BCA E-Commerce Study Guide
BCA E-Commerce Study Guide
E Commerce
  Technologies
                 The ideas behind the World-Wide Web were formulated at CERN in 1989,
         leading to a proposal submitted in November 1990 by Tim Berners-Lee and Robert
         Cailliau for a "universal hypertext system." In the next four years the growth of World
         Wide Web was expanded in various areas like science, commerce, research, government,
         semi-government and now in private business and people‘s homes also.
                 This article describes the basic concepts behind the World-Wide Web, traces its
         development over the past four years with examples of its use both inside and outside of
         the high energy physics community and goes on to describe some of the extensions under
         development as part of the World-Wide Web project.
                  This was made possible by exploiting the existing capabilities of the Internet, a
         world-wide network of interconnected computers developed over the preceding 20 years,
         to establish a rapid connection to any named computer on the network.
                 The client-server model offers advantages to both the information provider and
         the consumer. The information provider is able to keep control of the documents he
         maintains by keeping them on his own computer.
                 From the information consumers' perspective, all the documents on the Web are
         presented in the form of hypertext. The consumer is totally unaware of how the
         documents are maintained by the information provider and, unless he really wants to
         know, from where the documents are being accessed
                 Initially the growth of the World-Wide Web was relatively slow. By the end of
         1992 there were about 50 hypertext transfer protocol (HTTP) servers. At about the same
         time, Gopher, a somewhat similar information retrieval tool as WWW but based on
         menus and plain text documents rather than hypertext, was expanding rapidly with
         several hundred servers.
                 During 1993 this situation changed dramatically, driven in large part by the
         development of the Mosaic client by a talented and extremely enthusiastic group at the
         National Center for Supercomputer Applications (NCSA) at the University of Illinois in
         Champaign-Urbana.
                 The Mosaic client for World-Wide Web was originally developed for X-
         Windows under UNIX, with subsequent versions released for both the Macintosh and PC
         platforms.
                 The Mosaic client software added a few new key features to the World-Wide
         Web:
         The ability to display embedded images within documents, enabling authors to greatly
         enhance the artistic of their documents; the ability to incorporate links to simple
         multimedia items such as short movie and sound clips; and the ability to display forms.
                 Forms greatly enhanced the original search mechanism built into WWW by
         allowing documents to contain fields that the user could fill in, or select from a list of
         choices, before clicking on a link to request further information.
                 The introduction of forms to the WWW opened a new arena of applications in
         which the World-Wide Web acts not only as a way of viewing static documents, but also
         as a way of interacting with the information in a simple but flexible manner, enabling the
         design of web-based graphical interfaces to databases and similar applications.
                  During 1993 the usage of WWW began to grow exponentially. As new people
         discovered the Web they often became information providers themselves, and as more
         information became available new users were attracted to the Web.
                  In comparison to Gopher (Internet Service) and FTP traffic during the same
         period (FTP stands for file-transfer protocol, one of the earliest protocols developed for
         the Internet and still the most widely used for transferring large files). Then after few new
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
         protocols for, FTP, e-mail and NNTP (Network News transfer protocol) traffic were
         developed.
                  Owing to the distributed management of the Internet and the World-Wide Web, it
         is very difficult to obtain hard numbers about the size of the Web or the number of users.
         (The number of users on the Internet, often estimated to be in the tens of millions, is itself
         a contentious issue, with some estimates claiming this number to be an overestimate by
         perhaps as much as an order of magnitude.) One illustration of the size of the Web came
         in early 1994 when a server was set up to provide information and up-to-the minute
         results from the Winter Olympics being held in Lillehammer, Norway.
                  The implementation of the server wasn't started until the day before the Olympics
         were scheduled to start, but two weeks later the server ( they arranged mirror server in the
         United States) had been accessed 1.3 million times, by users on somewhere between
         20,000 and 30,000 different computers in 42 countries.
                NCSA now estimates that more than a million copies of the Mosaic software
         have been taken from their distribution sight, and approximate counts of the number of
         HTTP servers indicates there are more than 3000 servers currently operating (Stanford
         University alone has over 40 HTTP servers.
                 As the size of the web has increased, so has the interest in the WWW from
         outside the academic community. One of the first companies to take an active interest in
         the World-Wide Web was the publisher O'Reillyand Associates.
                 For over a year they have provided an online service, the Global Network
         Navigator, using the World-Wide Web. This includes regularly published articles about
         developments in the Internet, the "Whole Internet Catalog," an index of information
         available on the Web, a travel section, business section and even daily online comics and
         advertising, all illustrated with professionally designed icons.
What Is A Client/Server?
         Server A server is one or more multi-user processors with a higher capacity of shared
         memory which provides connectivity and the database services along with interfaces
         relevant to the business procedures. Client/Server computing provides an environment
         that enhances business procedures by appropriately synchronizing the application
         processing between the client and the server.
          Integration of Services:
         Every client is given the opportunity to access corporate information via the desktop
         interface eliminating the necessity to log into a terminal mode or another processor.
         Desktop tools like spreadsheet, power point presentations etc. can be used for access of
         information.
          Inter-Operation of Data:
         All development tools used for client/server applications access the back-end database
         server through SQL, an industry-standard data definition and access language, helpful for
         consistent management of corporate data.
                  Advanced database products enable user/application to gain a merged view of
         corporate data dispersed over several platforms. Rather than a single target platform this
         ensures database integrity with the ability to perform updates on multiple locations
         enforcing quality presentation and recovery.
          Easy Maintenance:
         Since client/server architecture is a distributed model representing dispersed
         responsibilities among independent computers integrated across a network, it‘s an
         advantage in terms of maintenance. It‘s easy to replace, repair, upgrade and relocate a
         server while clients remain unaffected. This unawareness of change is called as
         encapsulation.
         Security:
         Servers have better control access (Read, Write, Execute/ R-W-X) rights to users and
         resources to ensure that only authorized clients can access or manipulate data and server-
         updates are administered effectively. So that security is maintained and not compromised
         easily.
         The users of the Internet interact through one of the several client-server applications. As
         the name suggest, in a client-server application there are two major classes of software
         the client software, which usually exists on an end-user‘s desktop and provides
         navigations and display.
                  The other software is the Server Software, which usually exists on a workstation
         or a server-class machine and provides back-end data access services, where the data can
         be something simple like a file or complex like a relational database. The most widely
         used client-server applications are listed below in table.
                                          TABLE 1.1
                                 CLIENT-SERVER APPLICATIONS
         Telnet
                  Telnet is a program that allows you to log into computers on the Internet and use
         online databases, library catalogs, chat services and more. To Telnet to a computer, you
         must know its address.
                  This can consist of words (www.yahoo.com) or numbers (204.71.200.67). Some
         services may require connection to a specific port on a remote computer. In this case,
         type the port number after the Internet address, for example telnet dte.vsnl.net.in to access
         your Web server.
                  Probably the most common Web-based resource available through telnet are
         library catalogues. A link to a telnet resource may look like any other link, but it will
         launch a telnet session to make the connection. A telnet program must be installed on
         your local computer and configured to your Web browser in order to work.
         IRC
                 IRC is the Internet Relay Chat service in which participants around the world can
         ―talk‖ to each other in real-time on hundreds of channels. These channels are usually
         based on a particular topic.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
                 While many topics are frivolous or carefree, substantive conversations also take
         place. To have access to IRC, you must use an IRC software program. This program
         connects you to an IRC server and allows you to visit IRC channels.
                 The largest nets are EFnet (the original IRC net, often having more than 32,000
         people at once), Undernet, IRCnet, DALnet, and NewNet.
                 Generally the user (such as you) runs a program (called a ―client‖) to connect to a
         server on one of the IRC nets. The server relays information to and from other servers on
         the same net. Some of the recommended clients are:
                 UNIX / shell    : ircII
                 Windows         : mIRC or PRICH
                 Macintosh       : Ircle
                 Once connected to an IRC server on an IRC network, you will usually join one or
         more ―channels‖ and converse with other. On EFnet, often thereare more than 12,000
         channels, each devoted to a different topic. Conversations may be public (where everyone
         in a channel can see what you type) or private (messages between only two people, who
         may or may not be on the same channel).
                  Internet has the capability to transform society. With the appearance of the
         internet, distance is not that big an obstacle for commerce. Internet is the most important
         communication medium to have come along in the last few decades, and businesses have
         to make wise use of this medium.
                 The value of internet lies in the connections it enables. 3 types of networks can be
         created on the internet. The first type of network is the one-to-many or broadcast
         network, in which a supplier provides information to a large number of users.
         Communication Switching
                Through the use of communication switching, computer networks allow
         computers to transfer data using shared lines of communication such as a cable.
         Communication switching works similar to telephone switching networks.
                 A telephone switching network eliminates the need to connect a wire between
         your telephone and every telephone you may ever call Instead, the phone company
         connects your phone (and everyone else‘s phone) to a set of phones.
                  Without a telephone switching network, if you needed to call 1000 different
         people, you would need to connect 1000 lines to your phone. In a similar way, computer
         networks rely on communication switches. Networks use two common methods of
         communication switching to transfer data—circuit switching and Packet Switching. In
         circuit switching, the switches create a single, ubnroken path between devices that want
         to communicate.
                  Most computer networks, includeing the Interent, do not use circuit switching.
         They use a technique called packet switching. In a typical terminal-to-host data
         connection, the line remains idle for most of the time. Thus, with data connections, a
         cuicuit-switched approach is inefficient.
                 In a circuit-switched network, the connection provides for transmission at a
         constant data rate. Thus, each of the two devices that are connected must transmit and
         receive at the same data rate as the other. This limits the utility of the network in
         interconnecting host computers and terminals.
                 In packet switching, that are transmitted in short packets. A typical upper limit on
         packet length is 1 kilobyte. If a source has a longer message to send, the message is
         broken up into a series of packets. Each packet contains a portion (or all for a short
         message) of the user‘s data, plus some control information. The control information, at a
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
         minimum, includes the information that the network requires in order to be able to route
         the packet through the network and deliver it to the intended destination.
         ISPs in india :
                  Internet access, in a sense, came into India in the early 1990s. ERNet, a division
         of Department of Electronics (DoE), and NICNet (Department of Statistics) made the
         intial role in this field. Both ERNet and NICNet are government projects, but with very
         different charaters and growth histories.
                  The ERNet (Educational and Research Network) project was designed to provide
         Internet Connectivity to the premier educational and research institutions of India. While
         NICNet was assigned the provision of Internet Services Primarily to government
         departments and organizations.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
                 NICNet was designed to provide V-SAT and dial-Up Internet access primarily to
         government departments. It began with shell-only access, at 2400 bps, but now provides
         high speed TCP/IP access through 64kbps V-SAT Links.
                 ERNet and NICNet are thus India‘s first ISPs, though their operations have been
         shakled by the restrictions imposed on them by the government in the form of regulations
         and policies of the DoT. Despite this, they were doing quite well in providing essential
         Internet services to an Internt-Started India, until the advent of VSNL Internet services
         and the restrictive clampdown / crackdown that followed.
                  Another provider of Internet serice that preceeded Videsh Sanchar Nigam
         Limited (VSNL) is the Software only Technology Parks of India (STPI) internet service.
         Again, this service was permitted only to a restricted audience, essentially the software
         exporters who fall under the STP scheme of the DoE, STPI has been providing high-end
         internet services through leased lines and dial-up links, in and around several parts of the
         country, through the respective softNET networks.
                 On August 15, 1995, VSNL launched the Gateway Internet Access Service, for
         providing public internet access. Starting with only dial-up shell and PPP access in the 4
         metros, VSNL followed with leased-lin access to subscribers, followed by the setting up
         of Points of Presence (POP) in Bangalore and Pune, VSNL has, since the inception of
         GIAS, portrayed / Drawing itself in the press as India‘s only legitimate ISP, while forcing
         many restrictions on the other ISPs through DoT regulations and the telecom policy.
                  There is no bar on the number of companies which will be given licences and
         licence free is virtually non-existent –none for the first five years and apply minor rates
         Rs 10 for the next 10 years. The equity for foreign investment has been kept at 49 percent
         as is the norm with other telecom services opened to the private sector.
                  The interested companies are free to fix their tariff and there is no insistence on
         coverage. E-mail companies have been decided to automatically become Internet Service
         Providers (ISPs). However, pending a more defined policy, ‗conditional licences‘ will be
         given to companies which have defaulted on licence fees in other services such as
         cellular, radio paging and basic phone services.
                 The present policy is not very different from the previous one prepared by a
         committee headed by Dr.Bimal Jalan and announced by a previsous government. The
         policy based on Dr.Jalan Committee recommendations was announced on January 15,
         1998.
                  The categories of ISPs have been specified. In the category A, licences are given
         on an all-india basis, under the second category fall the 20 territorial (rural) circles (3-12
         mile limited area) and the four metro telephone systems of Delhi, Mumbai, Chennai, and
         Calcutta as well as Bangalore, Hyderabad Ahemadabad and Pune, Any secondary
         switching area (equivalent to a district) from a separte category C service area with the
         exception of the eight cities defined in B category. The security deposit has been fixed at
         Rs 2 crores, Rs 20 lakhs and Rs 3 lakhs (Note: 1 lakh = 1000000,000, 1 crore = 100
         lakhs) respecitively.
                 Private companies have been allowed to establishe their own gateways in
         addition to using the gateways of DoT, VSNL or authoriesed public/government
         organisations. But this concept is only in principle because the Government has set up an
         inter-ministerial or ministry committee which will first go into security-related issues
         before granting permission to ISPs to set up alternate internation gateways. Till then
         subscribers to ISPs will have to grapple or make fast with the problem of congestion
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
           facing existing Internet Subscribers unless the VSNL dramatically increases the number
           of access nodes.
                    In addition to leasing transmission linkes from the DoT, ISPs are also allowed to
           utilise the infrastructure planned to be set up by the Railways, State Electricity Boards,
           Power Grid Corporation etc. A point of disagreement might arise over the lease charges
           with the DoT likely to insist that these organisations should charge the same amount as
           DoT. The railways is planning two optical fiber-based networks between Chennai and
           Mumbai and Delhi and Mumbai with branches at a number of places.
                   There are in all 183 operating Insternet Service Providers in India. Of them 41*
           ISPs are listed below.
SIFY                       Siti Cable Network         Gateway System (India)    World Phone Internet
Services
Broadband Technologies
Cable Modems
                 Passive Optical Networks are access networks in which fiber trunks are fed
         towards end points and split into multipoint trees along the way, until reaching a
         termination of the fibre run. A PON consists of Optical Line Termination (OLT) and
         Optical Network Unit (ONU) equipment.
                  It is deemed ―passive‖ because the physical connection between the OLT and
         ONUs, referred to as the Optical Distribution Netwrok (ODN), consists only of passive
         components such as optical fibres, connectors, splitters, combiners, and splice points.
         One OLT typically supports up to 32 ONUs; the ITU recommendation states a desired
         support for up to 64 ONUs.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
                 Ethernet has enjoyed phenomenal success in enterprise LANs since its inception
         in the early 1980s. today, well over 90 percent of deployed networks are based on this
         solid and standarized technology. It has grown from a shared 10 mbps technology, where
         all users on the network contend for the same pool of bandwidth, into a switched
         technology providing dedicated bandwidth to each subscriber at up to a full gigabyte of
         throughput. Thosands of Ethernet devices are available to handle everything from small,
         home-based networks, to wiring closets and even 500 backbones. World-Wide shipments
         of Ethernet devices measure in tens of millions of interfaces.
                 The IEEE 802.3 committee, which is responsible for the ethernet standard, is
         broken into sub-committees based on different versions of Ethernet. The following are
         the specific committees:
                         IEEE 802.3—Ethernet (10 Mbps)
                         IEEE 802.3u—Fast Ethernet (100 Mbps)
                         IEEE 802.3z—Gigabyte Ethernet (1000 Mbps)
                         IEEE 802.3ae—10 Gbps Ethernet (10 Gbps): standard under
         development.
         In Contrast, B2C reflects only the interactions between a customer and a retailer.
         Basically, B2C transactios include the following steps; (i) Account Acquisition, (ii)
         Product discovery through search and browse, (iii) Price negotiation, (iv) Payment, and
         (v) Product delivery. In some cases, dispute resolution and customer services may also
         exist.
                 E-commerce can be classified according to the transaction partners such as
         business-to-consumer (B2C), Business-to-Business (B2B), Business-to-Government
         (B2G), Consumer-to-Consumer (C2C), and Consumer-to-Business (C2B). within these
         broad categories, there are a number of variations in the way the models are
         implemented. Following table summarizes some of the current e-business models. The
         contents of this table are illustrated in the folrm of a diagram in figure.
                                      TABLE 1.3
                      SUMMARY OF E-BUSINESS TRANSACTION MODELS
         2. Globalization. Even being in a small company, the Web can make you appear to be a
            big player which simply menas that the playing field has been levelled by e-business.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
             The Internet is accessed by millions of people around the world, and definitely, they
             are all potential customers.
         3. Reduced operational costs. Selling through the Web means cutting down on paper
            costs, customer support costs,advertising costs, and order processing costs.
         2. Customer registers. The customer has to register to become part of the site‘s shopper
            registery. This allows the customer to avail of the shop‘s complete services, the
            customer becomes a part of the company‘s
            growing database and can use the same for
            knowledge management and data mining.
         7. Shipment and delivery. The product is then shipped to the customer. The customer
            can track the order/delivery as virtual malls have a delivery tracking module on the
            website which allows a customer to check the status of a particular order.
         8. Customer receives. The product is received by the customer, and is verified. The
            system should then tell the firm that the order has been fullfilled.
         9. After-sales service. After the sale has been made, the firm has to make sure that it
            maintains a good relationship with its customers. This is done throught customer
            relationship management or CRM.
         Business-to-Business (B2B)
                  B2B is that model of e-commerce whereby a company conducts its trading and
         other commercial activity through the Internet and the customer is another business itself.
         This essentially means commercial activity between companies through the Internet as a
         medium.
                  This is supporsed to be a huge opportunity area on the Web. Companies have by
         and large computerized all the operations worldwide and now they need to go into the
         next stage by linking their customers and vendors.
                  This is done by supply chain software, which is an integral part of your ERP
         application. Companies need to set up a backbone of B2B applications. Which will
         support the customer requirement s on the web. Many B2B sites are company and
         industry specific, catering to a community of uses, or a re a combnination of forward and
         backward integration. Companies have achieved huge savings in distibution-related costs
         due to their B2B applications.
         2. Focussed sales promotion. This information gives authentic data about the likes,
            dislikes and preferences of clients and thus helps the company bring out focusses
            slaed promotion drives which are aimed at the right audience.
         3. Building customer loyalty. It has been observed that online customers can be more
            loyal than other customers if they are made to feel special and their distinct identity is
            recognized and their concerns about privacy are respected. It has also been fund that
            once the customer develop a binding relationship with a site and its product, they do
            not like shift loyalties or faithfulness to another site or product.
         4. Scalability. This means that the web is open and offers round-the-clock access. This
            provides an access never known before, to the customer. This access is across
            locations and time zones. Thus a company is able to handle many more customers on
            a much wider geographical spread if it uses an e-business model.
                The company can set up a generic parent site for all locations and make regional
            domains to suit such requirements. Microsoft is using this model very successfully.
            The additional cost of serving a large segment of customers comes down drastically
            once a critical mass is reached.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
            It is important to know the right marketing strategies, which would be required to sell
            successfully and profitably over the Web. The Web as a medium provides you with a
            unique platform to enable various strategies, which would not have been possible to
            execute in a conventional scenario. Some of these are;
         1. Use of pricing as a tool, there is a wealth of research on pricing used as a tool to
            generate sales on the Internet. The biggest e-tailer of them all, amazon.com, made it
            big by giving substantial discounts. Part of these heavy discounts is attributed to the
            distributor level commiissions, which are now being passed on to the customer. Aprt
            from this, companies have started giving things free on the Internet in order to get a
            critical mass of subscribers, which helps in getting advertising revenues. The best
            example is the Apple IMac computer machine being given free if the buyer agrees to
            make a certain amount of purchase using the Apple’s e-commerce website.
         2. Use of application service provider model, this is an old model of the 1970s, which
            was used among mainframes, and dumb terminals, and which is being revisited with
            a re attempt. Software companies are offering their packages not in CDs and boxes
            but through the Web. The customer can log in over the Internet and access the
            software from the web server of the company and need not download it into his PC.
            This goes one step further in the age of the networked PCs where one need not use
            even a hard disk and all critical application data is kept on the Web and can be
            accessed from anywhere in the world. These service (which are not products) are
            being offered at, say $5 an hour.
         3. Use of generic models which are known for efficiency as well as personalized
            attention to various business customers. The Web has given rise to a new
            partnership between brick-and-mortar manufacturer, e-trailers, and express delivery
            companies like FedEx. These organizations take care of the individual elements of
            the customer, the order fulfillment and the post sale complaints, if any.
         4. Use of compariosn shopping. The Internet has brought in a whole new concept of
            price matching and comparison-shopping. Today there are sites, which will take you
            to hundreds of sites to fine the cheapest product to suit your specifications. This
            would never have been possible without the Internet.
                                      TABLE 1.4
                           COMMON ELEMENTS OF B2B EXCHANGES
         Elements                                             Benefits
         Centralized markspace                        Neutral and nonaligned with
         either sellers or buyers.
         3. Community or alliance. In the community model, alliances are used to achieve high
            value integration without hierarchical control. Members and ene-users paly key roles
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
             as contributors and customers. Basically, communities produce knowledge with
             economic value, such as Linux, MP3, and Open Source.
         4. Content. Content is the end product of this model of B2B commerce. It has the
            purpose of facilititating trading. Revenue can be generated from subscriptions,
            membership or advertising. For example, there are e-companies that sell information
            about contracts to bid market intelligence and analysis, and jobs by industry.
         Consumer-to-Consumer (C2C)
         With the C2c e-business model, consumers sell directly to other consumers via online
         classified ads and autctions, or by selling personal services or expertise online. Examples
         of consumers selling directly to consumers are ebay.com (auction) and TraderOnline.com
         (classified ads).
                  There are also a number of new consumer-to-consumer expert information
         exchanges that are expected to generate $6 billion in revenue by 2005. Come of these
         exchanges, such as AskMe.com and abuzz, are free, and some allow their experts to
         negotiate fees with clients, InfoRocket.com, one of the first question-and-answer
         marketplaces, is driven by a person-to-person auction format. The InfoRocket.com
         bidding system allows a person who submits a question to review the profiles of
         ―experts‖ who offer to answer the question. When the person asking the question accepts
         an ―experts‖. Who offer to answer the question. When the person asking the question
         accepts an ―expert‖ offer, InfoRocket.com bills the person‘s credit card, delivers the
         answer, and takes a 20 percent commission.
         Consumer-to-Business (C2B)
         The C2B model, also called a reverse auction or demand collection model, enables
         buyers to name their own price, often binding, for a specific good or sergice generating
         demand. The website collects the ―demand bids‖ and then offers the bids to the
         participating sellers. ReverseAuction.com (travel, consumer electronics) and
         priceline.com (travel, telephone, mortgages) are examples of C2B e-business models.
         On the basis of value addition. Value addition is the addition of value to a product or
         service because of the opportunities that it offers on the Web.
         On the basis of Control. At the high end of control there is hierarchical control and at the
         low end there is no control, so that it is self-organizing. Normally, the control is done
         throught the policies of the website.
                 Based on these, nine types of transactions can be identified as listed below:
              Brokerage
              Aggergator
              Info-mediary
              Community
              Value chain
              Subscription
              Manufacturer
              Advertising
              Affiliate
                          These transaction types take place in a variety of ways. Moreover, any
                 given firm may combine one or two of these as part of its Web business stragegy
                 , following fiture dipicts the Transaction Model.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
         Brokerage Model
         The characteristics of the brokerage model are as follows:
          The price-discovery mechanism is its key-principle
          It is a meeting point for sellers and buyers
          Auctions and exchanges are the modes of transactions
          It is a ‗Free Market‘
          It consists of Global Network of Buyers and sellers
          It is a virtual Marketpace enabled by the Internet
          If ecompasses all types of organization now
            C2C trading
             (a) Allows buyers and sellers to trage directly bypassing intermediaries, and
             (b) Reduces cost for both the parties.
            Global reach
            Trading convenience, which
             (a) Allows trading at all hours, and
             (b) Provides continuity updated information.
            Sense of cimmunity through direct buyer and seller communication.
            Efficient access to information
            Alleviation of the risks of anonymous trading.
         There are three kinds of price discovery mechanisms, which from the basis for the
         brokerage model. They are:
                1. Auction
                2. Reverse Auction
                3. Market Exchange
             Some examples of price discovery mechanism based models are:
                 B2B
                     B2B sell side FastParts.com
                     B2B buy side FreeMarket.com
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
                     B2B exchanges Covisint.com
             Some Indian Brokerage sites are:
                www.baazee.com
                www.automartindia.com
                www.steelexchangeindia.com
                www.indiacar.com
             Of the three mechanisms listed, the first two—auction and reverse auction—can be
         discussed below.
                 Auction broker. Many different auction formats have emrged since the first
         auction occurred in Babylon in about 500B.C Today, different auction formats are
         aggregated on certain common attributes. There are open and sealed-bid auctions. There
         are auctions where the price descends at regular intervals. There are single auctions and
         double auctions.
                  English auction. The english auction is one of the most common auction
         formats. It is also known as the open-outcry auction (a type of auction made by group of
         people) or the Ascending-Price Auction. It is frequently used for selling art, wine, and
         other physical goods, which do not have a limited lifetime.
