0% found this document useful (0 votes)
127 views6 pages

Ecommerce 2

1. The document discusses the scope and technical components of e-commerce, including online retail, B2B and B2C transactions, mobile commerce, and supply chain management. 2. Supply chain management involves planning, sourcing, manufacturing, logistics, returns, customer service, and collaboration across stages to maximize profitability. 3. Effective e-commerce requires websites, servers, payment gateways, inventory management, analytics, and security to facilitate online shopping and business transactions.

Uploaded by

Vishesh Nagdev
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
127 views6 pages

Ecommerce 2

1. The document discusses the scope and technical components of e-commerce, including online retail, B2B and B2C transactions, mobile commerce, and supply chain management. 2. Supply chain management involves planning, sourcing, manufacturing, logistics, returns, customer service, and collaboration across stages to maximize profitability. 3. Effective e-commerce requires websites, servers, payment gateways, inventory management, analytics, and security to facilitate online shopping and business transactions.

Uploaded by

Vishesh Nagdev
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

1.

Technical components of E-commerce, Scope of E-commerce, Supply Scope of ecommerce


Chain Management
The scope of e-commerce, or electronic commerce, has significantly
Technical components of ecommerce expanded in recent years due to advancements in technology and
changing consumer behavior. Some of the key areas where e-commerce
E-commerce, or electronic commerce, involves the buying and selling of is currently making an impact include:
goods and services over the internet. The technical components of an e-
commerce system typically include: 1)Online retail: E-commerce has revolutionized the way people shop,
with online retailers offering a vast selection of products at competitive
1)Website: The website serves as the main platform for the e-commerce prices, often with free shipping and easy return policies.
business. It includes the product catalog, shopping cart, and checkout
system. 2)B2B e-commerce: E-commerce is increasingly being used in business-
to-business (B2B) transactions, with companies buying and selling
2)Server: The server is the computer system that hosts the website and products and services online to streamline operations and reduce costs.
handles all the data processing and storage related to the e-commerce
business. 3)Digital services: E-commerce platforms are also used to sell digital
services such as software, music, movies, and e-books.
3)Payment Gateway: The payment gateway is a third-party service that
enables customers to securely pay for their purchases using a credit card 4)Mobile commerce: With the increasing use of mobile devices, e-
or other payment methods. commerce platforms are increasingly optimized for mobile use, making it
easier for customers to shop on the go.
4)Shopping Cart: The shopping cart is a software application that allows
customers to add products to their cart and track the total cost of their 5)Social commerce: E-commerce platforms are also integrating with
purchases. social media platforms, allowing businesses to sell products directly
within social media channels.
5)Inventory Management: The inventory management system tracks the
stock levels of the products in the catalog and alerts the business when 6)Subscription-based services: E-commerce platforms are also used to
items are running low. sell subscription-based services such as meal kits, beauty products, and
streaming services.
6)Customer Relationship Management (CRM): The CRM system stores
information about customers and their purchasing history. This 7)International trade: E-commerce has made it easier for businesses to
information can be used to personalize marketing and improve customer engage in cross-border trade, allowing them to reach customers in
retention. different countries and regions.

7)Security: E-commerce systems must be secure to protect sensitive


customer information, such as credit card details. Security measures
include SSL certificates, encryption, and firewalls. Supply change management

8)Logistics: The logistics system manages the shipping and delivery of Supply chain management (SCM) refers to the management of the flow
products to customers. This may include partnerships with shipping of goods and services, from the sourcing of raw materials to the delivery
companies, order tracking, and automated shipping notifications. of finished products to the end customer. Effective supply chain
management is essential for businesses to meet customer demand,
9)Analytics: Analytics tools track the performance of the e-commerce reduce costs, and maximize profitability.
business, such as sales data, website traffic, and customer behavior. This
information can be used to improve the customer experience and Here are some of the key components of supply chain management:
optimize business operations.
1)Planning: This involves forecasting demand, creating production
schedules, and determining the optimal inventory levels.

