MEANING OF ECOMMERCE
E-Commerce or Electronic Commerce means buying and selling of goods, products, or services over the internet. E-commerce is also known as electronic commerce or internet commerce. These services provided online over the internet network. Transaction of money, funds, and data are also considered as E-commerce. These business transactions can be done in four ways: Business to Business (B2B), Business to Customer (B2C), Customer to Customer (C2C), Customer to Business (C2B). The standard definition of E-commerce is a commercial transaction which is happened over the internet. Online stores like Amazon, Flipkart, Shopify, Myntra, Ebay, Quikr, Olx are examples of E-commerce websites. By 2020, global retail e-commerce can reach up to $27 Trillion. Let us learn in detail about what is the advantages and disadvantages of E-commerce and its types.
E-commerce is a popular term for electronic commerce or even internet commerce. The name is self-explanatory, it is the meeting of buyers and sellers on the internet. This involves the transaction of goods and services, the transfer of funds and the exchange of data.
So when you log into your Amazon and purchase a book, this is a classic example of an e-commerce transaction. Here you interact with the seller (Amazon), exchange data in form of pictures, text, address for delivery etc. and then you make the payment.
Brief History Of E-Commerce
The history of E-commerce is a history of how Information Technology has transformed business processes. Some authors will track back the history of E-commerce to the invention of the telephone at the end of last century. The Internet was conceived in 1969, when the Advanced Research Projects Agency (a Department of Defence organization) funded research of computer networking. The Internet could end up like EDI (Electronic Data Interchange) without the emergence of the World Wide Web in 1990s. EDI (Electronic Data Interchange) is widely viewed as the beginning of E-commerce if we consider E-Commerce as the networking of business communities and digitalization of business information.
EDI, which expanded from financial transactions to other transaction processing and enlarged the participating companies from financial institutions to manufacturers, retailers, services, and so on. Many other applications followed, ranging from stock trading to travel reservation systems .Such systems were described as telecommunication applications and their strategic value was widely recognized. With the commercialization of the Internet in the early 1990s and its rapid growth to millions of potential customers, the term electronic commerce was coined, and EC applications expanded rapidly. One reason for the rapid expansion of the technology was the development of networks, protocols, software, and specifications. The other reason was the increase in competition and other business pressures. From 1995 to 1999 we have witnessed many innovative applications ranging from advertisement to auctions and virtual reality experiences. Almost every medium- and large-sized organization in the United States already has a Web site many are very extensive; for example, in 1999 General Motors Corporation offered 18,000 pages of information that included 98,000 links to its products, services, and dealers.
Definition Of E-Commerce:
Concepts of E commerce
Electronic commerce is an emerging model of new selling and merchandising tools in which buyers are able to participate in all phases of a purchase decision, while stepping through those processes electronically rather than in a physical store or by phone (with a physical catalogue). The processes in electronic commerce include enabling a customer to access product information, select items to purchase, purchase items securely, and have the purchase settled financially. It is an emerging concept that describes the process of buying and selling or exchanging of products, services; and information via computer networks including the Internet.
E-commerce is basically, doing business-as-usual, but across the Internet. You advertise your products or services on your Web site, as you would in any other media like newspapers, TV or brochures. Advertising on your Web site can be done in two ways.
The first is by use of a relatively simple Web site consisting of a few pages whereby you tell potential customers who you are, what you do, where you are and how they can contact you ( easiest done by giving them your email address).
The second way of enabling world-wide customers to buy from you is to provide them with an On-Line Catalogue of your products which they can browse at their leisure without having to go to your place of business.
On-Line Catalogue:
On-Line Catalogue is that catalogue where people access via the Internet. On-Line Catalogue is an integral part of website, enabling customers to...
Browse through stock list, read about an item or service;
Look at photographs of the products.
Select which items they want to purchase
And drop them into a shopping cart as they go along.
When they have completed their shopping, they go to the
Check-Out.
The next step is to request the order by filling in their details and method of payment on a form which is waiting for them at the Check-Out. The form is already partially completed with a breakdown of the items in their shopping cart, prices inclusive of tax, and shipping & handling charges, if any. If they choose to pay by credit card, the form includes a place for them to fill in their credit card number. And then, with one press of a button, they send the order to you.
Electronic Commerce under different perspectives:
Let’s see how Electronic Commerce (EC) is defined under each perspective.
1. Communications Perspective
EC is the delivery of information, products /services, or payments over the telephone lines, computer networks or any other electronic means.
2. Business Process Perspective
EC is the application of technology toward the automation of business transactions and work flow.
3. Service Perspective
EC is a tool that addresses the desire of firms, consumers, and management to cut service costs while improving the quality of goods and increasing the speed of service delivery.
4. Online Perspective
EC provides the capability of buying and selling products and information on the internet and other online services.
Advantages of E-Commerce
Some advantages that can be achieved from e-commerce include: 
• Being able to conduct business 24 x 7 x 365.: E-commerce systems can operate all day every day. Your physical storefront does not need to be open in order for customers and suppliers to be doing business with you electronically. 
• Access the global marketplace: The Internet spans the world, and it is possible to do business with any business or person who is connected to the Internet. Simple local businesses such as specialist record stores are able to market and sell their offerings internationally using e-commerce. This global opportunity is assisted by the fact that, unlike traditional communications methods, users are not charged according to the distance over which they are communicating. 
• Speed: Electronic communications allow messages to traverse the world almost instantaneously. There is no need to wait weeks for a catalogue to arrive by post: that communications delay is not a part of the Internet / ecommerce world. 
• Marketspace: The market in which web-based businesses operate is the global market. It may not be evident to them, but many businesses are already facing international competition from web-enabled businesses. 
• Opportunity to reduce costs: The Internet makes it very easy to 'shop around' for products and services that may be cheaper or more effective than we might otherwise settle for. It is sometimes possible to, through some online research, identify original manufacturers for some goods - thereby bypassing wholesalers and achieving a cheaper price. 
• Computer platform-independent: Many, if not most, computers have the ability to communicate via the Internet independent of operating systems and hardware. Customers are not limited by existing hardware systems. 
• Efficient applications development environment: In many respects, applications can be more efficiently developed and distributed because the can be built without regard to the customer's or the business partner's technology platform. Application updates do not have to be manually installed on computers. Rather, Internet-related technologies provide this capability inherently through automatic deployment of software updates. 
• Allowing customer self service and 'customer outsourcing': People can interact with businesses at any hour of the day that it is convenient to them, and because these interactions are initiated by customers, the customers also provide a lot of the data for the transaction that may otherwise need to be entered by business staff. This means that some of the work and costs are effectively shifted to customers; this is referred to as 'customer outsourcing'. 
• Stepping beyond borders to a global view. Using aspects of e-commerce technology can mean your business can source and use products and services provided by other businesses in other countries.. 
• A new marketing channel: The Internet provides an important new channel to sell to consumers. 

Limitations and Constraints of E-Commerce
Some disadvantages and constraints of e-commerce include the following. 
• Time for delivery of physical products: It is possible to visit a local music store and walk out with a compact disc or a bookstore and leave with a book. E-commerce is often used to buy goods that are not available locally from businesses all over the world, meaning that physical goods need to be delivered, which takes time and costs money. In some cases there are ways around this, for example, with electronic files of the music or books being accessed across the Internet, but then these are not physical goods. 
• Physical product, supplier and delivery uncertainty: When you walk out of a shop with an item, it's yours. You have it; you know what it is, where it is and how it looks. In some respects e-commerce purchases are made on trust. This is because, firstly, not having had physical access to the product, a purchase is made on an expectation of what that product is and its condition. Secondly, because supplying businesses can be conducted across the world, it can be uncertain whether or not they are legitimate businesses and are not just going to take your money. It's pretty hard to knock on their door to complain or seek legal recourse! Thirdly, even if the item is sent, it is easy to start wondering whether or not it will ever arrive. 
• Perishable goods:. Forget about ordering a single gelato ice cream from a shop in Rome! Though specialized or refrigerated transport can be used, goods bought and sold via the Internet tend to be durable and non-perishable: they need to survive the trip from the supplier to the purchasing business or consumer. This shifts the bias for perishable and/or non-durable goods back towards traditional supply chain arrangements, or towards relatively more local e-commerce-based purchases, sales and distribution. In contrast, durable goods can be traded from almost anyone to almost anyone else, sparking competition for lower prices. In some cases this leads to disintermediation in which intermediary people and businesses are bypassed by consumers and by other businesses that are seeking to purchase more directly from manufacturers. 
• Limited and selected sensory information: The Internet is an effective conduit for visual and auditory information: seeing pictures, hearing sounds and reading text. However it does not allow full scope for our senses: we can see pictures of the flowers, but not smell their fragrance; we can see pictures of a hammer, but not feel its weight or balance. Further, when we pick up and inspect something, we choose what we look at and how we look at it. This is not the case on the Internet. If we were looking at buying a car on the Internet, we would see the pictures the seller had chosen for us to see but not the things we might look for if we were able to see it in person. And, taking into account our other senses, we can't test the car to hear the sound of the engine as it changes gears or sense the smell and feel of the leather seats. There are many ways in which the Internet does not convey the richness of experiences of the world. This lack of sensory information means that people are often much more comfortable buying via the Internet generic goods - things that they have seen or experienced before and about which there is little ambiguity, rather than unique or complex things. 
• Returning goods: Returning goods online can be an area of difficulty. The uncertainties surrounding the initial payment and delivery of goods can be exacerbated in this process. Will the goods get back to their source? Who pays for the return postage? Will the refund be paid? Will I be left with nothing? How long will it take? Contrast this with the offline experience of returning goods to a shop.