                  The english auction is defined in the following way: the auctioneer starts off
         auction with the lowest acceptable price or the reverse price. He then reserve bids from
         the bidders until the point from which there is not raise in the bid. At that point, the
         auctioneer ‗knocks down‘ the item, which indicates theat the highest bidder will receive
         the item in exchange for the sum of money he bid for. Sometimes, the reserve price will
         not be made known to the public. This may happen when the auctioneer is uncertain
         about the price expectation of the bidders and when he wishes the bidders to totally set
         the price level. As a consequence of not giving the reserve price, the item will never be
         sold if the highest bid is lower than the reserve price. He then receives bids from the
         bidders until the point from which there is no raise in the bid. At that point, the auctioneer
         ‗knockes down‘ the item, which indicates that the highest bidder will receive the item
         exchange for the sum of money he bid for, sometimes, the reserve price will not be made
         known to the public. This may happen when the auctioneer is uncertain about the price
         expectation of the bidders and when he wishes the bidders to totally set the price level.
         As a consequence of not giving the reserve price, the item will never be sold if the
         highest bid is lower than the reserve price.
                  The bidders are often anonymous, especially if the bidding occurs through
         electronic means, this is done to preserve the identity of the bidders. A well-known
         bidder may increase the price expectation of the product just because a person known to
         him has entered a bid. He may be his business rival. Therefore this kind of bidding will
         not be beneficial for the bidders. The seller might benefit from a ‗non-anonymous‘
         bidding process, if he wants to acquire the highest price possible. We must neverthless
         keep in mind that some bidders might not join this bidding process which can result in a
         lower finel price for the seller.
                  In a traditional physical auction, the auctioneer can hightgly influence the
         bidding process. He can manipulate bidders with his voice, his gestures, and his
         personality. Manipulation can to know each other, discuss topics of mutual interest, and
         petition one another for information. These bulletin boards are public forums that
         encourage open communication between users. eBay also encourages open and honest
         communication between the community and the company. Frequently, the members of
         the community organize grass-root movements to improve the environment in which they
         work and play. More than 60 million auctions have been completed on eBay since its
         inception. Following figure describes the eBay model.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
         Security. You can insantly check the reputation or business practices of anyone at
         eBay.the Feedbaack Forum is a place where users leave comments about each other‘s
         buying and seling experiences at eBay. A bidder checks his seller‘s Feedback Profile,
         before he places a bid, to learn about the other person‘s reputation with the previous
         buyers. If a person is a seller, he follows the same procedure with the bidders.
                  Every eBay purchase is covered by insurance, free of charge under the terms of
         eBay‘s program. If a person paid for an item and did not receive it (or if hs has received
         the item in a form unline), eBay will reimburse or pay back money to buyers up to $200,
         less the standard $25 deductible.
                  An escrow (an agreement of money between two person or organisations) service
         provides added security to both the buyer and the seller, in transactions involvong
         expensive items. eBay‘s escrow partner i-escrow, will hold the payment and send it to the
         seller only after the merchandise has been inspected and given approval by the buyer.
         The seller also is given the opportunity to inspect and approve a returned item before the
         buyer gets the refund.
             Reverse Auction
             The reverse auction business model is decribed on the priceline website.
         Priceline.com has pioneered a unique type of e-commerce known as a ―demand
         collection system‖ that enables consumers to use the internet to save money on a wide
         range or products and services while enabling sellers to generate incremental revenue.
         Using a simple and compelling consumer proposition—―name your price‖, they collect
         consumer demand (in the form of individual customer offers granateed by a credit card)
         for a particular product or service at a price set by the customer and cummunicate that
         demand directly to participating sellers or to their private databases. Consumers agree to
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
         hold their offers open for a specified period of time to enable priceline.com to fulfill their
         offers from the inventory provided by the participating sellers. The fulfilled offers
         generally cannot be cancelled. By requiring consumers to be flexible with respect to
         brands, sellers and / or product features, they enable sellers to generate incremental
         revenue without disrupting their existing distribution channels or retail pricing structures.
             Priceline.com was founded in October 1997. It launched its website in april 1998,
         trumpeting or announcing the idea of buyer-driven commerce as a way to use the Internet
         to secure the lowest possible price on airline fares. Patent claims have been a key factor
         in driving with customers in areas of airline service industry, automobile industry, hotel
         reservation services industry, home financing services industry, adaptive marketing
         programs, and through website banner referral.
             By creating these alliances, priceline.com has been able to capture the market in these
         various service ares, using their patented ―name your price‖ business model. With
         competition growing, such alliances have merely given priceline.com an advantage.
         Alliances formed in the automobile industry are with both new and used car dealers and
         with car rentals. Ford, Honda, Nissan are a few brands available on priceline.com. some
         firms have allied with priceline.com for their rental car business. The Affiliate Network
         Program enables the qualified independent websites to place the priceline.com hyperlink
         on their site, any referral from an independent website to priceline.com that results in
         business for priceline.com, receives $10 for first time qualified user and $1 for
         subsequent users.
             Priceline.com has adaptive marketing programs with numerious companies. These
         programs facilitate a revenue stream based on a referral programs with numerous
         companies. These programs facilitate a revenue stream based on a referral basis. There
         are also thrid-party participants who enable priceline.comto develop. These third parties
         are indirect alliances. Priceline.com depends on the use of the third party‘s computer
         systems. Some of these computer systems include: the central computer system for hotel
         and airline reservations, Lending tree Inc. for home financing, the fact of experience
         &communication for infrastructure, Web and database servers, and CallTech
         Communications Inc. for call centre. Priceline.com‘s major sourses of revenue are
         derived from the following areas:
         Priceline‘s competitive advantages lies in its ―name your price‖ business model. It is the
         world‘s first buyer-driven commerce system, and benefits both consumers and sellers by
         providing a unique platform where demand and supply meet. The model is fundamentally
         different from any other form of electronic commerce and it seems to revolutionize the
         way people shop for products.
         Aggregator Model
         Classic wholesalers and retailers of goods and services are increasingly referred to as ―e-
         tailers‖. Sales can be made based on list prices or through auctions. In some cases, the
         goods and services are unique to the web and do not have a traditional ―Brick-and-
         Mortar‖storefront.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
             1. Virtual merchant. This is a business that operates only from the Web and offers
                either traditional or Web-specific goods and services. The method of selling may
                be by list price or auction. An example of a service merchant is Facetime, which
                calls itself an ―application service provider‖. It offers live customer support for e-
                commerce websites (e.g. amazon, eToys, Eyewire and OnSale).
             4. Bit Vendor. This is a merchant that deals strictly in digital products and services
                and, in its purest form, conducts both sales and distribution over the Web.
             5. Subscription model. In this, the users pay for access to the site. High value-
                added content is essential (e.g. WallSt. Journal, ConsumerReports). Generic
                news content, viable on the news-stand, has proven less successful as
                subscription model on the Web.
    To be more precise, the aggregators are the connectors between the buyers and the sellers.
    They are involved in the overall process of selection, organization, matching the buyers‘
    requirement with the particulars of the available goods, fulfillment of the orders and enabling
    the customers to create a value about the sellers.
    2. Mainstream aggregators. These include sites like yahoo providing a Web directory and a
       search engine, along with a bunch of attractive tools like e-mail addresses, home pages,
       reminders, and many others. The most attractive feature of these sites is that they have an
       ‗Easy-to-Remember‘ URL which is one of the reasons for them to be the top traffic sites
       on the Web.
    3. Event aggregators. These are site that provide in-depth content and tools tailored to the
       needs of a particular group, which doubles as a clearly defined customer base, for
       example, mortgages—build tools, rates, advise, and the ability to purchase mortgage
       online in the same place (Microsoft‘s HomeAdvisor or HomeShark).
         E-commerce is forcing changes in the distribution channels that require all parties—
    manufacturere, distributors, retailers,consumers and logistics companies—to evaluate their
    value proposition and develop capabilities that will meet the evolving demands of the Internet
    age.Implications for manufactureres, other challenges and opportunities of e-commerce are
    that, it:
         The distribution channel and logistics infrastructure remains largely unchanged for
    products that are either perishable (a food product needed to kept in cool place) or require
    contact with the product prior to selection.
         The changes generated by e-commerce present equally significant opportunities and
    challenges for logistics and transportation companies such as GATX, ASD Systems, Logistix,
    Clickship.com, and a host of others that have sprung up or started to leverage the capabilities
    of the Internet.
         The implications of the model are that, for the growth of the ability to realize the
    potential for Internet-generated demand for delivery from local brick-and-mortar enablers, the
    same-day pickup and delivery infrstructure, will need to evolove rapidly. The fragmented
    nature of the same-day puckup and delivery service has limited acheivement of delivery
    density, productivity and proper marketing to reduce the cost of service.
         Logistics and transportation enable who can use the same levelof technology, marketing,
    operational planning, management talent to same-day service that has fuelled the growth of
    the express market, will find that the pent-up demand for this service with e-commerce
    models can be greater than what Frederick Smith envisioned for overnight service when he
    launched Federal Express.
    Chennaibazaar.com
    Chennaibazaar was officially launched on 28th Dec. 1998, initilaly offering e-commerce
    services to chennaites. It is a B2C gifting and a retail shopping website. This was the first
    shopping mall to be launched from Tamil Nadu. The name chennaibazaar was coined,
    keeping in mind that its services and operations would be conrfined only to chennai.
         Chennaibazaar started with a listing of more than 2000 departmental products, which a
    chennaite could select from and get delivered at his doorstep anywhere in chennai, absolutely
    free of cost. This was a cash-on-delivery model.
         In june 1999, chennaibazaar was completely restructed to target only the chennai-based
    NRIs, who could send gifts like cakes, flowers and sweets to their friends and relatives in
    chennai. This concept became a major hit with a hign growth rate in terms of the number of
    customers. Chennaibazaar.com from then onwards started to be known as the green site.
         Gradually, chennaibazzar extended this service all over india and now it is very popular
    among NRIs from all over the world. Through the domain says chennai, it has exteded its
    service to more than 45 cities all over india.
         Therefore, even though the website was set up on a modest scale, its operations now are
    spread all over the world, manily helping indians living abroad to stay connected with their
    people and their homeland. Chennaibazaar is also now associated with Pioneer Tradings Ltd.
    In the United Kingdom, where it is operating in the name of Reachhindustan.com.
         Though chennaibazaar offers a wide variety of goods for thecustomer to choose from, it
    also provides the customers with the facility of goods for the customer to choose from, it also
    provides the customers with the facility of mentionaning any special commodity in their
    ―Request a Product‖. Chennaibazaar then gets back to the customer to confirm whether the
    requested commodity can be arranged by it and what would be its price.
         The commodity is also then included in their shopping cart to enable the customer to
    place an order for it.
    Most products are purchased from the best known shops in the city, those renowned for their
    quality. In case a customer wants the item to be purchased from any specific place,
    chennaibazaar also provides him with the facility of placing a request in their ―Request a
    Product‖. The website gets back to the customer, confirming the availability and the price of
    executing this demand.
         Website generally askes for a time peiord of 72 hours to complete the delivery withing
    chennai and for a period of 5 days otherwise, through in some special cases like delivery in
    talukas and villages the time span may be up to 7 days.
         Since the site is an online merchant, it provides a variety of goods and services to its
    customers. But these goods are not their own. Once the order is placed, the company secures
    the products ordered from its business partners.
    1. Digital signatures. Digital signatures are used throughout the system in order to ensure
       that transactions arriving at a gateway are from an identifiable merchant, and that any
       information passed back to the merchant is from a SECURETRADING gateway.
                Each signature uniquely identifies it s source. Gateways also communicate with
       each other and with the control system using such digital signatures. In the event that a
       merchant‘s digital signature becomes a security risk (e.g. if their server is stolen), the
       appropriate signature is immediately revoked and it will no longer function within the
       system.
    2. Encryption. All communication within the system is strongly encrypted using 2048-bit
       RSA encryption with variable 168-bit session keys (i.e., each transaction uses a new key).
       This is significantly (many billions of times) more secure than the standard browser SSL
       security provided by, for example, Internet Explorer.
                 SECURETRADING encryption is also much more secure than that specified for
       the SET (Secure Electronic Transaction) protocol. The high level of encryption used is
       forecast as not being a requirement until the year 2015. The encryption is of course
       totally transparent to the merchant and his / her customers.
                 All payments are accepted through credit cards only. The credit card details are
       accepted throught the SSL protocol. All transactions are secured, powered by CGI script
       capable of procesing credit card transactions, ensuring that the information is encrypted
       before it is transmitted. The credit cards accepted are Amerian Express, VISA, Master
       Card, and Discover.
                 Goods are delivered all over the would through FedEx. For delivereis in India,
       items are delivered through the courier service. Every care and precaution is taken to
       ensure proper quality and timely delivery of the items. Delivery is made on the date
       specified. Deliveries on Sunday are available only for chennai.
                 Special delivery charges have to be incurred by the customer in case of delivereis
       to places like the USA, Canada, etc. In case of any delay delivering the product, the
       company is liable only to the extent of the price of the product.
Automortindia.com
            To simplify the process of buying and selling automobiles in the Indian automotive
             space.
          To provide a high level of transparency and credibility in the used car market:
              Virtues sorely lacking in the current scenario.
         To this end, Automartdindia Led. Offers its customers a range of services—from choice
         of a certified vehicle, to certification, finance and registration, insuarance, insurance,
         valuation, etc.—that simplify the entire process and helps them make informed sales and
         purchase decisions. Automartindia Ltd. Is in a unique position to leverage its intrinsic
         strengths and create a unique alignment of the interests of purchasers, sellers, dealers,
         automobile associations, and manufacturers.
                  Automartindia recognizes that a car in the India context is much more than just
         transportation. It is a symbol of achievement, recognition of value and a major milestone
         in the life of most of our targe groups. Hence automartindia has positioned itself as a
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
         companion that helps its customers achieve this milestone with the least possible
         discomfort.
Services Offered
    1. Used Vehicles. Automartindia has the largest online inventory of used cars from over 70
       cities in india. Moreover, its retail outlets are equipped to display at least 50 small,
       medium and premium segment cars at any given point of time.
                 Towards providing credibility and transparancy in the highly disorganized used
       car market, automartindia certification program works at two levels. While the used car
       buyers can ensure what they pay for is what they get, the sellers can actually sell their
       vehicles faster by avoiding prolonged negotiations and haggling once they have put all
       their cards on the table.
    2. New vehicles on the site. Automartindia offers its users a range of new cars from small
       family cars to premium sedans (a car with seats for 4-5 people). This is coupled with
       other helpful services like online reviews and technical statistics that users can avail of on
       the site. They can also run a dealer search to find the dealer closest to them.
                 Perhaps the most daunting task in the transaction of used vehicle is the
       paperwork that needs to be done. Automartincia ensures complete documentation at the
       time of procurement itself. Besides this, a check on accident history is also done.
       Automartindia has tie-ups with financial institutions for consumer. Loans.
                 This product has also been developed to plug a huge need gap in the used car
       business. Warranty is provided for a period of 6 months or 8000 kms (which ever is first).
       This is provided as per the original manufacturer guidelines, thus ensuring that the same
       service standard is maintained for the car. This is a comforting factor for consumers of
       used cars. All this comes free to a consumer, through its ―portal‖, automartindia offers:
         1.   C2C trading:           sellers put their offerings online, buyers browse for the best possible
               opportunities, the buyer contacts the seller and then the two close the
              deal offline.
         2.   B2C trading:           Dealers put their offerings, both new and used cars, on the website,
              offering special discounts. The buyers may choose from this range as
              well.
3. Online Store: The website offers accessories online through its dealer network.
         4.   Physical presence:     The company has a dealer network spread across the contry and
              company-owned outlets in 5 cities, where the buyers can physically
              verify the condition of the cars.
                                     Partnerships and Tie-ups
---------------------------------------------------------------------------------------------------------------------
          Partner                                                    Value added
---------------------------------------------------------------------------------------------------------------------
       Hyundai Motors                            HTML has tied up with automartindia for its exchange
programmes.
         India Ltd.                              Under this programme, any customer walking into a Hyundai
                                                 showroom can get his card valued cand choose a brand new
                                                 Hyundai product of his choice. This scheme compliments both
                                                 companies because a customer walking into the showroom can
                                                 sell his vehicle to automartindia and in excyhange drive away
                                                 in a brand new Hyundai car.
General Motors India(GMI)         automartindia has tied up a strategic relationship with General
        Motors tolaunch used car outlets with GMI and its dealers.
        Automartindia would provide their skill and expertise, and
 Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
         GMI and its dealers would provide the infrastructure.
Indiatimes.com                        For developing the used car market, automartindia has tied up
                                               with the horizontal portal, indiatimes, to operate the car sales
                                               channel for them. This way, automartindia caters to the
                                               registered users of Indiatimes as well.
---------------------------------------------------------------------------------------------------------------------
         Info-mediary model
                  An organizer of virtual community is called an information intermediary or info-
         mediary, who helps sellers to collect, manage, and maximize the vaue of information
         about consumers. Data about consumers and their buying habits are extremely valuable,
         expecially when that information is carefully analyzed and used to target marketing
         compaigns. Some firms are able to function as info-mediaries by collecting and selling
         information to other businesses. An info-mediary may offer users free Internet access
         (e.g. NetZero) or free hardware (e.g. eMachines.com) in exchange for detailed
         information about their surfing and purchasing habits. Thie is more likely to succeed than
         the pure advertiseing model (Refer the Figure).
                  The info-mediary model can also work in the other direction, i.e. providing
         consumers with useful information about the websites in a market segment that competes
         for their dollar. Info-mediaries are in information business, implying that they competes
         on their ability to capture and manipulte information in a manner that adds value for their
         clients, who could be sellers or buyers.
         Value Addition
                  An analysis of the general info-mediary business model reveals that info-
         mediaries create and add value for the customer duding several critical phases from the
         initial search of the supplier and product comparision (as to whether it fulfils the
         requriements) to the actual transaction and ultimate product or service delivery (sales
         fulfillment). To support the initial phase, info-mediaries leverage the potential of the
         Internet to provide almost unlimited expansion of search space for consumers, thus
         overcomig the limitation of physical space inherent in traditional brick-and-mortar
         operations. Whilc the conventional store carry only the most popular items, amazon.com
         offers millions of items, most of which are sought only by a relatively few customer with
         specialized tastes.
                  Buyers can certainly expand their search space through search engines, but a
         more organized universe provided by info-mediaries is generally preferable. For example,
         at yahoo.com’s shopping area andamazon.com’szShops.com, buyers can search thousands
         of stores and millions of products. Aggregating a large number of suppliers, these info-
         mediaries save buyers‘ invaluable hours on tedious piecemeal searches through direct use
         of search engines. Ironically, the bringing toghether of buyers and sellers becomes
         increadingly necessary as the search space grows larger. In this sense, info-mediaries
         create and prepetuate or to cause something to continue their own demand.
                  Finally, info-mediaries also provide valuable assistance to buyers to make their
         purchasing decisions, by offering ―suitable‖ suggestions. This function is supported by
         technology for one-to-one marketing based on online customer profiling. Amazon.com
         not only anticipates book-buyers‘comments about the bok on sale.
                  This analysis reveals how info-mediaries help buyers expand, organize, and
         optimize their search spaces with information and information technologies. For some
         products, including books, CDs and flowers that are small in size and relatively easy to
         ship, info-mediaries provide support through bot the requirements and the axuisition
         phases. Thus, we identify two dimensions—vertical and horizontal—underlying the
         manner in which info-mediaries add and create value, as represented in the form of an
         info-mediary value grid: the vertical dimension is the acquisition cost.
                  The text ‗products‘ in figure of info-mediary model (the bottom-most block)
         refers to typically information-intensive items such as books, CDs, and houses. Flowers
         are not information-intensive, but infor-mediareis like 1-800-Flowers.com expand
         buyers‘ search spaces by locating a florist to deliver flowers anyshere in the world on
         their behalf.
                  Similarly, the search space for PCs is also enlarged, since buyers readily specify
         any desired PC configuration, often impossible to work out in a brick-and-mortar store.
         Home buyers can also benefit from info-mediaries such as Realtor.com, to navigate rhe
         range of selections. To complete an acquisition however, they need to work with local
         realtors collaborating with Realtor.com. for certain segments of the population (such as
         people who are just too busy), frequent trips to local stores to buy common household
         items and other daily necessities are inconvenient.
                  Start-up info-mediaries like Kozmo.com and Webvan.com provide value to busy
         people by helping them save time in doing their daily chores. Kozmo.com advertise itself
         by saying:‖Delivery to you in under an hour.‖
Classification of Info-mediaries
         2. Generic Agents. These info-mediaries maintain open relationships with both buyers
            and suppliers and involove no relatoinship-specific investment. Examples include
            search engines Hotbot.com and Google.com that provide open search capabilities to
            any buyer looking for a supplier. The info-mediaries create valuable through their
            comprehensive and unbiased service, often generating revenue from advertising,
            which is priced based on eyeballs or number of unique user clicks, and the value of
            screen real estate, some info-mediaries like Yahoo.com attempt to create additional
            stickness by providing community and personalization service. Others like
            Bizrate.com provide customers a rating system on various e-tailers‘ ability to deliver
            promised services.
         3. Supplier agents. Many info-mediaries start off in this quadrant, sponsored either by
            specific companies with a vested interest in selling their products or by close
            affiliation to the core group of sellers. Thus, they do not provide unbiased or able to
            judge options for buyers. Major auto manufacturers, for example, host their own
            websites.
                 Prior to offering other stock and mutual funds from a number of direct
             competitots, the Charles Schewab website started off as a supplier agent providing
             access to only its own products. The sustainability of these info-mediaries depends on
             the quality of suppliers they include, provision of benefits to buyers, and the ability to
             maintian a good infrstructure and seamless exchange platforms.
Evolution of Info-mediaries
         Community Model
         ―Community‖ is an Internet buzzword these days. The dictionary defines it as
         (a) A unified body of indivduals….
         (b) The people with common interest living in a particular area, broadly, the area itself.
         (c) An iteracting population of various kinds of individuals in a common location….
         E-communities (or electronic communities) are formed when groups of people meet
         online to fulfil certain needs, which include personal interests, trade goods and services,
         entertain and, seek help. The viability of the community model is based on user loyalty
         (as opposed to high traffic volume). Customer loyalty can be achieved by building e-
         communities. First, visitors come and look for information.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
                 Then, they start to contribute to the website by, for instantce, suggesting ways to
         improve the site or its services. Finally, they work inside website by, for instance
         volunteering as editors for a message board or by serving on a customer advisory board.
         Users make a high investment in both time and emotion on the site. In some cases, users
         are regular contibutors of content and / or money.
                 Having regular visitors contributes to advertising on info-mediary or specialized
         portal opportunities. The community model may also run on a subscription fee for
         preminum services.
         1. Most people long to be accepted and loved and concered about. These along with a
            desire to learn cause online communities to attract prople. Word goes around about a
            discussion going on or about a place to make personal or business contracts and
            visitors thus are attracted. They may end up joining the community.
         2. Communities on the Internet provide information. Since they tend to revolve around
            around about a particular interest of common task or hobby, they can be the sources
            for sharing information. And can become deep reservoirs of technical information.
         3. Communities also begest loyalty. Members develop the habit of visiting one
            particular site again and again. They get so used to the site, that they develop a sense
            of ownership, especially if they are involved in online communication.
         4. Communities also build your business. Once people become used to a site, they are
            quite comfortable making a purchase through it rather than going into unknown
            territory. Communities build ―stickness‖ (the tendencey to spend a long session at a
            particular site), and that in turn builds joyalty, which is return builds traffic and trust,
            and trust is the common currency of business.
Community Structures
         Discussion lists.      One of the best ways to build a sense of community is by e-mail
         discussion lists. In a typical discussion list, the listever software allows a member to send
         a message to the list address, and then sends that message to all the list members, all
         within a few minutes.
                 There are three types of discussion lists:
                 E-mail discussion list. all messages from the members are forwarded to other
         members as soon as they are received. If a particular list is not active several hundred
         messages could be on such a list. but a larger list with lots of discussion can easily
         generate 50 to 100 e-mails per day and swamp many users. Lists can be configured so
         that a moderator approves a message before it is sent to the members. The larger lists
         usually offer a digest option.
                  E-mail discussion list digest. The digest collects all the messages sent to the list,
         bundles them, and e-mails them in one-email to subscibers, either daily or when the
         accumulation reaches a certain size, depending on how the list is set up. A digest helps
         control the level of e-mail, but tends to inhibit spontaneous interactions among members
         on the list.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
                  Moderated discussion list digest.Large discussion lists are eventually forced to
         limit the quantity and screen the quality of message that go out to the list members. When
         people receive e-mail from the discussion list nearly every day, they begin to get
         acquainted with other list subscribers and recognize them by their comments and hobby-
         horses and idiosyncrasies or way of their behavirous.These various points of view make
         for a rich sense of community and commonality. If one member shares a problem,
         another will jump in with a solution that may work out well for the member.
Bulletin Boards
Chat Rooms
         Another significant type of community building tool is the chat room. This is a useful
         source of knowledge and information for any user. As for business people, it has a great
         utility value sometimes even people from public relations schedule chats and interviews
         with famous personalities. Such chats may have overwhelming (difficult to fight against
         something) respeonses and may also gear up businesses for nearly every business, it is
         prefered that the chats are scheduled ahead of time so thatenough people gather around
         for the same topic and have a meaningful discussion.
                   This may give fruitful results for business starters. If a small business needs a
         chat room, web hosting services often have no-or-low-cost rooms available. eGroups has
         a Java-based chat rooms built into their online list areas, if there is a need for occasional
         facility, but all participants need to register as group members to use the chat room. This
         gives additional security for the participants.
         What is really necessary to build a successful community? A lot of care and planning are
         involved. But be sure to have:
         1. A clear focus for the community that makes sense to prospective members.
         2. The requisite technicial capability through your own software and hardware or a free
             service.
         3. A proper structure, guidelines, and parameters for the discussion to keep the group on
             target.
         4. A moderator responsible for each group or list.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
         5. A clear strategy on how the community will benefit your business. Since
            communities care a lot for maintenance, it has to achieve something to make it worth
            your while.
         What effects can you expect a community to have on your business‘s profit and loss
         statements? Let us list them out as follows:
         4. Moderating or sponsoring a group puts you in the role of an expert in the industry,
            and gives you and your business high visibility.
         5. Narrowly focussed groups you sponsor (those who have a clear interest in your
            product or service).
