SlideShare une entreprise Scribd logo
1  sur  9
INTRODUCTION
In the late 1970s, technology such as Electronic Data Interchange (EDI) and Electronic
Funds Transfer (EFT) were used for doing commercial transactions electronically. Now
businesses could send commercial documents like purchase orders or invoices
electronically.
The growth and acceptance of credit cards, automated teller machines (ATM) and
telephone banking in the 1980s was another form of electronic commerce.
In 1990, the World Wide Web was invented by Tim Berners-Lee. By the end of 2000 many
companies in America were offering their business services through the internet.
DEFINATION
A fairly broad definition of Electronic Commerce is given below:
“Electronic commerce is the process of doing business electronically. It involves the
automation of a variety of business-to-business-to-consumer transactions through reliable
and secure connections.”
FEATURES
Ubiquity
Ubiquity means found everywhere. E-commerce is available just about everywhere. With
E-commerce it is possible to shop from desktop, at office, at home, even when you are
travelling. There is no need to visit the physical market place.
Universal Standards
One unusual feature of E-commerce technologies is that the technical standards of the
Internet are universal standards- they are shared by all nations around the world.
Richness
It refers to richness in providing information to the consumer. Information about a
product is provided to the consumer by using Audio/Video.
Interactivity
E-commerce allows two way communications between merchant and consumer.
Communication can be with E-mail or on line chatting etc.
InformationDensity
Internet is making information more useful and important than ever. Information
becomes more plentiful, less expensive and of higher quality.
ADVANTAGES
1. Reduced cost to buyers.
2. Reduced errors as orders are processed electronically.
3. Reduced cost to the traders as the orders are obtained online.
4. Reduced time per transaction.
5. New markets are easily created even in remote areas.
6. Better quality achieved due to product standardization.
7. Optimization of resource utilization.
8. Lower inventory costs to the traders.
9. Lower advertising costs.
10. Equal oppurtinity for big and small merchants.
LIMITATIONS
1. E-commerce as being new technology, one has to be aware of how to use it in the
business.
2. E-commerce suffers from Security, Authenticity, Reliability and Accessibility.
3. E-commerce also suffers from bandwidth restrictions therefore sometime it is
difficult to use.
TYPES
Traditional forms of commerce have been in existence for decades and will
Continue to do so. However due to the various advantages of E—Commerce
listed in the previous chapter, the trend to use E-Commerce has been
increasing and is bound to continue to do so. There are different types of E-
Commerce and this distinction is by the nature of the relationship i.e. the
parties involved in the buying and selling.
The types of E-Commerce are
1. Business - to - Consumer (B2C)
2. Business - to - Business (B2B)
3. Consumer - to - Consumer (C2C),
4. Peer - to - Peer (P2P)
Business-to-Consumer (B2C)
It is a form of electronic commerce in which products or services are sold from a firm
directly to consumers. Example: amazon.com.
Business-to-business(B2B)
It is a form of electronic commerce in which products or services are sold from a firm
to another firm. It is performed in much higher volumes than B2C. Example:
shop2gether.com.
Consumer-to-Consumer(C2C)
It is a form of electronic commerce in which products or services are sold from one
consumer to another consumer with the help of online market such as the auction site
eBay. Example: ebay.com.
Peer-to-Peer (P2P)
It is a form of electronic commerce in which user can share files and computer
resources directly without having to go through a central Web server. Example:
BitTorrent.com.
REVENUE MODELS
Advertising Revenue
A Web site that offers its users contents, services, and/or products also provides a
forum for advertisements and receives fees from advertisers. Web sites, those are able
to attract the greatest viewer ship are able to charge higher advertising rates. Example:
Yahoo.
SubscriptionRevenue
A Web site that offers its users contents or services charges a subscription fee for
access to some or all of its offerings. They may charge monthly/ annual subscription fee.
The contents offered by such site, must be a high-value-added, premium offering that
neither is readily available elsewhere nor easily replicated. Example:
Consumerreports.org.
TransactionFee Revenue
A company receives a fee for executing a transaction. For example eBay provides an