Classifications of E-Commerce Applications
Electronic Commerce (e-Commerce) is a general concept covering any form of business transaction or information exchange executed using Information and Communication Technologies (ICTs). E-Commerce takes place between companies, between companies and their customers, or between companies and public administrations. Electronic Commerce includes electronic trading of goods, services and electronic material.
E-Commerce systems include commercial transactions on the Internet but their scope is much wider than this; they can be classified by application type:
Electronic Markets:
The principle function of an electronic market is to facilitate the search for the required product or service. Airline booking systems are an example of an electronic market.
Electronic Data Interchange (EDI):
Electronic Data Interchange (EDI) is the electronic exchange of business documents in a standard, computer processable, universally accepted format between-trading partners.
EDI is quite different from sending electronic mail, messages or sharing files through a network. In EDI, the computer application of both the sender and the receiver, referred to as Trading Partners (TPs) have to agree upon the format of the business document which is sent as a data file over electronic messaging services.
The two key aspects of EDI that distinguish it from other forms of electronic communication, such as electronic mail, are:
The information transmitted is directly used by the recipient computer without the need for human intervention is rarely mentioned but often assumed that EDI refers to interchange between businesses. It involves two or more organization or parts of organization communicating business information with each other in a common agreed format.
The repeated keying of identical information in the traditional paper-based business.
Communication creates a number of problems that can be significantly reduced through the usage of EDI. These problems include: -
Increased time
Low accuracy
High labour charges
Increased uncertainty.
To take full advantage of EDI’s benefits, a company must computerize its basic business applications. Trading partners are individual organization that agrees to exchange EDI transactions. EDI cannot be undertaken unilaterally but requires the cooperation and active participation of trading partners. Trading partners normally consists of an organization’s principal suppliers and wholesale customers. Since large retail stores transact business with a large number of suppliers they were among the early supporters of EDI. In the manufacturing sector, EDI has enabled the concept of Just-In-Time inventory to be implemented. JIT reduces inventory and operating capital requirements.
EDI provides for the efficient transaction of recurrent trade exchanges between commercial organizations. EDI is widely used by, for example, large retail groups and vehicle assemblers when trading with their suppliers.
Internet Commerce
The Internet (and similar network facilities) can be used for advertising goods and services and transacting one-off deals. Internet commerce has application for both business to- business and business to consumer transactions.
E-commerce
The three categories of E Commerce
Types of e-commerce
Types of e-commerce
There are a number of different types of E-Commerce
B2B - Business to Business
B2C - Business to Consumer
C2B - Consumer to Business
B2E - Business to Employee
C2C - Consumer to Consumer
B2B - Business to Business
E-commerce has been in use for quite a few years and is more commonly known as EDI (electronic data interchange). In the past EDI was conducted on a direct link of some form between the two businesses where as today the most popular connection is the internet. The two businesses pass information electronically to each other. B2B e-commerce currently makes up about 94% of all e-commerce transactions.
Typically in the B2B environment, E-Commerce can be used in the following processes:
Procurement;
order fulfilment;
Managing trading-partner relationships.
B2C - Business to Consumer
Business to Consumer e-commerce is relatively new. This is where the consumer accesses the system of the supplier. It is still a two way function but is usually done solely through the Internet.
B2C can also relate to receiving information such as share prices, insurance quotes, on-line newspapers, or weather forecasts. The supplier may be an existing retail outlet such as a high street store; it has been this type of business that has been successful in using E-Commerce to deliver services to customers. These businesses may have been slow in gearing-up for E-Commerce compared to the innovative dot.com start ups, but they usually have a sound commercial structure as well as in-depth experience of running a business - something which many dotcoms lacked, causing many to fail.
Example: A home user wishes to purchase some good quality wine. The user accesses the Internet site to read a report on the recommended wines. After reading the tasting notes the user follows the links to place an order along with delivery and payment details directly into the merchants’ inventory system. The wine is then dispatched from the supplier’s warehouse and in theory is delivered to the consumer without delay.
C2B - Consumer to Business
Consumer to Business is a growing arena where the consumer requests a specific service from the business. Example: Harry is planning a holiday in Darwin. He requires a flight in the first week of December and is only willing to pay Rs. 250. Harry places a submission with in a web based C2B facility. Dodgy Brothers Airways accesses the facility and sees Harry’s submission. Due to it being a slow period, the airline offers Harry a return fare for Rs. 250.
B2E - Business to Employee
Business to Employee e-commerce is growing in use. This form of E-commerce is more commonly known as an ‘Intranet’. An intranet is a web site developed to provide employees of an organisation with information. The intranet is usually access through the organisations network, it can and is often extended to an Entrant which uses the Internet but restricts uses by sign on and password.
C2C - Consumer to Consumer
These sites are usually some form of an auction site. The consumer lists items for sale with a commercial auction site. Other consumers access the site and place bids on the items. The site then provides a connection between the seller and buyer to complete the transaction. The site provider usually charges a transaction cost. In reality this site should be call C2B2C.
B2A is the least developed area of E-Commerce and it relates to the way that public sector organisations, at both a central and local level, are providing their services on-line. Also known as e-Government, it has the potential to increase the domestic and business use of e-Commerce as traditional services are increasingly being delivered over the Internet. The UK government is committed to ensuring this country is at the forefront of e-Commerce and it is essential that e-Government plays a significant part in achieving this objective.
Scope of E-Commerce
Selling can be focussed to the global customer
Pre-sales, subcontracts, supply
Financing and insurance
Commercial transactions: ordering, delivery, payment
Product service and maintenance
Co-operative product development
Distributed co-operative working
Use of public and private services
Business-to-administrations (e.g. customs, etc)
Transport and logistics
Public procurement
Automatic trading of digital goods
Accounting
Dispute resolution
E- Commerce in Action
E- Commerce in Action
How E-Commerce Works
The consumer first moves through the internet to the merchant’s web site. At the web site, the consumer is briefly given an introduction to the product or services the merchant offers. It is at this point that the consumer makes the decision to visit the web store by clicking on a link or button located on the web page (e.g., Buy Now, Shop Online, or an image of a shopping cart button are common entry points into a web store). After choosing to visit the web store, the consumer is typically connected to an online transaction server located somewhere else on the internet which runs software commonly referred to as a shopping cart application. The shopping cart application has been setup by the merchant to display all products and services offered, as well as calculate pricing, taxes, shipping charges, etc.
From there, the consumer decides that he wants to purchase something, so he enters all pertinent credit card information and a sales order is produced. Depending on the ecommerce implementation, the sales order can now take two totally different paths for confirming to the consumer that the order is officially placed.
Scenario 1
The consumer’s credit card information goes directly through a private gateway to a processing network, where the issuing and acquiring banks complete or deny the transaction. This generally takes place in no more than 5-7 seconds and the consumer is then informed that the order was received, the credit card was authorized, and that the product will ultimately be shipped.
Scenario 2
The consumer’s entire order and credit card information is electronically submitted back to the merchant’s server (usually via email, FTP, or SSL connection) where the order can be reviewed first and then approved for credit card authorization through a processing network. The consumer then receives an email shortly afterwards, confirming the order being received, the credit card being authorized, and status on when the product will exactly be shipped.
In both scenarios, the process is transparent to the consumer and appears virtually the same. However, the first scenario is a more simplistic method of setting up a shopping cart application and does not take into consideration any back office issues that may delay shipment (i.e., items out of stock, back orders, orders submitted after office hours or during holidays, etc.). ManageMore’s eCommerce Manager relies on the second scenario to handle all of its ecommerce orders. This second scenario keeps the consumer accurately informed throughout the entire ordering process.
Let us assume an ecommerce implementation that uses the second scenario mentioned above.
There are several basic steps you will need to accomplish before becoming Commerce enabled.
Getting a Merchant Bank Account
Web Hosting
Web Design Considerations
Registering a Domain Name
Obtaining a Digital Certificate
Getting a Merchant Bank Account
In order to be able to accept credit cards, you must apply for an account with a credit card merchant account provider. This can be relatively easy or somewhat difficult, depending on which country you live in, and the type of business you are running.
When choosing a merchant account provider, the following should also be noted:
In order for credit card authorization to be automatic from within ManageMore, you must ensure that your merchant account provider has credit card processors that connect with IC Verify™, PC Charge™, or AuthorizeNet™ (i.e.Intellicharge Interface) software. These products are sold separately from ManageMore and eliminate the need for merchant terminal devices or separate time consuming steps to approve credit cards.
Your merchant account provider must allow you to handle non-swiped credit card transactions. This refers to transactions where the customer is not present and only the credit card number and expiration date are being used for approving the charges.
When choosing a merchant account provider, you should do a little research on the company’s reputation, years in business, and company size. Constantly changing to a new merchant account provider when your old one goes out-of business can be costly and time consuming.
Avoid merchant account providers that ask for a non-refundable fee before you get approved.
Avoid merchant account providers that require 1 or 2 year contract terms. Since there are so many merchant account providers available, it doesn’t make sense to lock your company into a commitment for any period of time.
Expect merchant account providers to have some form of a sign up fee after being approved only. These fees can come in the form of an application fee, processing fee, software fee, etc. Typically expect to pay around $100 to $500 for getting an account setup to accept credit cards and sometimes electronic checks.
You should be able to find a merchant account provider that can offer you discount credit cards rates ranging from 1.75% to 2.75% and no more than .25 cent per transaction. If not, contact Intellisoft regarding our merchant account provider affiliates and the free Intellicharge Interface just for signing up with them.
You will need a dedicated phone line or data line for processing credit cards and electronic checks. Note: If your computer or local area network is already connected to the internet, a separate data line will not be necessary if you use the Intellicharge Interface for electronic payment.
Web Hosting
Web hosting is a very important step in this process, as this is how you gain a presence on the internet in the first place. There are actually two scenarios that can be used for web hosting. Scenario1 involves setting up and maintaining your own web server, while Scenario 2 involves farming out all web hosting administration to an ISP. An Internet Service Provider (ISP) is a company that provides you with internet access and limited hard drive space on their web servers for hosting your web site.
The following should be noted when searching for an Internet Service Provider:
Always try to find an ISP that can provide a local telephone number for you to connect to the internet.
Choose an ISP that is known for having few interruptions of service.
Choose an ISP that is known for good technical support and has knowledgeable people familiar with ecommerce sites.
Choose an ISP that consistently has fast connection speeds.
As with any company you do business with, make sure the ISP is reputable.
The online transaction providers that offer the actual web store itself can sometimes be hosted by your same ISP or may require a completely different provider, referred to as a Commerce Service Provider (CSP). Many small businesses tend to choose CSP’s for creating a web store because it gives them the flexibility of choosing a provider that offers competitive pricing and the best shopping cart application for their needs. Online transaction providers will usually provide one shopping cart solution they feel is better than the many others that exist and differ by price, appearance, layout, functionality, and ease of use.
The following should be noted when dealing with shopping cart applications:
Online transaction providers will either sell or rent you the use of an online shopping cart application for your business. Be forewarned that purchasing an online shopping cart application is very expensive. Most businesses will rent these online web store programs rather than committing to such a steep investment.
Rental pricing for the use of shopping cart programs vary depending on number of transactions generated a month, number of products listed on the shopping cart application, and the sophistication of the shopping cart application itself.
There are a lot of online transaction providers out there, and they all have varying packages. Deciding on a provider’s package that fits your needs is perhaps the most important aspect.
Web Design Considerations
With little knowledge of HTML and a lot of patience, you can probably create your own corporate web site with the help of products like Microsoft FrontPage™ or DreamWeaver™. However, when adding a web store to your web site, you may want to seek the help of professional web designers to make the look and feel of your web store consistent with the rest of your corporate web site. Most shopping cart applications, like SoftCart by Mercantec, allow its templates to be modified just for this purpose. In many cases, the same ISP or CSP you choose can provide web design and consultation.
Registering a Domain Name
Domain names are the names for computers on the Internet that correspond to IP (Internet protocol) numbers to route information to addresses on the Internet network. Domain names serve as a convenient way of locating information and people on the Internet. In layman terms, will it be important to you, for customers to find your web site by typing “123.123.456.456” or by typing something simple to remember like
Registering a domain name is one of the most important decisions you can make for your online identity. Your domain name says who you are to your clients, your peers - the whole world. The basics for registering a domain name are:
Contact a domain name registrar on the internet to register for a domain name.There are many to choose from, just do a web search on “domain name registrar” to get you started.
2. Select a unique domain name you would like others to use for finding your web site.
Obtaining a Digital Certificate
A digital certificate, also known as a SSL Server Certificate, enables SSL (Secure Socket Layer encryption) on the web server. SSL protects communications so you can take credit card orders securely and ensure that hackers cannot eavesdrop on you. Any ecommerce company that provides you with an online web store will require you to have SSL before you can use their services. Thankfully, for most people obtaining a digital certificate is not a problem. For a minimal fee, one can usually use the certificate owned by the web hosting company where your page resides. If you are a larger company, however, you may want to get your own digital certificate.
Architectural Framework of E Commerce
A framework is intended to define and create tools that integrate the information found in today’s closed systems and allows the development of e-commerce applications. It is important to understand that the aim of the architectural frame-work itself is not to build new database management systems, data repository, computer languages, software agent based transaction monitors, or communication protocols. Rather, the architecture should focus on synthesizing the diverse resources already in place in corporations to facilitate the integration of data and software for better applications. The electronic commerce application architecture consists of six layers of functionality, or services:
applications;
brokerage services, data or transaction management;
interface, and; support layers”
secure messaging, security and electronic document interchange;
middle ware and structured document interchange; and
network infrastructure and basic communications services.
These layers co-operate to provide a seamless transition between today’s computing resources and those of tomorrow by transparently integrating information access and exchange within the context of the chosen application. As seen in Fig., electronic commerce applications are based on several elegant technologies. But only when they are integrated do they provide uniquely powerful solutions.
In the ensuing discussion of each of these layers, we will not elaborate on the various aspects of the network infrastructure that transports information. These were discussed extensively earlier and will not be addressed here. We begin our discussion with the application level services.
Table Electronic Commerce: A conceptual framework
Table Electronic Commerce: A conceptual framework
Electronic Commerce Application Services
The application services layer of e-commerce will be comprised of existing and future applications built on the innate architecture. Three distinct classes of electronic commerce application can be distinguished: customer to business, business-to-business, and intra organization
Consumer-to-Business Transactions
We call this category marketplace transaction. In a marketplace transaction, customers learn about products differently through electronic publishing, buy them differently using electronic cash and secure payment systems, and have them delivered differently.
Also, how customers allocate their loyalty may also be different. In light of this, the organization itself has to adapt to a world where the traditional concepts of brand
Differentiation no longer hold-where “quality” has a new meaning, where “content” may not be equated to “product,” Where “distribution” may not automatically mean “physical Transport.” In this new environment, brand equity can rapidly evaporate forcing firms to develop new ways of doing business
Business-to Business Transactions
We call this category market-link transaction. Here, businesses, governments, and other organizations depend on computer - to-computer communication as a fast, an economical, and a dependable way to conduct business’ transactions. Small companies are also beginning to see the benefits of adopting the same methods. Business-to-business transactions include the use of EDI and electronic mail for purchasing goods and services,buying information and consulting services, submitting requests for proposals, and receiving proposals. Examine this scenario.
The current accounts payable process occurs through the exchange of paper documents. Each year the trading partners exchange millions of invoices, checks, purchase orders, financial reports, and other transactions. Most of the documents are in electronic form at their point of origin but are printed and key-entered at the point of receipt. The current manual process of printing, mailing is costly, time consuming, and error-prone. Given this situation and faced with the need to reduce costs, small businesses are looking toward electronic commerce as a possible savior. Intra-organizational Transactions We call this category market-driven transactions. A company becomes market driven by dispersing throughout the firm information about its customers and competitors; by spreading strategic and tactical decision making so that all units can participate; and by continuously monitoring their customer commitment by making improved customer satisfaction an ongoing objective. To maintain the relationships that are critical to delivering superior customer value, management must pay close attention to service, both before and after sales. In essence, a market-driven business develops a comprehensive understanding of its customers’ business and how customers in the immediate and downstream markets perceive value.
Three major components of market-driven transactions are
customer orientation through product and service
customization; cross-functional coordination through enterprise
integration; and advertising, marketing, and customer service.
Information Brokerage and Management
The information brokerage and management layer provides service integration through the notion of information brokerages, the development of which is necessitated by the increasing information resource fragmentation. We use the notion of information brokerage to represent an intermediary who provides service integration between customers and information providers, given some constraint such as a low price, fast service, or profit maximization for a client. Information brokers, for example, are rapidly becoming necessary in dealing with the voluminous amounts of information on the networks. As on-line databases migrate to consumer information utilities, consumers and information professionals will have to keep up with the knowledge, and owner-ship of all these systems.
Most professionals have enough trouble keeping track of files of 1 interest on one or two database services. With all the complexity associated with large numbers of on-line databases and service bureaus, if it is impossible to expect humans to do the searching. It will have to be software programs-information brokers or software agents, to use the more popular term-that act on the searcher’s behalf. Information brokerage does more than just searching. It addresses the issue of adding value to the information that is retrieved. For instance, in foreign exchange trading, information is retrieved about the latest currency exchange rates in order to hedge currency holdings to minimize risk and maximize profit. In other words, the act of retrieving the information is the input to other transactions. With multiple transactions being the norm in the real world, service integration becomes critical.
Taking the same foreign exchange example further, service integration allows one to link the hedging program (offered on a time-sharing basis by a third party) with the search program (could be another vendor) that finds the currency rates from the cheapest on-line service to automatically send trades to the bank or financial services company. In effect, a personalized automated trading system can be created without having to go to any financial institution. This is just one example of how information brokerages can add value. Another aspect of the brokerage function is the support for data management and traditional transaction services. Brokerages may provide tools to accomplish more sophisticated, time-delayed updates or future compensating transactions. These tools include software agents, distributed query generator, the distributed transaction generator, and the declarative resource constraint base which describes a business’s rules and-environment information.
At the heart of this layer lies the work-flow scripting environment built on a software agent model that coordinates work and data flow among support services. As pointed out earlier, software agents are used to implement information brokerages. Software agents are mobile programs that have been called “healthy viruses,” “digital butlers/” and “intelligent agents.” Agents are encapsulations of users’ instruction that perform all kinds of tasks in electronic market places spread across networks.
Information brokerages dispatch agents capable of information resource gathering, negotiating deals, and performing transactions. The agents are intelligent because they have contingency plans of action. They examine themselves and their environment and if necessary change from their original course of action to an alternative plan. For example, suppose you send an agent to an on-line store with a request to order a bouquet of roses for Rs. 25 or less. If the shop offers roses starting at Rs. 30, your agent can either choose a different bouquet or find a different store by consulting an online
“Yellow Pages” directory, depending on prior instructions. Although the notion of software agents sounds very seductive, it will take a while to solve the problems of interregna communication, interoperable agents, and other headaches that come with distributed computing and net-working. To some critics, the prospect of a single-agent language like Telescript as a world standard is disturbing. They worry that agents sound a bit too much like computer viruses, which instead of running errands may run amok.
Vendors such as General Magic go to great lengths to explain the precautions it has taken to make this impossible: the limits placed on the power of agents, the “self-destruct” mechanism built into their codes. Yet until electronic commerce services are up and running on a large scale, it is impossible to know how well software agents will work.
Interface and Support Services
The third layer, interface and support services will provide interfaces for electronic commerce applications such as interactive catalogs and will sup-port directory servicesfunctions necessary for information search and access. These two concepts are very different.
Interactive catalogs are the customized interface to consumer applications such as home shopping. An interactive catalog is an extension of the paper-based catalog and incorporates additional features such as sophisticated graphics and video to make the advertising more attractive. Directories, on the other hand, operate behind the scenes and attempt to organize the enormous amount of information and transactions generated to facilitate electronic commerce. Directory services databases make data from any server appear as a local file. A classic example of a directory is the telephone White Pages, which allows us to locate people and telephone numbers. In the case of electronic commerce, directories would play an important role in information management functions.
For instance,take the case of buying an airline ticket with several stopovers with the caveat that the time between layovers be minimized. This search would require several queries to various online directories to-find empty seats on various airlines and then the avail-ability of seats would; be coordinated with the amount of time spent in the air-port terminals. The primary difference between the two is that unlike interactive catalogs, which deal with people, directory support services interact directly with soft-ware applications. For this reason, they need not have the multimedia glitter and jazz generally associated with interactive catalogs. From a computing perspective, we can expect that there will be no one common user interface that will glaze the surface of all electronic commerce applications, but graphics and object manipulation will definitely dominate. Tool developers and designers might incorporate common tools for interface building, but the shape of catalogs or directories will depend on the users’ desires and functional requirements.
Secure Messaging and Structured Document Interchange Services
The importance of the fourth layer, secured messaging, is clear. Everyone in business knows that electronic messaging is a critical business issue. Consider a familiar business scenario:
You hand over an urgent fax Monday and find out Tuesday that it’s still sitting on your fax operator’s desk. What happened?
The line was busy and he thought he’d try again later. Or, the number was wrong,but he forgot to let you know. Or you’re in London and you need to send a spreadsheet that details a marketing plan for a product introduction strategy to a co-worker in New York. This must be done today, not tomorrow when the courier service would deliver.
There is a solution to these common and frustrating problems. It’s called Integrated Messaging: a group of computer services that through the use of a network send, receive, and combine messages, faxes, and large data files. Some better-known examples are electronic mail, enhanced fax, and electronic data interchange.
Broadly defined, messaging is the software that sits between the network infrastructure and the clients or electronic commerce applications, masking the peculiarities of the environment. Others define messaging as a frame-work for the total implementation of portable applications, divorcing you from the architectural primitives of your system. In general, messaging products are not applications that solve problems; they are more enablers of the applications that solve problems. Messaging services offer solutions for communicating non formatted (unstructured) data-letters, memos, and reports as weft asformatted (structured) data such as purchase orders, shipping notices, and invoices. Unstructured messaging consists of fax, e-mail, and form-based systems like Lotus Notes.
Structured documents messaging consist of the automated inter-change of standardized and approved messages between computer applications, via telecommunications lines. Examples of structured document messaging include EDI. Messaging is gaining momentum in electronic commerce and seems to have many advantages. It supports both synchronous (immediate) and asynchronous (delayed) message delivery and processing. With asynchronous messaging, when a message is sent, work continues (software doesn’t wait for a response).This allows the transfer of messages through store-and-forward methods.
Another advantage of messaging is that it is not associated with any particular communication protocol. No pre-processing is necessary, although there is an increasing need for programs to interpret the message. Messaging is well suited for both client server and peer-to-peer computing models. In distributed systems, the messages are treated as “objects” that pass between systems.
Messaging is central to work-group computing that is changing the way businesses operate. The ability to access the right information at the right time across diverse work groups is a challenge. Today, with the messaging tools, people can communicate and work together more effectively-no matter where they are located. When an employee sends an electronic mail form, the information travels along with the form. So one person can start the form, mail it to the next person, fill it in/ sign it, mail it to the next, and so on. This is known as message-enabled work-flow solutions.
The main disadvantages of messaging are the new types of applications it enables which appear to be more complex, especially to traditional programmers and the jungle of standards it involves. Because of the lack of standards, there is often no interoperability between different messaging vendors leading to islands of messaging. Also, security, privacy, and confidentiality through data encryption and authentication techniques are important issues that need to be resolved for ensuring the legality of the message-based transactions themselves.
Middleware Services
Middleware is a relatively new concept that emerged only recently. Like so many other innovations, it came into being out of necessity. Users in the 1970s, when vendors, delivered homogeneous systems that worked, didn’t have a need for middleware3&heR conditions changed-along with the hardware and the software the organizations couldn’t cope: The tools were inadequate, the backlog was enormous, and the pressure was overwhelming. And, the users were dissatisfied. Something was needed to solve all the interface, translation, transformation, and interpretation problems that were driving application developers crazy. With the growth of networks, client-server technology, and all other forms of communicating between/among unlike platforms, the problems of getting all the pieces to work together grew from formidable to horrendous.
As the cry for distributed computing spread, users demanded interaction between dissimilar systems, networks that permitted shared resources and applications that could be accessed by multiple software programs. In simple terms, middleware is the ultimate mediator between diverse software pro-grams that enables them talk to one another. Another reason for middleware is the computing shift from application centric to data centric. That is, remote data controls all of the applications in the network instead of applications controlling data. To achieve data-centric computing, middleware services focus on three elements: transparency, transaction security and management, and distributed object management and services.
Transparency
Transparency implies that users should be unaware that they are accessing multiple systems. Transparency is essential for dealing with higher-level issues than physical media and interconnection that the underlying network infrastructure is in charge of. The ideal picture is one of a “virtual” network: a collection of workgroup, departmental, enterprise, and inter enterprise LANs that appears to the end user or client application to be a seamless and easily accessed whole.
Transparency is accomplished using middleware that facilitates a distributed computing environment. This gives users and applications transparent access to data, computation, and other resources across collections of multi-vendor, heterogeneous systems. The strategic architectures of every major system vendor are now based on some form of middleware. The key to realizing the theoretical benefit of such architecture is transparency. Users need not spend their time trying to understand where something is. Nor should application developers have to code into their applications the exact locations of resources over the network. The goal is for the applications to send a request to the middleware layer, which then satisfies the request any way it can, using remote information.
Transaction Security and Management
Support for transaction processing (TP) is fundamental to success in the electronic commerce market. Security and management are essential to all layers in the electronic commerce model. At the transaction security level, two broad general categories of security services exist: authentication and authorization.
Transaction integrity must be a given for businesses that cannot afford any loss or inconsistency in data. Some commercial sites have had gigantic centralized TP systems running for years. For electronic commerce, middleware provides the qualities expected in a standard TP sys-tem: the so-called ACID properties (atomicity, consistency, isolation, and durability).
Distributed Object Management and Services
Object orientation is proving fundamental to the proliferation of network-based applications for the following reasons: It is too hard to write a net-work-based application without either extensive developer retraining or a technology that camouflages the intricacies of the network. Objects are defined as the combination of data and instructions acting on the data. Objects are an evolution of the more traditional programming concept of functions and procedures. A natural instance of an object in electronic commerce is a document.
A document carries data and often carries instructions about the actions to be performed on the data. Today, the term object is being used interchangeably with document resulting in a new form of computing called document oriented computing. Here, the trend is to move away from single data-type documents such as text, pictures, or video toward integrated documents known as com-pound document architectures. The best example of this approach is an active document. If you create a new document that is an integration of the spreadsheet, word processor, and presentation package, what you’ll see in the next generation of operating systems is that as you scroll through your document, the tool bar will automatically change from a spreadsheet too bar,to a word processing tool bar, to a presentation package tool bar. These applications will also be able to access and retrieve data from any file in the computing network.
Advantages of E-Commerce
Electronic Commerce can increase sales and decrease costs.
Advertising done well on the web can get even a small firm’s promotional message out to potential customers in every country in the world.
Businesses can use electronic commerce to identify new suppliers and business partners.
Electronic Commerce increases the speed and accuracy with which businesses can exchange information, which reduces costs on both sides of transactions.
E-Commerce provides buyers with a wider range of choices than traditional commerce because buyers can consider many different products and services from a wider variety of sellers.
Electronic payments of tax refunds, public retirement and welfare support cost less to issue and arrive securely and quickly when transmitted over the Internet.
Disadvantages of E-Commerce
Some business processes such as perishable foods and high-cost, unique items such as custom-designed jewelry might be impossible to inspect adequately from a remote location.
Costs, which are a function of technology, can change dramatically even during short-lived electronic commerce implementation projects because the technologies are changing so rapidly.
Many firms have trouble recruiting and retaining employees with the technological, design and business process skills needed to create an effective electronic commerce presence.
Firms facing difficulty of integrating existing databases and transaction processing software designed for traditional commerce into the software that enables electronic commerce.
Companies that offer software design and consulting services to tie existing systems into new online business systems can be expensive.
Consumers are fearful of sending their credit card numbers over the Internet and having online merchants. Consumers are simply resistant to change and are uncomfortable viewing merchandise on a computer screen rather than in person.
ADVANTAGES AND DISADVANTAGES OF TRANSACTING ONLINE
As well as disadvantages, online payment methods have several advantages. Read these examples:
Low labour costs
Since online payments are usually automatic, they have lower labour costs than manual payment methods, such as cheque, money order, cash and EFTPOS.
Convenience for online sales
Online payment methods allow conveniently selling goods and services online.
Automatic
Online payments can be automatic, which can be convenient for you and your customers.
Fast transaction speed
Online transactions quickly provide feedback to you and your customers.
Low risk of theft
After processing delays, online payments generally go straight into your bank account, so they have a low risk of theft.
Disadvantages of online payments
Online payment methods have several disadvantages. Check out these examples:
Service fees
Payment gateways and third-party payment processors charge service fees.
Inconvenient for offline sales
Online payment methods are inconvenient for offline sales.
Vulnerability to cybercriminals
Cybercriminals can disable online payment methods or exploit them to steal people’s money or information. Visit the Australian Cybercrime Reporting Network’s Learn about cybercrime page to learn more about cybercrime.
Reliance on telecommunication infrastructure
Internet and server problems can disable online payment methods.
Technical problems
Online payment methods can go down due to technical problems.
Processing online payments
Online payments are usually automatic. Check out this example:
Your business has a website with online purchase facilities to sell your goods and services.
A customer visits your website and finds some products they want to buy.
The customer checks out the products from your website and goes to the payments section.
Your website lets your customer know the total cost of the products they want to buy as well as their payment options.
The customer selects and completes their preferred payment method.
Your website automatically sends your confirmation of payment to you and your customer and sends a request to your business to ship the product.
Your website automatically gives your customer a receipt and/or a GST tax invoice. If GST applies, you must provide a GST tax invoice within 28 days if your customer requests one.
Tips for using online payment methods
If you want to offer online payments, try some these tips:
Protect customer information
Only retain credit and debit card information if you need it. Make sure you have good security to protect any information you retain.
Shop around
Look for the best payment gateway provider or third party payment processor for your business.
Use encryption
Make sure you use encryption for sending payment information to and from your website to protect your customers’ information from cybercriminals.
Train your employees
If your employees handle online payments, make sure they are properly trained in managing the online payments system and in keeping customer payment details secure.

Key elements of a business model
8 Key elements of a business model that you need to pay attention to


1) Value Proposition
Define how a company’s product or service fufils the need of customers.
-Examples of successful value propositions
 -Personalization/ Customization
 -Reduction of product search, price discovery costs
 -Facilitation of transactions by managing product delivery
2) Revenue Model
Define how the firm will earn revenue generates profits and produce a superior return on invested capital
-Major types:
Advertising revenue models: CNN.com
Subscription revenue models: MATCH.com
Transaction fee revenue model: EBay, E-Trade, Hotwire
Sales revenue model: Amazon, LLbean, Gap.com
Affiliate revenue model: E-pinions, Banner Exchange, Edmunds  sends traffic to another website
3) Market Opportunity
Refers to a company’s intended market space and the overall potential financial opportunities available to the firm in that market space
4) Competitive Environment
Refers to the other competition selling similar products and operating in the same market space
-Influenced by
How many competitors are active
How large operations are
The market share for each competitor
How profitable these firms are
How they price their product
5) Competitive Advantage
Achieved when a firm can produce a superior product and/or bring a product to market, at a lower price than most, or all, of their competitors.
-Types of competitive advantage:
First mover advantage
Unfair competitive advantage
6) Market Strategy
Plan that details how a company intends to enter a new market and attract strategy
7) Organizational Development
Describes how the company will organize the work that needs to be accomplished
8) Management Team
Employees of the company responsible for making the business model work
-Strong management team gives instant credibility to outside investors
There are many types of e-commerce business models lets take a look at all of them and what are the difference.