         6. When your list is well developed you can earn some advertising revenue from e-mail
            ads or banner ads, but do not start a list expecting this to be your primary revenue
            stream—it probably will not develop this way for at least a year or two, if at all.
         Sulekha.com
         Anchored aournd the conepts of ‗expression‘, ‗interaction‘ and ‗community‘ that set it
         apart from scores of other ‗portals‘, ‗sulekha‘ is sustained by contributions of tens of
         captures like no other, the amazingly diverse and dynamic portriate of the world of
         modern India and Indians.
                  The driving theme of Sulekha is ‗community‘. In addition to building the
         definitive online Indian community, Sulekha is a pioneer in enabling offline communities
         through its comprehensive and popular network of city hubs, launched for 25 US cities
         and with designs to cover other cities around the world soon. Sulekha is the leading
         provider of integrated online event promotion and management, membership and fund-
         raising services to offline organizations. Sulekha today is the buggest ticketer of events
         and movies of interest to Indians, with a successful track record.
                  Sulekha is part of Smart Information Worldwide, Inc. a fully funded company
         with operations in Austin, USA and Chennai, India. Sulekha can easily boast of:
              o Thousands of contributors from over 50 countries.
              o Hundreds of thousands more who enjoy reading, watching and writing for
                  sulekha.
              o 500,000+ pages of content, more than 90% contributed by members.
              o Discussions, photographs, articles, art, events, news, reviews, recos, and much
                  more—all of them updated, lates,
                  analytical, informative, and thought provoking.
         Sulekha is one of the biggest creatinve and vibrant online communities of Indians and ‗a
         whole cauldron (a round container) teeming (full of people) with creativity, wit and
         fun‘(free press journal). Sulekha offers several ways to contribute. It does not matter if
         one is a not experienced, everyone is welcome to contribute to sulekha and become a
         member of its global family of contributors.
History of Sulekha
         Sulekha founded in 1998, had a humble beginning. Content for the site has grown purely
         by word-of-mouth and the intense loyalty of its members. Online participation by
         thousands evidently helps make the site a vibrant, loyal and dynamic platform.
                 Sulekha realizes the goal in a profitable manner by creating a flexible and
         powerful, interactive platrofm that connects Indians worldwide through a variety of
         popular and powerful services. Here are some concrete examples of how it does it:
         Social Capital: Sulekha provides the most popular platform for expression and
         discussions (articles/columns, coffeehouse, Web logs) that allows exchange of thoughts
         and opinions. Sulekha has helped raised over $1 million / Rs 5 crores for hundreds of
         cultural and charitable organizations by promoting and selling tickets for their funds and
         events.
         Economic Capital: Sulekha runs one of the most popular online classifieds services
         worldwide, which allows for the exchange of products and services among Indians.
         1. Online Advertising
         2. In-theater Advertising
         3. Direct Marketing
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
         4. Event Sponsorship
         5. Market Research
         Sulekha today attract more than 500,000 unique visitors every month using one or more
         of the services that it offers. Like
         1. Event promotion and online ticketing.
         2. Membership online
         3. Fund-Raising online
         4. Integrated website and community development
         5. Insurance planes
         AltaVista company is the premier knowledge resource on the Internet. With its strong
         search engine tool and patented technology, AltaVista opens up avenues in the maze of
         Internet to the richest and the most relevant information on any subject from any nook of
         the Web world, Web pages, shopoing, up-to-the-minute news, live audio and viedo, and
         community resources.
                  By capitalizing on the unique Web-wide features and services, the AltaVista
         network procides and distinct Internet experience through multiple integrated platforms,
         as in the following:
         1. AltaVista search. The world‘s fastest, most comprehensive search service available
            in 25 languages with 8 distinct search dimenstions.
         2. AltaVista shopping.com. The first Web-wide comparision shopping services on the
            Internet, providing objective price and product comparison features to help users
            make intelligent purchasing decisions.
         3. AltaVista Live.      The only real-time, customizable contents source on the Web,
            linking content channels on topics such as money, news, sports, entertainment, and
            more.
         4. AltaVista raging bull. The Web‘s stickiest site, which has the Web‘s most active
            community of message boards, with an emphasis on finance.
         5. AltaVista free access. One of the fastest growing ISP services in the world, with
            over 2 million registered users in the US and Canada.
         6. AltaVista internation. Currently over half of its traffic ocmes from outside the US.
            To further encourage this growth, AltaVista has recently created local sites in France,
            Germany, Italy, the Netherlands, Sweden, and the UK.
                 The portal gives the website owner access to online traffic reporting through
         Reporting.net site. With reports available at any time, the owner can assess how
         effectively his affiliate network site is marketing AltaVista‘s products.
         1. Search Catalogues, invetory database, auctions, classifieds, job listenings, and even
            suppliers.
         2. Imrove the success rate of incoming searches—new linguistic query processing tools
            let customers find products even when they do not know exact product names or
            model numbers.
         3. Allow users to sort results by brand, price, availability, or any method.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
             With these, we can tailor the search to fulfil specific requirements. They build
             communities on deep and rich topics and region-specific contents. They also present
             search results with the help of a customized interface. Added to all these, they
             leverage AltaVista‘s global index of images, new articles, and audio and video clips.
                 These create a central knowledge source to help make your enterprise more
             competitive. The company could link business partners, suppliers and others to the
             network.
                  My Yahoo! Is the user‘s own personalized version of Yahoo! After the user gives
         his personal information, My Yahoo! Allows him to collect all his favourite sections of
         Yahoo! In one place. He can choose what he wants to surf, as news, weather, stock
         prices, sports scores, TV and movie listings, horoscopes, and much more. It is like having
         a personal secretary who would collect the favourite sections of the newspapers, give
         information about mail and appointments for the day, and so on.
                  My Yahoo! Is absolutely free. To register, just click ‗Get your Own My Yahoo!‘
         on the My Yahoo! Home page and feed in your favourite sections. My Yaho is also
         completely portable, which means, a person can check My Yahoo! From work, home,
         school, a friend‘s house, or a cyber café. These are just some of the things that makes My
         Yahoo! A great home page. My Yahoo! Allows a user to have two pages—a home page,
         and another page. The important and frequently accessed in information may be stored
         here. All secondary information may be stored on the other page.
                  Some of the tpics that Yahoo!
          Pick your weather cities
          Track your stock quotes
          Read your choice of news
          Find local movie showtimes
          Follow your favourite sports team
       Manufacturer Model
       The Manufacturer or ―direct model‖, is predicated on the power of the Web to allow a
       manufacturer (i.e. a company that creates a product or service) to reach buyers directly and
       thereby compress the distribution channel, the manufacturer model can be based on
       efficiency, improved customer service, and a better understanding of customer
       preferences. In this model, the manufacturere sells its products throught the use of its
       website.
       Purchase. The sale of a product in which the right of ownership is transferred to the
       buyer.
       Lease. In exchange for a product in which the right to use the product under a ―terms of
       use‖ agreement. The product is returned to the seller upon expiration or default of the
       lease agreemennt may include a right-of-purchase upon expiration of the lease.
       Licence. The sale of a product that involves only the transfer of usage rights to the buyer,
       in accordance with a ―terms of use‖ agreement. The ownership rights remain with the
       manufacturer. (e.g. in case of software licensing).
       Tata Steel
       Established in 1907 at Jamshedpur, the company is one of india‘s best known symbols of
       inductrial growth. It represents the country‘s single largest, integrated steel works in the
       private sector, with a market share of about 13 percent. The company is india‘s single
       largest exporter of high-quality, value-added stell products. It is the producer of one of the
       cheapest HR coils in the world. A blue-chip company, Tata Steel Ltd has successfully
       raised $100 million through Euro bonds.
                 The company offers a diverse range of products and services. These include HR /
       CR coils and sheets, tubes, construction bars, forging qualifity steel, rods, structureal strips
       and bearings, steel plant and material handling equipment, Ferro alloys and other minerals,
       software for process controls and cargo handling services. Sister companies offer tinplate,
       wires, rolls, refractories, project management services, and material handling equipment.
                 The company has technological and strategic tie-ups with world leaders such as
       thyssen, Nippon Steel, Hitachi, Posadata, and McKinsey.
E-business
E-sales
       Building a trusting, long lasting, and mutually beneficial relationship with their customers
       has been Tata Steel‘s fundamental belief and driving force. This hs formed the cornerstone
       of all their intiatives. In line with this, their latest offering is the self-help customer
       service.
                Their site offers you a collection of reports on an online basis anywhere—
       anytime, easy to read directly from their SAP R/3 system. As a valued customer, you can
       now access information ranging from your order status to delivery status, invoices to
       credit notes, payment dues to credit status, and many more, through exclusively tailored
       reports.
E-procurement
       The Tata Iron & Steel company was founded by the visionary Indian Industrialist
       Jamshedji Nusserwanji Tata in 1907. Today, the company consists of steel works at
       Jamshedpur with its own capative colliereis (a coal mine) at Jharia and West Bokaro and
       ore (rock or soil from metal) mines and quarries (an artificial hole in the ground for sand)
       at Noamundi and Joda. It has a wide product range that includes billets, structural bars,
       strips, tubes and bearings, H-R coil, C-R coil, GP sheets and plates.
                 The secondary products profit Center focusses its attention on marketing of
       products which are secndary to the company‘s main business. It encompasses selling of
       steel scrap, used and rejected material, by-products, raw materials from works, under size
       and extra generation from their collieries, and obsolete capital equipment and spares. The
       division has its headquarters at Jamshedpur and the marketing office at Kolkatta.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
                In order to meet the customer‘s demand in the best possible manner, this site has
       been launched for Tender Information and online quoting, which is the quickest method to
       serve the customers.
       Advertising Model
       The web advertising model is an extension of the traditional media broadcast model. The
       broadcaster, in this case a website, provides content (usually, but not necessarily, for fee)
       and services (like e-mail, chat, forums), together with advertising messages in the form of
       banner ads. The banner ads may be the major or sole source of revenue for the
       broadcaster. The broadcaster may be a content creator or a distributor of content created
       elsewhere. The advertiseing model only works when the volume of viewer traffic is large
       or highly specialized.
                 Advertising-driven sites are currently one of the cornerstones of e-commerce.
       The principles is simple and well known. A site offers free access to something and shows
       advertisements on every page. When a user clicks on an advertisement (eyeballs) or for
       every time someone clicks on the advertisement (click-through).
                 The same idea is popular in computer programs. Users can download and use the
       program for free but advertisements are shown during operation or startu-up of the
       program. In particular, advertisements can be shown when the user needs to wait for some
       time consuming operation, such as printing or scanning.
                 It is well known that an advertisement related to the topic at hand on the site will
       get higher exposure and click –through since such advertisemetns are targeted to the siet
       visitors. So, the site operator earns more money if he places on the site such targeted
       advertisements. When displaying advertisements in a computer program, it is possible to
       targeted advertisements to the purpose of the program, e.g. a spreadsheet shows
       advertisements for a stock brokering services.
                 Search engines use this idea as well, but relate the advertisements to the
       keywords entered in a query. For instance, if someone searches information on hilidays, an
       advertisement is shown for a hotel chain on the page with search results. The
       advertisement can further be targeted based on the use profile for the user doing the
       search.
                 The existence of advertising-driven sites created a business opportunity for
       companies such as DoubleClick, which collects advertisements from many sources and
       arranges for placements on different sites. The sources pay DoubleClick for placing their
       advertisements, and this revenue is then shared with the site owners. Additionally,
       DoubleClick tracks the users that view all the advertisements, which allows it to build a
       user profile. This profile can then be used to more accurately target advertisements to
       these users.
       Sify.com
       Sify is india‘s pioneer in Internet and e-commerce, and offers integrated end to end
       solutions with a comprehensive range of products and services, for both the Business-
       Consumer (B2C) and Buiness-to-Business (B2B) segments, that cover the four critical
       cornerstones of the Net: Connectivitiy, Content, Commerce, and Community.
                Their mission is ―Making the Internet Work For You.‖
                Sify enables this through the products, services and technology that they offer in
       the comprehensive suite of Business-to-Business e-commerce solutions and expertise that
       they provide in assiciation with global leaders. They delight customers with innovative
       B2C solutions like Satyam Online, the instant Internet access package and www.sify.com,
       one of India‘s most popular portals.
                Sify established the first private TCP/IP public data network between all the
       major cities in the country. This revolutionized business computing in india, with its
       interconnectivity between multi-location offices, flexibility of platforms, addplication
       software, and smooth transfer of data. theirs is the first frame relay service, the first ATM
       backbone, the first public data network with 2Mbps backbone, and the first authorized
       Notes public network.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
                  Sify was the first private ISP to operate when the ISP policy was announced in
        1998, pioneering this category of service with a customer focus that has made them the
        qualitative leader in Internet access services. They were also the first to offer Internet
        telephoney in April 2002, after the change in policy allowed it.
                  Sify is india‘s first and largest private Internet Service Provider. Sify pioneered
        the first-off-the-shelf, ready-to-use Internet connection in a tamper-proof CD Pack.
        Available in a wide range of usage packs, SatyamOnline today enables thousands of
        subscribers to benefits from the power of the Internet.
                  Their consumer portal www.sify.com aims to enhance the quality of user‘s lives
        by making them more efficient, connected, and aware of the world around them. The
        portal has many pioneering initiatives with regard to shopping, managing one‘s financial
        portfolio and brand promosions, in addition to mail, messaging, and search.
                  As sify, their objective is to be a one-step, e-solutions shop with a range of
        innovative and cost-effective IT solutions, products, and services. That is why they hve
        formed alliances with leaders in e-commerce, Internet commerce, and network solutions.
        And they are strategically poised to give their clientele the best there is .
                  Sify‘s customer care processes are ISO 9002 certified—the first and only
        national Internet Service Provider to have such a certification.
                  So, at sify, you‘ll find Customer Care Centers across the country, providing
        anytime, anywhere support. These 24-hours Centers have dedicated teams of tranied
        customer care executive who address and diagnose all queries and problems related to
        SatyamOnline Internet access, swiftly and accurately.
                  In theirpursuit towards making organizations and the economy Internet driven,
        they are allied with those providing IT solutions, sales partners of our Internet-based
        products and services, Web-based solution providers including website designers and web
        hosting service providers, and online content providers.
        Subscription Model
        Usera are charged a periodic—dily, monthyl, or annual-fee to subscribe to a service. It is
        not uncommon for sites to combine free content with ―preminum‖ (i.e subscriber or
        member-only) content. Subscription fees are incurred irrespective of actual usage rates
        subscription and advertising models are frequently combined.
        Content services provide text, audio, or video content to users who subscribe for a fee to
        gain accessto the service. Example: Netflix.com
        Internet Services Providers offer network connectivity and related services on a montyly
        subscription. Example: America Online.The organization makes money on the basis of
        membership / subscription.
         eGrucool.com
         NIIT‘s vast experience in the field of educaion and eGurucool‘s expertise and in depth
         understanding of the curricula have come together to make this a good site for e-eduction.
         Students are assured of a holistic learning experience that ensures a rewarding
         performance in school and board examinations, apart from the building up of a strong
         concepturla foundationfor later life.
                 The salient features and benefits of the eGrucool way of learning are:
                 Weel structured lesson plans that generate interest, curiosity, and provide clarity
                  about the objectives that sould be achieved through the lessons. This ensures that
                  students are drawn towards the lesson and derive maximum benefit from it.
Courses offered
         An array of courses from eGrucool for students and teachers, course help and test
         preparation modules plus value-added services that enhance the qualitiy of education.
                 CBSE Programs
                 ICSE Programs
                 Maharashtra Board Programs
                 IIT JEE Programs
eConnect
             This is a service that empowers schools by connecting students, teachers and parents
             24 hours a day and 7 days a week! It includes creation and maintenance of school
             websites, onlie classnotes and assitgnments, and performance tracking. Through
             eConnect, eGrucool has tie-ups with over 1600 schools across the country and is here
             to change the way schools look at education.
Course Structure
The program is designed to cover the entire syllabus prescribed for a class:
                 The theory and concepts of each chapter are covered in detail in the class,
                  illustravtive examples are used to reinforce concepts.
                 Regular assignements and tests with ‗ideal‘ solutions.
                 Mid-course assessment is done through a set of section tests.
                 A set of full length tests that closely simulate the board pattern. A minimum of 7
                  tests.
                 In addition to lectures, students also get printed booklets as study material.
E-Services
             This is a web-based service that connects students, teachers and parents round-the-
             clock, 7 days a week. It allows student to access classnotes and assignements
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
             prepared by teachers and track their academic performance. Besides, eConnect
             provides an online marking tool for multiple choice questions.
eAssignments
         eAssignements allow teachers to put up their assignemtns for the class on eht web. So
         studetns can access it anytime….wherever there is a computer. This makes learning
         exciging, and helps students learni beyond the confines of their classrooms.
                 In short, eAssignments are an extension of value added information that teachers
         provide in classrooms. It increases pace of learning, integrates concept learning and test
         preparation, and undoubtedly gives a better forum for discussion.
                 eAssignemtns are supported by onjective type questions which the students can
         answer online and get an instant evaluation. The subjective assignments can be submitted
         online or in class.
eClassnotes
         This allows student to take MCQ test online. Not only this, an automated in-buil tool
         does an instant evaluation. Students get a fair idea of their preparation as both the
         questions and the answers are provided by their school teachers.
                  An extension of value added information that teachers provide in classrooms,
         MCQ tests provide ease of accessibility, besides incoreasing the pace of learning while
         integrating concept internatlization and test preparation.
Performance Tracker
         An automated, user-friendly and efficient online systm, the performance tracker keeps
         track of a student‘s academic perfmance througout the year.
                  It generates descriptive report cards—class, student, test and subject-wise—and
         provides information on a student‘s individual performance. Besides, it provides a
         comparative analysis vis-à-vis the class for all the exams and class test conducted in a
         year. The performance tracker archives all the marks saved.
                  Moreover, teachers are saved from all the labourious calculations that are
         associated with the preparation of report cards. The teacher simply has to login and feed
         in the marks for every exam and test conducted. The in-built tool in the performance
         tracker automatically makes new calculations for grand total, aggregate percentage, and
         class average, and accordingly updates the report card. While making calculations, it
         even takes into account the weightage awarded to class test and term-exams. Teachers
         can subsequently take printouts of the results for reference and qualititive feedback to the
         parents.
                  Performance trakcer, being online, can be referred to without the constraints of
         time. Separate login IDs are provided to teachers, students and parents to access the
         same.
Course activation
          Course activation is a one-time process. Once you have activated your course, you can
          access it straightway from the ‗My Account‘ area.
                    Enter the order number and course code for the course given in your strater kit.
          Enter course activation pin and the click SUBMIT button.
----------------------------------------------------------------------------------------------------------
         Affiliate Model
         In contrast to the generalized portal, which seeks to drive a high volume of traffic to one
         site, the affiliate mode provides purchase opportunities wherever prople may be surfing.
         It does this by offering finantial incentives (in the form of a percentage of of revenue) to
         affiliated partner sites. The affiliates provide purchase-point click-through to the
         merchant. It is a pay-for-performance model—if an affiliate does not generate sales, it
         represents no cost to the merahcnt. The affiliate model is unherently well-suited to the
         Web, which explains its popularity. Variations include banner exchange, pay-per-click,
         and revenue-sharing programs.
         In 1945, Vannevar Bush, who was director of the US Office of Scientific Research and
         Development (R&D), wrote an Atlantic Monthly Article about ways that scientist could
         apply the skills they learned during World War-II to peacentime activities. The article
         included a number of visionary ideas about future uses of technology to organize and
         facilitate efficient access to information. Bush speculated that engineers would eventually
         build a machine that he called the Memex (a memory extension device), that would store
         all—a Persons‘s Books, Records, Letters, and research results—on microfilm. Vannevar
         Bush described a system for associatively linking information in his July 1945 article in
         The Atlantic Monthly, ‗As We May Think’2.
                  Hypertext, as implemented on the Web, however, has its origins in the start of the
         electronic computer age, when ideas about associative linking could be married with the
         possibilities of automated storage-and-retrieval systems. Douglas Engelbart, who also
         invented the computer mouse, created the first experimental hypertext system on one of
         the larges computers of the 1960s. in 1965, Ted Nelson coined the term hypertext to
         describe a text that is not contrained to be sequential.
                  Hypertext, as described by Nelson, links documents to form a web of
         relationships that draws on the possibilities for extending and augmenting the meaning of
         a ‗flat‘ piece of text with links to other texts, Hypertext terefore is more than just
         footnotes that serve as commentary or further information in a text.
                   Istead, it extends the structure of ideas by making ‗chunks‘ of ideas available for
         inclusion in many parts of multiple texts, Nelson also coined the term hypermedia, which
         is a hypertext not constrained to be text, it can include the combination of text, pictures,
         graphics, sound, and movies.
                  The ideas of vannevar Bush, Ted Nelson and others, about information systems,
         showed up in another project in the late 1980s. In March 1989, Tim Berners-Lee, a
         researcher at the Conseil Europeen Pour la Recherche Nucleaire (CERN), the European
         Laboratory for Particle Physics in Geneva, Switzerland, Proposed a Hypertext system to
         enable efficient information sharing for members of the higher-energy physics
         community. This proposal, called HyperText and CERN, was circulated for comments.
         The important components of the proposal follow;
          A user interface that would be consistent with all plateforms and that would allow
              users to access information from many different computers.
          A scheme for this interface to access a variety of document types and information
              protocols.
          A provision for universal access, which would allow any user on the network to
              access any information.
         In October of 1991, a gateway from the web to Wide Area Information Server (WAIS)
         software was completed. On 15 January 1991, the WWW interface became publicly
         available from CERN, and the CERN team demonstrated the Web to researchers
         internationally throughout the rest of the year.
                  By 1993, there were about 50 Web Servers in existence, and the first graphical
         interfaces (Called Clients or browsers) for the X window system and the Machintosh
         became available in Switzerland. Until 1993, most of the development of Web
         technologies came out CERN. In earyly 1993, however, a young undergraduate, Marc
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
         Andreessen, at the University of Illinois at Urbana-Champaign shifted the stage to the
         United States.
                  Working on a project for the National Center for Supercomupting APlications
         (NCSA), Andreessen led a team that developed an X Window System Browser for the
         Web and Called it Mosiac. Marc Andreessen and his colleagues then left NCSA in March
         1994 to form a company that later came to be known as NEtsape Communications
         Corporation. By May 1994, the interest in the Web was so intense that the first
         internation conference on the WWW, held in Geneva, overflowed with attendees.
                  By mid 1994, it was clear to the original developers at CERN that the stable
         development of the web should fall under the guidance of an internation organization. In
         July, the Massaechusetts Insititute of Technology (MIT) and CERN announced the
         World Wide Web Organization (which was later known as the World Wide Consortium,
         or W3C). Today, the W3C guides the technical development and standards for the
         evolution of the Web.
         In 1995, the web development was marked by rapid commercialization and technical
         change, Netscape Communication‘s browser, called Netscape Navigator (nicknamed
         Mozilla) contined to include more extension s of the Hypertext Markup Language
         (HTML), and at the same time the issues of security for commercial cash transactions
         garnered much attension. By May 1995, there were more than 15,000 known public Web
         servers—a ten-fold increase over the number that existed only a year before.
                  Hypertext Transfer Progocol (HTTP) is the Internet Protocol responsible for
         transferring and displaying web pages. HTTP runs in the application layer of the
         Transmission Control Protocol/Internet Procotol (TCP/IP) model. Like the other Internet
         Protocols, HTTP employs the client-server model in which a user‘s web browser opens a
         HTTP session and sends a request to remote server for a Web Page. In repsonse, the
         server creates an HTTP response message that is sent back to the user‘s Web browser.
         After the client determines that the message it received is correct, the TCP/IP connection
         is closed and the HTTP session ends. The Process demonstrated in following figure.
         The number of World Wide Web users continues to double in size about every 12 to 15
         months. All of these have had an impact. Perhaps the most significant factor, though, is
         that the internet offers a range of messaging techniques, all of which work rapidly.
                  The standards used to make it work are not all ratified by international standards
         bodies, but they do work. The factor of not having to wait for standards to be agreed has
         surely accelerated the growth in the number of internet users.
Figure 1.16 : Growth in the number of internet hosts over the years.
         Advantages of E-commerce
         Some of the strengths of using the Internet for businesses include the following:
         1. 24 x 7 Operation. Round-the-clock operation is an expensive proposition in the
            ‗brick-and-mortar‘ world, while it is natural in the ‗click-and-conquer‘ world.
         2. Global reach.        The net being inherently global, reaching global customers is
            relatively easy on the net compared to the world of bricks.
         3. Cost of acquiring, serving and retaining customers. It is relatively cheaper to acquire
            new customers over the net; thanks to 24 x 7 operation and its global reach.
            Through innovative tools of ‗push‘ technology, it is also possible to retain customers‘
            loyalty with minimal investments.
         4. An extended enterprise is easy to build.                In    today‘s    world    every
            enterprise is part of the ‗connected economy‘; as such, you need to extend your
            enterprise all the way to your suppliers and business partners like distributors,
            retailers and ultimately your end-customers. The Internet provides an effective (often
            less expensive) way to extend your enterprise beyond the narrow confines of your
            own organization. Tools like enterprise resource planning (ERP), supply chain
            management (SCM) and customer relationship management (CRM), can easily be
            deployed over the Internet, permitting amazing efficiency in time needed to market,
            customer loyalty, on-time delivery and eventually profitability.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
         5. Disintermediation. Using the Internet, one can directly approach the customers and
             suppliers, cutting down on the number of levels and in the process, cutting down the
             costs.
         6. Improved customer service to your clients. It results in higher satisfaction and more
             sales.
         7. Power to provide the ‘best of both the worlds’.                  It      benefits       the
             traditional business side-by-side with the Internet tools.
