts.
Consumers are no longer as influenced by brand names as they used to be. The
emergence of the value shopper is changing retailing. Today, the shopper is less willing to
pay the premium for the brand name and much more attentive to quality and value. The
decline in gross margins is the first evidence of the impact of that change, reflecting
lower initial markups and more discriminating shoppers in that segment. Clearly, retailers
that are focused on providing value-the best price, service, and selection-regardless of the
brand name will be successful. The real differentiating characteristic for retailers will be
in their ability to define what the broad or niche consumer segment is looking for,
identifying characteristics of customers in each target segment, and learning how to
bundle products and package brands so that they become the preferred choice for online
customers.
Today, electronic retailing is still far from being a competitive threat to more traditional
store retailing (see Table), but it is becoming increasingly attractive as technology and
applications improve, and retailers gain experience.
Television retailing, CD-ROM retailing, and online service based retailing, in which we
include Web-based retailing.
As the internet is becoming more and more important in business life, many companies
consider it as an opportunity to reduce customer-service costs, tighten customer
relationships and most important, further personalize marketing messages and enable
mass customization. Together with the creation of Sales Force Automation (SFA), where
electronic methods were used to gather data and analyze customer information, the trend
of the upcoming Internet can be seen as the foundation of what we know as eCRM today.
We can define eCRM as activities to manage customer relationships by using the Internet,
web browsers or other electronic touch points. The challenge hereby is to offer
communication and information on the right topic, in the right amount, and at the right
time that fits the customers specific needs.
For improving customer relations through information technology, the firms should take
care of:
M-commerce (mobile commerce) is the buying and selling of goods and services through
wireless handheld devices such as cellular telephone and personal digital assistants
(PDAs). Known as next-generation e-commerce, m-commerce enables users to access the
Internet without needing to find a place to plug in. The emerging technology behind m-
commerce, which is based on the Wireless Application Protocol (WAP), has made far
greater strides in Europe, where mobile devices equipped with Web-ready micro-
browsers are much more common than in the United States.
Financial services, which includes mobile banking (when customers use their
handheld devices to access their accounts and pay their bills) as well as brokerage
services, in which stock quotes can be displayed and trading conducted from the
same handheld device
Telecommunications, in which service changes, bill payment and account reviews
can all be conducted from the same handheld device
Service/retail, as consumers are given the ability to place and pay for orders on-
the-fly
Information services, which include the delivery of financial news, sports figures
and traffic updates to a single mobile device
IBM and other companies are experimenting with speech recognition software as a way
to ensure security for m-commerce transactions.
1. Mobile ticketing
Tickets can be sent to mobile phones using a variety of technologies. Users are then able
to use their tickets immediately by presenting their phones at the venue.
Tickets can be booked and cancelled on the mobile with the help of simple application
downloads or by accessing WAP portals of various Travel agents or direct service
providers.
Mobile ticketing for airports, ballparks, and train stations, for example, will not only
streamline unexpected metropolitan traffic surges, but also help users remotely secure
parking spots (even while in their vehicles) and greatly facilitate mass surveillance at
transport hubs.
economy of scale
quicker and easier delivery
effective target marketing
privacy-friendly data mining on consumer behavior
environment-friendly and resources-saving efficacy
Currently, mobile content purchase and delivery mainly consists of the sale of ring-tones,
wallpapers, and games for mobile phones. The convergence of mobile phones, mp3
players and video players into a single device will result in an increase in the purchase
and delivery of full-length music tracks and video. Download speeds, if increased to 4G
levels, will make it possible to buy a movie on a mobile device in a couple of seconds,
while on the go.
C) Location-based services
Unlike a home PC, the location of the mobile phone user is an important piece of
information used during mobile commerce transactions. Knowing the location of the user
allows for location based services such as:
local maps
local offers
local weather
people tracking and monitoring
D) Information services
A wide variety of information services can be delivered to mobile phone users in much
the same way as it is delivered to PCs. These services include:
news services
stock data
sports results
financial records
traffic data and information
Particularly, more customized traffic information, based on users' travel patterns, will be
multicast on a differentiated basis, instead of broadcasting the same news and data to all
Users. This type of multicasting will be suited for more bandwidth-intensive mobile
equipment.
2. Mobile banking
Banks and other financial institutions are exploring the use of mobile commerce to allow
their customers to not only access account information, but also make transactions, e.g.
purchasing stocks, remitting money, via mobile phones and other mobile equipment. This
service is often referred to as Mobile Banking or M-Banking. More negative issues like
ID theft, phishing and pharming are lurking when it comes to mobile banking,
particularly done on the mobile web. Net security technology free from redundancy and
paradigm shifts away from mobile web-based banking will be an optimal solution to
mobile banking in the near future.