Business to Consumer Models


Portal
Offers powerful search tools plus an integrated packages of content and services
typically utilize a combined subscription/ advertising revenues/ transaction fee model
E-tailer
Online version of traditional retailer
Types include:
-Virtual merchants: Amazon
-Bricks and Clicks: Borders, Wal-Mart
-Catalogue merchants: LL Bean
- Manufacturer- direct: Dell.com, Sony Style
Content Provider
Information and entertainment companies that provide digital content over the web
Typically utilizes a subscription, pay for download or advertising revenue model
Syndication a variation of standard content provider model


Transaction Broker
 Processes online transactions for consumers
 Primary value proposition- saving time and money
 Pay Pal
 Typical revenue model – transaction fee
Market Creator
 Uses internet technology to create markets that bring buyers and sellers together
 E.g. priceline.com & ebay.com
Service Provider
Offers service online
Value proposition: valuable, convenient, time-saving, low cost alternatives to traditional service providers
Visa Now
Revenue Model: Subscription fees or one-time payment
Community Provider
Sites that create a digital online environment where people with similar interest can transact, communicate and receive interest-related information
Angie’s List
Typically rely on hybrid revenue model
Business to Business Models
E-distributor
Supplies products and services directly to individual businesses
Owned by one company seeking to serve many customers
E-procurement
Creates and sells access to digital electronic markets
B2B services providers is one type
Application service providers: a subset of B2B service providers
Exchanges
Electronic digital marketplace where suppliers and commercial purchases can conduct transactions
Usually owned by independent firms whose business is making a market
Industry Consortia
Industry-owned vertical market place that serve specific industries
Horizontal market place, in contrast, sell specific products and services to a whole range of industries
Private industrial networks
Digital networks designed to co-ordinate the flow of communications among firms engaged in business together
Lobbying: influence the government as a group  Public policy access
Business models in emerging E-Commerce Areas
Consumer to consumer: Provides a way for consumers to sell to each other, with the help of online market maker (EBay)
Peer to peer (P2P): Link users, enabling them to share files and common resources without a common server (Kazaa, Cloudmark)
M-Commerce: E-commerce business models that use wireless technologies (EBay Mobile)—To date, m-commerce is a disappointment in the united states however, technology platform continues to evolve

Forces Behind E-commerce
E-Commerce is becoming popular, it is worthwhile to examine today’s business environment so let us understand the pressures it creates on organizations and the responses used by organizations.
Environmental factors that create Business Pressures:
Market, economical, societal and technological factors are creating a highly competitive business environment in which consumers are the focal point. These factors change quickly, sometimes in an unpredictable manner and therefore companies need to react frequently not only in the traditional actions such as lowering cost and closing unprofitable facilities but also innovative activities such as customizing products, creating new products or providing superb customer service.
Economic Forces One of the most evident benefits of e-commerce is economic efficiency resulting from the reduction in communications costs, low-cost technological infrastructure,speedier and more economic electronic transactions with suppliers,lower global information sharing and advertising costs,and cheaper customer service alternatives.
Categories of Economic Forces
Lower marketing costs: marketing on the Internet maybe cheaper and can reach a wider crowd than the normal marketing medium.
Lower sales costs: increase in the customer volume do not need an increase in staff as the sales function is housed in the computer and has virtually unlimited accessibility
Lower ordering processing cost: online ordering can be automated with checks to ensure that orders are correct before accepting, thus reducing errors and the cost of correcting them.
New sales opportunities: the website is accessible all the time and reaches the global audience which is not possible with traditional store front.
Economic integration is either external or internal. External integration refers to the electronic networking of corporations, suppliers, customers/clients, and independent contractors into one community communicating in a virtual environment (with the Internet as medium). Internal integration, on the other hand, is the networking of the various departments within a corporation, and of business operations and processes. This allows critical business information to be stored in a digital form that can be retrieved instantly and transmitted electronically. Internal integration is best exemplified by corporate intranets.
Among the companies with efficient corporate intranets are Procter and Gamble, IBM, Nestle and Intel. EG. SESAMi.NET: Linking Asian Markets through B2B Hubs SESAMi.NET is Asia’s largest B2B e-hub, a virtual exchange integrating and connecting businesses (small, medium or large) to trading partners, e-marketplaces and internal enterprise systems for the purpose of sourcing out supplies, buying and selling goods and services online in real time. The e-hub serves as the centre for management of content and the processing of business transactions with support services such as financial clearance and information services.
It is strategically and dynamically linked to the Global Trading Web (GTW), the world’s largest network of trading communities on the Internet. Because of this very important link, SESAMi reaches an extensive network of regional, vertical and industry-specific interoperable B2B e-markets across the globe.
Market Forces
Corporations are encouraged to use e-commerce in marketing and promotion to capture international markets, both big and small. The Internet is likewise used as a medium for enhanced customer service and support. It is a lot easier for companies to provide their target consumers with more detailed product and service information using the Internet. Strong competition between organizations, extremely low labor cost in some countries, frequent and significant changes in markets and increased power of consumers are the reasons to create market forces.
Technology Forces
The development of information and communications technology (ICT) is a key factor in the growth of ecommerce. For instance, technological advances in digitizing content, compression and the promotion of open systems technology have paved the way for the convergence of communication services into one single platform. This in turn has made communication more efficient, faster, easier, and more economical as the need to set up separate networks for telephone services, television broadcast, cable television, and Internet access is eliminated. From the standpoint of firms/ businesses and consumers, having only one information provider means lower communications costs.
Moreover, the principle of universal access can be made more achievable with convergence. At present the high costs of installing landlines in sparsely populated rural areas is incentive to telecommunications companies to install telephones in these areas. Installing landlines in rural areas can become more attractive to the private sector if revenues from these landlines are not limited to local and long distance telephone charges, but also include cable TV and Internet charges. This development will ensure affordable access to information even by those in rural areas and will spare the government the trouble and cost of installing expensive landlines
Societal and environmental forces
To understand the role of E-commerce in today’s organizations, it becomes necessary to review the factors that create societal and environmental forces.
Changing nature of workforce
Government deregulations
Shrinking government subsidies
Increased importance of ethical and legal issues
Increased social responsibility of organizations
Rapid political changes
Critical response activities by Organizations
A response can be a reaction to a pressure already in existence, or it can be an initiative that will defend an organization against future pressures. It can also be an activity that exploits an opportunity created by changing conditions.
Organizations’ major responses are divided into five categories:strategic systems for competitive advantage,continuous improvement efforts, business process reengineering (BPR), business alliances and EC.These several responses can be interrelated and Ecommerce can also facilitate the other categories. The four categories are described below.
Strategic Systems
Strategic systems provide organizations with strategic advantages, thus enabling them to increase their market share, better negotiate with their suppliers, or prevent competitors from entering into their territory. There is a variety of EC supported strategic systems. An example is FedEx’s overnight delivery system and the company’s ability to track the status of every individual package anywhere in the system. Most of FedEx’s competitors have already mimicked the system. So FedEx moved the system to the Internet. However, the competitors quickly followed and now FedEx is introducing new activities.
Continuous Improvement Efforts
In order to improve the company’s productivity and quality, many companies continuously conduct innovative programs. The efforts taken by companies for continuous improvement are
Improved productivity
Improved decision making
Managing Information
Change in management
Customer service Innovation and
Creativity.
For example, Dell Computer takes its orders electronically and improved moves them via Enterprise Resources Planning software (from SAP Corp.) into the just-in-time assembly operation. Intel is taking its products’ consumption in 11 of its largest customers, using its extranets, almost in real time, and determining production schedules and deliveries accordingly.
Business Process Reengineering (BPR)
Business Process Reengineering refers to a major innovation in the organization’s structure and the way it conducts business. Information technology and especially EC play a major role in BPR. Electronic Commerce provides flexibility in manufacturing, permits faster delivery to customers and supports rapid and paperless transactions among suppliers, manufacturers and retailers.
The major areas in which E-Commerce supports BPR are
Reducing cycle time and time to market: Reducing the business process time (cycle time) is extremely important for increasing productivity and competitiveness.Similarly, reducing the time from the inception of an idea until its implementation— time to market—is important because those who can be first on the market with a product, or who can provide customers with a service faster than competitors, enjoy a distinct competitive advantage.
Empowerment of employees and collaborative work: Empowerment is related to the concept of self-directed teams. Management delegates authority to teams who can execute the work faster and with fewer delays. Information Technology allows the decentralization of decision making and authority but simultaneously supports a centralized control. For example, the Internet and the intranets enable empowered employees to access data, information and knowledge they need for making quick decisions.
Knowledge management: Employees can access organizational know-how via their company’s intranet. Some knowledge bases are open to the public for a fee over the Internet, generating income.
Customer-focused approach: Companies are becoming increasingly customer oriented. This can be done in part by changing manufacturing processes from mass production to mass customization. In mass production, a company produces a large quantity of identical items. In mass customization, items are produced in a large quantity but are customized to fit the desires of each customer. Electronic commerce is an ideal facilitator of mass customization.
Business alliances
Many companies realize that alliances with other companies, even competitors can be beneficial. There are several types of alliances, such as sharing resources, establishing permanent supplier-company relationships and creating joint research efforts. One of the most interesting types is the temporary joint venture, in which companies form a special organization for a specific, limited-time mission.
E-Commerce Communities
What it is that will drive e-commerce in the future? — in a word, it’s community.
We certainly have the technology to build great business-to-consumer and business-to business ecommerce applications into our business models. And, yes, attributes such as viable application design, integration with business processes, and overall performance matter.
A successful community strategy must embrace the idea of moving the one-onone communication that occurs offline into the virtual world of e-commerce. Such a strategy currently requires multiple technical approaches. However, we believe community solutions will soon become more integrated and far-reaching.
The tools that form online communities include discussion or forum software, chat functions, instant messaging, two-way mailing lists, online collaboration tools, audio, video, and more. You may choose to invest slowly at first and increase your community commitment over time.
Online conversation with business partners will also give net positive results. A private discussion area or secured online meetings can go a long way toward building stronger relationships between companies. This will also serve to potentially drive new business opportunities for both parties. Building community has to be at the heart of any successful ecommerce strategy.
Is e-Commerce the Same as e-Business?
While some use e-commerce and e-business interchangeably, they are distinct concepts. In e-commerce, information and communications technology (ICT) is used in inter-business or inter-organizational transactions (transactions between and among firms/ organizations) and in business-to-consumer transactions (transactions between firms/ organizations and individuals).
In e-business, on the other hand, ICT is used to enhance one’s business. It includes any process that a business organization (either a for-profit, governmental or non-profit entity) conducts over a computer-mediated network. A more comprehensive definition of e-business is: “The transformation of an organization’s processes to deliver additional customer value through the application of technologies, philosophies and computing paradigm of the new economy.”
Three primary processes are enhanced in e-business:
1. Production processes, which include procurement, ordering and replenishment of stocks; processing of payments; electronic links with suppliers; and production control processes, among others;
2. Customer-focused processes, which include promotional and marketing efforts, selling over the Internet, processing of customers’ purchase orders and payments, and customer support, among others; and
3. Internal management processes, which include employee services, training, internal information-sharing, videoconferencing, and recruiting. Electronic applications enhance information flow between production and sales forces to improve sales force productivity. Workgroup communications and electronic publishing of internal business information are likewise made more efficient. The Internet economy pertains to all economic activities using electronic networks as a medium for commerce or those activities involved in both building the networks linked to the Internet and the purchase of application services such as the provision of enabling hardware and software and network equipment for Web-based/online retail and shopping malls (or “e-malls”).


DESIGNING ECOMMERCE WEBSITE
Forces Behind E-commerce
E-Commerce is becoming popular, it is worthwhile to examine today’s business environment so let us understand the pressures it creates on organizations and the responses used by organizations.
Environmental factors that create Business Pressures:
Market, economical, societal and technological factors are creating a highly competitive business environment in which consumers are the focal point. These factors change quickly, sometimes in an unpredictable manner and therefore companies need to react frequently not only in the traditional actions such as lowering cost and closing unprofitable facilities but also innovative activities such as customizing products, creating new products or providing superb customer service.
Economic Forces One of the most evident benefits of e-commerce is economic efficiency resulting from the reduction in communications costs, low-cost technological infrastructure,speedier and more economic electronic transactions with suppliers,lower global information sharing and advertising costs,and cheaper customer service alternatives.
Categories of Economic Forces
Lower marketing costs: marketing on the Internet maybe cheaper and can reach a wider crowd than the normal marketing medium.
Lower sales costs: increase in the customer volume do not need an increase in staff as the sales function is housed in the computer and has virtually unlimited accessibility
Lower ordering processing cost: online ordering can be automated with checks to ensure that orders are correct before accepting, thus reducing errors and the cost of correcting them.
New sales opportunities: the website is accessible all the time and reaches the global audience which is not possible with traditional store front.
Economic integration is either external or internal. External integration refers to the electronic networking of corporations, suppliers, customers/clients, and independent contractors into one community communicating in a virtual environment (with the Internet as medium). Internal integration, on the other hand, is the networking of the various departments within a corporation, and of business operations and processes. This allows critical business information to be stored in a digital form that can be retrieved instantly and transmitted electronically. Internal integration is best exemplified by corporate intranets.
Among the companies with efficient corporate intranets are Procter and Gamble, IBM, Nestle and Intel. EG. SESAMi.NET: Linking Asian Markets through B2B Hubs SESAMi.NET is Asia’s largest B2B e-hub, a virtual exchange integrating and connecting businesses (small, medium or large) to trading partners, e-marketplaces and internal enterprise systems for the purpose of sourcing out supplies, buying and selling goods and services online in real time. The e-hub serves as the centre for management of content and the processing of business transactions with support services such as financial clearance and information services.
It is strategically and dynamically linked to the Global Trading Web (GTW), the world’s largest network of trading communities on the Internet. Because of this very important link, SESAMi reaches an extensive network of regional, vertical and industry-specific interoperable B2B e-markets across the globe.
Market Forces
Corporations are encouraged to use e-commerce in marketing and promotion to capture international markets, both big and small. The Internet is likewise used as a medium for enhanced customer service and support. It is a lot easier for companies to provide their target consumers with more detailed product and service information using the Internet. Strong competition between organizations, extremely low labor cost in some countries, frequent and significant changes in markets and increased power of consumers are the reasons to create market forces.
Technology Forces
The development of information and communications technology (ICT) is a key factor in the growth of ecommerce. For instance, technological advances in digitizing content, compression and the promotion of open systems technology have paved the way for the convergence of communication services into one single platform. This in turn has made communication more efficient, faster, easier, and more economical as the need to set up separate networks for telephone services, television broadcast, cable television, and Internet access is eliminated. From the standpoint of firms/ businesses and consumers, having only one information provider means lower communications costs.
Moreover, the principle of universal access can be made more achievable with convergence. At present the high costs of installing landlines in sparsely populated rural areas is incentive to telecommunications companies to install telephones in these areas. Installing landlines in rural areas can become more attractive to the private sector if revenues from these landlines are not limited to local and long distance telephone charges, but also include cable TV and Internet charges. This development will ensure affordable access to information even by those in rural areas and will spare the government the trouble and cost of installing expensive landlines
Societal and environmental forces
To understand the role of E-commerce in today’s organizations, it becomes necessary to review the factors that create societal and environmental forces.
Changing nature of workforce
Government deregulations
Shrinking government subsidies
Increased importance of ethical and legal issues
Increased social responsibility of organizations
Rapid political changes
Critical response activities by Organizations
A response can be a reaction to a pressure already in existence, or it can be an initiative that will defend an organization against future pressures. It can also be an activity that exploits an opportunity created by changing conditions.
Organizations’ major responses are divided into five categories:strategic systems for competitive advantage,continuous improvement efforts, business process reengineering (BPR), business alliances and EC.These several responses can be interrelated and Ecommerce can also facilitate the other categories. The four categories are described below.
Strategic Systems
Strategic systems provide organizations with strategic advantages, thus enabling them to increase their market share, better negotiate with their suppliers, or prevent competitors from entering into their territory. There is a variety of EC supported strategic systems. An example is FedEx’s overnight delivery system and the company’s ability to track the status of every individual package anywhere in the system. Most of FedEx’s competitors have already mimicked the system. So FedEx moved the system to the Internet. However, the competitors quickly followed and now FedEx is introducing new activities.
Continuous Improvement Efforts
In order to improve the company’s productivity and quality, many companies continuously conduct innovative programs. The efforts taken by companies for continuous improvement are
Improved productivity
Improved decision making
Managing Information
Change in management
Customer service Innovation and
Creativity.
For example, Dell Computer takes its orders electronically and improved moves them via Enterprise Resources Planning software (from SAP Corp.) into the just-in-time assembly operation. Intel is taking its products’ consumption in 11 of its largest customers, using its extranets, almost in real time, and determining production schedules and deliveries accordingly.
Business Process Reengineering (BPR)
Business Process Reengineering refers to a major innovation in the organization’s structure and the way it conducts business. Information technology and especially EC play a major role in BPR. Electronic Commerce provides flexibility in manufacturing, permits faster delivery to customers and supports rapid and paperless transactions among suppliers, manufacturers and retailers.
The major areas in which E-Commerce supports BPR are
Reducing cycle time and time to market: Reducing the business process time (cycle time) is extremely important for increasing productivity and competitiveness.Similarly, reducing the time from the inception of an idea until its implementation— time to market—is important because those who can be first on the market with a product, or who can provide customers with a service faster than competitors, enjoy a distinct competitive advantage.
Empowerment of employees and collaborative work: Empowerment is related to the concept of self-directed teams. Management delegates authority to teams who can execute the work faster and with fewer delays. Information Technology allows the decentralization of decision making and authority but simultaneously supports a centralized control. For example, the Internet and the intranets enable empowered employees to access data, information and knowledge they need for making quick decisions.
Knowledge management: Employees can access organizational know-how via their company’s intranet. Some knowledge bases are open to the public for a fee over the Internet, generating income.
Customer-focused approach: Companies are becoming increasingly customer oriented. This can be done in part by changing manufacturing processes from mass production to mass customization. In mass production, a company produces a large quantity of identical items. In mass customization, items are produced in a large quantity but are customized to fit the desires of each customer. Electronic commerce is an ideal facilitator of mass customization.
Business alliances
Many companies realize that alliances with other companies, even competitors can be beneficial. There are several types of alliances, such as sharing resources, establishing permanent supplier-company relationships and creating joint research efforts. One of the most interesting types is the temporary joint venture, in which companies form a special organization for a specific, limited-time mission.
E-Commerce Communities
What it is that will drive e-commerce in the future? — in a word, it’s community.
We certainly have the technology to build great business-to-consumer and business-to business ecommerce applications into our business models. And, yes, attributes such as viable application design, integration with business processes, and overall performance matter.
A successful community strategy must embrace the idea of moving the one-onone communication that occurs offline into the virtual world of e-commerce. Such a strategy currently requires multiple technical approaches. However, we believe community solutions will soon become more integrated and far-reaching.
The tools that form online communities include discussion or forum software, chat functions, instant messaging, two-way mailing lists, online collaboration tools, audio, video, and more. You may choose to invest slowly at first and increase your community commitment over time.
Online conversation with business partners will also give net positive results. A private discussion area or secured online meetings can go a long way toward building stronger relationships between companies. This will also serve to potentially drive new business opportunities for both parties. Building community has to be at the heart of any successful ecommerce strategy.
Is e-Commerce the Same as e-Business?
While some use e-commerce and e-business interchangeably, they are distinct concepts. In e-commerce, information and communications technology (ICT) is used in inter-business or inter-organizational transactions (transactions between and among firms/ organizations) and in business-to-consumer transactions (transactions between firms/ organizations and individuals).
In e-business, on the other hand, ICT is used to enhance one’s business. It includes any process that a business organization (either a for-profit, governmental or non-profit entity) conducts over a computer-mediated network. A more comprehensive definition of e-business is: “The transformation of an organization’s processes to deliver additional customer value through the application of technologies, philosophies and computing paradigm of the new economy.”
Three primary processes are enhanced in e-business:
1. Production processes, which include procurement, ordering and replenishment of stocks; processing of payments; electronic links with suppliers; and production control processes, among others;
2. Customer-focused processes, which include promotional and marketing efforts, selling over the Internet, processing of customers’ purchase orders and payments, and customer support, among others; and
3. Internal management processes, which include employee services, training, internal information-sharing, videoconferencing, and recruiting. Electronic applications enhance information flow between production and sales forces to improve sales force productivity. Workgroup communications and electronic publishing of internal business information are likewise made more efficient. The Internet economy pertains to all economic activities using electronic networks as a medium for commerce or those activities involved in both building the networks linked to the Internet and the purchase of application services such as the provision of enabling hardware and software and network equipment for Web-based/online retail and Text Box: Designing an eCommerce site comes with its own challenges.
First of all, eCommerce sites are built not only to inform and to showcase your brand online, they are also built for consumers to shop. Because of this, designers have to make sure that the site is intuitive and easy to use in order to make sales. Without sales, the whole website loses its purpose.
If you’ve ever wondered what are the guidelines and website design ideas for designing an eCommerce website, then you’re in the right place. In this post, I’m going to show you some of the most important things an eCommerce site should have:
The purpose of your e-commerce site is to sell products, therefore it is only right that you should highlight your products on your website. When showcasing items, make sure that you’re using high-quality images that will get the user’s attention. The larger the images, the better. By showing quality pictures, your customers can see how well the product looks in real.
For better usability, choose a layout that emphasizes your product in every page. Don’t give them a hard time finding the page for “Accessories” or “Shoes” if they’ve already searched or clicked on a similar item. Lack of information can make customers leave and reach to other websites.
Misinformation is even worse. When you put in a wrong size, or colour, you risk getting a bad impression and losing valuable customers. Describe your products correctly and in detail. Unlike shopping in brick-and-mortar stores, your customers can’t touch and see their items in every angle. You need to devise ways so you can give your consumers all the information they need to picture your item in their heads. This includes the type, colour, size, weight, thickness, cut and fit (for clothes), and all the necessary instructions they need to know before purchasing the item.
3. SHIPPING RATES
Some of the best eCommerce sites I love are those that offer low or free shipping. When shopping online, customers are always torn with the question “Is this a good deal?” And usually, they decide once they see the shipping rate. High shipping means “I could have just bought this item on a regular store and I wouldn’t pay as much for shipping” while low shipping means that “I can spend a few bucks for shipping just to stay at home and wait for my item to arrive”.
4. SHOPPING CART DESIGN
Too many designers don’t pay attention to shopping carts, but it actually is one of the most incredibly important parts of your website. A good shopping cart can enable users to add multiple items, revise order, or remove products as easily as possible. When designing a shopping cart, make sure that you include functional product images, reviews, and a convenient search bar.
Here’s an example of a good shopping cart design. This shopping cart from Sephora features a simple but very intuitive design. It includes all the necessary features like the order summary, product recommendations, and a “continue shopping” option for those who want to add/replace items.
5. GUEST CHECKOUT
Many eCommerce sites today require users to register and create an account first before they make a purchase. Although this is extremely helpful since it allows you to communicate, follow-up, and track your customers, it isn’t really something customers want to do. Customers want to make every transaction as quick and anonymous as possible.
They don’t want to feel forced when you ask them to register. They don’t want long forms. All they want is to buy stuff from you. With guest check outs, customers don’t need to fill out pages of personal details before making the purchase. Experts believe that guest checkouts help boost conversion rates as it removes the barrier (which is the signing up/registering) so that more people can order from you.
6. EASY CHECKOUT PROCES
What’s the ideal checkout page? Aside from allowing transactions to be quick and anonymous, as mentioned above with the use of the guest checkout option, an eCommerce site should also make it as easy as possible for consumers to check out their items. The easier this process, the more motivation your customers will have to repeat purchase. So don’t make too many pages for checkout. Try as much as possible to make it a single-page process while not being too overwhelming for consumers. If you know the basics on how to make a website, designing the checkout page aren't so hard.
7. PAYMENT OPTIONS
I’ve seen lots of eCommerce sites that don’t allow users to pay with Paypal or with other kinds of payment aside from Visa or Master card. When designing an eCommerce site, make sure that you provide lots of payment solutions so you can cater a wide range of shoppers. By considering your consumer’s payment preference, you can increase their motivation to shop thereby boosting your sales in the long run.
8. CONTACT INFORMATION AND SUPPORT
Let your customers know that you’re simply a call, text, email, and live chat away! The best way to earn loyal customers and to instil more confidence is to show how passionate you are in helping them. When they encounter a problem, make sure that there is always someone who can attend to help. If your site hides any contact information and other means of communication, customers see this as a red flag, and they’re less likely to do business with you.
Here’s an example of an eCommerce website that provides complete contact information along with a brief history background, community affairs, and contact services of the company:
9. KEEP YOUR STORE SECURE
Brick-and-mortar stores keep secure by installing cameras around their perimeters, appointing bodyguards, and necessary tools to keep customers safe while they’re shopping. How to build Shopify stores? In a recent survey conducted by Ponemon Research, 90% of respondents said their computers had been breached at least once over the past year.
All eCommerce sites are a target for hackers and the need to keep your store secure is becoming increasingly important. Still, the best way to make your site secure is to support SSL to encrypt information. With an SSL certificate, you can protect your customer’s valuable information including address, e-mails, phone number, and credit cards.
10. SOCIAL PROOF
Without evidence that someone purchased successfully or liked your site no one will ever put their confidence in you. If you’re struggling for good reviews, make it so that your customers are able to review you easily. You can do this by bringing this option on the product page or right after they have successfully completed an order.