         8. A technology-based customer interface.                  In a brick-and mortar business,
             customers conduct transactions either face-to-face or over the phone with store
             clerks, account managers, or other individuals, In contrast, the customer interface in
             the electronic environment is a ‗screen-to-face‘ interaction. This includes PC-based
             monitors, ATM machines, PDAs, or other electronic devices such as the DoCopMo
             iMode in Japan and the Nokia 7100 in Europe. Operationally, these types of
             interfaces place an enormous responsibility on the organization to capture and
             represent the customer experience because there is often no opportunity for direct
             human intervention during the encounter. If the interface is designed correctly, the
             customer will have no need for a simultaneous or follow-up phone conversation.
             Thus, the ‗screen-to-customer‘ interface has the potential to both increase sales and
             decrease costs. In fact, a number of innovators are entering the e-commerce markets
             with solutions that reintroduce humans into the process, such as the service
             representatives available on demand for Web users at www.liveperson.com when the
             interface does not work, not only is the revenue lost but the organization also incurs
             the technology costs. Thus, a poorly designed customer interface has both negative
             revenue and cost implications.
         9. The customer controls the interaction. At most websites, the customer is in control
             during screen-to-face interaction, in that the web largely employs a ‗self-service‘
             model for managing commerce or community-based interaction. The customer
             controls the search process, the time spent on various sites, the degree of price /
             product comparison, the people with whom he or she comes in contact, and the
             decision to buy.
                  In a face-to-face interchange, the control can rest with either the buyer / seller or
             the community member. At a minimum, the seller attempts to influence the buying
             process by directing the potential buyer to different products or locations in the store,
             overcoming price objections and reacting in real item to competitive offering.
                  The virtual store can attempt to shape the customer experience with uniquely
             targeted promotions, reconfiguration of storefronts to reflect past search behavior,
             recommendations based on previous behavior of other similar users, and access to
             proprietary information. However, the seller has much less power in the online
             environment due to the control and information flows that the online world puts in
             customer‘s hands.
         10. Knowledge of customer behavior.While the customer controls the interaction, the
             firm has unprecedented access to observe and track individual consumer behavior
             companies, through a third-party measurement firm such as Vividence and Accrue,
             can track a host of behaviors on websites visited, length of stays on a site, page views
             on a site, contents of wish lists and shopping carts, purchases, dollar amounts of
             purchases, repeat purchases behavior, conversion rates of visitors who have
             completed transactions and other metrics.
                  This level of customer behavior tracking, in contrast with tracking consumer
             attitudes, knowledge or behavioral intensions, is not possible in the brick-and-mortar
             world. Armed with this information, companies can provide one-to-one
             customization of their offerings.
                   In addition, companies can dynamically publish their storefronts on the web to
             configure offerings to individual customers. In a tactical embellishment, electronic
             retailers can welcome a user back by name. In more strategic terms, an online
             business can actually position offers and merchandise in ways that uniquely appeal to
             specific customers.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
         11. Network economics. In information intensive industries, a key competitive
             battleground centers on the emergence of industry-standard products, services,
             components, and or architecture. Network effects, as described by Metcalf‘s law, can
             best be expressed as the situation where the value of a product or service rises as a
             function of the number of other users who are using the product.
                  A classic example is the fax machine of other people who adopt the technology.
             A key characteristic of network‘s economic is positive feedback, that is, as the
             installed base grows, more and more users are likely to adopt the technology because
             of the installed base.
                   Many commercial wares in the digital economy revolve around setting a
             standard, growing the installed base and attempting to ‗lock-in‘ customers to the
             standard because of rising switching costs. This applies to both hardware (e.g. cable
             modems versus DSL lines) and software (e.g. MP3 versus streaming audio).
                  A key result of network effects and positive feedback is ‗increasing return‘
             economies as compared to the traditional decreasing-returns model often associated
             with the brick-and-mortar world. It also means that the traditional realities of
             marketing such as the importance of world-of-mouth (WOM) among potential
             customers, become greatly magnified in this new environment.
                  It is this turbocharged WOM phenomenon that makes viral marketing a reality
             for consumer-oriented e-commerce business such as ICQ in instant messaging
             system.
             Disadvantages of E-commerce
             Some business processes may never lend themselves to electronic commerce, For
             example, perishable foods, and higher-cost items (such as jewelry, antiques, and the
             like), may be difficult to inspect from a remote location, regardless of any
             technologies that might be devised in the future.
                  Most of the disadvantages of electronic commerce today, however, stem from the
             newness and rapidly developing pace of the underlying technologies. These
             disadvantages will disappear as e-commerce matures and becomes more and more
             available to and gets accepted by the general population. Many products and services
             require a critical mass of potential buyers who are well-equipped and willing to buy
             through the internet.
                  Business often calculate the return-on-investment before committing to any new
             technology. This has been difficult to do with e-commerce, since the costs and
             benefits have been hard to quantify.
                  Costs, which are a function of technology, can change dramatically even during
             short-lived e-commerce implementation projects, because the underlying
             technologies are changing rapidly. Many firms have had trouble in recruiting and
             retaining employees with technological, design, and business process skills needed to
             create an effective e-commerce atmosphere.
                  Another problem facing firms that want to do business on the internet is the
             difficulty of integrating existing databases and transaction-processing software
             designed for traditional commerce into a software that enables e-commerce.
                  In addition to technology and software issues, many businesses face cultural and
             legal obstacles in conducting e-commerce. Some consumers are still somewhat
             fearful of sending their credit card numbers over the internet. Other consumers are
             simply resistant to changed and are uncomfortable viewing merchandise on a
             computer screen rather that in person.
                  The legal environment in which e-commerce is conducted is full of unclear and
             conflicting laws. In many cases, government regulators have not kept up with the
             trends in technologies.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
             The potential for e-commerce is enormous in India, owing to the rapid growth of the
             number of Internet users. The enormous savings in time and money achieved by both
             buyers and sellers is the principal advantage.
             A pertinent question arises here about the readiness of Indian buyers for e-commerce.
             The proliferation of the Net at a rapid pace and the granting of private ISP Licenses
             has put the market en route to a new phase. Even small and medium enterprises
             (SMEs) have been increasingly realizing the potential of the net.
                 The technological advancements happening in all spheres of life in India will be
             the driving factors for the spread of e-commerce in this country, as has happened
             elsewhere in the world. NASSCOM (National Association of Software and Service
             Companies), has recently released the findings of its survey to evaluate the e-
             commerce scenario in India. E-commerce is dependent to a great extent, on the
             number of internet users in India. The following tables give the rate of growth of
             internet users in India.
                                      GROWTH OF INTERNET IN INDIA
             The Internet has undergone a steady evolution from being a source of instant
             communication in the early 90s to a rich source of internment and education. This
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
             evolution has been driven by the growing customer expectations with the content of
             Internet. Thus newer segments of Internet usage have emerged and there lie potential
             user segments that are still unexplored and may emerge in the future.
                  Five years ago there was limited Internet access but only in a few major cities, all
             in the hands of the government, VSNL, the agency responsible for Internet activities,
             and the DOT (Department of Telecommunications) provided an agonizingly erratic
             connectivity, with miserly bandwidth and far too few phone lines. Connection rates
             ran as low as 5% and users were frequently cut off. And the rates for this pathetic
             level of service were among the highest in the world. By the end of 1998, after three
             years of government monopoly, there were barely 150,000 Internet connections in
             India.
                  Presently, the government monopoly is largely over. Dozens of small to large
             ISPs have set up shop, triggering a price war and an improvement of service. Users
             are now estimated at over 37 million, with a growth predicted to reach more than 50
             million in the next three years.
                  According to the Nasscom survey, the total volume of e-commerce transactions
             in India was about Rs 450 crores in 1999-2000. Out of this volume, about Rs 50
             crores were contributed by retail internet or Business-to-Consumer transactions
             (B2C), and about Rs 400 transactions may seemto be negligible. However, given the
             situation in India, this amount seems impressive in the background of an almost non-
             existing regulatory framework to support e-commerce. Thus, if e-commerce-based
             businesses can emerge as viable propositions working within the confines of the
             existing not-so-conducive framework, imagine the potential that would be unleashed
             once we have a suitable, catalyzing framework in place! With the passing of the I.T
             Bill in both Houses of Parliament, a legal regulatory structure exists and what is now
             required effective enforcement.
             1. Financial services. A large number of users use the Internet for some form of
                financial guidance.
             2. Stock trading. Online stock trading is nowadays one of the most demanding e-
                commerce utilities. The ability to offer market access at a competitive price is a
                key advantage of online stock broking companies and this is slowly happening in
                India too.
             3. Banking. Internet banking is now growing. Many banks like ICICI and HDFC
                are making inroads into this area.
             4. Legal and professional services. Opportunities also exist for Indian companies
                in legal and other professional services. There are significant legal and regulatory
                implications of implementing an Internet business or of migrating from a
                traditional off-line business. In terms of opportunities for Indian legal service
                providers, the requirement for professional, legal and regulatory advice is
                expected to increase as the number of e-commerce users increases.
             5. Tour and travel. The travel industry has readily adapted to e-commerce. There
                has been a growing emphasis on the search for alternative distribution channels
                within the sector, particularly with the railways and the airlines, as they seek to
                reduce within the sector, particularly with the railways and the airlines, as they
                seek to reduce costs. These sectors have adapted well because of their online
                reservation systems.
The concept of electronic record, as envisaged by the Act has already been described. A secure
electronic record has been
         Defined in the Act as follows:
                 Where any security procedure has been applied to an electronic record at a
        specific point of time, then such record shall be deemed to be a secure electronic record
        from such point of time to the time of verification.
                 The security procedures envisaged are not prescribed by the Act. The Act
         specifies that the central government shall prescribed the security procedures. Thus
         insofar as the Act is concerned, the secure electronic record is a purely legal concept and
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
         not a technological one. The application of the prescribed procedure will create a
         presumption, in the eyes of the law, relating to the authenticity and integrity of the record.
         Therefore, not only must the security of the procedure be such that it indeed offers
         adequate security, but it must also be demonstrated that the correct procedure has in fact
         been applied.
                  The IT Act, 2000 prescribes that electronic records are to be authenticated by
         means of affixing a digital signature. This digital signature must be effected by the use of
         an asymmetric crypto system and hash function. In contrast, the European Electronic
         Signature Standardization Initiative (EESSI) is technology neutral in its prescription of
         how an electronic signature may be effected.
                  This point needs a little elaboration. Until fairly recently (about 1997) it was
         believed that the use of asymmetric crypto systems would be the foundation for all
         electronic authentication. However, there is an increasing awareness that other
         technologies, such as biometrics, also offer the promise of electronic authentication.
         Consequently, there is greater interest in technology-neutral legislation. This type of
         technology-neutral specification tends to be called electronic signature as opposed to
         digital signature, which is just one type of electronic signature.
                  The concept of a secure digital signature, as the Act puts it, is:
                  If, by application of a security procedure agreed to by the parties concerned, it
         can be verified that a digital signature, at the time it was affixed, was
                  (a) Unique to the subscriber affixing it;
                  (b) Capable of identifying such a subscriber;
                  (c) Created in a manner or using a means under the exclusive control of the
                       subscriber and is linked to the electronic record which it relates in such a
                       manner that if the electronic record was altered the digital signature would
                       be invalidated, then such digital signature shall be deemed to be a secure
                       digital signature.
                  It can be seen that the concept of secure digital signature is a purely legal concept
         rather than a technical one. The parties concerned must agree on a security procedure,
         and once it is demonstrated that the security procedure was indeed applied, then the
         digital signature will be deemed secure, and all the legal presumptions that stem from this
         consideration, will then be applicable.
                  The technical requirements for effecting digital signatures by the use of an
         asymmetric crypto system with has function are a private key to effect a digital signature
         and a public key to verify such a signature. The Act stipulates that the association
         between a subscriber‘s name and his public key should be made available by a duly
         licensed certifying authority in the form of a digital signature certificate.
                  The Act provides for a controller of Certifying Authorities to be appointed by the
         central government. The functions of the controller include licensing and regulating of
         operations of organizations that may act as certifying authorities.
                  A certifying authority provides a subscriber for a fee, with a digital signature
         certificate and a private key. The private key is known only to the subscriber. The
         certifying authority is obliged to:
             1. Make use of hardware, software and procedures that are secure from intrusion
                  and misuse.
             2. Provide a reasonable level of reliability in its services which are best suited to the
                  performance of intended functions.
             3. Adhere to security procedures to ensure that the secrecy and privacy of the digital
                  signatures are assured.
             4. Observe such other standards as may be specified by regulations.
                  The digital signature certificate of any subscriber is used by anyone who wishes
         to verify a digital signature purported to be affixed by that subscriber. Thus the basic role
         of a certifying authority is to establish trust in the name---public key association that is
         contained in the digital signature certificate.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
         From the perspective of the corporate sector, the IT Act, 2000 and its provisions contain
         the following positive aspects:
    1.   The implications of these provisions for the corporate sector would be that e-mail will
         now be a valid and legal form of communication in our country, which can be duly
         produced and approved in a court of law, the corporates today thrive on e-mail, not only
         as the form of communication with entities outside the company but also as an
         indispensable tool for intra-company communication.
                  Till now it has been seen that the corporates in their intra-company
         communications on e-mail have not been very careful in using the language in such e-
         mails. Corporates will have to understand that they need be more careful while writing e-
         mails, whether outside the company or within, as the same with whatever language could
         be proved in the court of law, sometimes much to the detriment of the company.
                  Even intra-company notes and memos, till now used only for official purposes,
         will also fall within the ambit of the IT Act and be admissible as evidence in a court of
         law, a possible consequence of the same for a typical wired company would be that any
         employee unhappy with a particular e-mail communication, whether received in an
         official or personal form, may make the said e-mail as the foundation for launching a
         litigation in a court of law. Further, when a company executive sends an e-mail to another
         to another executive in the company with some defamatory or other related material and
         copies the same to others, there are possibilities that he may land in a litigation in a court
         of law.
    2.   Companies shall now be able to carry out electronic commerce using the legal
         infrastructure provided by the Act. Till now, the growth of e-commerce was impeded in
         our country basically because there was not legal infrastructure to regulate commercial
         transactions online.
    3.   Corporates will now be able to use digital signatures to carry out their transactions online,
         these digital signatures have been given legal validity and sanction in the Act.
    4.   The Act also throws open the doors for the entry of corporates in the business of being
         certifying authorities for issuing digital signature certificates. The Act does not make any
         distinction between any legal entities for being appointed as a certifying authority so long
         as the norms stipulated by the government have been followed.
    5.   The Act also enables the companies to file any form, application or any other documents
         with any office, authority, body or agency owned or controlled by the appropriate
         government in the electronic form as may be prescribed by the appropriate government.
         India is rapidly moving ahead in the field of electronic governance and it will to be long
         before governments start their interactions with the public by taking applications or
         issuing license, permit, sanction or approvals, online. This provision can act as a great
         leveler as it will enable all kinds of companies to do a lot of their interaction with
         different government departments online, thereby saving costs, time and wastage of
         precious manpower.
    6.   Corporates are mandated by different laws of the country to keep and retain valuable and
         corporate information. The IT Act enables companies legally to retain the said
         information in the electronic form, if the
              a. Information contained therein remains accessible so as to be usable for further
                  reference,
              b. Electronic record is retained in the format in which it was originally generated,
                  sent or received,
              c. Details which will facilitate the identification of the origin, destination, date and
                  time of dispatch or receipt of such electronic record are available in the electronic
                  record.
    7.   The IT Act also addresses the important issues of security which are critical to the
         success of electronic transactions. The Act has also given a legal definition to the concept
         of secure digital signatures which would be required to have been passed through a
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
       system of a security procedure, to be stipulated by the government at a later, in the times
       to come, secure digital signatures shall play a big role in the new economy particularly
       from the perspective of the corporate sector as it will enable a more secure transaction
       online.
    8. IT Act, 2000 has defined various cyber-crimes and has declared them penal offences
       punishable with imprisonment and fine. These include hacking and damage to computer
       source code. Often corporates face hacking into their systems and information. Till date,
       the corporates were in a helpless condition as there was no legal redress to such issues.
       But the IT Act changes the scene altogether.
         However, despite the overwhelming positive features of the IT Act, 2000 for the
         corporate sector, some new legislations need to be enacted by the government in related
         areas.
         The IT Act, 2000 does not cover the following legal issues:
          Taxation Issues that arise out of e-commerce, Internet and m-commerce, transactions.
          Domain Name Registration Policy, as Digital Copyright Issues, Trade Makers,
             Patents,
          Privacy and Data Protection Issues.
          Rights to e-consumers, i.e. no provision for cover under COPRA.
         The IT Act does not have any clause ensuring security and protection to the online
         consumer while it is clear that consumers shall play possibly one of the most important
         roles in the success of e-commerce.
         The IT (Amendment) Bill, 2006, was introduced in the Lok Sabha (Lower House of
         Parliament) on December 15, 2006 by Union Minister of State for Communication.
         According to ‗Statement of Objects and Reasons‘ of the Bill the purpose of legislation is
         (1) harmonization of electronic communication and services with the Information
         Technology Act. (2) protection of Critical Information Infrastructure (3) to suggest penal
         provisions in the IT Act, Indian Penal Code, Indian Evidence Act, and the Code of
         Criminal Procedure to prevent the publication of sexually explicit material, video
         voyeurism, breach of confidentiality and leakage of data by intermediaries, e-commerce
         fraud like personation (phishing), identity theft, and transmission of offensive materials
         through communication services. The bill also seeks to enable the government to
         authorize service providers to collect service charges from customers as specified by the
         government.
Computer-related Crimes
         Section 43 of the principal Act (IT Act, 2000) deals with computer-related crimes
         including unlawful access to computer resources, sending computer virus, damage
         computer systems or disrupting communication systems, denial of authorized access to
         computer resources to someone, manipulation of electronic money transfer. Section 66
         deals with hacking while section 67 deals with publication of obscene materials in
         electronic form. According to the new bill both section 66 and section 67 of the principal
         Act will be totally substituted by new ones. Section 66 of the proposed legislation deals
         with computer-related crimes and according to it ‗if any person, dishonestly or
         fraudently, does any act referred to section 43, he shall be punishable with imprisonment
         for a term which may extend to two years, or with fine which may extend to five lakh
         rupees, or with both.‘ Section 66A makes sending offensive messages punishable which
         reads ‗any person who sends, by means of a computer resource or communicative device
         that is‘
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
    a) Grossly offensive or has menacing character; or           b) any content which he knows
       to be false, but for the purpose of causing annoyance, inconvenience, danger, obstruction,
       insult, injury, criminal intimidation, enmity hatred or ill-will shall be punishable with
       imprisonment for a term which may extend to two years and with fine.
         In order to prevent computer-related crimes and protect sensitive data The IT Bill, 206
         proposes to insert a new Section (43A) to make IT Companies and service providers
         make it mandatory to put in place reasonable ‗security practices and procedures‘
         protection of sensitive personal data. Section (43A) says, Where a body corporate,
         possessing, dealing or handling any sensitive personal data or information in a computer
         resource which it owns, controls or operates, is negligent in implementing and
         maintaining reasonable security practices and procedures and thereby causes wrongful
         loss or wrongful gain to any person, such body corporate shall be liable to pay damages
         by way of compensation, not exceeding five crore rupees to the person so affected.
         Section (43A (ii)) also suggests the government discuss with various stake holders how to
         define ‗reasonable security practices and procedures‘ as reads,
         As per the new bill the punishment for computer-related crimes will be reduced to two
         years imprisonment which was three years in the principal Act. However, fine has been
         increased from Rs 2 lakhs to Rs 5 lakhs.
                 Even though the new bill has widened the scope for the punishment for
         computer-related crimes, it does not address issues such as spam whereas the US has
         passed a separate anti-spam legislation.
         The proposed legislation seeks to amend the Indian Penal Code to prevent identity theft
         and cheating by impersonation by using information and communication technologies.
         The amendment (Section 417A) targets ‗whoever, cheats by using the electronic
         signature, password or any other unique identification feature of any other person, shall
         be punished with imprisonment by using any computer resource or communication
         device will be liable for imprisonment up to five years and shall also be liable to fine.‘
         According to Section 419A, anyone cheats by personation by using any computer
         resource or communication device will be liable for imprisonment up to five years and he
         / she shall also be liable to fine.
         Bok, pamphlet, paper, writing, drawing, painting is exempted from liability if the
         publication of which is ‗proved to be justified as being for the public good.‘ Publication
         or transmission of materials which is the interest of science, literature, art or learning are
         other objects of general concern or which is kept or used bona fide for religious purpose
         are deemed to be of public good.
         The IT Act, 2006 has been subordinated by inserting a new clause in Section 81 of the
         Principal Act which says, ‗Provided nothing that contain in this Act shall restrict any
         person from exercising any right conferred under the Copyright Act, 1957 or the Parents
         Act, 1970. This means any compliant with regard to violation of Intellectual Property
         Right will be dealt according to the provisions of the Copyright Act or Patent Act.‘
                                                   Exercise
Q. 1 Define internet. Why is internet important in E-Commerce?
Q. 2What do you mean by e-com? Write difference between inter and intra organizational e-
com?
Q. 3 what are the types of e-com? OR what are ecommerce models
Q. 4 explain what are the forces behind the development of e-com?
Q. 5 explain the economic potential of e-com with example?
Q.6 what are the advantages of e-commerce to traditional businesses.
Q.7 what are the disadvantages or constraints of e-commerce.
Q.8 write short note on:-
       A. peer to peer e-com,
       B. business to business e-com
       C. Consumer to consumer e-com
Q.9. Explain B2C ecommerce. OR Explain working process of B2C ecommerce model.
Q.10 what is Brick and mortar model of ecommerce.
Q.11 what are the main types of ecommerce.
Q.12 Explain the use of internet in evolution of ecommerce
Q.13 Define World Wide Web.
Q.14 what are the advantages of e-commerce
Q.15 Short note on-
       a) ISP b) URL c)internet client server Application d)Internet naming conventions
Q.16 Explain online extension of BAM model.
Q.17 what is difference between dynamic IP and static IP addressing?
Q.18 what is broadband technology? Explain types of broadband technology.
Q.19 Explain business model based on relationship of transaction types for E-commerce.
Q.20 Explain business model based on relationship of transaction parties for E-commerce.
Q.20 Explain client server architecture.
Q.21 Explain Ecommerce opportunities in India OR
Applications of ecommerce in India.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
Q.22 explain information technology act 2000. OR
      Write a short note on IT Act 2000. OR
      Explain the importance of IT Act 2000 for ecommerce or e-business.
Q.23 Explain few challenges for ecommerce business in Indian market OR
Explain e-transition challenges in Indian market. OR
Explain some internal or external factors in growth of ecommerce in Indian market.
Q.24 Write a short note on IPR. (Intellectual property rights)
Q.25 Write a short note on: ISP (internet service provider)
Q.27 what is the difference between EDI and E-commerce.
Q.28 what are the advantages of Business to consumer e-commerce model.
Q.29 Explain B2B ecommerce. OR Explain working process of B2B ecommerce model.
Q.30 what are the advantages of Business to Business e-commerce model.
Q.31 Write a short note on: Consumer to consumer e-commerce model.
Q.32 List down the E-business models based on relationship of transaction types.
Q.33 Define following: 1. Network 2. Router 3. Switch 4. Internet protocol
      5. explain connectionless and connection -oriented protocol
Q.34 Explain TCP/IP Protocol.
Q. 35 State the origin and growth of e-commerce? Also explain different types of
      E- Commerce.
Q.36 Discuss the Ecommerce architecture and its components in detail with the help of a
diagram
Q. 37 Discuss how E-Commerce is helpful to business success
Q. 38 Compare and contrast the traditional business with electronic commerce in a book shop
       Business.
Q.39 With the help of any example web site explain the perspectives of the buyers and sellers
in a B2B Ecommerce web site.
Q.40 What is BAM Model in online extension?
Q.41 List the challenges in E-transition in India.
Q.42 Define E-Commerce with suitable example.
Q.43 Explain the importance of Information Exchange.
Q.44 What is Internet? What is WWW? Explain the suitable example.
Q.45 What are disadvantages of E-Commerce?
Q.46 Write a short note on Information Technology Act 2000.
Q.47 Draw a diagram for pure waterfall life cycle.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
Unit-2 : E Marketing
    Today‘s markets around the world are racing to take advantage of its interactive
    nature, to communicate and foster exchanges and relationships with customers,
    suppliers, and the public. Also, the amounts of transactions on the Internet are
    increasing exponentially, as shown in the Table.
The shopping patterns among the countries can be seen in table 2.2.
Traditional Marketing
    If marketing is whatever you do to promote the sale of your products or services, then
    it should include:
    Market research—from competitive information-gathering to industry awareness to
    soliciting customer opinions and preferences.Publicity from press releases to the
    positioning of your company and its offerings in the marketplace.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
        Advertising that is text-based (classifieds) and graphic-based (display)Sales,
    including distribution and merchandising Customer service and customer support.
    Traditional marketing seems to fall far of three features. There are certain problems
    associated with it, which can be listed as follows:
        When a business creates a physical space in which to conduct its activities, its
    managers focus on very specific objectives. Few of these objectives are image-driven.
    An ambitious businessman must find a location that will be convenient for customers
    to access, with sufficient floor space features to allow the selling activity to occur,
    and they must take into consideration, the room space to store inventory and provide
    working space for employees. An added feature is the interior decoration which could
    enhance the business ambience, and at the same time attract customers.
        The success of a business relies on fulfilling these objectives in a tangible,
    physical location.
        On the web, businesses and other organizations have the advantage of creating a
    space of their own choice, design and other embellishments, good enough to make a
    distinctive presence. A website can have images, and can activate them by animation,
    thus making the customers feel and enjoy its presence. It can serve as a sales
    brochure, a product showroom, a financial report, an employment ad, or a customer
    contact point. Each entity that establishes a web presence should decide which tasks
    the website must accomplish, and which tasks are most important and need to be
    included for promoting their business.
        Different firms, even those in similar business, may establish different web
    presence goals, for example, Coca-Cola and Pepsi are two companies that have
    established very strong brand images and are in the same business, but have
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
    developed very different web presences. In figure 2.1, you can see the website of
    Pepsi.