FEAUTURES E-commerce E-business 2)Sourcing: This involves selecting and managing suppliers, negotiating
Meaning Trading of Running business on contracts, and ensuring the timely delivery of raw materials.
merchandise over the internet is
internet is called e- known as e-business 3)Manufacturing: This involves producing goods, managing the
commerce production process, and maintaining quality control standards.
What is it Subset: e-commerce Superset: e business
is a part of ebusiness includes ecommerce 4)Logistics: This involves managing the transportation and distribution of
goods, including warehousing, shipping, and delivery.
Is it limited by Yes No
monetary 5)Return: this is the problem part of supply chain a network is created
transactions for receiving defective and excessive products back and supporting
Type of transaction Commercial Business transaction customers who have problem with their delivered products.
transaction
approach Extroverted (often Ambiverted (often 6)Customer service: This involves managing customer orders, resolving
B2C) B2B) issues, and ensuring customer satisfaction.
Requires website Website, CRM, ERP
etc. Effective supply chain management requires collaboration and
Types of networks Internet Internet, intranet, communication across all stages of the supply chain, from suppliers to
used extranet customers. Technology can play a critical role in enabling effective supply
chain management, such as the use of software for inventory
management, transportation planning, and order tracking.

Overall, effective supply chain management is essential for businesses to


maintain a competitive edge, improve customer satisfaction, and
maximize profitability.
Types of business models Mobile e-commerce (m-commerce) refers to online sales
transactions using mobile devices, such as smartphones and
Business-to-business (B2B) e-commerce refers to the electronic tablets. It includes mobile shopping, banking and payments.
exchange of products, services or information between Mobile chatbots facilitate m-commerce, letting consumers
businesses rather than between businesses and consumers. complete transactions via voice or text conversations
Examples include online directories and product and supply
exchange websites that let businesses search for products,
services and information and initiate transactions through e-
procurement interfaces. A Forrester report published in 2018
predicted that by 2023, B2B e-commerce will reach $1.8 trillion
pure online vs brick and click
dollars and account for 17% of U.S. B2B sales.
Basis Pure Online Brick-and-Click
Business-to-consumer (B2C) is the retail part of e-commerce on Presence Online-only, no Both online and
the internet. It is when businesses sell products, services or physical stores physical stores
information directly to consumers. The term was popular during Overhead costs Lower, no need for Higher, need to
the dot-com boom of the late 1990s, when online retailers and physical locations or maintain physical
staff stores and staff
sellers of goods were a novelty.
Reach Potentially wider, Limited to areas
customers from all with physical stores
Today, there are innumerable virtual stores and malls on the over the world can
internet selling all types of consumer goods. Amazon is the access website
most recognized example of these sites. It dominates the B2C Customer May struggle to Can offer both
market. experience build trust and online and in-
loyalty without person shopping
Consumer-to-consumer (C2C) is a type of e-commerce in which physical presence experiences
Marketing Limited to online Can leverage
consumers trade products, services and information with each
opportunities channels physical locations
other online. These transactions are generally conducted for additional
through a third party that provides an online platform on which marketing
the transactions are carried out. opportunities
Product limitations Some products may Can offer in-person
Online auctions and classified advertisements are two examples be difficult to sell product experiences
online without
of C2C platforms. EBay and Craigslist are two well-known
physical interaction
examples of these platforms. Because eBay is a business, this (e.g. clothing,
form of e-commerce could also be called C2B2C -- consumer-to- furniture)
business-to-consumer. Platforms like Facebook marketplace and Fulfilment options Typically limited to Can offer both
Depop -- a fashion reselling platform -- also enable C2C delivery or pickup delivery and in-store
pickup options
transactions.

Consumer-to-business (C2B) is a type of e-commerce in which


consumers make their products and services available online for
companies to bid on and purchase. This is the opposite of the
traditional commerce model of B2C.