shopping malls (or “e-malls”).
Many people use the terms Internet and World Wide Web (aka. the Web) interchangeably, but in fact the two terms are not synonymous. The Internet and the Web are two separate but related things.
What is The Internet?
Internet IconThe internet is a massive network of networks, a networking infrastructure. It connects millions of computers together globally, forming a network in which any computer can communicate with any other computer as long as they are both connected to the internet. Information that travels over the internet does so via a variety of languages known as protocols.
Quick Points about The Internet:
It is a global network connecting millions of computers.
The internet is decentralized.
Each internet computer is independent.
There are a variety of ways to access the internet.
There are more than 3.5 billion internet users in the world.
What is The Web (World Wide Web)?
Web IconThe World Wide Web, or simply web, is a way of accessing information over the medium of the internet. It is an information-sharing model that is built on top of the internet. The web uses the HTTP protocol, only one of the languages spoken over the internet, to transmit data. Web services, which use HTTP to allow applications to communicate in order to exchange business logic, use the the web to share information. The web also utilizes browsers, such as Internet Explorer or Firefox, to access Web documents called webpages that are linked to each other via hyperlinks. Web documents also contain graphics, sounds, text and video.
Quick Points about The Web:
It is a system of internet servers that support specially formatted documents.
Documents are formatted in a markup language that supports links to other documents.
You can jump from one document to another simply by clicking on hot spots (hyperlinks).
Applications called web browsers that make it easy to access the World Wide Web.
There are more than 1,275,000,000 websites.
The Web is a Portion of The Internet
The web is just one of the ways that information can be disseminated over the internet. The internet, not the web, is also used for email, which relies on SMTPUsenet news groups, instant messaging and FTP. So the web is just a portion of the Internet, albeit a large portion, but the two terms are not synonymous and should not be confused.
EVOLUTION OF THE INTERNET AND WWW
Evolution
World Wide Web was created by Timothy Berners Lee in 1989 at CERN in Geneva. World Wide Web came into existence as a proposal by him, to allow researchers to work together effectively and efficiently at CERN. Eventually it became World Wide Web.
The following diagram briefly defines evolution of World Wide Web:
internet_technologies_tutorial
WWW Architecture
WWW architecture is divided into several layers as shown in the following diagram:
internet_technologies_tutorial
Identifiers and Character Set
Uniform Resource Identifier (URI) is used to uniquely identify resources on the web and UNICODE makes it possible to built web pages that can be read and write in human languages.
Syntax
XML (Extensible Markup Language) helps to define common syntax in semantic web.
Data Interchange
Resource Description Framework (RDF) framework helps in defining core representation of data for web. RDF represents data about resource in graph form.
Taxonomies
RDF Schema (RDFS) allows more standardized description of taxonomies and other ontological constructs.
Ontologies
Web Ontology Language (OWL) offers more constructs over RDFS. It comes in following three versions:
OWL Lite for taxonomies and simple constraints.
OWL DL for full description logic support.
OWL for more syntactic freedom of RDF
Rules
RIF and SWRL offers rules beyond the constructs that are available from RDFs and OWL. Simple Protocol and RDF Query Language (SPARQL) is SQL like language used for querying RDF data and OWL Ontologies.
Proof
All semantic and rules that are executed at layers below Proof and their result will be used to prove deductions.
Cryptography
Cryptography means such as digital signature for verification of the origin of sources is used.
User Interface and Applications
On the top of layer User interface and Applications layer is built for user interaction.
WWW Operation
WWW works on client- server approach. Following steps explains how the web works:
User enters the URL (say, http://www.tutorialspoint.com) of the web page in the address bar of web browser.
Then browser requests the Domain Name Server for the IP address corresponding to www.tutorialspoint.com.
After receiving IP address, browser sends the request for web page to the web server using HTTP protocol which specifies the way the browser and web server communicates.
Then web server receives request using HTTP protocol and checks its search for the requested web page. If found it returns it back to the web browser and close the HTTP connection.
Now the web browser receives the web page, It interprets it and display the contents of web page in web browser’s window.
internet_technologies_tutorial
Future
There had been a rapid development in field of web. It has its impact in almost every area such as education, research, technology, commerce, marketing etc. So the future of web is almost unpredictable.
Apart from huge development in field of WWW, there are also some technical issues that W3 consortium has to cope up with.
User Interface
Work on higher quality presentation of 3-D information is under deveopment. The W3 Consortium is also looking forward to enhance the web to full fill requirements of global communities which would include all regional languages and writing systems.
Technology
Work on privacy and security is under way. This would include hiding information, accounting, access control, integrity and risk management.
Architecture
There has been huge growth in field of web which may lead to overload the internet and degrade its performance. Hence more better protocol are required to be developed.
Web Page
web page is a document available on world wide web. Web Pages are stored on web server and can be viewed using a web browser.
A web page can cotain huge information including text, graphics, audio, video and hyper links. These hyper links are the link to other web pages.
Collection of linked web pages on a web server is known as website. There is unique Uniform Resource Locator (URL) is associated with each web page.
Static Web page
Static web pages are also known as flat or stationary web page. They are loaded on the client’s browser as exactly they are stored on the web server. Such web pages contain only static information. User can only read the information but can’t do any modification or interact with the information.
Static web pages are created using only HTML. Static web pages are only used when the information is no more required to be modified.
internet_technologies_tutorial
Dynamic Web page
Dynamic web page shows different information at different point of time. It is possible to change a portaion of a web page without loading the entire web page. It has been made possible using Ajax technology.
Server-side dynamic web page
It is created by using server-side scripting. There are server-side scripting parameters that determine how to assemble a new web page which also include setting up of more client-side processing.
Client-side dynamic web page
It is processed using client side scripting such as JavaScript. And then passed in to Document Object Model (DOM).
internet_technologies_tutorial
Scripting Laguages
Scripting languages are like programming languages that allow us to write programs in form of script. These scripts are interpreted not compiled and executed line by line.
Scripting language is used to create dynamic web pages.
Client-side Scripting
Client-side scripting refers to the programs that are executed on client-side. Client-side scripts contains the instruction for the browser to be executed in response to certain user’s action.
Client-side scripting programs can be embedded into HTML files or also can be kept as separate files.
internet_technologies_tutorial
Following table describes commonly used Client-Side scripting languages:
S.N.
Scripting Language Description
1.
JavaScript
It is a prototype based scripting language. It inherits its naming conventions from java. All java script files are stored in file having .js extension.
2.
ActionScriptIt is an object oriented programming language used for the development of websites and software targeting Adobe flash player.
3.
Dart
It is an open source web programming language developed by Google. It relies on source-to-source compiler to JavaScript.
4.
VBScript
It is an open source web programming language developed by Microsoft. It is superset of JavaScript and adds optional static typing class-based object oriented programming.
Server-side Scripting
Sever-side scripting acts as an interface for the client and also limit the user access the resources on web server. It can also collects the user’s characteristics in order to customize response.
internet_technologies_tutorial
Following table describes commonly used Server-Side scripting languages:
S.N.
Scripting Language Description
1.
ASP
Active Server Pages (ASP)is server-side script engine to create dynamic web pages. It supports Component Object Model (COM) which enables ASP web sites to access functionality of libraries such as DLL.
2.
ActiveVFP
It is similar to PHP and also used for creating dynamic web pages. It uses native Visual Foxpro language and database.
3.
ASP.net
It is used to develop dynamic websites, web applications, and web services.
4.
Java
Java Server Pages are used for creating dynamic web applications. The Java code is compiled into byte code and run by Java Virtual Machine (JVM).
5.
Python
It supports multiple programming paradigms such as object-oriented, and functional programming. It can also be used as non-scripting language using third party tools such as Py2exe or Pyinstaller.
6.
WebDNA
It is also a server-side scripting language with an embedded database system.
Web Browser
web Browser is an application software that allows us to view and explore information on the web. User can request for any web page by just entering a URL into address bar.
Web browser can show text, audio, video, animation and more. It is the responsibility of a web browser to interpret text and commands contained in the web page.
Earlier the web browsers were text-based while now a days graphical-based or voice-based web browsers are also available. Following are the most common web browser available today:
Browser
Vendor
Internet Explorer
Microsoft
Google Chrome
Google
Mozilla Firefox
Mozilla
Netscape Navigator
Netscape Communications Corp.
Opera
Opera Software
Safari
Apple
Sea Monkey
Mozilla Foundation
K-meleon
K-meleon
Architecture
There are a lot of web browser available in the market. All of them interpret and display information on the screen however their capabilities and structure varies depending upon implementation. But the most basic component that all web browser must exhibit are listed below:
Controller/Dispatcher
Interpreter
Client Programs
Controller works as a control unit in CPU. It takes input from the keyboard or mouse, interpret it and make other services to work on the basis of input it receives.
Interpreter receives the information from the controller and execute the instruction line by line. Some interpreter are mandatory while some are optional For example, HTML interpreter program is mandatory and java interpreter is optional.
Client Program describes the specific protocol that will be used to access a particular service. Following are the client programs tat are commonly used:
HTTP
SMTP
FTP
NNTP
POP
internet_technologies_tutorial
Starting Internet Explorer
Internet explorer is a web browser developed by Microsoft. It is installed by default with the windows operating system howerver, it can be downloaded and be upgraded.
To start internet explorer, follow the following steps:
Go to Start button and click Internet Explorer.
internet_technologies_tutorial
The Internet Explorer window will appear as shown in the following diagram:
internet_technologies_tutorial
Accessing Web Page
Accessing web page is very simple. Just enter the URL in the address bar as shown the following diagram:
internet_technologies_tutorial
Navigation
A web page may contain hyperlinks. When we click on these links other web page is opened. These hyperlinks can be in form of text or image. When we take the mouse over an hyperlink, pointer change its shape to hand.
internet_technologies_tutorial
Key Points
In case, you have accessed many web pages and willing to see the previous webpage then just click back button.
You can open a new web page in the same tab, or different tab or in a new window.
Saving Webpage
You can save web page to use in future. In order to save a webpage, follow the steps given below:
Click File > Save As. Save Webpage dialog box appears.
Choose the location where you want to save your webpage from save in: list box. Then choose the folder where you want to save the webpage.
Specify the file name in the File name box.
Select the type from Save as type list box.
Webpage, complete
Web Archive
Webpage HTML only
Text File
From the encoding list box, choose the character set which will be used with your webpage. By default, Western European is selected.
Click save button and the webpage is saved.
Saving Web Elements
Web elements are the pictures, links etc. In order to save these elements follow the steps given below:
Right click on the webpage element you want to save. Menu options will appear. These options may vary depending on the element you want to save.
internet_technologies_tutorial
Save Picture As: This option let you save the picture at specific location with its name. When you click this option, a dialog box is opened where you can sepcify its name and location.
Favourites
The Favourites option helps to save addresses of the webpages you visited oftenly. Hence you need not to remember long and complex address of websites you visit often.
In order to open any webpage, you just need to double click on the webpage that you have marked from bookmarks list.
Adding a web page to your Favourites
In ordered to add website to your favourite list, follow the steps given below:
Open webpage that you want to add to your favourite.
Click on favourite menu and then click on Add to Favourites opton. Addfavourites dialog box appears.
You can also click Favourites button available in the toolbar. Favourites panel will open in the left corner of the internet explorer window. Click add button, AddFavourites dialog box will apppear.
internet_technologies_tutorial
In AddFavourites dialog box, the Name: text box will contains the name of the web page that you want to add to favourites.
Click the Create in button, Favoutites folder will appear. Move to the folder where you want to store the favourites by clicking on the folder name.
Now click OK button to save the favourites.
Opening Favourites
In order to open favourites, follow the steps given below:
In the Favourite Panel, take the mouse over the site that you want to open. Now click on the address to open that site.
internet_technologies_tutorial
Favourite can also be opened from the Favourites menu by selecting the appropriate one.
internet_technologies_tutorial
Organizing Favourites
Favourites can be organized by categorizing web pages, creating folder for each category and then storing web pages into them. In order to organize favourites, follow the steps given below:
Click Favourites menu > Organize Favourites. Organize favourites dialog box will appears.
In order to organize the webpages, drag the individual webpage to the respective folder. Similarly to delete a favourite, Click on delete button.
internet_technologies_tutorial

The characteristics of the Internet that are clearly of importance in cyberlibel proceedings are:
its global nature;
interactivity;
its potential to shift the balance of power in the offline world;
accessibility;
anonymity;
its facilitation of republication;
the prominence of intermediaries;
its reliance on hyperlinks/hypertext;
its long-term impact — the use of permanent archives;
its multimedia character; and
its temporal indeterminacy.
1)      Global Nature:
The first feature of the Internet is its truly global nature. Presently, more than 1.9 billion people in more than 190 countries are linked through this massive interconnected web of computer networks.[1]
This feature immediately raises several interesting conflicts of law questions for the libel lawyer, such as:
a.  In which jurisdiction did the publication of the defamation occur?
Theoretically, every time a third party accesses a defamatory posting on the Internet, publication has occurred.
b.  In what jurisdiction should the plaintiff sue?
Where the plaintiff resides?
Where the defendant resides?
Wherever publication has occurred?

Defamation laws vary from country to country and in countries such as Australia, Canada, and the US, it can vary from province to province and state to state. Therefore, plaintiffs may have the luxury of “forum shopping” or choosing the jurisdiction in which the laws are most favourable.
The High Court of Australia heard a defamation claim instituted by a plaintiff, who was a resident of the State of Victoria in Australia, against Dow Jones, an American corporation, for allegedly defamatory statements made in articles published by Dow Jones on its website, which was maintained on servers located in the State of New Jersey, USA. Dow Jones brought a motion to have service of the claim set aside or the action permanently stayed on the basis that the courts in Australia did not have jurisdiction. The High Court of Australia rejected that argument and allowed the action to proceed. The majority of the High Court said at para. 44:
“In defamation, the same considerations that require rejection of locating the tort by reference only to the publisher’s conduct, lead to the conclusion that, ordinarily, defamation is to be located at the place where the damage to reputation occurs. Ordinarily that will be where the material which is alleged to be defamatory is available in comprehensible form assuming, of course, that the person defamed has in that place a reputation which is thereby damaged. It is only when the material is in comprehensible form that the damage to reputation is done and it is damage to reputation which is the principal focus of defamation, not any quality of the defendant’s conduct. In the case of material on the World Wide Web (web), it is not available in comprehensible form until downloaded on to the computer of a person who has used a web browser to pull the material from the web server. It is where that person downloads the material that the damage to reputation may be done. Ordinarily then, that will be the place where the tort of defamation is committed.
c.  Whose laws should apply?
For example, should the First Amendment protection and the public figure defence available in the US apply? Or should the common law of the commonwealth apply? Or the civil law?[2]
d.  Will it be possible to enforce any judgment obtained?
Currently, despite legislation allowing reciprocal enforcement of civil judgments, some courts in the US are unwilling to enforce defamation judgments from other jurisdictions because of First Amendment protection of freedom of expression.
e. What is the quantum of damages?
Theoretically, damages could be very large as a publication on the Internet potentially reaches millions of people. In practice, however, it is unlikely that millions of people will actually view each particular publication. In any event, publication on the Internet will generally be larger than in all but the largest print or broadcast media outlets.