        Now, have a look at their competitor‘s site, given in next figure 2.2. These two
    companies change their web pages frequently.
    Coca-Cola page usually includes its corporate image such as the Coke Bottles, while
    the Pepsi page is usually filled with hyperlinks to a variety of activities and product-
    related information.
    These web presences project the image of each of these companies.
        Each presence is consistent with other elements of the marketing efforts of these
    companies. Coca-Cola is maintaining its long-drawn traditional position, and Pepsi,
    as the upstart product favored by the younger generation.
        An effective site is the one that creates an attractive presence that meets the
    objectives of the business or the organization. These objectives include:
     Attractive visitors to the website
     Making the site interesting enough so that visitors stay and explore
     Convincing visitors to follow the sit‘s links to obtain information
     Creating an impression consistent with the organization‘s desired image
     Building a trusting relationship with visitors
     Reinforcing positive images that the visitors
     Encouraging visitors to return to the site.
        When firms first started creating websites in the mid-1990s, they often built
    simple sites that conveyed basic information about their businesses. Few firms
    conducted any market research to see what kinds of things potential visitors might
    want to obtain from these websites, and even fewer considered what business
    infrastructure improvement would be needed to keep the site alive.
        For example, few firms had e-mail address links on their sites, those firms that did
    include an e-mail link, often understaffed the department responsible for answering
    visitor‘s e-mail messages. Thus, many of the visitors‘ e-mails remained unanswered.
    The failure to understand how the web is different from other presence-building
    media is one reason why so many businesses fail to achieve their web objectives. The
    scenario has changed for the better in the recent times with the prominence of Internet
    technologies over others.
        Now, most of the websites that are designed to create an organization‘s presence
    in the web medium include links to a fairly standard information set. The sites give
    visitors easy access to its history, statements about its objectives or mission,
    information about products or services offered, financial information, and means of
    communication with the organization. Such sites achieve varying levels of success,
    depending largely on how they convey theses information. Presentation is important,
    so also is realizing the fact that the web is an interactive medium.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
     Meeting the Needs of Website Visitors
        Businesses that are successful on the web realized that every visitor to their
    website is potential customer. Thus, an important concern for businesses crafting a
    web presence is the variation in the visitors‘ characteristics. People who visit a
    website seldom arrive at it by accident; they are at it for a specific reason. The web
    designer who makes a site useful for everyone, needs to keep in mind some of the
    possible reasons listed as follows:
As such, e-marketing thrives with the maintenance of strong relationship between the
company and the customer. It is like a chain—the company acquires customers,
customers, fulfills their needs and offers support (before and after purchase), and gains
their confidence so that they return to it again. Thus the customer value is upheld. This is
illustrated in figure.
1. Click-through captures: -How many users click through to the next stage in
the customer acquisition process? .
2. Time spent. How long did the viewer stay at the site and which items, pages or routes
did the viewer select to navigate through the site?
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
3. Time spent searching.Did the viewer use the ‗site map' or 'search feature, and if so for
what and for how long?
4. Time spent before click-through.How long did a viewer linger in the opening stages
of the interaction and where?
5. E-mails and telephone calls.How many e-mails or calls did this section generate and
on what issues?
6. Registered users. If the site has a registration facility, what is the rate?
        By assessing these metrics in conjunction with data from other sources such as the
direct sales and marketing channels, an organization can estimate the content, format, and
accessibility of the online site. Though not perfect, it does provide a useful set of
parameters from which to judge the site's effectiveness to retain eyeballs and potential
future customers.
         Thus, during a visit to the online video store, a customer issues requests that will
cause these functions to be executed. For example, a customer may cause a search to be
executed by submitting a URL that specifies the name of an application to be run at the
server through a server Application Programming Interface(API) and the keywords to
be used in the search.
         The application will then execute a search in the site database and return an
HTML page with call the videos that match the search criteria. Remember that the
sequence of consecutive requests issued by the same customer during a single visit to an
e-commerce site is called a session.
         A customer may be classified as being in different states, according to the type of
function (i.e. request) requested during a session. For example, the customer may be
browsing, searching, registering as a new customer, logging in, adding videos to the
shopping cart, selecting the result of a search, or paying for the order.
         The possible transitions between states depend on the layout of the site. For
example, one customer may go from the home page to search, from search to select, from
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
select to add to cart, and from there to the payment area. Another customer may go from
the home page to the browse state before doing a search and leaving the online video
store without buying anything.
         To capture the possible transitions between the states in which a customer may be
found, we need a model that reflects the navigational pattern of a user during a visit to an
e-commerce site (Figure 2.5).
Fig. 2.5 States and transitions of the BBMG for the virtual videostore.
         The given model is in the form of a graph and is called the Browser Behavior
Model Graph (BBMG)." The nodes of the BBMG, represented by rectangles, depict the
states a customer is in during a visit to the e-commerce site. Arrows connecting the states
indicate possible transitions between them.
Entry
       This is a special state that immediately precedes a customer's entry to the online
store. This state is part of the BBMG as a modelling convenience and does not
correspond to any action initiated by the customer.
Home
         This is the state a customer is in, after selecting the URL for the site's home page.
Login
       A customer moves to this state after requesting a login to the site. Sometimes,
even a home page may ask him to login.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
Register
       To have an account created by registering with the online video store, the
customer selects the proper link for the registration page, thus making a transition to the
Register state.
Search
         A customer goes to this section after issuing a search request.
Browse
        This is the state reached after a customer selects one of the links available at the
site to view any of the pages of the site. These links include the list of bestsellers and
weekly promotions.
Select
        Asearch returns a list of zero or more links to videos. By selecting one of these
links, à customer moves to this state.
Add to Cart
        Acustomer moves to this state upon selecting the button that adds a selected video
to the shopping cart.
Pay (Billing)
        When ready to pay for the items in the shopping cart, the customer moves to the
Billing section.
Exit
         Customers may leave the site from any state. Thus, there is a transition from all
states, except the entry state, to the exit state.
         In the case of Figure 4.5, customers can enter the virtual video store at only three
states: Home. Browse, and Search. From the Home state, they can visit the Register,
Login, Browse, and Search states, as well as exit from the site.
         This figure reflects all possible transitions between states. However, during a
single visit to the e-store, a customer may not visit all states, or there may be different
visits by the same customer to the site, or there may be visits from different customers in
terms of the frequency by which these states are visited.
         Thus, to characterize the user behavior during a visit to the site, one must also
capture the frequency with which transitions occur.
         Consider that during a visit to the e-commerce site, a customer visits the Select
state forty times. Out of these, the customer moves to the Search state sixteen times, to
the Browse state fifteen times, to the Add to Cart state eight times, and once to the Exit
state.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
         We can then say that the transition frequencies out of the Select state are: 0.40
(=16/40) to Search state, 0.375 (=15/40) to Browse state, 0.2 (=8/40) to Add state, and
0.025 (=1/40) to state Exit.
         In general, we label each transition in the BBMG with the frequency with which a
customer follows the path between two states. Since we use BBMGs to characterize the
behavior of many similar visits to the site, we refer to the transition frequencies as
transition probabilities.
         For example, according to the BBMG of Figure 4.5, customers have a 10 per cent
probability of leaving the site after performing a search. This is indicated by a transition
from the Search state to the Exit state.
         From the Search state, customers have a 20 per cent probability of going to the
Home state, a 25 per cent probability of doing another search, a 20 per cent probability of
selecting one of the videos that resulted from the search, and a 25 per cent probability of
going to the Browse state.
         Different types of users may be characterized by different BBMGs in terms of the
transition probabilities. As an example, consider two customer profiles-occasional and
frequent buyers.
         The first category is composed of customers who use the Web store to find out
about existing products, such as new books or best fares and itineraries for travel, but exit
most of the time without buying or selecting.
         The second category is composed of customers who have a higher probability of
buying if they see a product that interests them and is affordable. Thus, workload
characterization for e-commerce entails in determining the set of BBMGs that best
characterize customer behavior.
         Note that it is possible for the same customer to exhibit different types of
behavior during each visit to the site. Thus, a BBMG is in fact associated to a visit to the
site and not necessarily to a specific customer.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
Aggregate Metrics for E-business Sites:
         Since the Web became a widely used vehicle to support all sorts of applications,
including e-business, the need arose to devise metrics to measure a site's efficiency in
attaining its goals. Table 4.5 lists common e-business functions when customers get on to
an e-business website.
                                              TABLE 2.5
                   AGGREGATE METRICS FOR E-BUSINESS SITES
     Category                     Function                                     Description
Common                   Login                            Login to the site. Register as a new user.
                         Register
                                                          Search site database. View one of the results
                         Search
                         Select                           of a search. Follow links within the site.
                         Browse
Retail                   Add Item                         Add item to shopping cart. Remove item from
                         Remove Item
                                                          shopping cart. Check contents and value of
                         See Shopping Cart
                         Create Registry                  shopping cart, Create a gift registry. Add item
                         Add to Registry
                                                          to gift registry. Check status of previous order.
                         Check Status
                         Pay                              Pay for items in shopping cart.
Information              Download                         Download software/report/music. Subscribe to
                         Subscribe
                                                          regular downloads. Listen to real-time audio
                         Listen
                         Watch                            (e.g. lecture). Watch real-time movie.
         Many metrics have been used to assess the success of sites in terms of popularity
and/ or revenue generated. Some of the standard metrics are as follows:
Hits/Second
         This measures the number of requests for objects served in each second by a
website. A page is usually composed of one HTML file and several other embedded
image files that are automatically requested from the Web server when a user requests the
HTML document. So, hits/second counts not just the HTML pages but all embedded
objects in a page as separate requests, which does not give an exact idea of the number of
times a specific page, with its advertisement banners, was viewed.
Page Views/Day
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
         This reflects the number of individual pages served per day. A company paying
for a banner ad to be posted on a page may be interested in the number of times its ad is
being seen. Very popular sites can display a few hundred million page views per day.
Click-troughs
         This measures the percentage of users who not only view an online ad but also
click on it to get to the Web page behind it. This metric is oriented more towards
assessing the impact of online ads.
         However, this measure can be misleading. If the message in the banner ad is too
general, it may draw a larger number of clicks than a more specific message. However,
users who respond to the more specific messages are more likely to be interested in the
product being advertised than those who react to the more general message.
Unique Visitors
         This indicates how many different people visited a website during a certain period
of time. Many times it is more important to know how many different people visited your
site than the total number of visits received during a certain period.
Revenue Throughput :-
         This is a business-oriented metric that measures the number of dollars/sec derived
from sales from an e-commerce site. This measure implicitly represents customer and site
behavior. A customer who is happy with the quality of service (e.g. response time) of an
e-business site will shop at the Web store, and the revenue throughput will increase.
Online Marketing
         Online marketing means using the power of online networks, computer
communications and digital interactive media to reach your marketing objectives. Online
marketing will not replace traditional forms of marketing anyway. Instead, it will both
add to and subtract from today's marketing mix.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
         It will add more interactivity. But it will subtract costs. It will add more customer
choices. But it will remove, marketing's dependence on paper. It will add "information
value‖ to products and services. But it will take away barriers to starting a business or
extending a business into international markets.
         And most importantly, it will turn upside down some old notions we have held of
what marketing is all about.
         There are three new market segments which are as follows:
Cyber buyers
         These are professionals who spend a good deal of time online, mainly at their
places of business. These professionals often have to make complex purchasing decisions
that require reams of data and difficult to locate sources of supply, all within a tight time
frame. That is a perfect fit with the capabilities of online technology.
Cyberconsumers
         These are the home computer users wired up to commercial online services and
the Internet. This group represents the pot of gold, and marketers simply need to find
ways to make it more attractive to shop and buy online than to go to the local store.
Cybersurfers
         They use online technology to expand their business future plans, challenge their
abilities, and for fun. This segment is typically younger, and possesses shorter attention
spans.
         Some of the important aspects of marketing are advertising, sales, security of the
transactions and the mode of payment used for payments. And all of these have had to
adapt and change themselves according to the demands of the Internet.
Databanks
         In the information economy, pure data is emerging as a hot commodity. With the
ease and low cost of delivering information over the Internet pushing down prices, data-
vendors are building profitable businesses in the market space.
         Convenient mechanisms for searching databases are making information services
use-friendly as well and importantly, businesses are also springing up to enable data-
shoppers to hunt for the information they need, in the form of search engines which
search millions of documents on the Internet to track down information.
Music
         Since it is recorded and stored digitally, music as well as the other audio products
are the perfect products for distribution over the Internet. Instead of buying cassettes or
CDs, customers can simply download the recordings from the site.
         The world‘s top music labels are setting up websites from which Internet
shoppers can buy their favorite pieces. They are also creating customer involvement by
setting up virtual communities of music aficionados who can access sample, value-added
information, such as lyrics and scores, directly through the Internet.
Retailing
         Two genres of online shopping malls are being set up by digital entrepreneurs.
The first consists of multimedia catalogues which shoppers can download through the
Internet without taking physical delivery.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
         The second variety is a supermarket service that offers gateways to the websites
of scores of other shops, acting as a single window for virtual shoppers. With electronic
payment systems becoming secure, customers will soon complete entire retailing
transactions on the Internet.
E-advertising
         Advertising is a $500 billion worldwide industry that, until now, has been mainly
a one-way street, with consumers passively absorbing advertising messages. Advertisers
hoped that potential buyers would remember their slogan or jingle long enough to make a
trip to the store and purchase the product.
         This has changed with the advent of interactivity. The new concept of
'interactivity' has overpowered the traditional concept of advertising, by putting the buyer
in the driver's seat. Interactivity allows consumers to increase their control over the
buying process. We are all deluged with an overflow of data. We long for a sense of
mastery over the information that washes over us. Given the opportunity, we will be more
selective about the kind of information we choose to receive. Interactivity gives us that
option. Thus, the audience is not captive any more, and the marketers would have to work
harder than before to entice them. The marketing efforts will have to be information-rich
and user-friendly.
                  Web-based advertising has become an important part of a company's
         media mix. Numerous companies are committing large advertising budgets to the
         Internet.
         Following are the reasons for the growing importance of e-advertisements:
    1. People increasingly prefer to surf the Internet rather than watch TV.
    2. The target audience goes to the advertisement, rather than the other way around.
    3. Development of business search engines by companies such as C2B
         Technologies, which aim to link buyers with online bargain sites for over a
         million products for comparison-shopping purposes.
    4. Yahoo! has a business unit which offers contests and prizes to online
         participants, which drive players to the websites of different clients. To play,
         participants     must    provide certain         data, including their preference of
         advertisements and tastes, which presents a valuable database as to customer
         preferences.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
    5. The growth of e-business. Dell Computers, for example, estimates that by
         2005, 85 per cent of its sales will be through the Internet.
    6. The Internet is not geographically restricted. Amazon.com sells 20 per cent of
         its books to foreign destinations, whereas a physical book store serves an area of
         only a few square miles.
Banners:-
         They make up 50 per cent of online ad revenues, but their effectiveness may be
waning. When IBM kicked off banner ads in 1994 on tech site Hotwire, 30 per cent of the
people who saw the ads clicked on them. Now the overall click-through rate for banner
ads has dropped to a measly 0.3 per cent.
         But it is the most commonly used form of advertising on the Internet. As you surf
your way through the information superhighway, banners are everywhere. The smaller
the file size, the quicker it gets loaded.
         Typically, a banner contains a short text or a graphical message to promote a
product. A major advantage of using banners is the ability to customize them to the target
audience. One can decide which market segment to focus on.
Skyscrapers :-
         These are the extra-long skinny ads running down the right or left side of a
website.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
Banner Swapping :-
         Banner swapping is nothing but a direct exchange of links between websites. To
be precise, company A may agree to display a banner (in the form of a link) of company
B in exchange for company B displaying company A's banner.
Effectiveness Tracking :-
         This is an upstart DynamicLogic designed by a pioneering service to help
traditional advertisers gauge the impact of their marketing by placing tiny files, called
cookies, on viewers' computers. This helps them track where people go after seeing their
ads.
Mini-sites, Pop-ups :-
         These ads burst upon the screens, allowing companies such as Volvo and
SmithKline Beecham's Oxy acne medicine to dish up games and product information.
Mini-sites allow advertisers to market without sending people away from the site they are
visiting. This type of advertising also gets higher click rates. Sometimes, these can be
intrusive and annoying.
Coupons :-
         Companies such as cool savings (www.coolsavings.com) offer their members
discount coupons which they can print out and then use for both online and offline
retailers. Coupons can be an attractive marketing mechanism because they encourage
product trial, and they are a way of selectively discounting prices to the most price
sensitive customers (those are willing to go to website and print out a coupon).
Loyalty Programs :-
         Companies such as click rewards (www.clickwards.com) offer their members the
chance to earn a currency, such as airline miles, by shopping at their network of partner
sites. The economics of customer retention are well known. An existing, loyal customer
is much more profitable than a new one, so rewarding existing customers to encourage
them to remain loyal can be a good tactic.
Partnerships :-
         While many offline companies arrange partnerships, the use of partnerships is
more widely in the New Economy. Similar to the manner in which complementary
companies often collaborate to push a new technology, Web companies often partner
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
with complementary sites to quickly provide a more value-enhanced service to site
visitors. One prevailing strategy is to select a customer niche and provide services that
encompass the customer's entire needs in that area.
Providing Information :-
         The Web allows sites to instantly offer information that is relevant to their
customer base. Many sites provide instantly accessible information to their customers as
a form of marketing and product differentiation. The e-commerce market for travel
(airlines, hotels, etc.) is very competitive, with many well-funded players. Sites try to
differentiate themselves by offering vast amounts of information to their customers.
Travel information can range from top restaurant and hotel information targeted toward
expense account business travellers, to time sensitive travel information to budget-
minded leisure travellers. Customers evaluate the information they receive and establish a
relationship with the site that best meets their needs. Sites try to capitalize on this
relationship by offering e-commerce opportunities like travel reservation services.
         Responses can be validated as they are entered, and other elements can be added
to the questionnaire, such as graphics, logos, and links to other Web pages. Also, data re-
entry errors are eliminated and statistical analyses can be done in minutes.
         Data from prospective participants can also be collected across international
borders. In addition, the participants have the flexibility of responding at any time, at
their own convenience. Real-time information and reporting can also be accomplished.
Market Segmentation :-
         For years, companies used direct mail to contact customers. However, they did it
regardless of whether the products or services were appropriate for the individuals on the
company's mailing list. The cost of the direct mailings was about $1 per customer, and
only 1 to 3 per cent responded. This meant that the cost per responding customer was
between $33 and $100. Obviously, this type of direct marketing was not cost-effective.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
         In segmentation, the company breaks thousands of customers into smaller
demographic segments and tailors its campaigns to each of those segments. Segmentation
is done with the aid of tools such as data modeling, warehousing, and mining. Using data
mining and Web mining, businesses can look at consumer buying patterns to slice
segments even finer.
         Unfortunately, this is not an easy process, and it requires considerable resources
and computer support. Most of the segmentation success stories involve large companies.
For example, Royal Bank of Canada segments its 10 million customers at least once a
month to determine credit risk, profitability, and so on.
         Their segmentation is very successful. The response to Royal Bank of Canada's
advertising campaigns has increased from 3 to 30 per cent. Segmentation is less
expensive than one-to-one personalization.
         It is also easier to obtain and maintain the necessary data. Segmentation is
important when the Internet goes for localization for advertisement, especially in India
with so many different states and languages. See Table 4.6.
                                              TABLE 2.6
                  CONSUMER MARKET SEGMENTATION IN INDIA
         Segmentation                                     Bases/Descriptors
          Geographic                  Region and states
                                      Size of state, city, district, village
                                      Statistical area
                                      Population density Climate
         Demographic                  Age
                                      Occupation
                                      Sex Education
                                      Family size
                                      Religion
                                      Family life cycle
                                      Caste
                                      Income
                                      Linguistic groups
          Psychosocial                Social classes
                                      Lifestyles
                                      Personality
     Cognitive, Affective,            Attitudes
        Behavioural                   Benefits sought
                                      Loyalty status
                                      Readiness stage
                                      Usage rate
                                      Perceived risk
                                      User status
                                      Innovativeness
                                      Usage situation Involvement
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
Educational and Age Profiles of Users? The educational and age profiles of users in
India are observed as shown in Figure 2.7 and Table 2.8 respectively.8
                                                       Undergraduates. ,
                                                              8
Postgraduates , 26
Graduates , 37
Professionals , 29
Points of Access
         Regarding the region-wise distribution within India, more than two-thirds of the
Indian Internet users are found to be in 6 cities. See Table 2.9.
                  Delhi                     •          Mumbai
                  Bangalore                            Hyderabad
                  Chennai                              Pune
                                                 TABLE 2.9
                     POINTS OF ACCESS FOR INTERNET IN INDIA
  Internet accessed from               % on a working day                     % on a holiday
Home                                               25                                 47
Cyber Cafe                                         30                                 27
Work                                               29                                 07
Others                                             16                                 19
         Considering the trends in the Indian market, it can be concluded from the rate of
growth of Internet and computer usage that India has the potential to grow even more in
this field and finally emerge as one of the countries with an exceptionally high computer
and Internet user population.
         However, right now, Internet marketing and advertising is very minimal; limited
to a small segment of the population.
The following are the major characteristics and objectives of data mining:
    1. Relevant data are often difficult to locate in very large databases.
    2. In some cases, the data are consolidated in data warehouses and data marts;
         in others, they are kept in databases or in Internet and intranet servers. Data
         mining tools help remove the information buried in corporate files or archived in
         public records.
    3. ―The "miner" is often an end-user empowered by ―data drills" and other power
         query
    4. Tools to ask ad hoc questions and get answers quickly, with little or no
         programmingskills.
    5. ―Striking it rich‖ often involves finding unexpected, valuable results.
    6. Data mining tools are easily combined with spreadsheets and other end-user
         software development tools; therefore, the mined data can he analyzed and
         processed quickly and easily.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
    7. Data mining yields five types of information: (a) association,
         (b)Sequences, (c) Classifications, (d) Clusters, and (e) Forecasting.
         Data miners can use several tools and techniques. The most well-known tools of
data
         mining are:
        Neural computing.Neural computing is a machine learning approach by which
         historical data can be examined for patterns. Users equipped with neural
         computing tools can go through huge databases and, for example, identify
         potential customers for a new product or search for companies whose profiles
         suggest that they are headed for bankruptcy.
        Intelligent agents. One of the most promising approaches to retrieving
         information from the Internet or from intranet-based databases is through the use
         of intelligent agents.
        Association analysis. This approach uses a specialized set of algorithms that
         sorts through large data sets and expresses statistical rules among items.
         Data mining can also be used to analyze websites. Web mining is the application
of data mining techniques to discover actionable and meaningful patterns, profiles, and
trends from Web resources.
         The term Web mining is being used in two different ways. The first, Web content
mining, is very similar to text mining. It is the process of information discovery from
millions of Web documents.
         The second, Web usage mining, is the process of analyzing Web access logs (or
other information connected to user browsing and access patterns) on one or more Web
localities. Table 2.10 shows various industries where data mining can be used.
                                             TABLE 2.10
                               DATA MINING APPLICATIONS
          Industry                                     Applications
Retailing     and         sales Predicting sales, determining inventory levels and
distribution                    schedules.
Banking                         Forecasting levels of bad loans and fraudulent credit
                                card use, predicting credit card spending by new
                                customers, predicting .customer response to offers.
Airlines                        Capturing data on where customers are flying and the
                                ultimate destination of passengers who change carriers in
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
                                   mid-flight; thus, airlines can identify popular locations
                                   that they do not service and check the feasibility of
                                   adding routes to capture lost business.
Broadcasting                       Predicting what is best to air during prime time and how
                                   to maximize returns by interjecting advertisements.
Marketing                          Classifying customer demographics that can be used to
                                   predict which customers will respond to a mailing or buy
                                   a particularproduct.
Product Brokering
         Once a need is established, customers search for a product (or service) that will
satisfy this need. Several agents are available to assist customers with this task.
         The pioneering agent in this category was firefly (a person with bright ideas). This
agent, which was purchased by Microsoft and is no longer available independently,
initially helped users find music they were likely to enjoy. Firefly (and similar agents)
use a collaborative filtering process to build profiles of people willvisit a website.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
         Firefly provided works with a tool that identified them when they visited sites
participating in the Firefly program and recommended products/ services to them. Based
on people's likes (favorite movies, music, interests), Firefly helped marketers predict
what customers were likely to want next. This allowed marketers to reach out to
consumers with a customized pitch that was cheaper and more effective than mass
advertising. It made product recommendations based on the prioritization of attributes,
such as price and delivery time, by users.
Merchant Brokering
         Once a customer knows what product he or she wants, the customer needs to find
where to buy it. Bargain Finder (from Andersen Consulting) was the pioneering agent in
this category.
         The agent, used in online CD shopping, queried the price of a specific CD from a
number of online vendors and returned a list of prices. However, this system has
encountered problems because vendors who do not want to compete on price only have
managed to block out the agent's requests.
Negotiation
         The concept of "market" implies negotiation, mostly about prices. In B2B
transactions, negotiation is very common. The benefit of dynamically negotiating a price
is that the decision is shifted from the seller to the marketplace. In a fixed-price situation,
if the seller fixes a price that is too high, sales will suffer. If the price is set too low,
profits will be lower. Electronic support of negotiation can be extremely useful.
         Kasbah also uses intelligent agents in the negotiation process. Kasbah agents
(kasbah.com) can negotiate with each other following specific strategies assigned by their
creators. However, this agent's usefulness is limited by the fact that price is the only
parameter considered.
         Agents can negotiate in pairs, or one agent can negotiate for a buyer with several
sellers' agents. In such a case, the contact is done with each seller's agent individually, but
the buyers agent can conductcomparisons.
Purchase and Delivery
         Agents are used extensively during the actual purchase, including arranging
payment and delivery with the customer. For example, if a customer makes a mistake
when completing an electronic order form, an agent will point it out immediately.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
         When customers buy stocks, for example, the agent will tell the customers when a
stock they want to buy on margin is not marginable, or when the customer does not have
sufficient funds. Delivery options at amazon.com, for example, are posted by agents and
the total cost is calculated in real-time..