online auction marketplace and receives a small transaction fee from the seller if the
seller is successful in selling the item. Example: eBay.
Sales Revenue
Companies derive revenue by selling goods, information or services to consumers.
Example: Amazon.
Affiliate Revenue
Sites that steer business to an “affiliate” receive a referral fee or percentage of the
revenue from any resulting sales. Example: Mypoints.
PAYMENT SYSTEMS
When commerce has become Electronic, the means of paying for goods and services
has also become electronic. The traditional paper based systems used for making
payments cannot give the speed, privacy and internationalization needed in E-
commerce. The following payment systems are used in E-commerce :
1. Digital Cash
Digital Cash is the electronic parallel of notes and coins. It is a string of numbers that
represent an amount of money. The customer or consumer has to deposit cash in
the banks, in lieu of which, the bank will be give electronic authenticated tokens. The
merchant who receives these electronic tokens then deposits them in his bank and
his bank credits his account.
2. Online storedvalue systems
Online Stored value payment systems enable consumers to make instant online
Payments to merchants and other individuals based on value stored in a digital
account. Online value systems rely on the value stored in a Consumer’s bank,
checking, or credit card account and some of these Management Information
systems require the use of a digital wallet. E-count offers a prepaid debit
account for online purchases.
3. Digital Accumulating Balance Payment
Accumulated balance digital payment systems enable users to make micropayments
and purchases on the Web, accumulating a debit balance that they must pay
periodically on their credit card or telephone bills. IPIN has been widely adopted by
online music sites that sell music tracks for 99 cents. It invoices customers through
existing consumer billing services such as telephone and wireless service companies,
Internet service providers, and banks. PaymentOne and Trivnet enable consumers to
charge small purchases to their monthly telephone bill.
4. Digital Credit Card Payment
Credit cards account for 80 percent of online payments in the United States and
about 50 percent of online purchases outside the United States. The more
sophisticated electronic commerce software has capabilities for processing credit
card purchases on the Web. Businesses can also contract with services that extend
the functionality of existing credit card payment systems. Digital credit card payment
systems extend the functionality of credit cards so they can be used for online
shopping payments. They make credit cards safer and more convenient for online
merchants and consumers by providing mechanisms for authenticating the
purchaser’s credit card to make sure it is valid and arranging for the bank that issued
the credit card to deposit money for the amount of the purchase in the seller’s bank
account.
5. Digital Checking
Digital checking payment systems, such as Western Union Money Zap and e-Check,
extend the functionality of existing checking accounts so they can be used for online
shopping payments. Digital checks are less expensive than credit cards and much
faster than traditional paper-based checking. These checks are encrypted with a
digital signature that can be verified and used for payments in electronic commerce.
Electronic check systems are useful in business-to-business electronic commerce.
PRIVATE KEY ENCRYPTION
Private key encryption is the standard form. Both parties share an encryption key,
and the encryption key is also the one used to decrypt the message. The difficulty is
sharing the key before you start encrypting the message - how do you safely
transmit it?Many private key encryption methods use public key encryption to
transmit the private key for each data transfer session.If Bob and Alice want to use
private key encryption to share a secret message, they would each use a copy of the
same key. Bob writes his message to Alice and uses their shared private key to
encrypt the message. The message is then sent to Alice. Alice uses her copy of the
private key to decrypt the message. Private key encryption is like making copies of a
key. Anyone with a copy can open the lock. In the case of Bob and Alice, their keys
would be guarded closely because they can both encrypt and decrypt messages.
PUBLIC KEY ENCRYPTION
Public key encryption uses two keys - one to encrypt, and one to decrypt. The sender
asks the receiver for the encryption key, encrypts the message, and sends the
encrypted message to the receiver. Only the receiver can then decrypt the message -