A) Mobile brokerage
Stock market services offered via mobile devices have also become more popular and are
known as Mobile Brokerage. They allow the subscriber to react to market developments
in a timely fashion and irrespective of their physical location.
B) Auctions
Over the past three years mobile reverse auction solutions have grown in popularity.
Unlike traditional auctions, the reverse auction (or low-bid auction) bills the consumer's
phone each time they place a bid. Many mobile PSMS commerce solutions rely on a one-
time purchase or one-time subscription; however, reverse auctions are high return
applications as they allow the consumer to transact over a long period of time.
C) Mobile purchase
Mobile purchase allows customers to shop online at any time in any location. Customers
can browse and order products while using a cheap, secure payment method. Instead of
using paper catalogues, retailers can send customers a list of products that the customer
would be interested in, directly to their mobile device or consumers can visit a mobile
version of a retailers ecommerce site. Additionally, retailers will also be able to track
customers at all times and notify them of discounts at local stores that the customer
would be interested in.
Mobile marketing is an emerging concept, but the speed with which it's growing its roots
is remarkable. Mobile marketing is highly responsive sort of marketing campaign,
especially from brands’ experience point of view. And almost all brands are getting
higher campaign response rates. Corporations are now using m-commerce to expand
everything from services to marketing and advertisement. Although there are currently
very few regulations on the use and abuses of mobile commerce, this will change in the
next few years. With the increased use of m-commerce comes increased security. Cell
phone companies are now spending more money to protect their customers and their
information from online intrusions and hackers.
PAYMENT METHODS
New advanced mobile applications typically involve high-speed services being accessed
by devices remotely, any where, at any time. Introduction of higher data speeds and
packeted ‘always on’ technology will enable mobile devices to be used to receive, send
and access a huge range of information and services in real time.
Across all e-commerce applications there are barriers to adoption. M-commerce seeks to
remove even further the sense of a consumer having to go to the business for products or
services, or needing to be skilled in multiple technologies or having to plan whenever
they want to access a business using the Internet.
Mobile phone-based devices are now permitting visual and data transfer (e.g. emails,
multimedia messaging, etc) across spectrums and networks usually preserved for voice
traffic alone. Evidence suggests as devices and networks converge with existing
technologies (e.g. Internet, mobile phones and video conferencing or TV broadcast
systems), consumers are reacting to the technology in a very positive manner.
Security remains the single largest barrier to adoption of m-commerce. For both business
managers and customers, concerns raised in surveys include security problems related to
data encryption, protecting the wireless connection from unauthorized access, hackers,
viruses and the like. Further limitations of m-commerce remain. They include:
Small screens of most devices still limit types of file and data transfer (i.e.
streaming videos, etc.)
standards guiding applications and technology development and connection(s)
WAP and SMS limited to small number of characters and text.
use of graphics limited
less functionality for mobile Internet over mobile phones and existing generation
of handhelds than for mobile computers (laptops and next generation handhelds)
user interface is often difficult to learn how to use
limited bandwidth
limited roll out of higher bandwidth mobile networks and devices (i.e. 3g
networks and wireless broadband networks are predominantly located in cities)
cost of establishing mobile and wireless broadband infrastructure
technology constraints of mobile devices (memory, processing power, display
capabilities, input methods)
security of data moved across some mobile and wireless networks
Businesses investment in hardware and infrastructure is seen as riskier as rapid
evolution of mobile and wireless technologies continues.
Transactions
banking
stock trading and brokering
shopping (real time - online - access, buying, purchasing or browsing)
auctions
betting
reservations and ticketing
e-cash
sales force automation
field service automation
Entertainment
music
games
graphics
video
interactive games
Information
news
maps/guides
directories
traffic/weather
market data
corporate
browsing and directory services
Communication
email
chat
corporate system access and security
video/voice
intranet
extranet
All the above applications mean a business can use m-commerce to better understand the
customer, including their:
individual preferences
location and time factors
use patterns
technology and applications preferences
technology skills and patterns of use
Trends
New advanced mobile applications typically involve high-speed services being accessed
by devices, remotely, anywhere, at any time. Introduction of higher data speeds and
packeted ‘always on’ technology will enable mobile devices to be used to receive, send
and access a huge range of information and services in real time.
As mobile technologies and networks mature, so does their reliability. This in turn
reduces uncertainties and lowers risk to both the business and the customer. New
international standards for network connectivity, data sharing, content management and
security have also ‘locked in place’ the more positive gains being made.