Target Markets
         Marketing strategy involves identifying and analyzing a target market and
creating a marketing atmosphere that satisfies the individuals in that market. Increasingly,
marketers are reaching those individuals through the Internet. Currently, about 110
million Americans access the Internet either at home or at work. Although Internet access
outside the US has lagged behind in usage, people around the world are rapidly
discovering the Web's potential for communication and e-marketing. Internet use by
consumers in other countries-especially Japan (26.9 million users), Germany (19.1
million), the United Kingdom (17.9 million), China (15.8 million), and Canada (13.28
million)—is escalating rapidly..
         Although men have long dominated Internet usage statistics, women are using the
Internet for work and to simplify their lives, especially to save time and money. There are
27 million women online in the US, about 46 per cent of American Internet users, but
some experts predict that women would have outnumbered men (60 per cent to 40 per
cent) on the Internet by 2002.
         Women are also shopping online -53 per cent of women visitors make online
purchase. Internet access by American minority groups is also increasing, with 6.9
million Hispanics, 4.9 million blacks, and 4 million Asians online today.
         Marketers are also interested in the increasing use of the Internet by teenagers and
seniors over the age of 55 years. The 11 million American teenagers using the Internet,
spent $161 million online this year, and experts project that their numbers will reach 15.3
million and $1.4 billion in 2002.
         Seniors spent $3.5 billion online this year and are projected to reach $16.7 billion
in online spending by 2002. Such important target markets booming with Internet use,
more and more companies are finding market opportunities online.
Product Considerations
         The exponential growth of the Internet and the World Wide Web presents
significant opportunities for marketing products to both organizationsand consumers.
Through e-marketing strategies, companies can provide products, including goods,
services, and ideas, that offer unique benefits and improve customer satisfaction.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
         Computers and computer peripherals, industrial supplies, and packaged software
are the leading organizational purchases online. Consumer products account for a small
but growing percentage of Internet transactions, with securities trading, travel/tourism,
and books among the hottest consumer purchases.
         The online marketing of goods such as computer hardware and software, books,
videos, CDs, toys, automobiles, and even groceries is accelerating rapidly. Ideas such as
marriage counselling, medical advice, tax/legal advice, and even psychic services, are
being successfully marketed online as well.
         Services may have the greatest potential for online marketing success. Many
websites have sprung up to offer or enhance services ranging from home and car-buying-
assistance to grocery shopping and travel reservations, and in the travel industry, for
example, the ease and relatively low cost of booking travel arrangements online has
fuelled online ticket sales, with bookings increasing from $276,000 in 1996 to $1.9
million in 1998. They are projected to reach $8.9 million by 2002.
E-branding
         A known and respected brand name can present to potential customers, a
powerful statement of quality value and other desirable qualities in one recognizable
element. Branded products are easier to advertise and promote, because each product
carries the reputation of the brand name.
         Companies have developed and nurtured their branding programmes in the
physical marketplace for many years. Consumer brands such as Ivory soap, Walt Disney
entertainment, Maytag appliances, and Ford automobiles have been developed over many
years with the expenditure of tremendous amounts of money. However, the value of these
and other trusted major brands far exceeds the cost of creating them.
Elements of Branding
         The key elements of a brand are differentiation, relevance, and perceived value.
Product differentiation is the first condition that must be met with to create a product or a
service brand. The company must clearly distinguish its product from all others in the
market. This makes branding for products such as salt, nails, or plywood difficult, but not
impossible.
         If a brand has established that it is different from competing brands and that it is
relevant, and inspires a perception of value to potential purchasers, those purchasers will
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
buy the product and become familiar with how it provides value. Brands become
established only when they reach this level of purchaser-understanding.
         In traditional marketing, "branding" campaigns are designed to embed a company
or a product name in your consumer psyche. Firms often use a combination of persuasive,
emotional advertising campaigns and public relations to encourage a link between a
positive "feeling" and a product. If it works, it can make you want to spend your hard-
earned money as fast as possible. Online companies are putting branding to work with
remarkable success. Research shows the brand names of seven Internet companies are
already recognized by more than 50 million US adults, giving them ‗mega-brand' status.
According to Opinion Research Corporation International, the following Internet names
are top-of-mind with Americans: America Online, Yahoo!, Netscape, amazon.com,
Priceline.com, Infoseek, and Excite. Intelliquest a national computing survey was
conducted a research and asked 10,000 randomly selected Internet users (unaided by a list
of possibilities) to name the sites they associate with certain products. Following is the
result
        Books: Amazon.com (56%).
        Music: CDNow (24%)
        Computer Software: Microsoft (30%).
        Computer Hardware: Dell (20%) .
        Clothing: The Gap (12%).
        Travel: AOL, Yahoo!, Travelocity (each 8%)
        Autos: Yahoo! (6%)
    This clearly shows the effect that e-branding has on the psyche of the consumer. This
e-branding criteria is summarized in Table 2.12..
                                             TABLE 2.12
                                    E-BRANDING CRITERIA
Affiliate Networks
         Online marketers need to carefully plan and manage partner programs that give
them a broad reach of links on affiliate sites across the internet. Where 20 per cent of
Web users cite "random surfing‖ as their top means of finding new sites, marketers must
have extensive links in place, to maximize their reach to customers throughout the
Internet.
         So-called ―affiliate networks‖—which typically reward referring to sites with a
commission or bounty based on click-through, sales leads or completed transactions are
generally much more cost-effective than standard cost-per-thousand banner campaigns.
Advocacy Marketing
         Often the most powerful recommendation for a company is that of a satisfied
customer to a friend. With 20 per cent of surfers citing word of mouth from friends as
their top means of finding new sites, companies need to provide incentives (e.g.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
discounts, loyalty currencies) and simple mechanisms (e.g. Web-based e-mail forms,
pass-along e-mail newsletters) to enlist their customers as marketing advocates to their
friends—a strategy often referred to as "viral marketing" by online marketers.
Permission E-mail
         When customers explicitly opt into permission marketing relationships, e-mail
can be one of the most cost-effective and brand-positive means of acquiring new
customers and remarketing to existing customers.
         Savvy Internet marketers have realized that "e-mail marketing" does not need to
be synonymous with "spam‖. Instead, a range of strategies such as customer relationship
e-mail, corporate e-mail newsletters, reminder services, permission networks, sponsored
independent newsletters, discussion lists, and partner co-marketing can drive online
traffic and enhance brand equity.
E-care
         A key component of any brand experience is the quality of customer service and
support. While companies have long striven for customer service excellence in the offline
environment, they are finding that customer expectations for online service present many
unfamiliar challenges, such as managing a torrent of customer e-mail inquiries and
enabling efficient self-service knowledge bases.
         With the proper allocation of resources, however, companies can experience bran
1-positive efficiencies, delivering quality customer service more efficiently online than
through traditional channels. Companies that disappoint the user's expectations, however,
will damage their online brand equity.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
         Conventional offline branding is a promise, a relationship built over time, across a
wide range of media, gradually giving customers and would-be customers an impression
of the organization and an expectation of its products or services.
         E-branding is immediate. It is not based on the promise; it is based on that
dynamic flow of information or the transaction at hand. E-branding is the experience of
the words, images, and applications available on your site.
         Creating the experience is creating what you wish users to feel and think about
you, as they operate quite independently from one on the digital frontier (i.e. separating
boundary). The experience, then, is your brand.
         While existing brand equity can be brought to the online experience by your
customers, it can be destroyed in an instant through a negative interaction with your
website, banner ad, or multimedia presentation.
Marketing Strategies
Permission-marketing Strategies
         Many businesses would like to send e-mail messages to their customers and
potential customers to announce new products, new product features, or sales on existing
products.
         However, print and broadcast journalists have severely criticized some companies
for sending e-mail messages to customers or potential customers. Some companies have
even faced legal action after sending out mass e-mails. Unsolicited e-mail (i.e. voluntarily
or not called email) is often considered to be a spam.
         Many businesses are finding that they can maintain an effective dialogue with
their customers by using automated e-mail communications.
         Sending one e-mail message to a customer can cost less than one cent if the
company already has the customer's e-mail address. Purchasing the e-mail addresses of
persons who have asked to receive specific kinds of e-mail messages will add between a
few cents and a dollar 10 the cost of each message sent.
         Another factor to consider is the conversion rate. The conversion rate of an
advertising method is the percentage of recipients who respond to an ad or promotion.
Conversion rates on requested e-mail messages range from 10 per cent 10 over 30 per
cent. These are much higher than the click-through rates on banner ads, which are
currently under 1% percent and decreasing.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
         The practice of sending e-mail messages to people who have requested
information on a particular topic or about a specific product is called opt-in e-mail and is
part of a marketing strategy called permission-marketing. Thus, a marketing strategy that
only sends specific information to persons who have indicated an interest in receiving
information about the product or service being promoted should be more successful than
a marketing strategy that sends general promotional messages through the mass media.
One website that offers opt-in e-mail services is yesmail.com.
         To induce potential customers to accept or opt in to advertising information sent
via e-mail messages, the seller must provide some incentive.
         This incentive could be entertainment, a chance to win a prize, or even a direct
cash payment. For example, AllAdvantage.com is a company that pays web users for
permission to monitor their web surfing activities.
         After tracking these users, AllAdvantage.com presents targetted ads to them.
Advertisers are willing to pay a premium to have access to persons who have
demonstrated by their web surfinghabits thatthey are interested in the products or services
offered by the advertiser
Brand-leveraging Strategies
         Rational branding is not the only way to build brands on the Web. One method
there working for well-established websites is to extend their dominant positions to other
are and services. Yahoo! is an excellent example of this strategy. Yahoo! was one of
directories on the Web.
         It added a search engine function early in its development and has continued to
parlay (i.e. winning from previous bet)its leading position by acquiring other Web
businesses and expandingexisting offerings.
         Then, Yahoo! acquired GeoCities and Broadcast.com, and entered into an
extensive cross-promotion partnership with a number of Fox entertainment and media
Yahoo! continues to lead its two nearest competitors, Excite and Infoseek, in ad revenue
by adding futures that Web users find useful and that increase the site's value to
advertisers..Amazon.com's expansion from its original book business into CDs, videos,
and auctions is another example of a website leveraging its dominant position by adding
features of existing customers.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
Affiliate-marketing Strategies
         Of course,this leveraging approach only works for firms that already have website
this dominate a particular market. As the Web matures. itwill be increasingly difficult for
new entrants (i.e. a group of participants)and attain dominance. A tool that many new,
entrants to identify unserved market segments and attain dominance.
         A tool low-budget websites are using to generate revenue is affiliate marketing. In
affiliate marketing, one firm's (the affiliate firm's) website includes descriptions, reviews,
ratings, or other information about a product that is linked to another firm's site that
offers the item for the For every visitor who follows a link from the affiliate's site to the
seller's site, the affiliate
also obtains the benefit of the selling site's brand site receives a commission. The affiliate
site also obtains the benefit of the sell in exchange for the referral.
         One of the more interesting marketing tactics made possible by the Web is con
marketing, which is an affiliate-marketing program that benefits a charitable organization
(and thus. Supports a "cause"). In cause marketing, the affiliate site is created to benefit
the charitable organization.
         When visitors click a link on the affiliate's Web page, a donation is made by a
sponsoring company. The page that loads after the visitor clicks the donation linkcarries
advertising for the sponsoring companies. Many companies have found that the line
through rates on these ads are much higher than the typical banner ad click-through man
A leading retail Web florist, proflowers.com, has had excellent results advertising on the
Hunger Site page.
         When      a    visitor     clicks    the     button     on    this    page,     a    group   of
sponsoring advertisersdonates food to a hungry person and a page appears in the visitor's
browser with ads for the sponsors.
Viral-marketing Strategies
         Traditional marketing strategies have always been developed with an assumption
that the company was going to communicate with potential customers directly or through
an intermediary that was acting on behalf of the company, such as a distributor, retailer,
or independent sales organization. Since the Web expands the types of communication
channels available, including customer-to-customer communication, another marketing
approach has become popular on the Web. Viral marketing relies on existing customers
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
to tell other persons—the company's prospective customers—about the products or
services they have enjoyed using.
         Much as affiliate marketing uses websites to spread the word about a company,
viral marketing approaches individual customers to do the same thing. The number of
customers increases much as a virus multiplies, thus the name.
         Although most domains that have high value are dot-com sites, the name
engineering.org sold at an auction to the American Society of Mechanical Engineers, a
not-for-profit organization, for just under $200,000.
         Several legitimate online businesses, known as URL brokers, are in the business
of selling or auctioning domain names that they believe others will find valuable.
Companies selling ―good‖ (short and easily remembered) domain names include
Domains.com, DomainRace.com, GreatDomains.com, and HitDomains.com. Unclaimed
Domains sells a subscription to lists of recently expired domain names that it publishes
periodically, and the Netcraft website has a URL search function to search for words in
URLs.
         The Internet Corporation for Assigned Names and Numbers (ICANN) maintains a
list of accredited domain name registrars, which are companies that have been authorized
by ICANN to sell the rights to use specific domain names ending in com, pet, and org.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
Advertising-supported Model
         The advertising-supported business model is the one used by network television
in the United States. Broadcasters provide free programming to the audience along with
advertising messages.
         The advertising revenue is sufficient to support the operations of the network and
the creation or purchase of the programs.
         Many observers of the Web in its early growth period, believed that the potential
for Internet advertising was tremendous. However, after a few years of experience trying
to develop profitable advertising-supported business models, many of those observers are
less optimistic.
         The success of Web advertising has been hampered by two major problems. First,
as discussed earlier, no consensus has emerged on how to measure and charge for site
visitor views.
         Since the Web allows multiple measurements, such as of number of visitors,
number of unique visitors, number of click-throughs, and other attributes of visitor
behavior, it has been difficult for web advertisers to develop a standard for advertising
charges, such as the CPM measure used for mass-media outlets.
         In addition to the number of visitors or page views, stickiness is a critical element
for creating a presence that will attract advertisers.the stickiness of a website is its ability
to keep visitors at the site and to attract repeat visitors. People spend more time at a sticky
website and are thus exposed to more advertising.
         The second problem is that very few websites have sufficient numbers of visitors
to interest large advertisers. Most successful advertising on the Web is targeted to very
specific groups. However, it can be difficult to determine whether a given website is
attracting a specific market segment or not, unless that site collects demographic
information, which the visitors are increasingly reluctant (i.e. unwillingly)to provide
because of privacy concerns.
         Only a few general-interest sites have generated sufficient traffic to be profitable
based on advertising revenue alone. One of these is Yahoo!, which was one of the first
Web directories. Many people use Yahoo! as a starting point for searching the Web, and
the number of visitors increase day by day. This has made it possible for Yahoo! to
expand its Web directory into one of the first portal sites.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
         Because the Yahoo! portal's search engine presents visitors' search results on
separate pages, it can include advertising on each results page that is triggered by the
terms in the search. For example, when the Yahoo! search engine detects that a visitor
has searched on the term ―new car deals‖, it can place a Ford ad at the top of the search
results page.
         Ford is willing to pay more for this ad because it is directed only at visitors who
have expressed interest in new cars. This example demonstrates one attractive option for
identifying a target market audience without collecting demographic information from
site visitors.
         Unfortunately, only a few high-traffic sites are able to generate significant
advertising revenues this way. Besides Yahoo!, the main portal sites in this market today
are Excite, Infoseek, and Lycos.
         Smaller general-interest sites, such as the Web directory refdesk.com, have had
much more difficulty than the larger search engine sites in attracting advertisers. This
may change in the future as more people use the Web.
         Newspaper publishers have experimented with various ways of establishing a
profitable presence on the Web. It is unclear whether a newspaper's presence on the Web
helps or hurts the newspaper's business as a whole.
         Although it provides greater exposure for the newspaper's brand and a larger
audience for advertising that the paper carries, it can also take away sales from the print
edition, a process called cannibalization. Newspapers and other publishers worry about
cannibalization (i.e. reduction of sales from company), because it is very difficult to
measure.
         Some publishers have conducted surveys in to find out whether people have
stopped buying their favorite newspaper because the contents they want to see are
available online, but the results of such surveys are not very reliable.
         Many leading newspapers, including The Washington Post and The Los Angeles
Times, have established online presences in the hope that they will generate enough
revenue to cover the cost of creating and maintaining the website. The Internet Public
Library Online Newspapers page includes links to hundreds of newspaper sites around
the world.
         Although attempts to create general-interest websites that generate sufficient
advertising revenue to be profitable have met with mixed results, sites that target niche
markets have been more successful. For newspapers, classified advertising is very
profitable. Therefore, it is not a surprise that websites which specialize in providing
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
only classified advertising, have profit potential if they can reach a narrow enough
target market.
         An implementation of the advertising-supported business model which appears to
be successful is web employment advertising. Firms with websites such as
CareerSite.com and JOBTRAK offer international distribution of employment ads.
         As the number of people using the Web increases, these businesses will be able to
move out of their current focus on technology and higher-level jobs and include
advertising for all kinds of positions.
         These sites can use the same approach that search engine sites use to offer
advertisers target markets. When a visitor specifies an interest in, for example,
engineering jobs in Dallas, the results page can include a targeted banner ad for which an
advertiser will pay more, because it is directed at a specific segment of the audience.
         Employment ad sites can also target specific categories of job seekers by
including short articles on topics of interest. This will also ensure that qualified people,
who are not necessarily looking for a job, keep coming back to the site; such people are
the candidates most highly sought after by employers.
All of this and more add up to the Brand- the Times of India.
Case Discussion
    1. What are the advantages of having an internet version of the newspaper?
    2. Visit the site of The Times of India and identify the difference between
         the internet version and the actual newspaper?
    3. How does the marketing model fit into the internet version of the newspaper?
Rediff.com 10
         Founded in 1996, Rediff.com India Ltd., is one of India's leading Internet,
communications and media companies, serving Indians globally, both online and offline.
         Through its online and offline product and service offerings, Rediff.com offers
interest specific channels, local language editions, sophisticated search capabilities,
online shopping, long distance calling cards and Internet based telephony services.
         Its news publication, India Abroad, is one of the oldest and largest South Asian
weekly newspaper, serving the Indian American community in the United States. The
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
Company also provides users extensive Internet community offerings, all tailored to the
interests of Indians worldwide. Rediff.com has offices in New York, Chicago, New Delhi
and is headquartered in Mumbai, India.11
         At rediff.com, you can do almost anything that you would like to do on the
Internet. You could...
        Communicate better.
        Find useful information
        Have fun
        Enhance your career
        Simplify routine work
        Plan your life
        Stay informed. Buy and sell
    You can begin communicating by exploring any of the several ways in which
rediff.com can help you communicate better.
        Send and receive e-mail
        Chat with people
        Send an instant message
        Send greetings
        Build your own home page
        Voice your opinions
        Send e-mail from your mobile
         Rediffmail is a free e-mail service. Rediffmail also allows you to send e-mail in
most Indian languages. E-cards or electronic cards are the Internet's version of regular
paper greeting cards. E-cards can be sent to anyone with an e-mail address.
         If you have strong opinions about issues at large, polls can serve to be the
platform where you can have your say. Polls have proved to be very popular because they
maintain your anonymity and at the same time help you compare your stand with the rest
of the world.
         A poll could be question based, where you will have to answer one or more
questions. It could also be a statement, about which you can air your opinion.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
         One reason why the Internet has made the world come closer together is because
it lets groups of people chat with each other in real time, no matter in which part of the
world they might be.
         Chat facilities are there in Rediff. The name of the room will usually give you an
idea about what kind of discussions you will find going on inside. In the Metropolis
room, you can make friends and communicate with people from different parts of the
world.
         You can now experience the power of the Internet on your mobile phone too.
Most of the communication between a mobile phone and the Internet can happen only if
your handset supports a technology standard called WAP, short for 'wireless access
protocol'.
Search Facilities :-
         There is so much information on the Internet, that finding what you exactly want
becomes very difficult. That is why, to get the most out of the Internet, it is crucial that
you use the best search tools.
         Here is how rediff.com makes it very simple to immediately find useful
information...
        Search the Internet
        Search rediff.com
        Find financial information.
        Find hotels and flight schedules
        Locate wedding resources
        Land a dream job
        Find the right car
         RediffSearch has one of the best search tools in the world. It has been designed to
meet the needs of Indians worldwide. Rediff Travel can help you search for the hotels to
suit your budget at your desired destination. You can also find out about flight and train
availability by using Rediff Air/Rail Information. For train availability, you can follow a
link to a page that has a table of train schedules. For flight availability, there is a
sophisticated tool that will first ask you some information about your journey. On the
basis of what you have typed, it will let you know whether tickets are available.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
         Use the Internet to search for information related to jobs and career opportunities.
This means that you no longer have to depend only upon placement agencies or go
directly to the companies when you are job hunting. Rediff Jobs is a tool that helps you
search a job that matches your skills. Using this tool you can.
        Search for jobs posted by companies on their websites
        Search, for jobs openings within your industry
        Search for useful tips that will increase your chances of getting a job
         You can search a database of over 10,000 job openings by specifying the category
and the city of your preference. If you are an employer, you can search through the
resumes posted online to find a suitable candidate. You will need to register to use this
service.
         Here is how rediff.com tries to help you to plan your life.
        What the stars foretell.
        Manage your money.
        Pack your bags.
        Spice up your love life.
        Plan a perfect wedding.
        Improve your lifestyle.
    All kinds of planning can be undone if your personal finances are in a mess.
    Rediff Money covers the entire investment universe: stocks, mutual funds and
banking, taxation, insurance, loans, credit cards, and real estate. You can find these under
a subsection called 'personal finance'.
    Rediff Romance offers you everything you ever wanted to know about love and
romance. You can pick up some valuable love lessons about:
        Getting your first date
        Dealing with heartbreak
        Shyness
        Jealousy
        Gifting
        Long distance relationships.
News on Rediff...
        Get the latest news and views
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
        US edition keeps you in touch
        Read news in Indian languages.
        Keep track of money matters.
        Get the latest movie news.
        Catch the action.
        Keep abreast of tech advances.
        Catch sporting activities.
        Identify travel hotspots.
        Check out the hottest sites.
        Follow the weatherman.
        Step up your career.
        Track lifestyle trends.
        Stay informed on the go.
    Rediff News publishes interviews, special features and reports. These cover local and
national events in politics, business, entertainment and sports, especially cricket. It also
features a cross-section of opinions through its galaxy of columnists.
    There is a niche for photojournalism, and picture slide shows are a regular feature.
Video and sound clips are also published.
    Rediff Newsletters gives you the option of subscribing to several newsletters. These
newsletters deliver the news via e-mail so that you do not have to visit the site all the
time. News and events from around the world are now accessible to you in four Indian
languages: Hindi, Tamil, Telugu and Gujarati. These language editions are not merely
translations of the Rediff News. They carry extensive features and news that would
specifically interest Hindi, Tamil, Telugu and Gujarati readers.
Rediff Technology :-
    Information here is neatly slotted into news, reviews, business and technology, help
and how-to, Web life, Hindi zone, forum and events. You can also get access to new
downloads, read breaking news and check out the Editor's Pick of the Day.
    Rediff Sports brings to you the highlights of all major sporting activities from all over
the world. You can catch the sporting action through interviews, columns, and slide
shows.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
    However, cricket holds it prime position with a separate section for it. Rediff Cricket
is the most popular cricket site in the world. It is famous for having pioneered live cricket
commentary in a chat room. Also, here you can pick up details of the latest cricket
tournaments. There is an international cricket schedule to keep track of the season.
    You can read match reports, statistics, columns, interviews and articles. There are
links to articles on other sites too. Besides, there is a photo gallery of cricket stars. You
can also pose a question to an expert and participate in a daily poll.
Case Discussion
        How does the advertising model fit rediff.com?
        What are the other business models that can be applied to rediff.com?
        What is the source of success of rediff.com?
        What are the benefits derived from being a user of rediff mail?
        Why would rediff.com offer free e-mail?
                                            EXERCISES :-
    1. Describe the process of Internet shopping. List the major steps involved.
    2. What is direct marketing?
    3. List the critical success factors of Dell.
    4. Why are books such a natural target for e-commerce?
    5. List the major methods of Internet advertisement.
    6. Compare banner swapping and banner exchange.
    7. Compare and contrast 'pulling information' and 'pushing information'.
    8. Discuss why banners are important in Internet advertisement.
    9. How is the chat room used for advertisement?
    10. Why might the use of CPM to charge advertisers be inappropriate as a basis
         for charting ads?
    11. Why do customers like Web-based purchase? What cultural and social factors
         would affect Indian Web-based purchases?
    12. Enter the sites www.peapod.comand www.Netgrocer.com.Compare the services
         offered by the two companies and evaluate their chances for success. If you had
         money to invest, in which of these two companies would you invest?
    13. There are many search engines. Try the following ones: www.jango.comand
         www.compare.com. Try to find a Notebook computer, a vacuum cleaner and a
    Note: This Study material is still under development and editing process. This draft is being made
    available for the sole purpose of reference. Final edited copies will be made available once ready.
             plain paper fax machine and compare the prices. Comment on the strong and
             weak point of each of the search engines.
        14. Almost all major car manufacturers allow you to configure your car online. Enter
             www.toyota.comand www.ford.comand configure a car of your choice. After you
             decide what you want, examine the payment options.
        15. Enter the website www.ipro.comand find what Internet traffic management, Web
             : results and auditing services are provided. What are the benefits of each?
        16. Find information about banners in the following sites:
                 (a) www.linkexchange.com
                 (b) www.coder.com
                 (c) www.doubleclick.net/advertisers
        17. Investigate the high volume items that are being retailed on the Internet. Some
             examples are:
             Toys(www.eToys.com)
             Software(www.eggheads.com)
             Movies(www.real.com)
    Find more bestselling sites.
        18. Study the site traveljini.com and analyses its marketing strategies. A brief history
             of Traveljini is given below:
              The tourism industry in India is fairly developed and there is scope for further
     development. Traveljini.com provides a unique business proposition for the tourism
     industry by using e-commerce, so as to give tourism in India a greater visibility that is
     also cost-effective and reliable.