The global nature of the Internet also raises some interesting procedural questions for the libel lawyer. In traditional libel law, there are three different types of defamatory statements:
a.  A statement that is defamatory on its face and which is obviously defamatory.
b.  A statement which contains false innuendo. False innuendo is a defamatory statement that has an inferential meaning, therefore only persons with the necessary contextual knowledge appreciate that the statement is defamatory. Since statements on the Internet are published globally, their inferential meanings may vary depending on the geographic or cultural location of the reader or the newsgroups or the Usenet group involved.
c.  A statement of legal innuendo. While not defamatory on their face, these statements are defamatory when viewed together with extrinsic circumstances. Once again, contextual knowledge may render a statement defamatory in one jurisdiction but not in another.[3]
The geographical indeterminancy of the technology of the Internet collides regularly with the stark reality of the geographical determinacy of defamation actions. This reality is above and beyond the conflicts of law questions that bedevil all international litigation. It is an example of a larger problem facing other areas of the law and the Internet, as stated by Binnie J. in the Supreme Court of Canada decisions of Society of Composers, Authors and Music Publishers of Canada v. Canadian Assn. of Internet Providers, 2004 SCC 45, [2004] 2 S.C.R. 427 at para. 41:
“The issue of the proper balance in matters of copyright plays out against the much larger conundrum of trying to apply national laws to a fast-evolving technology that in essence respects no national boundaries. Thus in Citron v. Zundel (2002), 41 C.H.R.R. D/274, the Canadian Human Rights Tribunal wrestled with jurisdiction over an alleged hate Web site supplied with content from Toronto but posted from a host server in California. In Reference re Earth Future Lottery, 2003 SCC 10 (CanLII), [2003] 1 S.C.R. 123, 2003 SCC 10, the issue was whether sales of tickets from an Internet lottery in Prince Edward Island constituted gambling “in the province” when almost all of the targeted on-line purchasers resided elsewhere. The “cyber libel” cases multiply. In Braintech, Inc. v. Kostiuk 1999 BCCA 169 (CanLII), (1999), 171 D.L.R. (4th) 46, the British Columbia Court of Appeal refused to enforce a Texas judgment for Internet defamation against a B.C. resident where the B.C. resident’s only connection with Texas was “passive posting on an electronic bulletin board” (para. 66). There was no proof that anyone in Texas had actually looked at it. On the other hand, in Dow Jones & Co. v. Gutnick (2002), 194 A.L.R. 433, [2002] HCA 56, the High Court of Australia accepted jurisdiction over a defamation action in respect of material uploaded onto the defendant’s server in New Jersey and downloaded by end users in the State of Victoria. The issue of global forum shopping for actions for Internet torts has scarcely been addressed. The availability of child pornography on the Internet is a matter of serious concern. E-commerce is growing. Internet liability is thus a vast field where the legal harvest is only beginning to ripen. It is with an eye to this broader context that the relatively precise questions raised by the Copyright Board must be considered. [Emphasis added].
Emphasis on reputation and freedom of speech varies greatly even within the English-speaking common law world.[4] Jurisdictions such as the UK provide remedies for defamation but, until recently, only limited recourses for invasion of privacy,[5] while the converse is true in other jurisdictions such as France.
The use of legal innuendos, community standards for defamatory meaning, local procedural rules, and jurisdiction arguments accentuate the geographical determinacy of defamation law. This clash has several consequences, for example:
jurisdictional disputes are a common feature of cyberlibel cases,
there are limited extraterritorial applications for injunctions against cyberlibel statements published globally (see Barrick Gold Corp. v. Lopehandia, 2004 CanLII 12938 (ON C.A.));
abuse of process motions based on limited publications in the jurisdiction are used in UK cases (see “abuse of process,” below Chapter 9, section F; Chapter 11, sections E, F, and G; and Chapter 15, section C (2)); and
a very uneven “landscape” for the liability or immunity of intermediaries. Section 230 of the Communications Decency Act of 1996, 47 U.S.C.A. (CDA) provides complete immunity for the Internet Service Provider (ISP). No legislative protection exists for the ISP in defamation claims in Canada.
2)       Interactivity:
The interactive character of the Internet utterly changes the libel playing field. It is completely different from the Industrial Age paradigm where newspapers and television stations had dominant if not monopolistic relationships with readers and viewers.
See David Halberstam, The Powers that Be (Urbana: University of Illinois Press, 1975)
Someone who is damaged by the press has limited remedies. In the Internet Age a person whose reputation is attacked now has a wide range of offensive and defensive remedies, including juridical, technological, and public relations options. In many cases, the scope of re-publication is as wide or can even be wider than the original publication.
The ease with which users of the Internet can access bulletin boards and Usenets and communicate with each other has engendered in its users a false sense of freedom in their communications. This is exemplified by the prevalence of activities such as “spamming”[6] and “flaming”[7] in Internet communications. As a result, the Internet is qualitatively different from any other medium. Consequently, Mike Godwin, counsel for the Electronic Frontier Foundation, says that “the public figure defence” should apply to statements made on the Internet. The ability to reply, he claims, is much more gratifying, immediate, and potent than launching a libel action.[8]
Some American commentators[9] have proposed that when a libel plaintiff has been defamed by a message posted on an electronic bulletin board and she has access to the bulletin board to post a reply, the First Amendment requires that the plaintiff prove that the defendant acted with “actual malice” in defaming the plaintiff.[10] They argue that “Libel Plaintiffs who have been defamed by bulletin board speech and who have both access to the bulletin board on which the defamatory material appeared and a history of participation on the bulletin board are functionally equivalent to public figures.”[11] This proposal raises numerous questions such as:
Should the conceptual basis of this defence be the First Amendment or the technological ease of reply on the Internet?
What will be the reactions of courts outside the US to a defence based on the First Amendment?
Should the elements of such a defence include: (i) access to the Internet? (ii) access to the Internet and a particular bulletin board system where the defamatory statement was published? (iii) participation in the discussion?; (iv) a previous history of participation and discussions in that particular bulletin board system?
More broadly, counsel must consider: (i) what subject matters should be covered? (ii)how to define issues of public interest on a global medium of communication?
Is this defence only available to the operators of bulletin board systems or to the original publishers as well?
What test of malice should apply? Should it be the test set out by The New York Times Sullivan (376 U.S. 254 (1964)) or the tests set out at common law?
Should this concept be a defence or simply a mitigation of damages?
These issues have not yet been decided by the courts, but they need to be addressed as the Internet does provide a unique means of a quick and responsive reply to an attack on a person’s reputation.
See criticisms of this concept in Graham J. Smith, ed., Internet Law and Regulation 4th ed. (London: Sweet & Maxwell, 2007) at 345–46.
3)      Shifting the Balance of Power in the Offline World[12]
In some situations the Internet can actually change the balance of power that exists normally in the offline world. Any enterprise that has been the target of a concerted cyber-attack comes to realize that the terms of the debate are not what it is accustomed to, where, for example it is able to gain favourable attention for its press releases. On the contrary, the attackers are the persons with the power. The ferocity, ubiquity, and tenacity of cyblerlibel attacks often stun their targets. The power of the Internet to cause instantaneous and irreparable damage was graphically described by the Ontario Court of Appeal in Barrick Gold Corp. v. Lopehandia, [2004] CanLII 12938 at paras. 44–45 (ON C.A.):
Secondly, the motions judge failed to appreciate, and in my opinion misjudged, the true extent of Mr. Lopehandia’s target audience and the nature of the potential impact of the libel in the context of the Internet. She was alive to the fact that Mr. Lopehandia “[had] the ability, through the Internet, to spread his message around the world to those who take the time to search out and read what he posts” and indeed that he had “posted messages on many, many occasions.” However, her decision not to take the defamation seriously led her to cease her analysis of the Internet factor at that point. She failed to take into account the distinctive capacity of the Internet to cause instantaneous, and irreparable, damage to the business reputation of an individual or corporation by reason of its interactive and globally all-pervasive nature and the characteristics of Internet communications outlined in paragraphs 28–33 above.
Had the motions judge taken these characteristics of the Internet more fully into account, she might well have recognized Barrick’s exposure to substantial damages to its reputation by reason of the medium through which the Lopehandia message was conveyed.
DESIGNING ECOMMERCE WEBSITE
Over the past 10 years, e-commerce has been one of the fastest growing segments of the retail industry. That may seem obvious to anyone who has ever shopped online, but the size and speed of the boom has been truly astounding. There are already hundreds of thousands of online stores around the world wide web, and according to some estimates, merchants open 20,000 new e-commerce storefronts every week.1 The popularity of the online marketplace shows no signs of slowing, so now may be the perfect time to start selling on the web. There are more options for creating an e-commerce site than ever before. You can work with an e-commerce platform provider to set up an online store, or you may want to let web professionals handle the design and development of your site from start to finish. Working with services like these offer some convenience, but if you want additional flexibility and control, your best bet may be to create your site on your own. With a little know-how and some easy-to-use tools, you can develop an e-commerce site that looks and functions exactly the way you want, helping you meet the needs of your customers and your business more effectively. In this guide, you’ll learn about what goes into creating your own do-it-yourself (DIY) e-commerce web site, from picking the right tools and services you’ll need to create your web pages, to selecting the best hosting provider and payment solution to fit your business, to figuring out the best security for your site. Choosing Your Web Design Tools After you have your business plan in place and are ready to focus on your new online venture, it’s time to start creating your e-commerce web site. The first step is selecting the tools you want to use to design and code your site. You can start from scratch and code everything by hand, but this requires solid knowledge of HTML, PHP, MySQL, and other programming languages. To shorten the learning curve, you might want to invest in web design software like Adobe Dreamweaver or Microsoft Expression Web. Depending on what version you buy, these programs can run anywhere from $50 to $300. If you don’t have the budget to spend on software, there are also several free open source options to choose from, including KompoZer and BlueGriffon (formerly Nvu). While they may not offer all of the sophisticated features that paid software does, these open source programs are still powerful and easy to use. Everyone likes different web tools for different reasons, so it’s hard to say which will be the best program for you. However, there are some key elements you should look for in any software. An easy-to-use interface is important, especially if you’re less familiar with HTML and would prefer to work with a WYSIWYG (What You See Is What You Get) application. WYSIWYG HTML editors allow you to design your site by clicking and dragging elements and inserting text Before You Start Creating Your Site Step 1: Create Your E-Commerce Business Plan. What are you selling? Who is your target market? How much money will you need to invest to get your e-commerce business off the ground? Do you want to incorporate or operate as a sole proprietorship? These questions may seem like no-brainers, but it’s worth taking some time to sit down and map out a strategy. Depending on the size and complexity of your business, this could take anywhere from a day or two to several months. Learn the language(s) of the web HTML, PHP, ASP, SQL, CSS, AJAX— today’s internet encompasses an alphabet soup of different programming codes and tools. While you don’t need to be an expert in any of them to create a web site on your own, you should at least familiarize yourself with these technologies. There are a wide range of resources available at your local library, bookstore, and of course online. The World Wide Web Consortium is a great place to start. GUIDE and links like you would in a word processing program. While you design your site, the WYSIWYG editor will generate the HTML code for you. Many of these editors will allow you to toggle between the visual layout and the site code, giving you flexibility to tweak the HTML to see how it affects the page layout, and vice versa. If your web site is small and simple, HTML/CSS is fine. On the other hand, if the content or structure of your e-commerce site is going to change frequently, you may want to consider an open source content management system (CMS) such as Joomla and Drupal. A CMS is software that allows users to add new web pages—or change content on existing pages— quick and easily. With a CMS in place, you won’t need to worry about coding new content in HTML because the system will do it for you. When you’re considering which web site building tools to use, you should make sure that the applications you choose support all of the functionalities that you want in your web site. For example, if you plan to use a MySQL database to power your product catalog, be sure that you can integrate it into your site using the program you decide to go with. If you’re not completely sure about the functionalities you may need, spend some time exploring web sites that you like and pay special attention to the features that appeal to you the most. Aside from product catalogs, many e-commerce sites offer newsletter registration forms, customer support widgets, and other elements that make a site more interactive. After you have a list of features you want on your site, do a little research to learn more about the technologies behind them. Selecting Your Web Host for E-commerce Now that you’ve got an idea about how you’re going to build your web site, you need to think about where to host it. There are hundreds of different web hosting providers to choose from, so how can you be sure you’re making the best decision? Even though it may seem like a daunting choice, picking the provider that’s right for you can be an easy decision if you pay attention to a few key issues. The first is price, and while it’s easy to do a quick price comparison on the web, the cheapest host you can find may not always be the best. Providers that have lower prices sometimes skimp in other areas, like customer service or technical support. You should also be on the lookout for providers that may offer low prices up front, but then run up charges with hidden fees. In addition to price, you should also consider the type of features offered by a hosting provider. Since PHP and MySQL currently play an integral role in creating dynamic, interactive e-commerce web sites, picking a host that offers compatibility with these languages should be at the top of your list. If you’re interested in having email addresses that match your domain name—an important factor when considering how you will communicate with your customers and any employees you may have—access to an email server is critical. Host-based security services, like firewalls and virus detection, are also must-haves. It’s also a good idea to check how much uptime a hosting provider guarantees. A high uptime percentage helps to ensure that your web site will be available when a visitor types your web address into a browser or finds your site via a search engine. Choosing a host that Jumpstarting Your Site Design with Free Templates Even if you decide to create a DIY web site, you don’t need to start with a blank slate. There are a wide variety of free HTML templates that you can tweak to meet your needs available at sites such as 4templates.com or freewebtemplates.com. Before you start re-coding, however, be sure that the designer really has given permission for others to use and change the look of the template. Is Free Web Hosting Right for You? It’s often said that the best things in life are free, but when it comes to web hosting, this may not be the case. If you’re running an e-commerce site, a free hosting provider may not give you the reliability or features you need to keep your customers happy. Before you decide on a host, be sure it offers the bandwidth to support all of the traffic to your site and meets your needs for guaranteed uptime. GUIDE offers frequent backups is also a safe bet just in case your site goes down and you need to recover your files. Last but not least, if you’re new to building web sites, then finding a hosting provider that offers solid customer and technical support should also be a top priority. A good hosting provider will be able to answer any questions you may have during your site launch and should be able to help you quickly address any day-to-day problems that may arise. Picking a Payment Solution After deciding where you’ll set up shop on the web, the next step is choosing a method to accept payments on your site. The payment process is what puts the “commerce” in “e-commerce.” There are two kinds of payment systems that you should consider for your site: a payment processor and a payment gateway. Payment processors, like PayPal Website Payments Standard and Google Checkout, will send a customer to a checkout page that is hosted by the processing company. After customers submit their credit card information, they will be sent back to your web site. In contrast, payment gateways—such as Authorize.net—integrate directly with your shopping cart and the transaction is essentially invisible to your customer. There are pros and cons for payment processors and payment gateways that you should weigh. For some web site owners, payment processors can be easier to use because they do not require any backend integration with web sites. When you use a payment processor, you also don’t have to worry about securing financial transactions because the processing web site will take care of it for you. However, a payment processor will also take your customers away from your site during checkout, a process that may cause confusion and may give them second thoughts about completing their transaction. Payment gateways require more technical know-how, and you will have to obtain an SSL certificate to protect credit card transactions on your site (learn more about SSL security below). Even with these additional considerations, a payment gateway will keep customers at your web site during the transaction, making the user experience smoother and more professional. Before you decide on a payment processor or gateway, you should also research the transaction, set up, and service fees that each provider charges. Average charges vary widely across the industry, with some processors charging a cash fee plus a percentage of each Don’t Forget to Register Your Domain Name Before you can host your web site anywhere, you’ll need a domain name. Pick something that your customers will find easy to remember, but try to avoid plays on words and other phrases that are not search engine-friendly. For example, if you have a business selling cat toys, CatToyOutlet.com is better than PurrfectlyPerfect Toys.com. Also, remember to complete your metadata fields with relevant content and to submit your site to the Open Directory Project , Google, Yahoo, Bing, and other popular search engines so your customers can find you. Diagram 1. E-commerce Web Site Payment Processing Flowchart Payment Processor e.g., PayPal, Google Checkout Your Shopping Cart Direct Integration Their Payment Site Payment processor’s website Payment Gateway e.g., Authorize.net Certicate Your Shopping Cart Certicate Certicate User Name: Password: GUIDE transaction (for example, PayPal charges 30 cents plus 2.9 percent of every transaction for merchants who receive $3,000 or less per month in payments). Setup fees for gateways can cost anywhere from $99 to $299, and fees typically range from 10 to 50 cents per transaction. Merchants with high sales volumes can often find providers that offer a fixed monthly rate for transactions. It is often best to start with your own bank to see what merchant solutions for credit card processing they recommend. While set up costs and fees and important, there are a few more features that you should think about before making a decision. Check to see whether the payment services provider you’re interested in offers automatic tax calculations. This will make it much easier to figure out how much sales tax you should be collecting and will cut down on accounting headaches during tax season. Also be sure to find out if the processor or gateway you want to use can automatically calculate shipping charges. With this kind of service, you’ll know exactly how much to charge your customers so shipping costs won’t eat into your bottom line. Choosing a Shopping Cart—or Creating Your Own At brick-and-mortar stores, shoppers pick items from shelves, put them in a cart or basket, and usually bring them to a cashier when they’re finished shopping. You’ll need to set up a similar system—commonly called a shopping cart solution—for your online store. Typically, shopping cart software allows people to select items from web pages, add them to their “cart,” and walk them through the purchase process when they are ready to check out. Most shopping carts will also include taxes and shipping charges to give customers a total for their order. When choosing a shopping cart to go with your payment processing solution, make sure it’s supported by your hosting provider and look to see if the cart offers the payment and shipping options you need. There are a number of open source carts with active communities like osCommerce and Zen Cart, as well as GeoTrust Partner solutions like 3dcart.com. You can also create your own shopping cart using web page authoring programs like Dreamweaver or programming it from scratch using PHP, MySQL, and other web programs and languages. SSL Security: An Absolute Must-Have for Your Site A nice site design and seamless integration with a payment system are great, but they won’t mean a thing if you and your customers aren’t protected from fraud and theft. Security is one of the biggest concerns that shoppers have when it comes to buying online. In fact, a recent survey found that 45 percent of consumers are worried about identity theft when they buy on the web.2 Even more troubling for e-commerce business owners, security concerns like these have a serious impact on consumer behavior. The National Cyber Security Alliance recently found that a majority of Americans—64 percent—have abandoned an online purchase because they were not certain that a web site was secure.3 Given these fears, SSL security is critical to your web site. With an SSL certificate, you’ll be able to prevent cybercriminals from intercepting financial data as it’s transmitted over the internet. Not only that, but you’ll also be able to show your customers that your business is legitimate and can be trusted. GUIDE What is an SSL Certificate? SSL certificates are bits of code that you install on your site that will encrypt logins, passwords, credit card numbers and other information so that hackers can’t intercept the data and decode it. After an SSL certificate is installed on a site, it uses an extensive system of security checks to establish a domain and server as trustworthy. To encrypt logins, registration forms, credit card transactions and other situations where sensitive information needs to be sent between web browsers and servers, an SSL certificate uses a private “key”—essentially a long string of complex code—that is unique to the individual server that hosts the web site and a public key that is sent to web browsers. The private key can only be “unlocked” by the public key, and vice versa, helping to ensure that the data remains secure. The vast majority of businesses obtain SSL certificates from third-party providers called Certificate Authorities (CAs). In addition to providing the SSL certificate, a CA will also authenticate a business to help ensure that the company represented by the web site actually exists. For example, GeoTrust will check domain registration information and request business registration documents to verify a web site owner’s identity and location. SSL is now considered a standard internet security technology, but that doesn’t mean that all SSL certificates and providers are the same. Just like picking your design tools and your web host, there are several important factors you should think about before you select a CA and an SSL certificate. Choosing the Right SSL Provider Before you worry about any technical specifications, finding a credible SSL provider that has a strong reputation for online security should be a top concern. Why is this so important? With SSL security from a well-known CA like GeoTrust, your visitors will know that your company has been verified by an objective third party recognized for its strong security practices. People will be more likely to buy when they know that their information is protected and your business is safe, helping you turn that 64 percent of shoppers who have abandoned an online purchase into paying customers. Without legitimate SSL security, you run the risk of losing business because customers won’t recognize that your site is safe. Even worse, it can take just one fraudulent incident to damage your business reputation, even if it wasn’t your fault. Customers may still blame you and tell everyone they know—from family, to coworkers, to a potential audience of millions on popular social media sites like Facebook, Yelp, and Twitter—that your site can’t be trusted. Along with the reputation of your SSL provider, you also need to research what type of SSL certificate will be best for your site. Fortunately, this shouldn’t take too much of your time since there are only three types of SSL certificate that you need to learn about: Extended Validation, organization validation, and domain validation. Types of SSL Certificates Domain validated SSL is a basic certificate that provides encryption and only verifies that the person applying for the certificate has the right to use a specific domain name. These certificates are ideal for business owners who want to get a certificate as quickly as possible, however, they represent the lowest level of SSL security. Organization validated SSL, on the GUIDE other hand, also confirms that a company is a confirmed legal entity and establishes a physical location for that organization, giving customers more assurance that the business is legitimate. When people click an on organization validated certificate, it will display your company name, and trust marks provided by CAs may also display your business name. GeoTrust offers a domain validated SSL product—QuickSSL Premium—as well as an organization validated certificate called True BusinessID SSL. For sites that handle financial transactions, Extended Validation (EV) is your best bet. In addition to the encryption and authentication that organization validation provides, EV SSL also offers a clear sign that your web site is safe: the address bar in high-security browsers will turn green and show the name of your company as well as the name of your SSL provider. EV SSL requires a more thorough authentication process, but many businesses experience increased conversions and higher sales thanks to the green address bar and recent research shows that top performing sites are more likely to use EV SSL.4 If you’re looking for an EV SSL certificate, GeoTrust True BusinessID with EV is an ideal choice. Conclusion and Resources E-commerce has made it possible for entrepreneurs to extend their reach farther than they could have ever imagined. You’ve just read about all of the different components that go into creating an e-commerce web site, but here’s a quick recap that will help you put everything into place: 1. Choose your web design tools — Determine what tools you’re going to use to design and your site. 2. Select your web host — Find a hosting provider that can accommodate all of the tools you want to use and offers the features you need. 3. Pick a payment solution — Weigh your options to see if a payment processor or gateway is right for you. 4. Choose or create a shopping cart — Your customers are going to need a way to select items and buy them, so find a shopping cart solution that meets your needs. 5. Obtain credible SSL security — Work with a provider like GeoTrust to get credible SSL protection for your site. With the rise of identity theft and malware, item five is particularly important. If customers don’t believe that a site is secure, they won’t choose to spend their hard-earned money there. By using a reliable SSL certificate provider, you’ll be able to arm your site against online threats and send your customers a clear message that your company can be trusted. Not all SSL certificates are equal, however. Using the information in this guide, be sure to invest in a solution from a credible provider like GeoTrust that will help you build confidence in your site, communicate your commitment to online safety, and protect your business. Taking the time to find the right SSL certificate for your site now will pay off in the future, helping to ensure that your business is a success.