A popular example of a C2B platform is a market that sells


requirements for an online business designing
royalty-free photographs, images, media and design elements,
such as iStock. Another example would be a job board. Designing an effective online business requires a thoughtful and strategic
approach that takes into account the needs of both the business and its
Business-to-administration (B2A) refers to transactions customers. Some key requirements include a clear brand identity, user-
conducted online between companies and public cantered design, responsive design, high-quality visuals, strong
administration or government bodies. Many branches of information architecture, effective content, and robust security
measures.
government are dependent on various types of e-services or
products. These products and services often pertain to legal A clear brand identity helps to create a consistent and memorable user
documents, registers, social security, fiscal data and experience, while user-cantered design ensures that the website is easy
employment. Businesses can supply these electronically. B2A to navigate and use. Responsive design is important for ensuring that the
services have grown considerably in recent years as investments website is accessible on a variety of devices, while high-quality visuals
have been made in e-government capabilities. help to engage customers and support the brand messaging. A strong
information architecture ensures that content is organized in a logical
Consumer-to-administration (C2A) refers to transactions and intuitive way, while effective content helps to educate and inform
customers about the business and its offerings. Finally, robust security
conducted online between consumers and public
measures help to protect both the website and customers' information.
administration or government bodies. The government rarely
buys products or services from individuals, but individuals In summary, designing an online business requires careful consideration
frequently use electronic means in the following areas: of a range of factors, from branding and design to content and security.
By taking these requirements into account, businesses can create
Social security. Distributing information and making payments. effective online presences that engage customers and drive business
success
Taxes. Filing tax returns and making payments.

Health. Making appointments, providing test results and


information about health conditions, and making health
services payments.
IT infrastructure Intranet:

IT infrastructure refers to the underlying technology systems and Intranet is owned by a single organization and is a tool for sharing
components that support the operations of an organization's information information throughout the organization. It is the type of Internet that is
technology environment. This includes hardware, software, networks, used privately. Since, intranet is a private network so no one can use the
data storage, servers, and other components that are required for the intranet whose have not valid username and password. In intranet, there
processing, storage, and transmission of data and information. are a limited number of connected devices as compared to internet.
Intranet is highly secure and has a small number of visitors. It is used in
The IT infrastructure is critical to the success of an organization, as it order to get employee information, telephone directory etc.
supports the delivery of services, applications, and data to end-users. A
well-designed and maintained IT infrastructure can help organizations to Advantages of an intranet
improve efficiency, reduce costs, and enhance security.
1. Easy storage of files and information-Every organization has
Some key components of an IT infrastructure may include: hundreds, if not thousands, of differently formatted files floating among
email threads, Google Drive, or hard drives on laptops or desktops.
1)Hardware: This includes physical components such as servers, desktop Having a company intranet makes it easy to store and access all your files
computers, laptops, tablets, smartphones, and other devices that are in one central location. Any communication that happens on an intranet
used to access or manage information. is also saved for as long as the intranet is up. This makes it easier for
individuals to search for past posts from their company intranet.
2)Software: This includes operating systems, applications, and other
software tools that are used to manage and manipulate data. 2. Easy ways to communicate among employees -Intranets usually
feature user profiles similar to your LinkedIn profile. They contain a
3)Networking: This includes the hardware and software components photo, job title and description, and contact information. Any employee
that are used to connect devices and transmit data between them, such with access to the intranet can discover new colleagues and message
as routers, switches, and firewalls. them through the intranet. This facilitates increased collaboration and
helps establish a workforce network.
4)Data storage: This includes the hardware and software components
that are used to store and manage data, such as hard drives, solid-state 3. A good Content Management System (CMS) -Intranets started off in
drives, and cloud storage solutions. the 1990s as a simple welcome page with sparse information about an
enterprise. Since then, they have evolved to include discussion forums,
5)Security: This includes the hardware and software components that
blogs, and social features. This has enabled internal communicators to be
are used to protect IT infrastructure and data from unauthorized access,
able to use their intranet to share key messages and organizational
theft, and other security threats.
updates. CMS intranet enables internal communicators to easily create
and share content across the system.
Overall, the IT infrastructure is a critical component of any organization's
technology ecosystem, and requires careful planning, design, and
Disadvantages of an intranet
management in order to effectively support business operations and
achieve organizational goals. 1. Information is difficult to find-Intranets have traditionally been
structured in an outdated format that forces employees to search
components of internet information technology structure
through thousands of pages or folders to find the information that they
need
The internet information technology (IT) structure comprises various
components that work together to facilitate the flow of data and
2. Desk less workers can’t access intranets easily-Intranets are limited in
information across the internet. These components include:
their ability to reach all employees as they are sometimes only accessible
on the desktop. Remote workers, such as retail workers, nurses,
1)Transmission Control Protocol/Internet Protocol (TCP/IP): TCP/IP is
warehouse staff, and truck drivers, may not have the ability to access
the primary protocol used to transmit data across the internet. It defines
intranets
the rules for how data is sent and received over the internet.
3. Mobile isn’t supported-Many intranets do not support mobile or need
2)Domain Name System (DNS): DNS is a distributed naming system that
to be updated with the next mobile release. If you already have an
translates human-readable domain names into IP addresses that
intranet, it can be tempting to wait until the next update that has a
computers can understand. It allows users to access websites using easy-
mobile feature instead of committing to a communications makeover.
to-remember domain names instead of having to remember the IP
addresses of the websites they want to visit.
4. Updates to intranets can take a long time - Communication technology
and software are constantly improving and evolving. We are accustomed
3)Web servers: Web servers are software applications that run on
to regularly scheduled software updates, new releases, and exciting new
computers and provide access to web pages and other web content.
features.
They respond to requests from web browsers and deliver web content in
the form of text, images, videos, and other media.