              Traveljini.com Limited was established in June 2000 and is a portal dedicated to
     the exciting business of travel. It is one of India's premier travel portal backed by strong
     offline presence across the country.
              Traveljini.com offers a complete solution relating to travel. Some of the services
     they provide include the best deals on flights, hotels, car rentals, cruises, and
     leisure holidays, and all these can be booked either online or offline. The site boasts of
     the most exhaustive travel-related information and has a slew of unique support services
     to ensure that a tourist's travel experience is unmatched. This guarantees that it is the one
     site that discerning travelers must check before setting out.
              In over two years, Traveljini has established itself as the India's leading Internet
     travel company in terms of:
    brand recall
    Note: This Study material is still under development and editing process. This draft is being made
    available for the sole purpose of reference. Final edited copies will be made available once ready.
    depth of content
    transaction capability
              Traveljini aims to set benchmarks in customer service, using the latest
     technologies in product development and delivery. They use fully-automated,
     customized software. A brick-and-mortar travel agency and an efficient customer
     service cell, which allows them to serve their clients to a hitherto unprecedented degree.
              ―To become the largest Travel Distribution Company in India by the simple
     expedient of putting the customer first."
              TJ    Travel     Services     Limited     is   another     wholly-owned         subsidiary of
     Traveljini.com. It is an IATA accredited travel agency, which provides back-end support
     for corporate business travel as well as handling flight ticketing in both the domestic and
     international sectors, for conferences, incentive travel and events.
              Traveljini.com books domestic flights in India and international flights as well.
     They have an application called the Smart Fare Finder for special fares to various
     international destinations on the leading airlines of the world.
              They also provide assistance in visa processing. They can also book hotel rooms
     in India and abroad. To make it easy for the customer, they offer easy access to their
     global hotel reservation system, so one can check real-time availability of rooms in
     30,000 hotels around the world. They have every kind of holiday that a traveller might
     want, from a cruise to a weekend to a romantic honeymoon.
              If someone wants a holiday designed specially for him and his family, he can
     access Customjini. They allow buying of foreign exchange through their network and
     which is then delivered to the customer's doorstep. A service called Mapjini can be used
     to find ways in over 60 Indian cities if the need be. Business travellers can seek their
     services to organize a conference, a meeting, incentive travel or an exhibition. They also
     book cars in India for all kinds of travelers.
                                                 Exercise
    Q.1 Explain traditional marketing and online marketing.
    Q.2 what are key difference between traditional commerce and E-commerce?
    Q.3 Explain terms like Internet marketing trend, target markets and marketing supports.
    Q.4 Explain different marketing strategies.
    Q.5 Write a short note on affiliate marketing.
    Q.6 What is E-shopping? What are the advantages and disadvantages of e-shopping?
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
Q.7 Discuss the various available strategies of Internet advertisement
OR Explain various methods of internet advertising.
Q.8 Describe Internet advertisement. List out the advantages of Internet advertisement.
Q.9 What is e-retailing? Explain its advantages to consumer and business.
Q.10 Illustrate the process of online marketing with suitable example.
Q.11 What are the desirable characteristics of an Electronic Market Place.
Q.12 Discuss the different online marketing strategies in E-commerce.
Q.13 What types of Internet standards used in WWW?
Q.14 Explain the role of Software Agent in E-commerce.
Q.15 Differentiate between E-Marketing and traditional Marketing in details.
Q.16 write a note on: Target market.
Q.17 What are the advantages and disadvantages of online marketing?
Q.18 Write a short note on Browsing Behavior Model.
Q.19 Define intelligent agent and how it can be used in E-marketing.
OR
      Explain the tasks performed by intelligent agents in E-marketing.
Q.20 Write a short note on E-marketing value chain.
Q. 21 write a short note on: Achieving Web Presence Goals.
OR
       How you can use web to increase customers.
Q.22 Explain Aggressive Matrices for E-business sites.
Q.23 Explain advantages of online marketing.
Q.24 Write a note on: Market Segmentation.
Q.25 Explain the use of One-to-One marketing in building customer relationship.
Q.26 Explain E- branding. Explain elements of branding.
Q.27 Explain spiral branding.
Q. 28 what is data mining? Explain how it can be used for market research.
Q.29 Explain different marketing strategies on the web.
Q.30 write a short note on: Internet marketing trends.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
                                                CHAPTER 3
                                              E-security
Information System Security:-
confidentily
Integrity availability
                          TABLE 3.1
   GLOBAL SPENDING ON INTERNET SECURITY SOFTWARE 1998–20031
         Sites that ignore these problems face some significant risk that they will be
attacked by intruders and that they may provide intruders with a staging ground for
attacks on other networks. Even sites that do observe good security practices, face
problems with new vulnerabilities in networking software and the persistence of some
intruders.
         Some of the problems with Internet security are the result of inherent
vulnerabilities in the services (and the protocols that the services implement), while
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
others are a result of host configuration and access controls that are poorly implemented
or overly complex to administer. This is further aggravated by the tremendous growth of
the Internet and the way it is used. Businesses and agencies now depend on the Internet
for communications and research, and thus have much more to lose if their sites are
attacked. The following sections describe the problems on the Internet and the factors that
contribute to these problems.
       Security risks associated with a network and a website can be addressed in some
ways as follows:
Denial-of-Service Attacks:-
         A Denial-of-Service or DoS attack is an attack on a network that is designed to
disable the network by flooding it with useless traffic or activity. A distributed denial-of-
service, or DoS, attack uses multiple computers to launch a DoS attack. While a DoS
attack does not do any technical damage, it can do substantial financial damage to an e-
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
business, because every second an e-business's network or a website is down, it may
result in lost revenues.
         The attacker first breaks into hundreds or thousands of random, insecure
computers on the Internet and installs an attack program. Then he coordinates them all to
attack the target simultaneously. Thereafter, the target is attacked from many places at
once; the traditional defenses just do not work, and the system crashes.
         These attacks are incredibly difficult, if not impossible, to defend against. In a
traditional denial-of-service attack, the victim's computer might be able to figure out
where the attack is coming from and shut down those connections. But in a distributed
attack, there is no single source. The computer should shut down all connections except
the ones it knows to be trustworthy, but that does not work for a public Internet site.
         So far, these attacks are strictly denial-of-service. They do not affect the data on
the - websites. These attacks cannot steal credit card numbers or proprietary information.
They cannot transfer money out of your bank account to trade stocks in your name.
Attackerscannot gain financially from these attacks. Still, they are very serious. For most
big corporations, the biggest risk of a security breach is loss of income or loss of
reputation, either of which is achieved by a conspicuous denial-of-service attack. The real
problem is that there are hundreds of thousands, possibly millions, of innocent, naive
computer users who are vulnerable to attack. They are using DSL or cable modems,
they're always on the Internet with static : IP addresses, and they can be taken over and
used as launching pads for these attacks.
Viruses :-
         Viruses are the most common security risk faced by e-businesses today. A virus is
a small program that inserts itself into other program files that then become ―infected‖,
just as a virus in nature embeds itself in normal human cells.
         The virus is spread when an infected program is executed, and this further infects
other programs. Examples of virus effects include inability to boot, deletion of files or
entire hard drives, inability to create or save files, and thousands of other possibilities.
         A logic bomb is a virus whose attack is triggered by some event such as the date
on a computer's system clock. A logic bomb may simply release a virus or it may be a
virus itself. Viruses are generally introduced into a computer system via e-mail or by
unauthorized network access. Virus examples include Stoned, Michelangelo, and
AutoStart 9805.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
         Trojan horse. This takes its name from a story in Homer's Iliad, and is a special
type of virus that emulates a benign application. It appears to do something useful or
entertaining but actually does something else as well, such as destroying files or creating
a "back door" entry point to give an intruder access to the system. A Trojan horse may be
an e-mail in the form of attachment or a downloaded program. Trojan horse examples
include BackOrifice, VBS/Freelink, and BackDoor-G.
Worm :-
         This is a special type of virus that does not directly alter program files. Instead, a
worm replaces a document or an application with its own code and then uses that code to
position itself. Worms are often not noticed until their uncontrolled replication consumes
system resources and slows down or stops the system. Worm examples include
VBS/Loveletter, a VBS/Godzilla.worm, and Happy99.
         A macro is a short program written in an application such as Microsoft Word or
Excel to accomplish a series of keystrokes. A macro virus is a virus that infects Microsoft
Word or Excel macros. Macro viruses can be introduced into a computer system as part
of a Word or an Excel document received as an e-mail attachment, or as a file on disk.
Opening the e-mail attachment or file triggers the macro virus.
         Some viruses are, however, just hoaxes. Several antivirus software vendors
maintain up-to-date information such as the Virus Information Library at McAfee.com,
the Anti Viral Pro Virus Encyclopedia on viruses, worms, Trojan horses, and hoaxes. E-
businesses also face other security issues related to doing business on the Web, such as
website defacement,information theft, and data spills.
Weak Authentication:
         Security handling teams estimate that many incidents stem from the use of weak,
static passwords. Passwords on the Internet can be "cracked‖ in a number of different
ways. However, the two most common methods are by cracking the encrypted form of
the password and by monitoring communications channels for password packets.
         The UNIX operating system usually stores an encrypted form of passwords in a
file that can be read by normal users. The password file can be obtained by simply
copying it. It can also be obtained by à number of other intruder methods.
         Once the file is on hand, an intruder can run readily available password cracking
programs against the passwords. If the passwords are weak, e.g. less than 8 characters,
and so on, they could be cracked and used to gain access into the system.
Ease of Spying:-
         It is important to note that when a user connects to her account on a remote host
using Telnet or FTP, the user's password travels across the Internet unencrypted or in
plain text. Thus, another method for breaking into systems is to monitor connections for
P packets bearing a username and a password, and then using them on the system for
normal login. If the captured password is to an administrator's account, then the job of
obtaining privileged access is made much easier. As noted previously, hundreds and
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
possibly thousands of systems across the Internet have been penetrated as a result of
monitoring for usernames and passwords. E-mail, as well as the contents of Telnet and
FTP sessions, can be monitored and used to learn information about a site and its
business transactions. Most users do not encrypt e-mail. Since they assume that e-mail is
secure and thus safe for transmitting sensitive information.
Ease of Spoofing:-
         The IP address of a host is presumed to be valid and is therefore trusted by TCP
and UDP services. A problem is that, using IP source routing, an attacker's host can
masquerade as a trusted host or a client. Briefly, IP source routing is an option that can be
used to specify a direct route to a destination and return path back to the origin.
         The route can involve the use of other routers or hosts that normally would not be
used to forward packets to the destination. An example of how this can be used such that
an attacker's system could masquerade as the trusted client of a particular server is as
follows:
    1. The attacker would change her host's IP address to match that of the trusted client.
    2. The attacker would then construct a source route to the server that specifies
         the direct path the IP packets should take to the server and should take from the
         server back to the attacker's host, using the trusted client as the last hop in the
         route to the server.
    3. The attacker sends a client request to the server using the source route.
    4. The server accepts the client's request as if it came directly from the trusted
         client, and returns a reply to the trusted client.
    5. The trusted client, using the source route, forwards the packet on to the
         attacker's host.
Many UNIX hosts accept source routed packets and will pass them on as the source route
indicates. Many routers will accept source routed packets as well, whereas some routers
can be configured to block source routed packets.
         E-mail on the Internet is particularly easy to spoof and, without enhancements
such as digital signatures, generally cannot be trusted. As a brief example, consider the
exchange that takes place when Internet hosts exchange mail.
         The exchange takes place using a simple protocol consisting of ASCII-character
commands. An intruder could easily enter these commands on Telnet to connect directly
to a system's Simple Mail Transfer Protocol (SMTP) port.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
         The receiving host trusts this sending host, and thus the origin of the mail is
spoofed easily by entering a sender address that is different from the true address. As a
result, any user, without privileges, can falsify or spoof e-mail.
         Other services, such as Domain Name Service (DNS), can be spoofed, but with
more difficulty than e-mail. These services still represent a threat that needs to be
considered when using them.
How Vulnerable Are The Internet Sites?
         The Internet, while being a useful and a vital network, is at the same time
vulnerable to attacks. Sites that are connected to the Internet face significant risk in some
form by intruders. The following factors would influence the level of risk:
        Number of systems connected to the site
        Services utilized by the site.
        Interconnectivity of the site to the Internet.
        Site's profile, or how well-known the site is.
        Site's readiness to handle computer security incidents.
         The more the number of systems that are connected, obviously the harder it is to
control their security. Equally, if a site is connected to the Internet at several points, it is
likely to be more vulnerable to attacks than a site with a single gateway.
         At the same time though, how well prepared a site is, and the degree to-which the
site relies on the Internet, can increase or decrease the risk. A site's high profile could
attract more potential intruders who wish to do some harm to the site's image: It should
be mentioned though, that "quiet", less-frequently used sites are also attractive to
intruders since they can more easily hide their activity:
         Sites that use recommended procedures and controls for increasing computer
security have significantly lower risks of attack. Firewalls, combined with one-time
passwords that are immune from monitoring or guessing, can increase greatly a site's
overall level of security and make using the Internet quite safe.
Website Defacement:-
         Website vandalism or defacement can be the result of a hacker breaking into a
network, accessing the website files, and modifying the HTML to physically change Web
pages.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
         Not only do website defacements embarrass an e-business, but some website
defacements can have serious financial repercussions. Aastrom Biosciences. Inc., a
Michigan based medical products company, experienced a serious defacement created to
manipulate its stock price. In February 2000, a bogus news release announcing a merger
with a California biopharmaceutical company, Geron Corporation, was posted on
Aastrom's website. Stock prices for both companies rose: Aastrom shares rose from $4 to
$4.41 and Geron shares rose from $47.19 to $51.
         After discovering the defacement, Aastrom notified Geron, and representatives of
both companies advised officials with the NASDAQ index, where both stocks are traded,
that there was no merger.
         Electronic Industrial Espionage It is a major risk and a big dollar issue that most
companies are reluctant to discuss openly electronic industrial espionage. Often, e-
businesses that have been hacked and had business.
         Secrets stolen are too embarrassed to admit the break-in. However, in late October
2009, one. very high-profile company, Microsoft, found itself scrambling to deal with
first rumors and published reports of a serious hacking incident within industrial
espionage overtones.
         The apparent culprit was a Trojan horse virus named QAZ Trojan that was first
identified in mid-July in China. The QAZ Trojan virus infects à computer system when a
user opens an e-mail attachment containing the virus.
         Then the virus replaces the system's Notepad text editor with its own code,
searches for other shared hard drives to infect, and sends the IP addresses of infected
computers to an outside e-mail address. This creates a "back door" a hacker can use to
enter a system, search for passwords, and install software programs to allow remote
control of the computer.
         Although by August 2000, all major antivirus software makers had included the
QAZTrojan information in their downloadable virus updates, somehow the QAZ Trojan
virus was used to create a "back door" in Microsoft.
        Using a predefined key to encrypt and decrypt the data during transmission.
        Using the Secure Sockets Layer (SSL) protocol to protect data transmitted over
         the Internet.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
                  SSL provides encryption of data between the browser on the
         customer's computer and the software on the Web server, allowing data such as
         credit card information to be transmitted securely.
                  SSL uses digital certificates so that a Web browser can authenticate the
         server it is connected to, making sure that credit card data is going to the
         appropriate server;
        Moving sensitive customer information such as credit card numbers offline, or
         encrypting the information if it is to be stored online;
        Removing all files and data from storage devices, including disk drives and tapes,
         before getting rid of the devices; and
        Shredding all hard-copy documents containing sensitive information before
         trashing them.
         Of course, an e-business's security solutions are only as strong as its weakest link
often its employees. An e-business must maintain a security-oriented culture, starting at
the top, in order for employees to take security seriously. An e-business should also
consider having its security systems tested or audited.
                                           TABLE 3.3
                                       E-RISK INSURANCE
Why Firewalls?
         The general reasoning behind firewall usage is that without a firewall, a subnet's
systems expose themselves to inherently insecure services, and to probes and attacks
from hosts elsewhere on the network. In a firewall-less environment, network security
relies totally on host security and all hosts must, in a sense, cooperate to achieve a
uniformly higher level of security.
         The larger the subnet, the less manageable it is to maintain all hosts at the same
level of security. As mistakes and lapses in security become more common, break-ins
occur not as the result of complex attacks, but because of simple errors in configuration
and inadequate passwords.
         A firewall approach provides numerous advantages to sites by helping to increase
overall host security. The following sections summarize the primary benefits of using a
firewall.
Concentrated Security:-
         A firewall can actually be less expensive for an organization in that all or most
modified software and additional security software could be located on the firewall
systems as opposed to being distributed on many hosts. In particular, one-time password
systems and other add on authentication software could be located at the firewall as
opposed to each system that needed to be accessed from the Internet.
Enhanced Privacy:
         Privacy is of great concern to certain sites, since what would normally be
considered innocuous information, might actually contain clues that would be useful to
an attacker. Using a firewall, some sites wish to block services such as finger and
Domain Name Service.
         Finger displays information about users, such as their last login time, whether
they have read mail, and other items. But, finger could leak information to attackers
about how often a system is used, whether the system has active users connected, and
whether the system could be attacked without drawing attention.
         Firewalls can also be used to block DNS information about site systems; thus, the
names and IP addresses of site systems would not be available to Internet hosts. Some
sites feel that by blocking this information, they are hiding information that would
otherwise be useful to attackers.
Policy Enforcement :-
         Lastly, but perhaps most importantly, a firewall provides the means for
implementing and enforcing a network access policy. In effect, a firewall provides access
control to users and services.
         Thus, a network access policy can be enforced by a firewall, whereas without a
firewall, such a policy depends entirely on the cooperation of the users. A site may be
able to depend on its own users for their cooperation. However, it cannot or it should not
depend on the Internet users in general.
Firewall Components:-
         The primary components (or aspects) of a firewall are:
    1. Network policy.
    2. Advanced authentication mechanisms
    3. Packet filtering.
    4. Application gateways.
Network Policy:-
         There are two levels of network policy that directly influence the design,
installation and use of a firewall system. The higher-level policy is an issue-specific
network access policy that defines those services which will be allowed or explicitly
denied from the restricted network, how these services will be used, and the conditions
for exceptions to this policy.
         The lower level policy describes how the firewall will actually go about
restricting the access and filtering the services that were defined in the higher level
policy. The following sections describe these policies in brief.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
Service access policy :-
         The service access policy should focus on Internet-specific use issues as defined
above, and perhaps all outside network access (i.e., dial-in policy, and SLIP and PPP
connections) as well. This policy should be an extension of an overall policy regarding
the protection of information resources in the organization.
         For a firewall to be successful, the service access policy must be realistic and
sound, and should be drafted before implementing a firewall. A realistic policy is one that
provides a balance between protecting the network from known risks, while still
providing users access to network resources. If a firewall system denies or restricts
services, it usually requires the strength of the service access policy to prevent the
firewall's access controls from being modified on an ad hoc basis. Only a management-
backed sound policy can provide this.
         A firewall can implement a number of service access policies. However, a typical
policy may be to allow no access to a site from the Internet, but allow access from the site
to the Internet. Another typical policy would be to allow some access from the Internet,
but perhaps only to selected systems such as information servers and e often implement
service access policies that allow some user access from selected internal hosts, but this
access would be granted only if necessary and only if it could be combined with
advanced authentication.
         Firewall design policy. The firewall design policy is specific to the firewall. It
defines the rules used to implement the service access policy.
         One cannot design this policy in a vacuum isolated from understanding issues
such as firewall capabilities and limitations, and threats and vulnerabilities associated
with TCP/IP. Firewalls generally implement one of the following two basic design
policies.
         A firewall that implements the first policy allows all services to pass into the site
default, with the exception of those services that the service access policy has identified
disallowed. A firewall that implements the second policy denies, all services by default,
passes those services that have been identifiedas allowed. This second policy follows
classic access model used in all areas of information security.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
         The first policy is less desirable, since it offers more avenues for getting around
firewall, i.e. users could access new services currently not denied by the policy (or even
addressed by the policy) or run denied services at non-standard TCP/UDP ports that are
not denied by the policy. Certain services such as X Windows, FTP, Archie, and RPC can
be filtered easily and are better accommodated by a firewall that implements the first
policy. The second policy is stronger and safer, but is more difficult to implement and
may imp. Users in that certain services such as those just mentioned may have to be
blocked restricted.
         The relationship between the high-level service access policy and its lower level
counterpartis reflected in the discussion above. This relationship exists because the
implementation the service access policy is heavily dependent upon the capabilities and
limitations of t firewall system, as well as upon the inherent security problems associated
with the want Internet services. For example, wanted services defined in the service
access policy may ha to be denied if the inherent security problems in these services
cannot be effectively control by the lower level policy and if the security of the network
takes precedence over other factors. On the other hand, an organization that is heavily
dependent on these services meet its mission may have to accept higher risk and allow
access to these services. This relationship between the service access policy and its
lower-level counterpart allows for an iterative process in defining both, thus producing
the realistic and sound policy initial described.
         The service access policy is the most significant component of the four described
her the other three components are used to implement and enforce the policy. (And as
noted above, the service access policy should be a reflection of a strong overall
organization security policy.) The effectiveness of the firewall system in protecting the
network depends on the type of firewall implementation used, the use of proper firewall
procedures, and service access policy.
         Advanced Authentication Security lapses on the identity of Internet users have
occurred in part due to the weaknessesassociated with traditional passwords. For years,
users have been advised to choose password that would be difficult to guess, or not to
reveal their passwords. However, even if user follow this advice and many do not), the
fact that intruders can and do monitor the Interne for passwords that are transmitted in the
clear has rendered traditional passwords obsolete
         Advanced authentication measures such as smartcards, authentication tokens,
biometrics and software-based mechanisms are designed to counter the weaknesses of
traditional passwords while the authentication techniques vary, they are indeed similar in
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
one aspect. The password. Generated by advanced authentication devices cannot be
reused by an attacker who hasmonitored a connection. Given the inherent problems with
passwords on the Internet, an internet accessible firewall that does not use or does not
contain the hooks to use advanced authentication makes little sense.
         A firewall that implements the first policy allows all services to pass into the site
by default, with the exception of those services that the service access policy has
identified as disallowed. A firewall that implements the second policy denies all services
by default, 'but passes those services that have been identified as allowed. This second
policy follows the classic access model used in all areas of information security.
         The first policy is less desirable, since it offers more avenues for getting around
the firewall, i.e. users could access new services currently not denied by the policy (or
even addressed by the policy) or run denied services at non-standard TCP/UDP ports that
are not denied by the policy. Certain services such as X Windows, FTP, Archie, and RPC
cannot be filtered easily and are better accommodated by a firewall that implements
the The second policy is stronger and safer, but is more difficult to implement and may
impact users in that certain services such as those just mentioned may have to be blocked
or restricted.
         The relationship between the high-level service access policy and its lower level
counterpart is reflected in the discussion above. This relationship exists because the
implementation of the service access policy is heavily dependent upon the capabilities
and limitations of the firewall system, as well as upon the inherent security problems
associated with the wanted Internet services. For example, wantedservices defined in the
service access policy may have to be denied if the inherent security problems in these
services cannot be effectively controlled by the lower level policy and if the security of
the network takes precedence over other factors. On the other hand, an organization that
is heavily dependent on these services to meet its mission 'may have to accept higher risk
and allow access to these services. This relationship between the service access policy
and its lower-level counterpart allows for an iterative process in defining both, thus
producing the realistic and sound policy initially described.
         The service access policy is the most significant component of the four described
here. The other three components are used to implement and enforce the policy. (And as
noted above, the service access policy should be a reflection of a strong overall
organization security policy) The effectiveness of the firewall system in protecting the
network depends on the type of firewall implementation used, the use of proper firewall
procedures, and the service access policy.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
Advanced Authentication :-
         Security lapses on the identity of Internet users have occurred in part due to the
weaknesses associated with traditional passwords. For years, users have been advised to
choose passwords that would be difficult to guess, or not to reveal their passwords.
However, even if users follow this advice (and many do not), the fact that intruders can
and do monitor the Internet for passwords that are transmitted in the clear has rendered
traditional passwords obsolete.
         Advanced authentication measures such as smartcards, authentication tokens,
biometrics, and software-based mechanisms are designed to counter the weaknesses of
traditional passwords. While the authentication techniques vary, they are indeed similar
in one t. The passwords generated by advanced authentication devices cannot be reused
by an attacker who has monitored a connection. Given the inherent problems with
passwords on the Internet, an Internet-accessible firewall that does not use or does not
contain the hooks to use advanced authentication makes little sense.
         Some of the more popular advanced authentication devices in use today are called
one time password systems. A smartcard or authentication token, for example, generates
a response that the host system can use in place of a traditional password.
         The token or card works in conjunction with software or hardware on the host,
and therefore, the generated response is unique for every login. The result is a one-time
password which, if monitored, cannot be reused by an intruder to gain access to an
account.
         Since firewalls can centralize and control site access, the firewall is the logical
place for the advanced authentication software or hardware to be locate. Although
advanced authentication measures could be used at each host, it is more practical and
manageable to centralize the measures at the firewall. Figure 3.3 illustrates that a site
without a firewall using advanced authentication permits unauthenticated application
traffic, such as Telnet or FTP, directly to site systems.
         If the hosts do not use advanced authentication, then intruders could attempt to
crack passwords or could monitor the network for login sessions that would include the
passwords. The figure also shows a site with a firewall using advanced authentication,
such that Telnet or FTP sessions originating from the Internet to site systems must pass
the advanced authentication before being permitted to the site systems.
         The site systems may still require static passwords before permitting access.
However, these passwords would be protected against exploitation, even if the passwords
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
are monitored, as long as the advanced authentication measures and other firewall
components prevent intruders from penetrating or bypassing the firewall.