Step 1: Finalize Your Model
You need to size up your requirements before starting the development process. The more precise your specifications are, the better the end product you will get. So, you need to decide first that if you wish to have a full-fledged eCommerce website to sell your products. Or you want to create an eCommerce marketplace to let others sell their merchandise on your website.
The basic difference between having your own eCommerce website and a marketplace website is the authorization. Marketplace website is a common platform, where any seller can register to sell their merchandise and anybody can purchase from them. It’s more like a market.
Whereas, an eCommerce website is a place where you sell your own products or maybe merchandise of a specific brand. Here, only the admin can add and sell products, no other seller can intervene. Similar to what you see in the retailer shops. Create your beautiful online store using an eCommerce platforms and get in the business right away.
Step 2: Choose Your eCommerce Platform Wisely
The content management system (eCommerce platform) you use to design your eCommerce website will have a huge effect on its success or failure. A CMS or eCommerce platform should be chosen while considering the scale of your website. Of course, both in terms in of products and customers.
There are various content management systems (CMS) such as WooCommerce, Magento, PrestaShop, OpenCart, Shopify etc. available in the market to choose from. However, you can create an eCommerce website with WordPress WooCommerce and TemplateToaster. WooCommerce is basically a WordPress plugin that converts your simple website into an eCommerce store.
But how about a beautiful amalgamation of WordPress, WooCommerce, and TemplateToaster? Yes! TemplateToaster – a website builder software that lets you create a fully functional template or website in the desired CMS. TemplateToaster can benefit you in many ways. It gives you the freedom to switch your designed theme with any other CMS of your choice. Check out free WooCommerce themes.
Step 3: Responsive eCommerce Design
The flexibility to use mobile devices has pushed the eCommerce business enormously. Thus, it is absolutely important to make sure that a website should be mobile optimized. A website should be compatible with all devices no matter what size it is of. If you don’t have a responsive web design, then there are huge chances that you might lose your maximum traffic. Also, your site will not appear in the mobile search results. Thus, your site’s SEO will be affected. Because Google itself gives preference to responsive websites.
Since much of the audiences is inclined towards mobile devices nowadays so you cannot overlook the importance of the mobile-optimized website.
Step 4: Impressive Mobile App for iOS and Android
Don’t panic it’s not a mandatory aspect of eCommerce website development. In fact, it is just a suggestion. If you want to attract more traffic to your website then you can build a mobile app targeting specifically iOS and Android users. People spend most of the time on their phones and if you are offering an exclusive app for them, then this can boost up your business giving more authentic traffic. But at times creating an app can be a little heavy on your pocket, but believe me, it’s all worth it. Additionally, having a mobile-friendly website is indeed a great idea.
Step 5: Select the eCommerce Website Hosting Platform
Your choice of hosting server can have a massive effect on your eCommerce business. The site’s performance, efficiency, and website accessibility are connected to the chosen hosting platform. You should choose a hosting plan according to the needs and after analyzing the traffic that possibly can come to your website. Although it can be tough to analyze traffic in advance still you need to have an understanding before you buy any hosting plan.
There are various types of hostings such as VPS, Dedicated hosting, Cloud hosting, Semi-dedicated hosting, etc. available that you can choose for your website.
Virtual Private Server (VPS) is a virtualized server that provides you dedicated resources on the server. It is a secure and stable solution. It can serve medium-level traffic pretty well.
Dedicated hosting is a type of hosting in which a server is allocated to a single user only. Thus, more security and high performance are guaranteed.
Cloud hosting basically operates across distinct servers in the chain. Your data in the cloud hosting renders from varied servers. The best thing about cloud hosting is that you pay for what you use only. Your server needs can fluctuate with the business up and down and so is the price which you will pay to the server.
There are some Free WordPress hosting out there but you definitely need a good paid plan for eCommerce Website Development. As they say “if you pay peanuts, you get monkeys”.
Step 6: Some Important Other Key Factors to Keep in Mind
Perfect Site Search
This is actually not a step to implement rather a key component that needs to be taken care of in the development cycle. It helps you increase the user engagement to your website. The perfect the site search result, the more the user engagement will. Yes! A site search will help users to search for the desired product on a particular website. A site search engine searches the website for a particular result. When a user can’t find what they are looking for then chances of increase in bounce rate gets higher. You ought to have a perfectly working site search to keep your users on your site and to scale your WordPress eCommerce website easily.
Adding Related Items
It is absolutely important that other displayed merchandise should be related to the product that a visitor is currently viewing. Display of unrelated items can cause you to lose potential customers. Likewise, in the multi-product website, you need to be very specific about the related items you are showing to the potential customer. For example, you can display a specific model covers to the visitor that is searching for a mobile phone.
Perfect Categorization and Tag usage
A perfectly categorized website is a treat to eyes and the easy navigation is like a cherry on the cake. If all the products are well categorized then users can quickly find the relevant items. Thus, increase traffic to your website. Whereas, for a multi-product website it becomes even important to have well-defined categories to display the products.
You can also use tags to link to your merchandise. Since a Tag is a keyword referring to a particular product and helps it appear in the search result. Once a product is tagged then it is easy for a user to discover that specific product simply by typing that tag in the search. Therefore, tags are another very helpful tool to organize your store.
Look after SEO
One thing that you can never overlook in the eCommerce website development is search engine optimization. Use the best SEO practices to help people find your website, products, and services. An SEO-friendly website draws more customers than a non-optimized website. Similarly, adding target keywords make it easily searchable for the users. During the website development life cycle, you’ll find many SEO strategies that if implemented correctly can attract a huge number of potential customers to your website. Follow these eCommerce SEO tips for higher sales and conversions.
Use eCommerce Rich Snippets
Rich Snippets are basically a piece of structured data that helps users as well as crawlers to perceive more information about the site’s content. These rich snippets work amazingly different for your website. They attract the audience by displaying necessary information because you can’t tell a search engine to what exactly to show regarding your merchandise or pages. eCommerce rich snippet gives an idea to the search engine and customer to what to expect from a specific page. And it will help your site gain more exposure in organic search.
Security
Being an eCommerce website, security is the biggest concern. The transactions carried out through your website is your responsibility and it needs to be as secure as possible. The server you are using should Payment Card Industry Data Security Standards (PCI DSS) compliant. And your site must support Secure Sockets Layer (SSL). As the primary purpose of SSL is to provide a secure connection to exchange sensitive information such as credit card details, name, phone number, address etc. over the internet. Thus, employing SSL will give your customers a sense of security and consequently keep your data absolutely secure. In fact, basic SSL certificates are freely available these days. You can follow these instructions to set up SSL using Let’s Encrypt.
Speed optimization
The site’s performance is directly proportional to its speed. If the speed is slow, you’re likely to lose customers. It’s true! Generally, people abandon the website which takes more than 4 to 5 seconds to load. So, you have less than 5 seconds only to hook a new visitor to your website. Page load can significantly impact the user experience and your site’s ability to convert visitors into buyers. There are many ways to improve the performance of your WordPress website to run it smoothly. Consider using image compression and caching during development. Caching is a technique to save a static copy of pages so the server does not need to generate it dynamically every time it is requested. Caching is an essential tool for ensuring that your website runs efficiently and provides the best experience to the users.
Step 7: Website Testing
Once you’re ready with eCommerce website or even along with the designing process you can run testing. It is probably the most vital facet in website development. Testing is carried out for:
Bugs
User Convenience
Broken links
Usability
Shopping Cart Abandonment
Forms
Script
Navigation
spell-check
Both automated and manual testing should be done so that there should be no room for errors. However, you can never test enough. eCommerce website having errors or any other type of bug can leave your visitors as well as existing users dissatisfied.
So here are some factors which you need to keep your focus on. And you require to run various testings such as cross-browser compatibility checks, resolution testing, load test, scalability, stress testing, integration testing, performance examination, security checking, functionality check, cookies usage, and database testing.
According to experts opinion, around 20 to 25% of total ecommerce website development time should be invested in this stage only.
Step 8: Market Your eCommerce Website
That’s it. Congratulations, your store is now live. But don’t forget to market your website. Digital marketing is actually the most essential part of the eCommerce website development life cycle. Rarely will visitors discover your eCommerce website by accident. Thus, in order to generate sales, you will actively need to market your website on various platforms. In fact, you should be ready in advance with your market plans, so that as soon as you launch your website, online marketing and promotions can be rolled out. An online market campaign needs to be really effective so that the website doesn’t go unnoticed. Right strategy, right implementation at the right time will definitely attract potential users.
To promote your product and to increase traffic and drive sales, follow these popular marketing methods.
It Includes:
First and the foremost method is the traditional method is by giving ads in the newspaper, magazines, pamphlets, etc.
Social media marketing (SMM). SMM is the most popular and attention seeking digital marketing solution that helps marketers to market their merchandise conveniently. Social media platforms like Facebook, Instagram, Twitter, YouTube, Linkedin, Google+, Pinterest, etc. have almost become an integral part of every business marketing strategy to promote their business.
Email marketing is another effective way to market your website. You can ask your visitors to leave their email addresses in exchange for some enticing offers or promos. Send emails to your customers at specified intervals (not too often) and inform them about the new deals or new launches. Send them discount coupons to keep their interest in your store.
Content can help you reach the next level. Yes! Content marketing is an imperative measure of eCommerce development. It is something that can take the website higher in search results. Produce authentic, unique, and shareable information to attract visitors to your store. Give them something interesting and genuine to read and keep up their engagement.
Use viral marketing. Viral marketing is all about how creatively and quickly you create a strategy to get people to promote your website via however medium they like.
Step 9: Payment Methods
This is certainly a significant aspect of eCommerce business. It is your responsibility to make sure that no customer should ever feel insecure while making online payments. Thus, it is essential to include convenient payment options like cash on delivery, net banking, payment wallets, and credit or debit card payments. The best user experience always includes simple and secure payment methods. Support for these payment options will ensure credibility. If you wish to serve customers from various countries, then it requires you to integrate multiple currency payment options to ease your foreign customers. Here I would like to mention how the “Cash on Delivery” method dramatically changed the eCommerce ecosystem in India
Step 10: Effective Return and Exchange Policy
Since you’re running an eCommerce website so the chances that you will face many cases return and exchange of items. Nowadays with huge competition in the market, you have to have a good exchange and return policy to stay in business and ahead in this race. You should employ easy exchange and return policies so that your customers will never have trouble if they ever want to change or replace or maybe return the product. Give your users extra peace of mind.
Step 11: Offers, Sales, and Coupons
This is interesting. Well, at least for the customers. Everyone likes offers, sales, and coupons, you being the owner of an eCommerce website need to keep this in mind to introduce various offers and sales time to time and keep up the excitement. And also if you get lucky enough to collect plenty of email addresses of your valuable customers then you can send them discount coupons via email as well. Not only existing customers but sales and offers can get you more organic visitors as well. So keep tracing customer’s browsing habits, purchase patterns, and other user reactions to refine your offerings accordingly.

TRECHNOLOGIES REQUIRED TO BUILD AN ECOMMERCE WEBSITE
Over the last many years, ecommerce has changed how people buy and sell online. The Internet offers a quick and easy way for people to buy things without having to visit a real store. An online store can reach customers anywhere in the world. Online businesses are rapidly developing an ecommerce website to face times of economic adversity by offering greater discounts, flat-rate delivery, loyalty programs, and other incentives.  There are many popular ecommerce platforms that make it easy to run promotions and keep your customers happy. Finally, although the boom in online sales has also opened a potential avenue for fraud and scams, site-builders have managed to stay ahead by offering top-of-the-line site protection and payment security to keep the online marketplace as safe as possible.
Building a successful ecommerce site has become one of the most popular business trends. It may seem like a herculean task to set up an online business (not underestimating it either) or the actual e-commerce website development, but in real it isn’t that big of a hurdle as you’ve probably been hearing from most of the folks out there.

THE HARDWARE
Computer
Most current computers and laptops have high enough specifications to be used to create a website. The most important specification to check on the computer would be the size of the RAM, which should be over 2GB, though more is better. This will ensure that the computer runs quickly and smoothly, even with heavier programs such as website editors or photo editors. The computer should have a keyboard and mouse attached and working as well.
Internet
In order to create a website, access to a high-speed Internet connection can be vital. This allows you to transfer the files that will make up your website to the online server that will be hosting your website, post updates on your website and look at your website live online to make sure that it is displaying correctly.
External Hard Drive or DVDs for Backup
You should always keep a fairly current backup of your website in case there is an issue where the site crashes or files become corrupted. You can keep this backup on an external hard drive or a set of DVDs, depending on your preference. It is possible for an external hard drive to crash, losing your backup, but DVDs can be more unwieldy and can also scratch causing data loss. How often you should create a backup depends on how often you update your website, but once a month for a regularly-updated site can be a good amount of time.
Camera
Unless your website is going to consist only of text, you will want to have a way to get some digital photos and videos for your website. While you can buy stock photos and videos, these can end up being expensive if you need many of them, and they may not be as specific as the shots you need. A digital camera with video capability will allow you to take photos and videos that can be downloaded to your computer and added to your website. Because you took the photos and shot the videos yourself, you don't need to worry about copyright infringement of other people's media.
Server
You will need a server computer to host your website on to make sure that it is available all the time for anyone trying to access it. While you can set up a computer to act as a web server, this is a highly complicated task, and it is far easier, more reliable and cost-effective to simply purchase a hosting package from a web hosting company. They will keep and maintain the server computer, and you will be able to access it to change files on your website.
Mobile Devices
While not necessary, many free website creation softwares allow users to adjust, update and work on their website from a mobile device. If you are on the go often and would like to be able to make adjustments to your site from wherever you are at, you may want to look into getting a web-enabled smartphone or device.
THE SOFTWARE