4)Web browsers: Web browsers are software applications that allow


users to access and view web pages on the internet. They interpret the
code in web pages and display them in a format that is easy to read and
navigate.

5)Internet Service Providers (ISPs): ISPs are companies that provide


internet connectivity to users. They provide the physical infrastructure
and networks that allow users to access the internet from their devices.

6)Cloud services: Cloud services are web-based applications and services


that are hosted on remote servers and accessed over the internet.
Examples of cloud services include cloud storage, software-as-a-service
(SaaS), and platform-as-a-service (PaaS).

7)Content delivery networks (CDNs): CDNs are networks of servers that


are used to deliver web content to users more efficiently. They store
copies of web content on servers located closer to users, reducing the
amount of time it takes to download web content.
Extranet: intranet Extranet
Intranet is a tool for sharing Whereas Extranet is a tool for sharing
Extranet is owned by either a single or a many organization. It is information throughout the information between the internal
managed on a contractual basis between organizations and is a tool for organization members and external members.
sharing information between the internal members and external
members. Like intranet, it is also a private network so only those who Intranet is owned by a single While Extranet is owned by either a
have a valid username and password can use the extranet. Extranet is organization. single or a many organization.
used to check status, access data, send mail, place order etc.
In intranet, security is implemented Whereas in this, security is
Advantages of Extranet through a firewall. implemented through a firewall in
order to separate the extranet and the
1)Improved collaboration: An extranet can facilitate collaboration and internet.
communication between different companies, departments, or teams, Intranet is managed by an Whereas Extranet is managed by many
allowing them to work together more efficiently and effectively. organization. organizations.
Intranet has a limited number of Whereas in the extranet, connected
2)Enhanced security: Extranets are designed to be secure and restrict connected devices. devices are comparable with the
access only to authorized users, reducing the risk of unauthorized access intranet.
or data breaches. Intranet is a private network type for While it is also a private network in
an organization. which public network is used in order
3)Better customer service: An extranet can provide customers with to share the information to the
access to information and resources they need, such as order status, suppliers and customers.
account information, and support services, resulting in improved
customer satisfaction and loyalty. Intranet is used in order to get While It is used to check status, access
employee information, telephone data, send mail, place order etc.
4)Increased efficiency: An extranet can help streamline business directory etc.
processes and reduce the need for paper-based communication, Intranet is the limited and While Extranet is the limited
resulting in faster and more efficient operations. compromised version of and compromised version of
Extranet. Internet.
5)Cost savings: An extranet can reduce the need for travel and physical
meetings, resulting in cost savings for businesses.
Online payment mechanism
6)Increased flexibility: An extranet can provide access to information
and resources from anywhere with an internet connection, allowing Online payment mechanism refers to the process of making financial
users to work remotely or while traveling. Lowing them to work together transactions over the internet using various electronic payment
more efficiently and effectively. methods. It allows individuals and businesses to transfer funds
electronically without the need for physical cash or checks.
Disadvantages of Extranet
Online payment mechanisms include credit and debit card payments, e-
1)Security risks: Although extranets are designed to be secure, there is wallets, bank transfers, and digital currencies such as Bitcoin. These
still a risk of unauthorized access or data breaches. It's important to payment methods use secure online platforms and encryption
implement strong security measures and protocols to mitigate these technology to ensure that the transaction is safe and secure.
risks.
One of the advantages of online payment mechanisms is that they are
2)Dependence on technology: Extranets rely on technology, which can fast and convenient, allowing for instant payment processing and
be vulnerable to failures, outages, or other issues that can affect access transaction tracking. Additionally, they eliminate the need for physical
to information and resources. cash handling and reduce the risk of errors or fraud.