even the sender cannot read the encrypted message.When Bob wants to share a
secret with Alice using public key encryption, he first asks Alice for her public key.
Next, Bob uses Alice's public key to encrypt the message. In public key encryption,
only Alice's private key can unlock the message encrypted with her public key. Bob
sends his message to Alice. Alice uses her private key to decrypt Bob's message.The
things that make public key encryption work is that Alice very closely guards her
private key and freely distributes her public key. She knows that it will unlock any
message encrypted with her public key.
DIGITAL SIGNATURE
Digital signatures are often used to implement electronic signatures, a broader term
that refers to any electronic data that carries the intent of a signature,[1] but not all
electronic signatures use digital signatures.[2][3] In some countries, including the
United States, India,[4] and members of the European Union, electronic signatures
have legal significance.
Digital signatures employ a type of asymmetric cryptography. For messages sent
through a nonsecure channel, a properly implemented digital signature gives the
receiver reason to believe the message was sent by the claimed sender. Digital
signatures are equivalent to traditional handwritten signatures in many respects, but
properly implemented digital signatures are more difficult to forge than the
handwritten type. Digital signature schemes in the sense used here are
cryptographically based, and must be implemented properly to be effective. Digital
signatures can also provide non-repudiation, meaning that the signer cannot
successfully claim they did not sign a message, while also claiming their private key
remains secret; further, some non-repudiation schemes offer a time stamp for the
digital signature, so that even if the private key is exposed, the signature is valid.
Digitally signed messages may be anything representable as a bitstring: examples
include electronic mail, contracts, or a message sent via some other cryptographic
protocol.
SECURE SOCKET LAYER(SSL)
The Secure Sockets Layer (SSL) is a commonly-used protocol for managing the
security of a message transmission on the Internet. SSL has recently been succeeded
by Transport Layer Security (TLS), which is based on SSL. SSL uses a
program layer located between the Internet's Hypertext Transfer Protocol (HTTP)
and Transport Control Protocol (TCP) layers. SSL is included as part of both the
Microsoft and Netscape browsers and most Web server products. Developed by
Netscape, SSL also gained the support of Microsoft and other
Internet client/server developers as well and became the de facto standard until
evolving into Transport Layer Security. The "sockets" part of the term refers to
the sockets method of passing data back and forth between a client and a server
program in a network or between program layers in the same computer. SSL uses
the public-and-private key encryption system from RSA, which also includes the use
of a digital certificate.
SECURE ELECTRONIC TRANSACTIONS(SET)
Secure Electronic Transaction (SET) is a systemfor ensuring the security of financial
transactions on the Internet. It was supported initially by MasterCard, Visa,
Microsoft, Netscape, and others. With SET, a user is given an electronic wallet (digital
certificate) and a transaction is conducted and verified using a combination of digital
certificates and digital signatures among the purchaser, a merchant, and the
purchaser's bank in a way that ensures privacy and confidentiality. SET makes use of
Netscape's Secure Sockets Layer (SSL), Microsoft's Secure Transaction Technology
(STT), and Terisa System's Secure Hypertext Transfer Protocol (S-HTTP). SET uses
some but not all aspects of a public key infrastructure (PKI).
 Explain any E-commerce website and explain showing the product they sell and
payment system of their website?
Flipkartis an Indian e-commerce company founded by Sachin and Binny
Bansal, headquartered in Bangalore, Karnataka .The company acts as a
mediator between sellers and customers and is regarded as the Amazon
of India.
About the company
• Online Retail Industry
• It is one of the leading e-commerce players in the country
• With over 11.5 million book titles listed, 11 different categories, more than 2 million
registered users and sale of 30000 items a day.
• Founded by Sachin bansal & Binny bansal in Bangalore, Karnataka in 2007.
• Started with initial capital of INR 4 lakh.
• 7 warehouses, offices and delivery centers (2011).
• Revenue is of 75 Crore (FY 2010-11).
• 4600+ employees till December 2011.
• Subsidiaries are “We Read”, “Mime 360” and “Lets Buy”.
FLIPKART PRODUCT LIST
PAYMENT SYSTEM