Doing online business means trades of goods from your Webstore to the customer, and trade means transactions. The idea of creating an online store raises few questions in everyone’s mind like ‘how’ and ‘who’ can build my e-commerce store? On what platforms can my ecommerce store be built? How can I find products to sell on my online store and how the transactions will be handled?
Like all business requires proper planning, discussion, backup plans, contingency plan, similarly before building any e-commerce store, you need proper planning about everything. Before starting, you need to think and list down all the possible aspects repercussions regarding online business.
Write your e-business plans. The e-commerce plans start with website goals. Who will be your targeted audience? What kind of products and services you want to offer. How much time and money you need to make your online presence. How will you handle shipping and payments?
Although there are many ecommerce and website hosting platforms, you must choose a perfect platform where your ecommerce store can be built.
It all seems difficult at first, but with every step, you will grasp things easily. A lot of the things which didn’t make sense at first would probably start resonating with time. Here’s a rundown of everything which requires opening an e-commerce store. Let’s get down to business:
The Process of E-commerce Website Development- Let’s Get Started!
There are many ecommerce tools and technologies required to build an e-commerce store and operate a successful online business. Both software and hardware technologies must be included in your e-business plan.
Web Server
A web server is used to host an e-commerce website. All the Html, JavaScript, PHP files, databases, media files that make up the entire website are stored on this server. The web server runs on Windows or Linux operating system. Managing a web server is a very specific job. The website development companies host the site on their own web server or pay a hosting company to provide space on a secure web server.
Server Software
When a user visits any website on a web browser, the web server knows the client is requesting some specific information. So it processes that request and serves the correct files to the client. The web browser then displays these files to the user.
There are many types of server software available including application software, database server, file server software, and cloud computing software. The popular web server software includes Apache and Windows IIS. Server software can either use on a physical server or on a virtual / cloud server.
Web Tools
A web authoring tool is used to create the front end of an e-commerce website. They range from basic HTML text editors (like Notepad++) to more complex graphic authoring tools and CMS (content management system) with built-in frameworks and debugging tools.
Html files are created by Dreamweaver along with the CSS (cascading style sheet) which enhance the visual appearance of the site. Another web authoring tool would be Visual Studio .net that can be used to make the sites which have integrated databases in it. Graphic design packages are also web authoring tools which design the skin for a user interface.
Database System
A database is an integral part of an e-commerce website. The database is used to store information about the products and services of the website such as pricing, description, image, details, and sales. In addition to this, the customer details are also stored in the database like what they ordered, their payment details, shipping details, and contact information.
It is necessary to program the website to connect securely to the database so that all the orders are processed correctly and your business runs smoothly. Technologies like PHP and MySQL are the communication route between the website and the DBMS (database management system).
Networking
TCP (transfer control protocol) and IP (internet protocol) defines as how computers should connect with each other through the internet and how they share information. Common TCP/IP protocols are HTTPS, HTTP, and FTP. We use these protocols to access the website without even realizing it. FTP (file transfer protocol) used to download files from a browser.
HTTPS (where the “S” stands for security) responsible for the secure communication between a server and a browser like an account information or personal information.
For an e-commerce website or online store, it is considered essential to provide a secure connection. SSL (secure sockets layer) and TLS (transport layer security) are the protocols associated with trust and security of any e-commerce website.
Browser Compatibility
A web browser is a software application that is used to locate, receive and display content received from the web servers. Popular web browsers include Mozilla Firefox, Google Chrome, Internet Explorer and Safari. Web developers and Web development agencies test the website see how it displays on multiple browsers across multiple devices and screen sizes before launching the website.
The Tip: To analyze website traffics, use tools like Google Analytics to get an idea as what browsers people are using and which one is the most popular.
Ports
Ports allow one device to connect with the other through a different and unique IP address. A device can have more than one port.
Port 25 (SMTP) is usually reserved for email. It is used to transmit data from remote email servers. If that port is blocked no emails can be sent. Some other common port numbers are 80(HTTP), 443 (HTTPS), 21 (FTP), 22 (SSH). Firewalls can often block a port to tighten the security.
Domain Names
Domain names link to a company or a brand. Successful e-commerce companies have recognizable domain names. If you have any smaller business then it is best to select the domain name as per your business name. This would help to rank highly in search engines.
If a business becomes successful online, it is important to protect the brand by doing multiple registrations of domain names such as .com, .net, .uk, .org, .co
Doing this ensures that no one can steal your business by copying your business model.
Here is a quick recap that will help you put everything into place.
1: Front End: HTML, CSS, JavaScript, Ajax, JQuery
2: Server Side Scripting: PHP, ASP
3: CMS: WordPress + Woo commerce, Magento, OpenCart, PrestaShop
4: Database: MySQL, MSSQL 
What is business development for ecommerce?
Business development is a relatively vague term with a purpose and responsibility that differs from company to company. While the definition has been infinitely discussed, the ultimate objective of business development is to find strategic opportunities that create long-term value.
Web Technologies for E-Commerce Web Development
Websites and apps have become crucial for businesses and organizations to showcase their services, goods, and brands. To this end, you need a website that is well designed with feature-rich apps. Modern ecommerce web technologies have acquired a status where it’s not mandatory for businesses to develop e-commerce websites or apps right from scratch.
Here are the ten latest web technologies for e-commerce web development that will help you make a practical decision.
Magento
Shopify
WooCommerce
BigCommerce
OpenCart
Drupal Commerce
Volusion
OsCommerce
SimpleCart
Squarespace
Magento
Till date, Magento is the most famous and reliable e-commerce platform when it comes to B2B & B2C customers. Magento is a powerful SEO friendly platform with multiple features that can be readily customized. Magento’s ability to integrate with third-party products & services makes it a favorite among the customer community.
Shopify
For an e-commerce website, Shopify is a very popular SEO compliant and constantly evolving web technology. Besides an impressive professionally designed template for your storefront, there are several add-ons with responsive checkout being one of them. Another excellent feature is that Bitcoins can be used by your customers to make payments.
WooCommerce
WooCommerce is undoubtedly an amazing choice for problem-free setups. It is a free e-commerce plugin that can integrate with WordPress enabling store owners to sell their products rapidly and easily. It is estimated that around 30 percent of online store owners rely on WooCommerce plugin not only to sell their products but also to ship them and collect payments.
BigCommerce
BigCommerce is quite popular because it has several new features and functions like built-in blogging, improved SEO and customer support round the clock. Its primary benefits are a user-friendly interface with a comprehensive knowledge base.
OpenCart
OpenCart is a practical and easy open source CMS endorsed by outstanding developers for e-commerce. Its features include several simple back-end plug-ins. You can edit CSS within the admin. But OpenCart’s support system is not very detailed compared to other systems.
Drupal Commerce
Drupal Commerce is an exceptional online content marketing platform for open-source content. It guarantees an excellent customer experience using the e-commerce website. It can easily incorporate SEO strategy and blog integration as it can integrate seamlessly with the Drupal CMS framework.
Volusion
Volusion is commonly used owing to several features, one of which is an easy-to-use interface. Although Volusion’s add-on shop is not as big as Shopify and a blog setup is not available, but account experts provide you with personalized services. Opposed to a responsive layout, the mobile site is used by Volusion stores.
OsCommerce
OsCommerce is one of the first open source systems available with a big support database and an active forum. Its prominence is due to its easy installation and user-friendly interface. Although some consumers consider OsCommerce’s design and software update to be a little outdated store owner have complete control over their store and database.
SimpleCart
SimpleCart is best suited to small online stores ‘ needs. It operates on HTML having a small footprint but supporting multiple currencies.
Squarespace
Squarespace enables you to design attractive websites with images and rich templates. With Squarespace, customers have complete control over inventories, product variants, coupon generation, and shipping setup. Squarespace inculcates all the essential tools to create a universal e-commerce store.
Ecommerce Technology Trends for 2019
Regardless of the maturity of your ecommerce presence, you need to keep looking ahead to guarantee future success. To raise your ecommerce efforts in 2019, you should benefit from these three evolving trends.
1. Sell your goods on social media
Effective marketing is about enhancing your messaging to appeal to your target audience, but messaging won’t matter if the audience never sees it. It’s important to meet your audience members where they spend most of their time. In other words, if your customer base is online, it’s on social media one-third of that time. Therefore, you’re missing a great opportunity if you are not selling on social media.
2. Remix the buyer’s reality
Although diverse reality technologies have yet to see conventional adoption, they have made huge efforts to that end. Just as the internet, augmented reality and virtual reality will be a total game changer for retail. While augmented reality might not be everywhere yet, ecommerce retailers that effectively integrate AR capabilities into the shopping experience tend to gain a substantial advantage over their competitors.
3. Increase Personalization and Customer Engagement
Compared to conventional retail shopping, ecommerce stores have virtually no personal interaction. Online stores have no personnel who can endorse products based on your interests, sensitivities, and predilections. To imitate this experience, ecommerce businesses influence personalization opportunities through the shopping drive. Just as online course providers are substituting the need for in-person teaching, ecommerce is swapping the need for in-store retail experiences.
Conclusion
There are multiple e-commerce tools and technologies. It’s always good to know what resources are actually required to build an ecommerce store from start-to-finish.  Professional ecommerce website design process is a documented outline of the steps needed to be taken from start to finish, which divides and categorizes the work and then breaks these high-level sections into tasks and resources. But once you have gone through the complete guide to the technologies needed for building an e-commerce site, things will become easier and systematic and will make your ecommerce development process smooth and fluid. While there’s been a lot of work on the growth and development of ecommerce, there are aspects of the technology that needs to be unearthed.
Do E-commerce Merchants and Online Stores Need In-House IT departments?
Hiring an in-house IT team takes a lot of time and money. And if your business is fairly new and is yet to reach Amazon’s or Walmart’s level of success, you can start by outsourcing the IT part.
Just imagine, you would have to advertise the vacancy, read through all the applications, conduct interviews, consult with your colleagues, hire people, train them… Also, there’s always the risk, that a newly put together team won’t work smoothly right away. Moreover, there will be a lot of turmoil with the salary, benefits, taxes, etc. And what do you do with all these people, when your e-commerce website is up and running, and only needs maintenance every now and then? You probably wouldn’t want to go through the trouble of letting all those people go. Not to mention how inconvenient this way is if you are planning one or two other projects in the distant future.
Outsourcing E-commerce Website Development: Yes or No?
It looks like we made our point. Outsourcing e-commerce website development does actually seem to be a good idea. Especially, if Qubit Labs provides you with a team of top-notch e-commerce website developers, and takes care of all the managerial issues for you. For example, the most common outsource tasks for e-commerce merchants and online store owners are:
Web Design
Search Engine Optimization
Content Writing
Accounting
Customer Service
Data Entry
Software Development
Quality Assurance
Depending on the nature of your business, you may need to outsource some other web development aspects too..
Be aware, though. There are still some risks when outsourcing e-commerce website development. Because of time-zone or cultural differences, communication issues may arise. Or you may find it difficult to supervise the team’s work. But don’t worry. We know how to avoid and overcome these obstacles and to start a smoothly running partnership with an outsourcing team. And we are ready to start one with you.
Outsourcing Website Development Is Indeed Easy
Of course, it is only up to you to decide, whether outsourcing e-commerce website development is a good idea for your business right now. Your final word depends on your business’ current needs and finances. But of you are still in doubt, remember: outsourcing website development is not as difficult, as you may think! 

Risks: In-House vs. Outsourcing

On both sides of the fence, you’ve got some basic risks. First, if you’re not a tech pro, there’s a risk in trusting folks who claim to be pros. Then you’ve got the risk of hiring viable talent, managing employees, and employee turnover. Most importantly, there’s the risk of the overall success of your product. As with most things in business, there are advantages and disadvantages to both options.
Let’s take a look at the main risks associated with in-house developers first.

Risks With Hiring In-House Developers

When you employ a group of in-house developers, you acquire all of the risk in terms of their abilities. So the most obvious question is…
…do you even know how to hire tech talent?
That’s pretty much a prerequisite to hiring in-house. If you don’t, you will need help from someone who does or you’ll be taking a huge risk in that you’ll recognize the right talent when you see it.
Do you know what skill sets are needed?
Having access to a pool of pros, with current and evolving skill sets, will undoubtedly help your company thrive. But what skill sets are required to build the product and manage it to completion and execute after launch? How many resources are needed to develop native apps or engineer relevant software? Which alternatives will deliver the skill sets to provide the level of services you will need — both now and in the future?
During the 1990’s, plenty of forward-thinking companies managed to stay fairly relevant by staffing one or two IT professionals. And when those guys weren’t playing Minesweeper, they were successfully staying ahead of the tech curve. Today, it takes an IT village to raise up an online and mobile success that meets the needs of the masses.
The typical resources required, to develop a successful app business include:
·        iOS developer
·        Android developer
·        Back-end developer (server-side)
·        Interactive designer
·        Front-end (web) developer
·        Project manager
·        Product manager (this could be you, could be someone else on your team)
·        Business analyst (you’re building a business here, not just an app)
·        App store optimization (ASO) expert
·        App marketing expert (could also be an ASO expert)
·        and quite possibly a data scientist
Unless you’re picking from the clearance aisle, these folks ain’t cheap. You might think there’s no way you’ll need all of these people but we’ve rarely seen (less than 1%) a successful app business without all of these disciplines involved.
https://miro.medium.com/freeze/max/60/0*zI9Vrv21l7Db_nAF.gif?q=20
https://miro.medium.com/max/750/0*zI9Vrv21l7Db_nAF.gif
Assuming you’ve got some candidates, you’ll be responsible for training, planning, ongoing product evaluation, feedback loops, re-development — everything. And, as you might guess, managing a team of tech gurus isn’t the easiest task — particularly if you’re not proficient in the IT field.
Turnover is another risk you can’t ignore.
According to PayScale, the tech field has the lowest average tenure rate of any other field. When using in-house talent, be aware that another tech company may come calling — and one of your, previously loyal, app developers might jump ship. With an in-house IT operation, you accept the likely risk of attrition. Onboarding another tech genius can put your entire project on hold — threatening the viability of a live product.
https://miro.medium.com/max/60/0*jhOo1_3I60yDupA4.png?q=20
https://miro.medium.com/max/713/0*jhOo1_3I60yDupA4.png
As for the overall success of the product, the risk does fall entirely on you and of course the team you hire — assuming you hired the right team.

Risks with Outsourcing your Development

When choosing to hire an outside development firm your main risks include:
·        the firm going out of business
·        not being able to deliver the right product
·        they take your money and disappear
·        it ends up costing you way more than anticipated
In other words…
…your risk is in hiring the right firm, with the right people, with the right process.
Therefor, you have to know what you’re looking for and what questions to ask to ensure you hire the right firm.
·        Is it a start-up dev shop?
·        Does the firm have grievous complaints with the Better Business Bureau or horrible Yelp! reviews?
·        Was the group unable or unwilling to provide you with a recent portfolio?
·        Have they built similar apps or similar components to yours?
·        How is the quality of their work?
·        Will they help you build the business or just the product?
·        Did they only provide you with a one-page bid?
If you’re considering a tech firm, and you don’t get the right answer to any of these questions, there’s a plausible risk that ‘Shady Eddie’s App Developers’ may not be in business very long.
When it comes to outsourcing software development, app creation, or web development — choose an established firm, that has a top-notch reputation and understands the business of software. Then you won’t be stuck, trying to breathe life into a partially complete software project, when a fly-by-night tech firm fails to deliver.

Advantages: in-house vs outsourcing

We’ve scared you with risks but what about the advantages? Surely there are distinct advantages to each option. Yes, you are correct. Let’s review them…

Advantages to an In-House Team

Once you’ve established your in-house crew, you’ve got them in the palm of your hand. You’re the boss. However laborsome it may be to attain, develop, and manage IT talent, having some seasoned pros in your home court, is one sizable advantage to an in-house operation.
This means you have a greater ability to create a culture around your product and your business. A team that is only focused on one product, one mission, all in alignment toward a common goal.
Although a good development firm will keep you continuously involved in the process, when your team in in-house, you have full ownership and control over every aspect of the product as well as the knowledge gained while developing it. So you are aware of every detail, every bit of progress made, and every set back along the way. You don’t have to trust that delivery dates will be hit as you will know if your team will make them or miss them. This generally gives you greater visibility into the progress.

Advantages to Outsourcing your development

The most coveted advantage to outsourcing software development is, by far, the availability and scalability of the powerhouse skills concentrated in a proven tech development firm. The skills that can provide business acumen, data science, design, programming, and ongoing enhancements of the product and business, represent the immense value of outsourcing an experienced third party and trusting them to nurture your baby.
With an outside firm, you’re not carrying the skill risk.
A proven tech firm will have more than enough talent to understand and execute your project well. And the experts on staff will be available to you, as needed. It isn’t a question of “Who do I hire to help my company progress into the IoT market?” Instead, you reach out to the tech firm, and it will put the right person on the job. You pay the firm to do the heavy lifting and to take on the resource risks.
Provided you’re with a solid tech firm, the risk of your overall product delivery is minimal. A proven development company will assume the risk of the development and production of your project. They’ll keep you at the helm from pre-planning to launch. Then, they’ll make ongoing resources available to ensure your redevelopment needs are covered.
Turnover of employees is also a risk you won’t absorb. In the event of turnover, a good tech development firm will keep you informed of its intentions and work quickly to make things right. But a great tech development firm will have redundancies in place to ensure there is no hiccup in the production, development, or retooling of your project. If you’re working with the right outsourcing group, turnover and employee development is rarely something you’ll have to consider.
Successful apps take much more than good software development.
https://miro.medium.com/max/58/0*wM-2O2IsVIohFY4Y.png?q=20
https://miro.medium.com/max/876/0*wM-2O2IsVIohFY4Y.png
An app development company, that’s worth its weight, will understand that and have the process and skills necessary and work to ensure the long-term sustainability of your product.

Cost: In-House vs. Outsourcing

A steep bottom line exists on both sides of the scale. How much will it really cost for your company to hire a firm to develop your software or app vs. in-house IT staffers for the project? How much, in total, should you expect to shell out for quality web development or the creation of your first native app? What are the true costs of hiring in-house?
Let’s find out…

The Cost of Hiring In-House Developers

A good developer is well worth his or her salary. But, as we’ve covered, you’ll need more than just one good worker. Hopefully, with a few posts on craigslist, you’ll find all of the necessary talent to handle the resource needs of your company. Then take a look at the chart below to review average annual salaries of the IT professionals you’ll need for quality web development (2016 average salaries, courtesy of glassdoor.com).
Average Tech SalariesTitleSalaryiOS Developer$85,000Android Developer$84,562Back-End Developer$116,808Designer$67,281Project Manager$91,440Data Scientist$91,440
When you add up the average salaries, for each player on the team, you’re looking at more than $500,000 per year. It’s true that some groups may be able get by with a bare-bones operation (no designer, the project manager is your mom, and you skip the data scientist). If you bypass the sparkle and settle for a minor-league app development crew, it’ll put you in the ballpark of around $300,000 per year for salaries alone. Neither equation takes into account equipment, personnel management, licensure, or office space — that’ll be another chunk of change.
https://miro.medium.com/max/60/0*l4dB4Zd1rrHKarnx.png?q=20
https://miro.medium.com/max/831/0*l4dB4Zd1rrHKarnx.png
Just looking for employees of this caliber isn’t always cheap. If you don’t find the right people on the free job sites, expect to pay one of the larger, more well known, employment sites to post job ads. Or, take the traditional route, and hire an IT recruiter. Add in a signing bonus, monthly health insurance, dental insurance, paid holidays and sick days, worker’s comp insurance, payroll taxes, continuing education and training. Hiring a talented, in-house tech operation is costly. And it isn’t finite.
https://miro.medium.com/max/34/0*niDoicSvfA53OHwL.jpg?q=20
https://miro.medium.com/max/375/0*niDoicSvfA53OHwL.jpg
Once you’ve hired and groomed the IT Dream Team, it may be troublesome to scale-down your workforce, when your needs aren’t as intense as they were during launch week. IT pros are people too — not just software developers. They have families to feed and they generally aren’t looking for temporary work. By staffing in-house developers, you’re electing to incur all of the overhead all of the time, with no guarantee of product success.

The Cost of Outsourcing Your Development

Trusting a tech firm and signing on the dotted line can raise the blood pressure, for sure. Outsourcing may be a lot less expensive than owning an IT department, but it it’s still a huge investment. And if you hired the wrong firm in the past and have been taken for a ride by an IT group who has promised big and come up short, you may have a bad taste in your mouth.
While there are many poorly run dev shops out there, the reality is a good solid firm will be worth every penny you spend with them. You will get years of knowledge and expertise that you simply won’t have and can’t afford to bring in-house in the early stages of your company.
But what will it cost to hire a development firm?
A typical development firm will charge an hourly rate for the hours they estimate it to take their resources to build your product. They may have a couple different rates for different disciplines or skill levels depending on their model. They will add these numbers together, apply a buffer, and come out with a cost. Typical app development agency rates range from $100 — $250 per hour.
App costs vary greatly depending on the size of the development firm and, of course, the complexity of your project.
·        Large firms: $250,000 — $1,000,000+
·        Medium firms: $150,000 — $450,000
·        Small firms: $50,000 — $150,000
According to the report by Kinvey, on average, organizations spend around $270k to develop an app.
https://miro.medium.com/max/60/0*Vu9mymwWlK1PAAOe.png?q=20
https://miro.medium.com/max/1280/0*Vu9mymwWlK1PAAOe.png

Final Considerations

There are plenty of companies that really don’t need to outsource their technology needs. They can cash-flow an in-house IT department with ease and they have enough expertise and technology related work to justify paying an IT crew, annually.
For other companies, there may not be a need to hire, train, develop and, direct an in-house, IT department. For those businesses, and in particular, startups, a reliable and experienced third party is an undeniable asset. Businesses who want to swim with the big fish in the evolving rapids of technological change have to find solutions that fit their budgets and their true business needs.
If you’re a startup, it may make a ton of sense to hire and leverage the collective expertise of an outside firm to get your business on the right path and to allow you to focus on other areas of the business. Then, as you grow, you slowly hire in-house talent and take your development in-house.
At the end of the day, you’re developing a business not just an app. Keep reminding yourself of that. In the early stages you should make every effort to minimize your risks while maximizing your opportunity. If this means hiring an experienced, business-minded firm then find the best one you can afford. If this means recruiting and hiring an in-house team, then make sure you know how to hire the right people, make sure you know your costs, and follow that path. Weigh your risks and make an educated decision that’s right for your new business.



Hacking;-
Hacking is gaining access to unauthorised systems and resources. This allows the hacker to change details on the website and enable it to sound as if the website owner had done this. When a website has been hacked, the e-commerce will be forced to shut down the website until the details have been changed and security updated. This will then affect their customers as this will then prevent them from using the website in which could cause inconvenience for example, checking flight times. If this was to happen often, customers will then begin to give up on the website and take their searches elsewhere leaving the e-commerce with a loss of customers and therefore losing money. If this was to happen, this would then begin to affect the e-commerce supplier as they will no longer use the website for their searches and therefore promotion would become a waste of money and so they will eventually run out of business being forced to shut down. For good this time.  In order to prevent this, the website should keep their security updated at all times and possibly change their access password often to avoid any knowledge of the password getting out and keep the amount of people that know this as low as possible.
Viruses;-
Viruses are a software that is designed to specifically damage a computer. Spreading from program to program and software to software. If a virus has been planted into a website this will cause some problems and complaints from their customers as whenever they enter the website, the virus will then hop onto their computer causing damage to the computer. Once this happens the customers will then complain and will then refuse to use the website again and warn off other potential customers. The e-commerce will then begin to lose customers and then money. Without money the e-commerce can then no longer advertise and so will eventually be forgotten and then out of business. In order to prevent this, the e-commerce website should be sure to download an anti-virus program in order to protect their customers and their business.
Identity Theft;-
Identity theft is when a person gets hold of another person’s details and use them as their own to do what they want, claiming to be that person. On websites such as banking websites this can be a potential problem if not kept secure enough. If a customer’s identity is stolen, the thief could then use their bank details to claim their money or use it to buy what they want and claim to be that person and so claim the money as theirs. If this was to happen the customer would be forced to shut down their bank completely when realised and will most likely decide to change banking companies and this will then reflect badly on the e-commerce reputation. This could then lead to the bank company getting in a lot of trouble for the lack of security breach placed on their website, causing extra stress and devastation among their customers. They may then be forced to close the website down whilst they update security which will then cause inconvenience and the company will then gain a very bad reputation and new users will then choose other companies and depending on the circumstances some existing customers could switch. To prevent this from happening, the website should be sure to update their security, changing security questions and passwords often.