3)Cost: Implementing and maintaining an extranet can be expensive, Overall, online payment mechanisms have revolutionized the way we
especially if you need to invest in additional hardware or software. conduct financial transactions, making it easier, faster, and more secure
to buy and sell goods and services over the internet.
4)Complexity: Extranets can be complex to set up and manage, requiring
specialized knowledge and expertise.

5)Integration with legacy systems: Integrating an extranet with existing


legacy systems can be challenging, especially if these systems were not
designed with interoperability in mind.

6)Limited control over user access: When granting access to third-party


users, there is a risk that they may misuse or abuse the system, leading
to unauthorized access, data breaches, or other security incidents.
payment gateways Relevant provisions of the IT Act

Payment gateways are online platforms that enable secure and efficient The Information Technology (IT) Act, 2000 is an Indian law that governs
transactions between a buyer and a seller. They facilitate online payment the use of information technology in India. It has been amended several
processing by securely transmitting payment data between the customer times since its inception. Some of the relevant provisions of the IT Act
and the merchant's bank or financial institution. are:

The working of payment gateway is a five-step process- 1)Section 43: This section deals with the penalties for damage to a
computer system or computer network, hacking, and unauthorized
1)Customer inputs credit card information in an online shop access to computer systems.

2)the payment gateway encrypts data and send it securely to internet 2)Section 66: This section deals with the punishment for computer-
merchant account related offenses like hacking, data theft, and virus attacks.

3)the transaction is reviewed for authorisation by the customer’s issuing 3)Section 66A: This section dealt with sending offensive messages
bank. through communication services but was struck down by the Supreme
Court of India in 2015.
4)the result is encrypted and then send back through the gateway.
4)Section 69A: This section deals with the power of the central
5)merchants gets the result and decides whether or not to fulfil the government to block public access to any information through any
order computer resource.

There are several types of payment gateways, including: 5)Section 79: This section provides safe harbour to intermediaries like
social media platforms from third-party content posted on their
1)Hosted payment gateways
platforms.
2)Self-hosted payment gateways
6)Section 84A: This section deals with the punishment for publishing or
transmitting sexually explicit content.
3)API hosted payment gateways.
7)Section 85: This section provides for the punishment of a company's
4)Local payment gateways
managing director, manager, secretary, or any other officer in charge if
5)Mobile payment gateways the company is found guilty of committing an offense under the Act.

These are just a few of the provisions of the IT Act, and there are several
others that deal with various aspects of the use of information
risk management options for e-payment technology in India.