Contenu connexe

Tendances

Lecture 1 data communication
Lecture 1 data communicationLecture 1 data communication
Lecture 1 data communicationmohanad6
 
Data Communication & Networking Basics
Data Communication & Networking BasicsData Communication & Networking Basics
Data Communication & Networking BasicsMahbub Alam Masud
 
The Bluetooth technology
The Bluetooth technologyThe Bluetooth technology
The Bluetooth technologySaQi95
 
Transmission media
Transmission mediaTransmission media
Transmission mediaVikas Yadav
 
telecommunication-ppt
telecommunication-ppttelecommunication-ppt
telecommunication-pptsecomps
 
Mobile communication
Mobile communicationMobile communication
Mobile communicationAditya Sharat
 
Computer Networking concepts
Computer Networking conceptsComputer Networking concepts
Computer Networking conceptsMujeeb Ahmad
 
Guided media and Unguided media
Guided media and Unguided mediaGuided media and Unguided media
Guided media and Unguided mediaSanaa Sial
 
Trends In Telecommunications
Trends In TelecommunicationsTrends In Telecommunications
Trends In TelecommunicationsMarlon Jamera
 
Medios de transmision
Medios de transmisionMedios de transmision
Medios de transmisionDiego Tamayo
 
How PSTN phone works?
How PSTN phone works?How PSTN phone works?
How PSTN phone works?mahipal9
 
Bluetooth- A wireless technology
Bluetooth- A wireless technologyBluetooth- A wireless technology
Bluetooth- A wireless technologyNeha Jella
 
Prof. Andy Sutton: Backhauling the 5G Experience
Prof. Andy Sutton: Backhauling the 5G ExperienceProf. Andy Sutton: Backhauling the 5G Experience
Prof. Andy Sutton: Backhauling the 5G Experience3G4G
 
DATA COMMUNICATION PPT
DATA COMMUNICATION PPTDATA COMMUNICATION PPT
DATA COMMUNICATION PPTMajane Padua
 
Transmission mediums in computer networks
Transmission mediums in computer networksTransmission mediums in computer networks
Transmission mediums in computer networksGourav Kumar Saini
 
Wireless Communications - Presentation.pdf
Wireless Communications - Presentation.pdfWireless Communications - Presentation.pdf
Wireless Communications - Presentation.pdfEshwar Prasad
 

Tendances (20)

Lecture 1 data communication
Lecture 1 data communicationLecture 1 data communication
Lecture 1 data communication
 
Presentacion Voip
Presentacion VoipPresentacion Voip
Presentacion Voip
 
Data Communication & Networking Basics
Data Communication & Networking BasicsData Communication & Networking Basics
Data Communication & Networking Basics
 
The Bluetooth technology
The Bluetooth technologyThe Bluetooth technology
The Bluetooth technology
 
Transmission media
Transmission mediaTransmission media
Transmission media
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
telecommunication-ppt
telecommunication-ppttelecommunication-ppt
telecommunication-ppt
 
Mobile communication
Mobile communicationMobile communication
Mobile communication
 
Computer Networking concepts
Computer Networking conceptsComputer Networking concepts
Computer Networking concepts
 
Guided media and Unguided media
Guided media and Unguided mediaGuided media and Unguided media
Guided media and Unguided media
 
Trends In Telecommunications
Trends In TelecommunicationsTrends In Telecommunications
Trends In Telecommunications
 
Medios de transmision
Medios de transmisionMedios de transmision
Medios de transmision
 
How PSTN phone works?
How PSTN phone works?How PSTN phone works?
How PSTN phone works?
 
Bluetooth- A wireless technology
Bluetooth- A wireless technologyBluetooth- A wireless technology
Bluetooth- A wireless technology
 
Prof. Andy Sutton: Backhauling the 5G Experience
Prof. Andy Sutton: Backhauling the 5G ExperienceProf. Andy Sutton: Backhauling the 5G Experience
Prof. Andy Sutton: Backhauling the 5G Experience
 
DATA COMMUNICATION PPT
DATA COMMUNICATION PPTDATA COMMUNICATION PPT
DATA COMMUNICATION PPT
 
Transmission mediums in computer networks
Transmission mediums in computer networksTransmission mediums in computer networks
Transmission mediums in computer networks
 
Presentation
PresentationPresentation
Presentation
 
Wide area network (wan)
Wide area network (wan)Wide area network (wan)
Wide area network (wan)
 