Firewall;-
A firewall can be hardware and software. It is a security system that controls what goes in and out of a system. It is designed to stop any unauthorised access from using a private network. Firewall is necessary because it can help to prevent any unwanted internet users from using the private networks which are connected to the internet.  Firewalls can slow down the server speed as firewalls are designed to check for any potential danger and decide whether it is safe or not before giving you access to the page. Due to the fact that firewalls can slow down your server this can then slow down an e-commerce website meaning that it may take a little extra time for your customers to gain access to the page. This could go in two directions. The customer could be impatient and decide not to use the website because of the speed to gain access to it or could gain more customer trust, putting their mind at rest that they are safe from any potential danger. Firewalls will keep the website safe and secure meaning that e-commerce supplier can relax a little bit knowing their website is safe and therefore their customers are safe.
Strong Passwords;-
Strong passwords are essential to a website. Keeping strong passwords can prevent hacking. A strong password will consist of random words that have no relation to you or anyone else and including lots of random numbers which will be impossible to just guess. When you have a customer signing up to your website, you should be sure to ensure they have strong passwords before access. This will help to prevent them from hacking and identity theft meaning the customer can then roam the website safe and secure. Not only customers but for the e-commerce supplier themselves as this will keep hackers out of their websites where they can then then prevent viruses and identity theft and vandalism on their website meaning both them and their customers are safe.
Alternative;-
A basic authentication method is when you try to hit a url for a web application that is protected and you are unauthorised, there will be a window which pops up which will request your username and password which is then sent to the website to check up on as to whether it is correct or not. If the password and username match you will then be authorised and have access and if not then you will be denied access.
Examples of alternative methods are;

Face Recognition : Face recognition would allow the computer to scan your face and remember it so that only you can access the website or computer as it only recognises your face and no body else’s.
Fingerprint : Everybody’s fingerprints are different. Using a finger scanner will allow only the selected people with their installed finger prints access. It will scan your finger every time you want access.
Eyries Recognition : Using eyries recognition is also another safe bet as it goes by your eyes. This means that only you with your eyes can access the computer or website.
These methods are the most safe, but also the hardest. You have to make sure to be exact when using these other options. For face recognition you have to be sure to keep the same emotion of your face when logging in. For the fingerprint, you must keep your finger in the same angle and also the same finger. You cannot change the finger every time. Finally eyries recognition. When you are wearing glasses or contacts these can interfere with the machine so you must be sure to keep them the same. Try not to change contacts.
SSL;-
SSL is short for Security Socket Layer. It is a type of protocol that is used to transmit private documents using the internet. SSL uses a cryptographic system in which uses two keys to encrypt data; a private key and a public key. There are layers on a server that SSL has to go through before reaching the requested data. The first layer is the outer layer. This is where the high level protocols make bay such as HTTP. Depending on the clients request is how it is decided which outer layer is used. The outer layer high protocols then process the request through the SSL. If the client requests a non-secure connection then it passes through the TCP/IP layer and the server application or data. If the client requests a secure connection the SSL layer initiates the secure connection to process to begin. 
HTTPS;-
HTTPS is short for Hypertext Transfer Protocol Secure. HTTPS is used to determine how a message is formatted, how it is transmitted and what precautions web servers and browsers should take. HTTPS is a request response protocol which means for example a Web browser initiates a request to a server, typically by opening a TCP/IP connection then the request itself comprises
         a request line,
         a set of request headers, and
          an entity.
The server sends a response that comprises
         a status line,
         a set of response headers, and


RSA Certificates;-
This is short for Ron Rivest, Adi Shamir and Leonard Adleman. The RSA certificate is a professional program that offers professionals in technology the knowledge, skills and credentials that enables them to keep up with security systems within an enterprise. Certificates are basically just an implementation of digital signatures. One certificate is used to sign the data using a private key, and a corresponding verification certificate is given to the user along with the signature and the data. The user uses the verification certificate to verify that the file matches its signature.
Unit II
Security and Encryption
Need for Security and Encryption in Ecommerce
Security is an essential part of any transaction that takes place over the internet. Customers will lose his/her faith in e-business if its security is compromised. Following are the essential requirements for safe e-payments/transactions −
Confidentiality − Information should not be accessible to an unauthorized person. It should not be intercepted during the transmission.
Integrity − Information should not be altered during its transmission over the network.
We all have the one common question, whether we have received the same data that the sender has sent. Now it is the duty for integrity for the correctness of the information that has been transmitted or received or displayed on a website over the internet. 
Integrity can ensure that information on the internet has not been altered in any way by an unauthorized party. It maintains the consistency, accuracy, and trustworthiness of the information over its entire life cycle. 
Customer perspective on integrity: Is the information I have transmitted or received is altered? 
Merchant perspective on integrity: Is the information present on the website is altered without an authorization? Is the information received from the customer is valid or not? 
Example: The most common threat will be “would any unauthorized person will intercept and redirect payment into a different account” since ecommerce sites prefer online transfer mostly. 
Let us consider a subscription model, where you will give credit card details for a bill payment to the merchant. If someone added extra cost on your credit card bill without both yours or merchant’s knowledge, then you need to pay extra money for something you haven't purchased.

Availability − Information should be available wherever and whenever required within a time limit specified.

Continuous availability of the data is the key to provide a better customer experience in ecommerce. The continuous availability of the ecommerce website increases online visibility, search engine rankings, and site traffic. Data which is present on the website must be secured and available 24x7x 365 for the customer without downtime. If it is not, it will be difficult to gain a competitive edge and survive in the digital world. 
Customer perspective: Can I access the site at any time from anywhere? 
Merchant perspective: Whether my site is operating without any downtime? 
Example: An ecommerce website can be flooded with useless traffic that causes to shut down your site, making impossible for the user to access the site. 
Authenticity − There should be a mechanism to authenticate a user before giving him/her an access to the required information.
In ecommerce, since both the customer and seller need to trust each other, they must remain as who they are in real. Both the seller and buyer must provide proof of their original identity so that the ecommerce transaction can happen securely between them.  
Every ecommerce site uses authenticity as a tool to ensure the identity of the person over the internet. In ecommerce, fraudulent identity and authentication are also possible, which makes identity a difficult process. Some common ways to ensure a person's identity are customer log in using a password. 
Customer perspective: Who am I dealing with? Who can I assure the person I am dealing with is who they claim to be? 
Merchant perspective: Is the customer that I am communicating are a real person? If not, what could be their identity? 
Example: Some users can use a fake email address to access any of the ecommerce services. 
Non-Repudiability − It is the protection against the denial of order or denial of payment. Once a sender sends a message, the sender should not be able to deny sending the message. Similarly, the recipient of message should not be able to deny the receipt.
Good business depends on both buyers and sellers. They must not deny any facts or rules once they accept that there should not be any repudiation. 
Non-repudiation confirms whether the information sent between the two parties was received or not. It ensures that the purchase cannot be denied by the person who completed the transaction. In other words, it’s an assurance that anyone cannot deny the validity of transaction.  
Mostly non-repudiation uses a digital signature for online transactions because no one can deny the authenticity of their signature on a document. 
Customer perspective: Can a party take action on me if I have denied the action? 
Merchant perspective: It’s possible for a customer to deny a product after ordering it. 
Example: When a merchant doesn’t have enough proof of customers who have ordered with them during a credit card payment transaction, it will not be processed further to the merchant. 
Sometimes customers claim that they haven't ordered the product from a particular merchant if they disliked the product later. 

Encryption − Information should be encrypted and decrypted only by an authorized user.
Auditability − Data should be recorded in such a way that it can be audited for integrity requirements.
Confidentiality 
Confidentiality refers to protecting information from being accessed by an unauthorized person on the internet. In other words, only the people who are authorized can gain access to view or modify or use the sensitive data of any customer or merchants. 
According to Juniper Research, nearly 146 billion records will be exposed by criminal data breaches between 2018 and 2023. 
One confidentiality breach will be sniffing. It's a program that steals all the important files of the company, individual identity or email message or personal report of the internet user. 
Customer perspective: Can someone other than the intended recipient or a person read my message? 
Merchant perspective: Whether information on my site can be accessed by the unauthorized person without knowledge? 
Example: Ecommerce uses a user name and password to login to their account. Let’s consider this case for resetting the password, where an ecommerce site sends a one-time password to their customer in email or phone number if someone else reads it. 
Privacy 
Where confidentiality is a concern about the information present during communication, privacy is concerned with personal details. In general, privacy is used to control the usage of information by the customers that they have given to the merchant. 
According to Fortune, 1.16 billion email address and passwords are exposed in 2019 through security breaches. 
Privacy is a major threat to any online transaction or internet user since personal information has been revealed and there is no way back to disclose them. 
Customer perspective: Can I control the usage of information about myself that I have transmitted to the ecommerce site?  
Merchant perspective: What if anyone else uses personal data collected as part of the ecommerce transaction? Is there any unauthorized person to access a customer’s personal data? 
Example: If a hacker breaks into the ecommerce site, they can gain access to the customer credit card details or any other customer information. This also violates information confidentiality and personal privacy. 

Measures to ensure Security
Major security measures are following −
Encryption − It is a very effective and practical way to safeguard the data being transmitted over the network. Sender of the information encrypts the data using a secret code and only the specified receiver can decrypt the data using the same or a different secret code.
Digital Signature − Digital signature ensures the authenticity of the information. A digital signature is an e-signature authenticated through encryption and password.
Security Certificates − Security certificate is a unique digital id used to verify the identity of an individual website or user.
Security Protocols in Internet
We will discuss here some of the popular protocols used over the internet to ensure secured online transactions.
Secure Socket Layer (SSL)
It is the most commonly used protocol and is widely used across the industry. It meets following security requirements −
Authentication
Encryption
Integrity
Non-reputability
"https://" is to be used for HTTP urls with SSL, where as "http:/" is to be used for HTTP urls without SSL.
Secure Hypertext Transfer Protocol (SHTTP)
SHTTP extends the HTTP internet protocol with public key encryption, authentication, and digital signature over the internet. Secure HTTP supports multiple security mechanism, providing security to the end-users. SHTTP works by negotiating encryption scheme types used between the client and the server.
Secure Electronic Transaction
It is a secure protocol developed by MasterCard and Visa in collaboration. Theoretically, it is the best security protocol. It has the following components −
Card Holder's Digital Wallet Software − Digital Wallet allows the card holder to make secure purchases online via point and click interface.
Merchant Software − This software helps merchants to communicate with potential customers and financial institutions in a secure manner.
Payment Gateway Server Software − Payment gateway provides automatic and standard payment process. It supports the process for merchant's certificate request.
Certificate Authority Software − This software is used by financial institutions to issue digital certificates to card holders and merchants, and to enable them to register their account agreements for secure electronic commerce.
THE ECOMMERCE SECURITY ENVIRONMENT
What is eCommerce Security?
eCommerce security refers to the principles which guide safe electronic transactions, allowing the buying and selling of goods and services through the Internet, but with protocols in place to provide safety for those involved. Successful business online depends on the customers’ trust that a company has eCommerce security basics in place.
Privacy
One of the most obvious eCommerce security basics is privacy, which in this situation means not sharing information with unauthorized parties. When you shop online, your personal details or account information should not be accessible to anyone except the seller you have chosen to share it with. Any disclosure of that information by the merchant would be a breach of confidentiality. The business is responsible to provide at least the minimum in encryption, virus protection, and a firewall so that bank details and credit card information remain private.
Integrity
A second concept which is crucial within secure eCommerce is the idea of integrity—that none of the information shared online by the customer will be altered in any way. This principle states that a secure transaction includes unchanged data—that the business is only using exactly what was entered into the Internet site by the buyer. Any tampering with information is breaking the confidence of the buyer in the security of the transaction and the integrity of the company in general.
Authentication
For eCommerce to take place, both seller and buyer have to be who they say they are. A business cannot sell unless it’s real, the products are real, and the sale will go through as described online. The buyer must also provide proof of identification so that the merchant can feel secure about the sale. In eCommerce, fraudulent identification and authentication are possible, and many businesses hire an expert to make sure these kinds of eCommerce security basics are in place. Common solutions include technological solutions—customer logins and passwords or additional credit card PINs.
Non-repudiation
Repudiation is denial, and good business depends on both buyers and sellers following through on the part of the transaction which originated with them—not denying those actions. Since eCommerce happens in cyberspace, usually without any live video, it can feel less safe and sure. The legal principle of non-repudiation adds another level of security by confirming that the information which was sent between parties was indeed received and that a purchase or email or signature cannot be denied by the person who completed the transaction.  
Customers who don’t feel transactions are secure won’t buy. Hesitation on the part of the buyer will destroy eCommerce potential. Any breach will cost a business in lost revenues and consumer trust. These eCommerce security basics can guide any business owner regarding safe online transaction protocol. 

E-commerce embodies several business transactions over utilising electronic systems. E-commerce website involves internal network which might interface with World Wide Web. E-commerce introduced external as well as internal risk to both business and website to which it connected. External threats to e-commerce website are raised from various sources involving electronic economic environment as well as risk related to the external internet. Internal threats come from staff, internal network, management and business processes. The most common risk is security-related issues that relate to the interface among the consumer transactions and network. Intruders pose a security threat to the network through DoS attack that can overwhelm site or theft of private financial information after gaining access to the internal system through vulnerabilities of an e-commerce website. Other security threats related to these websites are summarised as beneath:
Malicious code threats: These types of threats involve worms, viruses and Trojan horses.
  • Viruses are external threats and have the ability to corrupt files on the website after finding their direction in the internal network. They might be critical as they completely harm the computer system and disrupt normal operations of the computer.
  • Trojan horse is defined as programming code that performs destructive functions. They attack computers while downloading something.
Wi-Fi eavesdropping: It is one of the simplest ways in the e-commerce to steal private information. It is recognised as virtual listening of data that is shared across Wi-Fi network that is not encrypted. It occurs on personal and public computers as well.
Other threats: Certain other threats which are raised are data packet sniffing, port scanning and IP spoofing. An attacker can involve a sniffer to attack an information packet flow and scan unique data packs. Through IP spoofing, it becomes hard to trace the intruder. The target is here to modify the source address and provide it such a look that it must look as though it is derived from another computer.

Techniques to combat e-commerce threats

Encryption:
It is defined as a mechanism of converting normal information into an encoded content that cannot be read by others except the one who sends or receive this message.
Having digital certificates:
It is known as digital certificate being issued by a trustworthy third party company. An SSL certificate is essential because it gives a high authentication level to the website. The main function of this certificate is to secure an e-commerce website from unintended attacks like Man-in-middle attacks.

Risk of social media marketing

Time intensive:
It is time-consuming and laborious to maintain interactive social media presence. There is need to monitor every social network, respond to queries and post valuable updates.
Negative feedback:
The users of social media have the freedom to post whatever they desire. Sometimes, an unhappy customer leaves angry rants related to your business. Moreover, some of the negative feedback comes from the disgruntled employees of the company that makes the complete business look bad.
Potential for embarrassment:
It is simple to get caught up in social media and post anything that comes to mind, having a huge impact on any business.

THREATS IN ECOMMERCE
The world today is coming closer. From communicating with one person sitting at the other end of the world to finalizing business deals, everything has become fast and quick. The reason for this is the massive internet boom which has made life easier for the average person by providing a plethora of options. What’s more, it has also made your shopping experience a more interesting and enjoyable one. You can now get practically everything from online shopping.

The E-commerce splash

This boom we would call as the ‘e-commerce’ boom. It has been a total game changer of sorts for shopping to the people. The consumer can now do more personalized shopping with a hoard of options available. The whole shopping experience has become very convenient. The thing with e-commerce is that it is not just maximizing but also changing. Today the consumer faces a maze of different online choices which were not available or even imaginable some years ago.
However, it has also led to a proliferation of cyber-attacks and online threats. One of the main reasons is the inadequate technical built up and proper protection of the systems. Poor security and very high levels of vulnerability in the arrangements is also one of the main reasons for the cyber-attacks.

What is e-commerce security?

E-commerce security is protection the various e-commerce assets from unauthorized access, its use, or modification.

What is an e-commerce threat?

In simple words, you can say that using the internet for unfair means with an intention of stealing, fraud and security breach.
There are various types of e-commerce threats. Some are accidental, some are purposeful, and some of them are due to human error. The most common security threats are phishing attacks, money thefts, data misuse, hacking, credit card frauds, and unprotected services.
Inaccurate management-One of the main reason for e-commerce threats is poor management. When security is not up to the mark, it poses a very dangerous threat to the networks and systems. Also, security threats occur when there are no proper budgets are allocated for the purchase of anti-virus software licenses.
Price Manipulation-Modern e-commerce systems often face price manipulation problems. These systems are fully automated; right from the first visit to the final payment getaway. Stealing is the most common intention of price manipulation. It allows an intruder to slide or install a lower price into the URL and get away with all the data.
Snowshoe Spam-Now spam is something which is very common. Almost each one of us deals with spam emails in our mailbox. The spam messages problem has never been actually solved, but now it is turning out to be a not so general issue. The reason for this is the very nature of a spam message. Spam is something which is sent by one person, but unfortunately, new development is taking place in the cyber world. It is called as snowshoe spam. Unlike regular spam it is not sent from one computer but is sent from many users. In such a case it becomes difficult for the anti-spam software to protect the spam messages.
Malicious code threats-These code threats typically involve viruses, worms, Trojan horses.
  • Viruses are normally external threats and can corrupt the files on the website if they find their way in the internal network. They can be very dangerous as they destroy the computer systems completely and can damage the normal working of the computer. A virus always needs a host as they cannot spread by themselves.
  • Worms are very much different and are more serious than viruses. It places itself directly through the internet. It can infect millions of computers in a matter of just a few hours.
  • A Trojan horse is a programming code which can perform destructive functions. They normally attack your computer when you download something. So always check the source of the downloaded file.
Hacktivism-The full form of Hacktivism is hacking activism. At first, it may seem like you should hardly be aware of this cyber threat. After all, it is a problem not directly related to you. Why should you be bothered at all? However, that’s not the case. Firstly hacktivists do not target directly to those associated only with politics. It can also be a socially motivated purpose. It is typically using social media platforms to bring to light social issues. It can also include flooding an email address with so much traffic that it temporarily shuts down.
Wi-Fi Eavesdropping-It is also one of the easiest ways in e-commerce to steal personal data. It is like a “virtual listening” of information which is shared over a Wi-Fi network which is not encrypted. It can happen on the public as well as on personal computers.
Other threats-Some other threats which include are data packet sniffing, IP spoofing, and port scanning. Data packet sniffing is also normally called as sniffers. An intruder can use a sniffer to attack a data packet flow and scan individual data packs. With IP spoofing it is very difficult to track the attacker. The purpose here is to change the source address and give it such a look that it should look as though it originated from another computer.

Ways to combat e-commerce threats

Developing a thorough implementation plan is the first step to minimize a cyber threat.
Encryption-It is the process of converting a normal text into an encoded text which cannot be read by anyone except by the one who sends or receives the message.

Having digital certificates

It is a digital certificate which is issued by a reliable third party company. A digital certificate contains the following things the name of the company (Only in EV SSL Certificate), the most important digital certificate serial number, expiry date and date of issue. An EV SSL Certificate is necessary which provides a high level of authentication to your website. The very function of this kind of certificate is to exclusively protect an e-commerce website from unwanted attacks such as Man-In_middle Attack.  Also, there are different Types of SSL Certificates available (such as Wildcard SSL, SAN, SGC, Exchange Server certificate, etc.) which you can choose according to the need of your website.
Perform a security audit-a routine examination of the security procedures of the firm.




Comments

Popular posts from this blog

Work certified and uncertified

factors influencing choice of advertising agency

Environment of International Marketing