There are several risk management options available for e-payment to


ensure safe and secure online transactions. Here are some of the
common risk management options:

1)Encryption: Encryption is the process of converting sensitive


information into an unreadable format to protect it from unauthorized
access. Payment gateways use encryption technology to secure online
transactions and prevent fraud.

2)Two-factor authentication: Two-factor authentication adds an extra


layer of security to the payment process by requiring the customer to
enter a password or code in addition to their payment details.

3)Fraud detection and prevention: Payment gateways use various fraud


detection and prevention tools, such as AI-based fraud detection
algorithms and risk scoring models, to identify and prevent fraudulent
transactions.

4)Chargeback protection: Chargeback protection is a service that


provides merchants with protection against chargeback losses due to
fraudulent transactions. Payment gateways offer chargeback protection
by monitoring transactions for fraud and providing a guarantee for
eligible chargebacks.

5)Compliance with regulatory standards: Payment gateways comply


with regulatory standards such as PCI DSS (Payment Card Industry Data
Security Standard) to ensure that customer data is secure and protected
from unauthorized access.

6)Secure servers and firewalls: Payment gateways use secure servers


and firewalls to prevent unauthorized access to customer data.

7)Understanding your risk and train your staff- Your staff should know
clearly what risks your e-commerce business may have to deal with.
Everyone in your business structure needs to understand the types of
risks inherent in online payments. Then, establish a procedure on
avoiding and solving risks, which is a must for all staff to follow.
secure electronic records and digital signature

Securing electronic records and digital signatures involves implementing


various measures to protect the confidentiality, integrity, and
authenticity of the information. Here are some key considerations for
ensuring the security of both electronic records and digital signatures:

1)Access Control: Implement robust access control mechanisms to


restrict access to electronic records and digital signature infrastructure.
This includes user authentication, authorization, and role-based access
control to ensure that only authorized individuals can access and modify
records or use digital signatures.

2)Encryption: Use strong encryption algorithms to protect electronic


records both at rest and in transit. Encryption helps prevent
unauthorized access and ensures the confidentiality of sensitive
information. Similarly, encryption should be applied to protect the
private keys used for creating digital signatures.

3)Secure Storage: Implement secure storage mechanisms for electronic


records and digital signature components. This includes secure servers,
databases, or cloud storage solutions with appropriate security controls
such as encryption, access controls, and regular backups.

4)Integrity Checks: Implement measures to ensure the integrity of


electronic records and digital signatures. This involves using secure hash
functions to generate checksums (hash values) for records and verifying
their integrity periodically or during access. Similarly, digital signatures
can be validated using the corresponding public keys and verifying the
integrity of the signed data.

5)Audit Trails and Logging: Maintain comprehensive audit trails and logs
of activities related to electronic records and digital signatures. This
includes capturing information such as user actions, access attempts,
modifications, and digital signature operations. Monitoring and analyzing
these logs can help identify any security breaches or suspicious activities.

6)Regular Updates and Patching: Keep electronic record management


systems, digital signature software, and underlying infrastructure up to
date with the latest security patches and updates. This helps address any
known vulnerabilities and ensures that security measures remain
effective.

7)Training and Awareness: Educate users about the importance of


security measures, such as protecting passwords, recognizing phishing
attempts, and understanding the proper usage of digital signatures.
Training and awareness programs can help minimize human errors and
enhance overall security.

By implementing these security measures, organizations can effectively


secure their electronic records and digital signature processes, mitigating
the risks associated with unauthorized access, tampering, or misuse of
sensitive information.

6. Issues challenges and opportunities for e marketing, reasons for


growth, tools and techniques, advantages and disadvantages

7. Segmentation vs targeting vs positioning, e-marketing mix, concept


and scope of customer relationship management

8. Prepare SEO well, internet advertising, online PR, email marketing,


social media marketing

Payment gateways

Use of debit and credit card

Mobile marketing trends and terminology

Benefits and application of mobile and smartphone application

M commerce

You might also like