Wireless Communications - Presentation.pdf
Wireless Communications - Presentation.pdfWireless Communications - Presentation.pdf
Wireless Communications - Presentation.pdf
 

Similaire à E commerce for tybcom introduction

Similaire à E commerce for tybcom introduction (20)

BCA E-Commerce PPT (PowerPoint Presentations).pdf
BCA E-Commerce  PPT (PowerPoint Presentations).pdfBCA E-Commerce  PPT (PowerPoint Presentations).pdf
BCA E-Commerce PPT (PowerPoint Presentations).pdf
 
contemporary application of information technology
contemporary application of information technologycontemporary application of information technology
contemporary application of information technology
 
E commerce
E commerceE commerce
E commerce
 
Future trends and legal aspects (111 kb)
Future trends and legal aspects (111 kb)Future trends and legal aspects (111 kb)
Future trends and legal aspects (111 kb)
 
E-commerce
E-commerceE-commerce
E-commerce
 
Mini Project- Shopping Cart Development
Mini Project- Shopping Cart DevelopmentMini Project- Shopping Cart Development
Mini Project- Shopping Cart Development
 
E Com
E ComE Com
E Com
 
E commerce
E commerceE commerce
E commerce
 
20240323T152419686.att.7543110432421119.pptx
20240323T152419686.att.7543110432421119.pptx20240323T152419686.att.7543110432421119.pptx
20240323T152419686.att.7543110432421119.pptx
 
Electronic payments ystem
Electronic payments ystem Electronic payments ystem
Electronic payments ystem
 
Secure E-payment Protocol
Secure E-payment ProtocolSecure E-payment Protocol
Secure E-payment Protocol
 
E commerce ppts
E commerce pptsE commerce ppts
E commerce ppts
 
E-commerce and it's future
E-commerce and it's futureE-commerce and it's future
E-commerce and it's future
 
The lecturer
The lecturerThe lecturer
The lecturer
 
ECOMMERCE.pptx
ECOMMERCE.pptxECOMMERCE.pptx
ECOMMERCE.pptx
 
ECOMMERCE.pptx
ECOMMERCE.pptxECOMMERCE.pptx
ECOMMERCE.pptx
 
E commerce in the current scenario
E  commerce in the current scenarioE  commerce in the current scenario
E commerce in the current scenario
 
E commerce
E commerceE commerce
E commerce
 
ibibo
ibiboibibo
ibibo
 
ECOMM.pptx
ECOMM.pptxECOMM.pptx
ECOMM.pptx
 

Plus de Aditya

ITC - Marketing Management
ITC - Marketing ManagementITC - Marketing Management
ITC - Marketing ManagementAditya
 
Food express ecommerce - Operation management (om)
Food express ecommerce - Operation management (om)   Food express ecommerce - Operation management (om)
Food express ecommerce - Operation management (om) Aditya
 
The 7 habits of highly effective people - Organization behaviour (ob)
The 7 habits of highly effective people - Organization behaviour (ob)The 7 habits of highly effective people - Organization behaviour (ob)
The 7 habits of highly effective people - Organization behaviour (ob)Aditya
 
Google - Principle of Management (POM)
Google - Principle of Management (POM)Google - Principle of Management (POM)
Google - Principle of Management (POM)Aditya
 
E commerce for tybcom
E commerce for tybcomE commerce for tybcom
E commerce for tybcomAditya
 
Internet tybcom
Internet tybcomInternet tybcom
Internet tybcomAditya
 
Conservation of resources
Conservation of  resourcesConservation of  resources
Conservation of resourcesAditya
 
Information communication technology
Information communication technologyInformation communication technology
Information communication technologyAditya
 
India - uae trade relation
India - uae trade relationIndia - uae trade relation
India - uae trade relationAditya
 

Plus de Aditya (9)

ITC - Marketing Management
ITC - Marketing ManagementITC - Marketing Management
ITC - Marketing Management
 
Food express ecommerce - Operation management (om)
Food express ecommerce - Operation management (om)   Food express ecommerce - Operation management (om)
Food express ecommerce - Operation management (om)
 