As such gains are made, so we begin to see more rapid technological development where
businesses see the value proposition ICTs can bring to business processes and
competitiveness.
CHAPTER – 5
E - SECURITY
5.1 INTRODUCTION TO E - SECURITY
In the computer industry, refers to techniques for ensuring that data stored in a computer
cannot be read or compromised by any individuals without authorization. Most security
measures involve data encryption and passwords. Data encryption is the translation of
data into a form that is unintelligible without a deciphering mechanism. A password is a
secret word or phrase that gives a user access to a particular program or system. The
Internet is a huge place that hosts several millions of people. As all the people are not
honest, illegal activity’ is inevitable. Statistics show that only 10% of computer client is
reported and only 2% of the reported client results in with convictions. There are two
basic types of criminal activities: The person who tries to understand and learn the
various systems and capabilities of any private network. In this case the person has no
intentions to do any damage or to steal any resources but tries to observe the system
functionality. For example teenagers who tries to enter into a network out of curiosity till
they are caught or deducted. The persons who uses the Internet and the Web to benefit
themselves by doing illegal activities such as, stealing softwares, information and causing
damage to resources. This type of criminal activity raises the concern for network
security. A large system like Internet has many holes and crevices in which a determined
person can easily find the way to get into any private network. There are many terms used
to signify the computer criminals.
DEFINITION
E-security refers to the process of ensuring the confidentiality, integrity, and availability
of electronic information and protecting it against malicious attackers who could use or
alter the information to disrupt critical national infrastructure and industry.
SECURITY ISSUES
Another major issue in the Internet security is misrepresentation and fraud. One of the
reasons of misrepresentation is that on the net it is easy to appear as anyone or anything
without the actual presence.
For example, shops site displaying goods, which the dealer may not have them
physically. But at the same time, creating a scam site is not as easy as it seems to be,
because one must host pages somewhere, which makes the provider responsible for the
content. For this reason, most Web site providers examines sites and have access to the
information that is been provided. With the rapid growth in use of Internet, in future the
number of fraud cases in which perpetrators create their own provider site will probably
increase. This is possible specially, in case of offshore servers where laws are more
favorable to the criminal and enforcement will be very difficult. For this reason, it is
increasingly important for Web users to protect themselves.
Encryption
Encryption is a technique for hiding data. The encrypted data can be read only by those
users for whom it is intended. Nowadays various encryption techniques are available.
One of the available techniques commonly used for encryption is Public Key.
In a Public Key encryption system each user has two keys-public key and private key.
The encryption and decryption algorithms are designed in a way so that only the private
key can decrypt data that is encrypted by the public key. And the public key can decrypt
data, encrypted by the private key. Therefore, one can broadcast the public key to all
users.
For example, Kelvin has a private key known him only. Another user, Carlo has a private
key that known to her only. Both users have public keys that every other user knows.
Kelvin wants to send a secure message to Carlo. But he wants that only Carlo should read
the message and she should know that Kelvin has sent the message to her. For this,
Kelvin encrypts his message using the Carlos public key that is known to all other users.
However, once the message is encrypted using the Carlos public key only Carlos private
key can decrypt the message that is known only to Carlo.
When Carlo receives the message from Kelvin, she decrypts with her private key and is
able to read the message. In case Carlo replies Kelvin back then she should encrypt the
message with Kelvins public key that can only be decrypted by Kelvins private key.
POTENTIAL
In recent years, information technology has proven to be a critical tool in facilitating the
near-instant delivery of information and in increasing the availability of information to
billions of new organizations and users. As more and more organizations recognize the
potential that ICT can bring, they have begun to use it to exchange increasingly important
information, creating a need to have an e-Security strategy to ensure that important
information is protected from attackers.
There are several important factors to remember about e-Security strategy and
information risk management. First, the function of e-Security is not to remove risk
completely, but to assess what the acceptable level of risk is for an information system
and work to bring the risk down to that level – risk cannot be completely eliminated but
can be managed. Second, managing information risk is not a one time process, it must be
undertaken on a continuous basis – information technology is constantly growing and
changing and organizations must adapt to ensure information security against malicious
attackers who are also evolving with the technology. Third, it is inevitable that e-Security
systems will be breached at some point.
Several sets of minimum e-Security standards are already available which can be used in
developing and implementing an e-Security strategy for federal governments. The ISO
(International Organization for Standardization) has extensive e-Security standards which
are used by governments and international organizations across the world, in particular
ISO 27001 which is used by the World Bank.
LIMITATIONS
Spiders: Software programs that run over web pages and index their contents.