The 7 habits of highly effective people - Organization behaviour (ob)
The 7 habits of highly effective people - Organization behaviour (ob)The 7 habits of highly effective people - Organization behaviour (ob)
The 7 habits of highly effective people - Organization behaviour (ob)
 
Google - Principle of Management (POM)
Google - Principle of Management (POM)Google - Principle of Management (POM)
Google - Principle of Management (POM)
 
E commerce for tybcom
E commerce for tybcomE commerce for tybcom
E commerce for tybcom
 
Internet tybcom
Internet tybcomInternet tybcom
Internet tybcom
 
Conservation of resources
Conservation of  resourcesConservation of  resources
Conservation of resources
 
Information communication technology
Information communication technologyInformation communication technology
Information communication technology
 
India - uae trade relation
India - uae trade relationIndia - uae trade relation
India - uae trade relation
 

Dernier

PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 

Dernier (20)

PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 

E commerce for tybcom introduction

  • 1. INTRODUCTION In the late 1970s, technology such as Electronic Data Interchange (EDI) and Electronic Funds Transfer (EFT) were used for doing commercial transactions electronically. Now businesses could send commercial documents like purchase orders or invoices electronically. The growth and acceptance of credit cards, automated teller machines (ATM) and telephone banking in the 1980s was another form of electronic commerce. In 1990, the World Wide Web was invented by Tim Berners-Lee. By the end of 2000 many companies in America were offering their business services through the internet. DEFINATION A fairly broad definition of Electronic Commerce is given below: “Electronic commerce is the process of doing business electronically. It involves the automation of a variety of business-to-business-to-consumer transactions through reliable and secure connections.” FEATURES Ubiquity Ubiquity means found everywhere. E-commerce is available just about everywhere. With E-commerce it is possible to shop from desktop, at office, at home, even when you are travelling. There is no need to visit the physical market place. Universal Standards One unusual feature of E-commerce technologies is that the technical standards of the Internet are universal standards- they are shared by all nations around the world. Richness
  • 2. It refers to richness in providing information to the consumer. Information about a product is provided to the consumer by using Audio/Video. Interactivity E-commerce allows two way communications between merchant and consumer. Communication can be with E-mail or on line chatting etc. InformationDensity Internet is making information more useful and important than ever. Information becomes more plentiful, less expensive and of higher quality. ADVANTAGES 1. Reduced cost to buyers. 2. Reduced errors as orders are processed electronically. 3. Reduced cost to the traders as the orders are obtained online. 4. Reduced time per transaction. 5. New markets are easily created even in remote areas. 6. Better quality achieved due to product standardization. 7. Optimization of resource utilization. 8. Lower inventory costs to the traders. 9. Lower advertising costs. 10. Equal oppurtinity for big and small merchants. LIMITATIONS 1. E-commerce as being new technology, one has to be aware of how to use it in the business. 2. E-commerce suffers from Security, Authenticity, Reliability and Accessibility. 3. E-commerce also suffers from bandwidth restrictions therefore sometime it is difficult to use. TYPES Traditional forms of commerce have been in existence for decades and will Continue to do so. However due to the various advantages of E—Commerce listed in the previous chapter, the trend to use E-Commerce has been increasing and is bound to continue to do so. There are different types of E- Commerce and this distinction is by the nature of the relationship i.e. the parties involved in the buying and selling.
  • 3. The types of E-Commerce are 1. Business - to - Consumer (B2C) 2. Business - to - Business (B2B) 3. Consumer - to - Consumer (C2C), 4. Peer - to - Peer (P2P) Business-to-Consumer (B2C) It is a form of electronic commerce in which products or services are sold from a firm directly to consumers. Example: amazon.com. Business-to-business(B2B) It is a form of electronic commerce in which products or services are sold from a firm to another firm. It is performed in much higher volumes than B2C. Example: shop2gether.com. Consumer-to-Consumer(C2C) It is a form of electronic commerce in which products or services are sold from one consumer to another consumer with the help of online market such as the auction site eBay. Example: ebay.com. Peer-to-Peer (P2P) It is a form of electronic commerce in which user can share files and computer resources directly without having to go through a central Web server. Example: BitTorrent.com. REVENUE MODELS Advertising Revenue A Web site that offers its users contents, services, and/or products also provides a forum for advertisements and receives fees from advertisers. Web sites, those are able to attract the greatest viewer ship are able to charge higher advertising rates. Example: Yahoo. SubscriptionRevenue
  • 4. A Web site that offers its users contents or services charges a subscription fee for access to some or all of its offerings. They may charge monthly/ annual subscription fee. The contents offered by such site, must be a high-value-added, premium offering that neither is readily available elsewhere nor easily replicated. Example: Consumerreports.org. TransactionFee Revenue A company receives a fee for executing a transaction. For example eBay provides an online auction marketplace and receives a small transaction fee from the seller if the seller is successful in selling the item. Example: eBay. Sales Revenue Companies derive revenue by selling goods, information or services to consumers. Example: Amazon. Affiliate Revenue Sites that steer business to an “affiliate” receive a referral fee or percentage of the revenue from any resulting sales. Example: Mypoints. PAYMENT SYSTEMS When commerce has become Electronic, the means of paying for goods and services has also become electronic. The traditional paper based systems used for making payments cannot give the speed, privacy and internationalization needed in E- commerce. The following payment systems are used in E-commerce : 1. Digital Cash Digital Cash is the electronic parallel of notes and coins. It is a string of numbers that represent an amount of money. The customer or consumer has to deposit cash in the banks, in lieu of which, the bank will be give electronic authenticated tokens. The merchant who receives these electronic tokens then deposits them in his bank and his bank credits his account. 2. Online storedvalue systems Online Stored value payment systems enable consumers to make instant online Payments to merchants and other individuals based on value stored in a digital account. Online value systems rely on the value stored in a Consumer’s bank, checking, or credit card account and some of these Management Information systems require the use of a digital wallet. E-count offers a prepaid debit account for online purchases.
  • 5. 3. Digital Accumulating Balance Payment Accumulated balance digital payment systems enable users to make micropayments and purchases on the Web, accumulating a debit balance that they must pay periodically on their credit card or telephone bills. IPIN has been widely adopted by online music sites that sell music tracks for 99 cents. It invoices customers through existing consumer billing services such as telephone and wireless service companies, Internet service providers, and banks. PaymentOne and Trivnet enable consumers to charge small purchases to their monthly telephone bill. 4. Digital Credit Card Payment Credit cards account for 80 percent of online payments in the United States and about 50 percent of online purchases outside the United States. The more sophisticated electronic commerce software has capabilities for processing credit card purchases on the Web. Businesses can also contract with services that extend the functionality of existing credit card payment systems. Digital credit card payment systems extend the functionality of credit cards so they can be used for online shopping payments. They make credit cards safer and more convenient for online merchants and consumers by providing mechanisms for authenticating the purchaser’s credit card to make sure it is valid and arranging for the bank that issued the credit card to deposit money for the amount of the purchase in the seller’s bank account. 5. Digital Checking Digital checking payment systems, such as Western Union Money Zap and e-Check, extend the functionality of existing checking accounts so they can be used for online shopping payments. Digital checks are less expensive than credit cards and much faster than traditional paper-based checking. These checks are encrypted with a digital signature that can be verified and used for payments in electronic commerce. Electronic check systems are useful in business-to-business electronic commerce. PRIVATE KEY ENCRYPTION Private key encryption is the standard form. Both parties share an encryption key, and the encryption key is also the one used to decrypt the message. The difficulty is sharing the key before you start encrypting the message - how do you safely transmit it?Many private key encryption methods use public key encryption to transmit the private key for each data transfer session.If Bob and Alice want to use
  • 6. private key encryption to share a secret message, they would each use a copy of the same key. Bob writes his message to Alice and uses their shared private key to encrypt the message. The message is then sent to Alice. Alice uses her copy of the private key to decrypt the message. Private key encryption is like making copies of a key. Anyone with a copy can open the lock. In the case of Bob and Alice, their keys would be guarded closely because they can both encrypt and decrypt messages. PUBLIC KEY ENCRYPTION Public key encryption uses two keys - one to encrypt, and one to decrypt. The sender asks the receiver for the encryption key, encrypts the message, and sends the encrypted message to the receiver. Only the receiver can then decrypt the message - even the sender cannot read the encrypted message.When Bob wants to share a secret with Alice using public key encryption, he first asks Alice for her public key. Next, Bob uses Alice's public key to encrypt the message. In public key encryption, only Alice's private key can unlock the message encrypted with her public key. Bob sends his message to Alice. Alice uses her private key to decrypt Bob's message.The things that make public key encryption work is that Alice very closely guards her private key and freely distributes her public key. She knows that it will unlock any message encrypted with her public key. DIGITAL SIGNATURE Digital signatures are often used to implement electronic signatures, a broader term that refers to any electronic data that carries the intent of a signature,[1] but not all electronic signatures use digital signatures.[2][3] In some countries, including the United States, India,[4] and members of the European Union, electronic signatures have legal significance. Digital signatures employ a type of asymmetric cryptography. For messages sent through a nonsecure channel, a properly implemented digital signature gives the receiver reason to believe the message was sent by the claimed sender. Digital signatures are equivalent to traditional handwritten signatures in many respects, but properly implemented digital signatures are more difficult to forge than the handwritten type. Digital signature schemes in the sense used here are cryptographically based, and must be implemented properly to be effective. Digital signatures can also provide non-repudiation, meaning that the signer cannot successfully claim they did not sign a message, while also claiming their private key remains secret; further, some non-repudiation schemes offer a time stamp for the digital signature, so that even if the private key is exposed, the signature is valid. Digitally signed messages may be anything representable as a bitstring: examples include electronic mail, contracts, or a message sent via some other cryptographic protocol.
  • 7. SECURE SOCKET LAYER(SSL) The Secure Sockets Layer (SSL) is a commonly-used protocol for managing the security of a message transmission on the Internet. SSL has recently been succeeded by Transport Layer Security (TLS), which is based on SSL. SSL uses a program layer located between the Internet's Hypertext Transfer Protocol (HTTP) and Transport Control Protocol (TCP) layers. SSL is included as part of both the Microsoft and Netscape browsers and most Web server products. Developed by Netscape, SSL also gained the support of Microsoft and other Internet client/server developers as well and became the de facto standard until evolving into Transport Layer Security. The "sockets" part of the term refers to the sockets method of passing data back and forth between a client and a server program in a network or between program layers in the same computer. SSL uses the public-and-private key encryption system from RSA, which also includes the use of a digital certificate. SECURE ELECTRONIC TRANSACTIONS(SET) Secure Electronic Transaction (SET) is a systemfor ensuring the security of financial transactions on the Internet. It was supported initially by MasterCard, Visa, Microsoft, Netscape, and others. With SET, a user is given an electronic wallet (digital certificate) and a transaction is conducted and verified using a combination of digital certificates and digital signatures among the purchaser, a merchant, and the purchaser's bank in a way that ensures privacy and confidentiality. SET makes use of Netscape's Secure Sockets Layer (SSL), Microsoft's Secure Transaction Technology (STT), and Terisa System's Secure Hypertext Transfer Protocol (S-HTTP). SET uses some but not all aspects of a public key infrastructure (PKI).  Explain any E-commerce website and explain showing the product they sell and payment system of their website?
  • 8. Flipkartis an Indian e-commerce company founded by Sachin and Binny Bansal, headquartered in Bangalore, Karnataka .The company acts as a mediator between sellers and customers and is regarded as the Amazon of India. About the company • Online Retail Industry • It is one of the leading e-commerce players in the country • With over 11.5 million book titles listed, 11 different categories, more than 2 million registered users and sale of 30000 items a day. • Founded by Sachin bansal & Binny bansal in Bangalore, Karnataka in 2007. • Started with initial capital of INR 4 lakh. • 7 warehouses, offices and delivery centers (2011). • Revenue is of 75 Crore (FY 2010-11). • 4600+ employees till December 2011. • Subsidiaries are “We Read”, “Mime 360” and “Lets Buy”. FLIPKART PRODUCT LIST