    1. Source IP address
    2. Destination IP address
    3. TCP/UDP source port
    4. TCP/UDP destination port.
         Not all packet filtering routers currently filter the source TCP/UDP port, though
vendors have now started incorporating this capability. Some routers examine the router's
network interfaces in which a packet arrives, and then use this as an additional filtering
criterion. Some UNIX hosts provide packet filtering capability, although most do not.
         Filtering can be used in a variety of ways to block connections from or to specific
hosts or networks, and to block connections to specific ports.
         A site might wish to block connections from certain addresses, such as from hosts
or sites that it considers to be hostile or untrustworthy. Alternatively, a site may wish to
block connections from all addresses external to the site (with certain exceptions, such as
SMTP for receiving e-mail) (see Figure 3.4).
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
                                        TABLE 3.4
                                PACKET FILTERING TABLE
Type       Source          Destinatio Sourc Destination por          Action
           address              n     e port        t
                            Address
TCP           *            123.4.5.6  >1023        23                permit
TCP           *            123.4.5.6  >1023        25       permitpermitpermitpermi
TCP           *            123.4.5.6  >1023         2                   t
TCP      129.6.58.25       123.4.5.6  >1023       119                  *
UD            4            123.4.* *  >1023       123
 P            *                 *       *           *
 *            *
         The first rule allows TCP packets from any source address and port greater than
1023 on the Internet to the destination address of 123.4.5.6 and port of 23 at the site. Port
23 is the port associated with the Telnet server, and all Telnet clients should have
unprivileged source ports of 1024 or higher. The second and third rules work in a similar
fashion, except packets to destination addresses 123.4.5.1 and 123.4.5.8, and port 25 for
SMTP, are permitted.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
         The fourth rule permits packets to the site's NNTP server, but only from source
address 129.6.48.254 to destination address 123.4.5.9 and port 119 (129.6.48.254 is the
only NNTP server that the site should receive news from, thus access to the site for
NNTP is restricted to only that system). The fifth rule permits NTP traffic, which uses
UDP as opposed to TCP, from any source to any destination address at the site. Finally,
the sixth rule denies all other packets-if this rule is not present, the router may or may not
deny all subsequent packets. This is a very basic .example of packet filtering. Actual
rules permit more complex filtering and greater flexibility.
         While some of these services such as Telnet or FTP are inherently risky, blocking
access to these services completely may be too drastic a step for many sites. Not all
systems · generally require access to all services. For example, restricting Telnet or FTP
access from the Internet to only those systems that require the access can improve the
security of users at no cost. Services such as NNTP may seem to pose little threat, but
restricting these services to only those systems that need them helps to create a cleaner
network environment and reduces the likelihood of exploitation from yet-to-be-
discovered vulnerabilities and threats.
Application Gateways :-
         To counter some of the weaknesses associated with packet filtering routers,
firewalls need to use software applications to forward and filter connections for services
such as Telnet and FTP. Such an application is referred to as a proxy service, while the
host running the proxy service is referred to as an application gateway. Application
gateways and packet filtering routers can be combined to provide higher levels of
security and flexibility than if either were used alone.
         As you move towards the union of these elements, the controls environment
increases there is greater coverage. Let us understand these three elements individually.
People - This core clement is the most important. The people element comprises the
people and various roles and responsibilities within the organization. These are the
people that are put in place to execute and support the process. A few key roles include
senior management, security administrators, system and IT administrators, end users, and
auditors.
Policy - This element comprises the security vision statement, security policy and
standards, and the control documentation. This is basically the written security
environment—the bible that the security process will refer to for direction and guidance.
Technology - This element includes tools, methods, and mechanisms in place to support
the process. These are core technologies--the operating systems, the databases, the
applications, the security tools-embraced by the organization. The technology then is the
enforcement, monitoring, and operational tools that will facilitate the process.
         The concept is that each core element could be measured for effectiveness and
coverage. Also, issues can be measured against the model to determine what controls
coverage for that issue. The objective then is to move issues into the intersecting areas of
the elements, with the final objective of moving the issue into the middle area of greatest
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
coverage. As risk issues are identified, each step to manage the risk will fall into one of
the core elements of people, policy, or technology.
         If the issue is resolved with one of the elements, addressing one of the other
elements can enhance this resolution. As the core elements are added to the controls
environment and utilized in concert, the issue is then resolved on several fronts the
controls coverage is greater.
         The PPT model is simply the analysis of a risk issue. If the issue is broken down
into the three core elements, action items can be determined for each core element: In this
manner, control coverage can be moved from one element to two, and ultimately to
coverage by all of the elements.
Within the four ―pillars‖ of the program, several phases are included.
         The first is the Decision Driver Phase, which contains factors determining the
business drivers of security. These include Technology Strategy and Usage, Business
Initiatives and Processes, and Threats, Vulnerabilities and Risk. All these combine to
form a unique "Security Profile‖ of the organization. The "profile" needs to be reflected
in the Security Policies and Technical Controls.
         The next facet of the Information Security Framework includes the design of the
security environment, also called the Design Phase. This is the stage where the
organization documents its security policy, the control environment and deals with
controls on the technology level. A key element in this process is not only the clear
definition of security policy and technical control information, but also the "Security
Model" of the enterprise. Information Classifications and Risk Assessment methods fall
under this component. These processes.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
Allow the organization to manage risk appropriately and identify the risks and value of
information assets.
         The final facet of the Information Security Framework is the Implementation
Phase. This begins by documenting the Administrative and End-User guidelines and
procedures. These guidelines must be succinct and flexible for the changing environment.
         Enforcement, Monitoring, and Recovery processes are then layered on for the
operational support of the security program. These processes are "where the rubber hits
the road". All the benefits of the Security Program design and documentation are
diminished if it is not put into effect on an operational day-to-day basis.
Power supplies. Information processing will come to halt in the absence of a suitable
power supply. This could be the worst type of a denial-of-service attack. A
thorough business risks assessment is necessary to understand the impact on non-
availability of power for certain durations. Based on the evaluation, appropriate measures
need to be taken.
These could be:
    1. Taking power from multiple feeds of electric supply.
    2. In case all the electric supplies fail simultaneously, you need to have an
         uninterruptible power supply (UPS) with adequate battery capacity capable of
         sustaining the initial load.
    3. The UPS could in-turn be supported by backup generator sets.
    4. The backup generator would require adequate supply of fuel, which also needs to
         be stored with replenishment, assured by the suppliers.
    5. Proper installation of emergency lights should also be planned; lightning
         protection should be provided to the power installation and the communication
         lines.
Cabling security. We really need to remember every detail, including the proverbial last
nail. Do we know the physical layout of power cables and communication cables in our
premises? The first step will be to obtain wiring diagrams and update them. Then, do a
physical inspection and assess the protection needs against damage, interference or
interception, establish the best practices for laying the network cables as well as power
cables, and ensure that these are actually implemented. The next step is to decide on
additional security protection required for the network.
         This could be expensive for an old installation. Safety measureslike use of
armored conduit cables, underground ducts, or fiber optic cabling will require huge
investment and need to be justified based on risk assessment.
         But simple measures like providing locks to the communication cable patch
board, which are often over-looked, should be immediately implemented.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
Equipment maintenance. It is normally expected that due care is taken for equipment
maintenance, and proper records are maintained. From a security angle, two more
measures are required. One is to maintain record of faults that were noticed, and the
second step is to maintain records of all equipment sent off the premises for
maintenance.
Security of equipment off premises. Shrinking size of computers and expanding wide
area networks have made the computer equipment extremely mobile. Processing as well
as storage capacity of mobile devices has been following Moore's law of doubling every
18 months.
         Securing these devices is as important as securing the data center. Various
controls that should be considered are: administrative controls like permissions and
corporate policy on use of mobile computers in places like airplanes, physical controls
like securing the devices with security chains, alarms, and storing them at non-obvious
places, using access control devices like USB tokens, and finally taking adequate
insurance cover.
Secure disposal or reuse of equipment. Storage devices have long memory, unless
specifically destroyed. Mere deletion is not enough. This becomes important when an old
computer equipment is disposed off or transferred to another location.
         Equipment sent for repair are equally susceptible to reading of data from the
'deleted' storage devices. Every such device should be subjected to a thorough erasing
and overwriting to destroy the data. Since some reports claim that the data could be
recovered even after multiple overwriting and formatting, it may be desirable to
physically destroy the media containing top secret information.
Secure Behavior:-
Clear desk and clear screen policy. Our concern for information security should not
stop at securing the premises and equipment. Sensitive information could be accessible in
many forms, and it is necessary to identify and protect the information in all its
incarnations.
    Classification of information will help to identify the sensitivity, but having an
organizational "clear desk and clear screen policy‖ could ensure actual protection. In
brief, it means keep everything under lock and key and do not allow anybody to snoop.
The following guidelines should be issued:
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
        Lock up all documents and media when not being used.
        Protect the computers and terminals through use of key locks, passwords, and
         screen
        Savers.
        Fax and telex machines used for confidential information should not be left
         unattended.
        Access to photocopiers and scanners is restricted after office hours.
        Printing of classified information should be supervised and all printouts must
         be removed immediately.
                                         EXERCISES
Q.1 Explain security on the internet.
Q.2 How to provide security to email and website.
Q.3 How vulnerable is the internet sites?
Q.4 Explain firewall component and what should firewall contain.
Q.5 Give benefits of internet firewall.
Q.6 Discuss the security requirements of Internet and E-commerce applications and how
these
     Requirements are fulfilled by various hardware and software systems.
Q.7 What are the security issues of E-commerce?
Q.8 Discuss password schemes and Biometric systems for implementing client server
network
     Security.
Q.9 Discuss various threats posed by servers in a client server environment.
Q.10 Write short note on:      (i) Biometric Systems. (iv) Digital Signatures.
Q.12 Discuss the various threats involved in client server communications and how are
they
      Encountered in EC business.
Q.13 Explain how SSL(secure socket layer ) helps an Ecommerce system to be secure.
Q.14 Explain intrusion mechanisms and intrusion detection techniques.
Q.15 What is the functionality of antivirus programs? How are viruses detected and
fixed?
Q.16 Describe the Risk Management issues in E-Commerce.
Q.17 Explain about the E-Security
Q.18 Explain in brief E-security and E-payment.
Q.19 Explain how are websites hacked.
Q.20 Write a short note on: Network and Website Security risks.
Q.21 Write a short note on network security and its types.
    OR explain strategies or methods to provide network security.
Q.22 Explain few methods to provide security to email.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
                                         CHAPTER - 4
                                     E-payment Systems
E-banking at ICICI Bank :-
         The banking industry in India is facing unprecedented competition from non-
traditional banking institutions, which now offer banking and financial services over the
Internet. The deregulation of the banking industry coupled with the emergence of new
technologies, are enabling new competitors to enter the financial services market quickly
and efficiently.
         Internet banking for E-banking) means any user with a personal computer and a
browser can get connected to his bank-s website to perform any of the virtual banking
functions. In internet banking system the bank has a centralized database that is web
enabled.
         All the services that the bank has permitted on the internet are displayed in menu.
Any service can be selected and further interaction is dictated by the nature of service.
The traditional branch model of bank is now giving place to an alternative delivery
channels with ATM network.
         Once the branch offices of bank are interconnected through terrestrial or satellite
links, there would be no physical identity for any branch. It would a borderless entity
permitting anytime, anywhere and anyhow banking.
         The Internet banking is changing the banking industry and is having the major
effects on banking relationships. Internet banking involves use of Internet for delivery of
banking products & services.
         It falls into four main categories, from Level 1 - minimum functionality sites that
offer only access to deposit account data--to Level 4 sites--highly sophisticated offerings
enabling integrated sales of additional products and access to other financial services
such as investment and insurance. In other words a successful Internet banking solution
offers
         ICICI Bank is India's second-largest bank with total assets of Rs 3,446.58 billion
(US$ 79 billion) at March 31, 2007 and profit after tax of Rs 31.10 billion for fiscal 2007.
The bank has a network of about 950 branches and 3,300 ATMs in India and presence in
17 countries.
         ICICI Bank offers a wide range of banking products and financial services to
corporate and retail customers through a variety of delivery channels and through its
specialized subsidiaries and affiliates in the areas of investment banking, life and non-life
insurance, venture capital and asset management. The bank currently has subsidiaries in
several other countries.
         ICICI Bank was originally promoted in 1994 by ICICI Limited, an Indian
financial institution, and was its wholly-owned subsidiary. ICICI's shareholding in ICICI
Bank was reduced to 46% through a public offering of shares in India in fiscal 1998, an
equity offering in the form of ADRs listed on the NYSE in fiscal 2000, ICICI Bank's
acquisition of Bank of Madura Limited in an all-stock amalgamation in fiscal 2001, and
secondary market sales by ICICI to institutional investors in fiscal 2001 and fiscal 2002.
ICICI was formed in 1955 at the initiative of the World Bank, the Government of India
and representatives of Indian industry.
         The principal objective was to create a development financial institution for
providing medium-term and long-term project financing to Indian businesses. In the
1990s, ICICI transformed its business from a development financial institution offering
only project finance to a diversified financial services group offering a wide variety of
products and services, both directly and through a number of subsidiaries and affiliates
like ICICI Bank. In 1999, ICICI become the first Indian company and the first bank or
financial institution from non-Japan Asia to be listed on the NYSE.
         Banking without borders has become an established concept as customers become
increasingly sophisticated and international in their outlook. Banks across the globe have
swiftly embraced this change by offering electronic banking across multiple channels.
However, in this transition from branch banking to multi-channel banking, the key fact
that has been overlooked is, customer convenience. As banks have adopted technology
for electronic banking, the limitation of technology, to integrate with existing systems of
the banks to provide a unified relationship view of the customers, has been a challenge.
         Further, the lack of flexibility in systems built on obsolete technology has pushed
banks to move with the times and offer varied products to meet the changing needs of
today's customers.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
         What banks need today is, a new generation electronic banking solution built on
open architecture with robust security features that provides true relationship banking
functionality.
         The solution should not only meet today's business requirements but also be
scalable and flexible enough to meet the changing demands of the retail customer.
                                     Non-Transaction Services
        Real Time Account Balance Information
        Download or Account Statements in six formals
        Subscription for Account Statements by E-mail
        Request for Cheque Book, Stop Payment and FD Opening
        Trade MIS to view all your trade-relater! banking information.
                                        Transaction Services
        Transfer funds within own ICICI account (Self account transfer)
        Transfer funds to channel partners ICICI account (Own to External transfer.)
        Transfer funds from channel partners ICICI account (External to Own)
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
        Transfer funds to non-ICICI Bank accounts using EFT/NEFT/RTGS.
        Utility Bill Payments to more than 85 billers across India
        Online Tax payment facility
        e-payment gateways.
Mobile Banking :-
         In today's hectic corporate world, it may not be always easy to keep track of
everything related to your finance and banking. Now with ICICI Bank's secured Mobile
Banking Service, you can access your bank accounts and carry out transactions through
your mobile.
         Get alerts and reminders at the right moment and more. Our secured Mobile
Banking Service answers your business needs, all through the push of a few buttons.
Push-based Alerts :-
        You will receive alerts for following transactions:
        Daily Closing Account balance
        Inward cheque returns above Rs 5000.00
        Outward cheque returns above Rs 5000.00
        Debit above Rs 5000.00
        Credit above Rs 5000.00
* Charges-as per schedule of charges.
Pull-based Alerts :-
You can register for Pull-based alerts only through Corporate Internet Banking (CIB).
         The corporate users can avail the following banking services:
                                   TABLE 4.1
                       PAYMENT SYSTEMS IN THE US, 1999–20102
         Everyone agrees that the payment and settlement process is a potential bottleneck
in the fast-moving electronic commerce environment, if we rely on conventional payment
methods such as cash, cheques, bank drafts, or bills of exchange. Electronic replicas of
these conventional instruments are not well-suited for the speed required in e-commerce
purchase processing.
         For instance, payments of small denominations (micropayments) for bits and
pieces of information must be accepted by vendors in real time. Conventional instruments
are too slow for micropayments, and the high transaction costs involved in processing
them add greatly to the overhead.
         Therefore, new methods of payment are needed to meet the emerging demands of
e-commerce. These new payment instruments must be secure, have a low processing
cost, and be accepted widely as global currency tender. -
                                  TABLE 4.6
       SIGNIFICANT INNOVATIONS IN MODERN PAYMENT SYSTEMS
         Year                                Innovations
1947               Flatbush National Bank issues first general-purpose credit
                   card, for use in select New York shops.
1950               Diners Club Charge Card introduced.
mid-1950s          The development of magnetic ink character recognition
                   (MICR) facilitated more timely processing of cheques, sealed
                   the cheque's standing as the preferred non-cash payment
                   option.
1958               BankAmerica, in Fresno, California, executes the first mass
                   mailing of credit cards.
1967               Westminster Bank installs the first automated teller machine
                   at Victoria, London branch.
1970               The New York Clearing House launches CHIPS--the
                   Clearing House Interbank Payments System which provides
                   US dollar funds transfer and transaction settlements online
                   and in real time.
late 1970s         Chemical Bank launches its Pronto system providing 3000
                   computer terminals to customers' homes linked to its central
                   computers by telephone. It offers a range of facilities: balance
                   inquiries, money transfers between Chemical Bank accounts,
                   and bill payments to selected local stores. The stumbling
                   block for first-generation home-banking systems in general
                   was, who is to pay for the terminals at home?
1985               Electronic Data Interchange (EDI) extensively used in bank-
                   to-bank payment systems.
1994               Digital cash trials by DigiCash of Holland conducted online.
1995               Mondex electronic currency trials begin in Swedon, England.
Benefits to Buyers :-
        Convenience of global acceptance, a wide range of payment options, and
         enhanced financial management tools.
        Enhanced security and reduced liability for stolen or misused cards.
        Consumer protection through an established system of dispute resolution.
        Convenient and immediate access to funds on deposit via debit cards.
        Accessibility to immediate credit. Intuitively, the comparative cost of arranging
         for a consumer loan relative to the ability to obtain credit at the point of sale is
         substantial in considering both the direct processing costs as well as the implicit
         opportunity costs to borrower and lender.
Benefits to Sellers:-
        Speed and security of the transaction processing chain from verification and
         authorization to clearing and settlement.
        Freedom from more costly labour, materials and accounting services that are
         required in paper-based processing.
        Better management of cash flow, inventory and financial planning due to swift
         bank payment.
        Incremental purchasing power on the part of the consumer.
        Cost and risk savings by eliminating the need to run an in-house credit facility.
Convenience :-
         Anyone who has searched through pockets for exact change for parking, fumbled
with foreign currency, paid exorbitant foreign exchange commissions, tried to cash a
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
cheque in another country or been concerned about carrying a large roll of banknotes can
appreciate the convenience of payment cards.
         Fundamental to this convenience is the virtually ubiquitous acceptance and utility,
whether it is an apparel store in Paris or a crafts shop in Nepal. Payment cards work in
brick and mortar environments, over the phone, on the Internet, and through the post.
         Applications are underway that support new uses such as recurring payments,
insurance and payroll disbursements, rent and utility bills, and small ticket transactions
such as vending machines and car parks.
         Consumers place an enormous value on convenience, although this paper has not
attempted to measure it. The sheer convenience of being able to access cash at an ATM
or conduct a transaction directly at the point of sale with a credit or debit card clearly has
had an impact on economic growth.
         None of the banking or retailing payment methods in their present form are
completely adequate for the consumer-oriented e-commerce environment. Their
deficiency is their assumption that the parties will, at some time or other, be in each
other's physical presence or that there will be a sufficient delay in the payment process
for frauds, overdrafts, and other undesirables to be identified and corrected.
         These assumptions may not hold good for e-commerce and so, many of these
payment mechanisms are being modified and adapted for the conduct of business over
networks.
         Entirely new forms of financial instruments are also being developed. One such
new financial instrument is electronic tokens, which are available in the form of
electronic cash/ money or cheques. Electronic tokens are designed as electronic
analogues of various forms of payment backed by a bank or a financial institution.
Simply stated, electronic tokens are equivalent to cash that is backed by a bank.
    The disadvantages of credit cards for e-commerce include the fact that they cannot be
used directly for small value payments or peer-to-peer transactions.
                            Method                        Percentage
                  Lost or stolen card                        48%
                  Identity theft                             15%
                  Skimming (or cloning)                      14%
                  Counterfeit card                           12%
                  Mail intercept fraud                        6%
                  Other                                       5%
          In this scheme, each consumer and each vendor generates a public key and a
secret key. The public key is sent to the credit card company and put on its public key
server. The secret key is re-encrypted with a password, and the unencrypted version is
erased.
          To steal a credit card number, a thief would have to get access to both a
consumer's encrypted secret key and password. The credit card company sends the
consumer a credit card number and a credit limit.
          To buy something from vendor X, the consumer sends vendor X the message, ―It
is now time T. I am paying Y dollars to X for item Z.‖ Then the consumer uses his or
her password to sign the message with the public key.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
         The vendor will then sign the message with its own secret key and send it to the
credit card company, which will bill the consumer for Y dollars and give the same
amount (less the fee) to X.
         Nobody can cheat in this system. The consumer cannot claim that he did not agree
to the transaction, because he has signed on it (as in everyday life). The vendor cannot
levy fake charges, because he does not have access to the consumer's key.
         He cannot impose the same charge twice, because the consumer has included the
precise time in the message. To become more useful, credit card systems will have to
develop distributed key servers and card checkers. Otherwise, a concentrated attack on
these sites could bring the system to a halt.
         Support for Privacy Enhanced Mail (PEM) and Pretty Good Privacy (PGP)
encryption 'has been built into several browsers. Both of these schemes can be
substantially bolstered with the addition of encryption to defeat snooping attacks.
         Unfortunately, whether existing credit card companies will accept digital
signatures as real signature is not clear. And so, vendors will have a difficult time when
customers dispute the charges made using encrypted credit card numbers over the
Internet.
         When credit card companies do decide to accept digital signatures, they also need
to maintain a public server with all the public keys. This method assumes that the credit
card company will keep the vendor honest, as is the case with traditional credit card
transactions. E-payment processing is not an inexpensive proposition, however. But
neither is it fraudulent.
         If e-commerce takes off and small transactions increase without a fully encrypted
system in place, fraud will become expensive all the more.
         Providing credit card processing service for numerous half-dollar and one-dollar
transactions may not be financially attractive, compared to the average credit card
transaction of about $60.
         If this process is extended to all of the micropayment services that are ultimately
available over the Internet (e.g. 20-cent file transfers and $1 video game rentals), the
overall processing load on key system components are likely to become unmanageable or
commercially non-viable unless a significant amount of automation takes place. To solve
this problem, third-party payment processors can be undertaken.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
Business Pros and Cons of Credit Card-based Payment :-
          Third-party processing for credit cards entails a number of pros and cons. These
companies are chartered to give credit accounts 10 individuals and act as bill collecting
agencies for businesses. Consumers use credit by presenting them for payment and then
paying an aggregate bill every month. Consumers pay either by flat fee or individual
transaction charge service.
          Merchants get paid for the credit card drafts that they submit to the credit card
company. Businesses get charged a transaction charge ranging between 1 per cent to 3
per cent for each draft submitted.
          Credit cards have advantages over cheques in that, the credit card company
assumes a larger share of financial risk on both the buyer and the seller in a transaction.
Buyers can sometimes dispute a charge retroactively and have the credit card company
act on their behalf.
          Sellers are ensured that they will be paid for all their sales and they need not
worry about the fraud. This becomes a convenience for the buyer in that, the credit card
transactions are usually quicker and easier than cheque (and sometimes even cash)
transactions. One disadvantage to credit cards is that their transactions are not
anonymous, and credit card companies do in fact compile valuable data about spending
habits.
          Record keeping with credit cards is one of the features consumers value most,
because of disputes and mistakes in billing. Disputes may arise because different services
may have different policies.
          For example, an information provider might charge for partial delivery of a file
(the user may have abandoned the session after reading a part of the file), and a movie
distributor might charge depending on how much of the video had been downloaded.
          The cause of interrupted delivery needs to be considered while resolving disputes.
In general, implementing payment policies will be simpler when payment is made by
credit card rather than by cash.
          The complexity of credit card processing takes place in the verification phase, a
potential bottleneck. If there is a lapse in time. between the charging and the delivery of
goods or services (for example, when an airline ticket is purchased well in advance of the
date of travel), the customer verification process is simple because it does not have to be
done in real time.
          In fact, all the relaying and authorizations occur after the customer merchant
transaction is completed, unless the authorization request-is-denied. However, if the
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
customer wants a report (or even a digital airline ticket) to be downloaded into a PC or
other information appliance immediately at the time of purchase, many message relays
and authorizations take place in real time, while the customer waits.
         Such exchanges may require many sequence-specific operations, such as staged
encryption and decryption and exchanges of cryptographic keys.
         Encryption and transaction speed must be balanced however, as research has
shown that online users get impatient and typically wait for 20 seconds before pursuing
other actions. Hence, online credit card users must find the process to be accessible,
simple, and fast.
         Speed will have design and cost implications, as it is a function of network
capabilities, computing power available at every server, and the specific form of the
transaction. The infrastructure supporting the exchange must be reliable.
         The user must feel confident that the supporting payment infrastructure will be
available on demand and that the system will operate reasonably well, regardless of
component failures or system load conditions. The builders and providers of this
infrastructure are aware of customer requirements and are in fierce competition to fill
those needs.
                              TABLE 4.7
           GROUPS AND EXAMPLES OF THE NEW PAYMENT SYSTEMS
Mondex of MondexInternational :-
         We will now explore the system of Mondex which has been developed by
National Westminster Bank (hereafter, Nat West Bank), a major commercial bank in
Britain.
         In December 1993. Nat West Bank announced an electronic low value payment
system. calledMondex. Mondex can be classified as a cash substitution system using
smart cards, which in a sense is the same as VISA Cash, but the concept is notably
different. In the Mondex system, there is one issuing body—the originator of electronic
value in the currency of the country.
         This originator basically serves as an issuing bank in the Mondex system and
issues to the Mondex member banks, the equivalent amount of electronic Mondex Value
in exchange for prime negotiable instruments or cash. Consumers as cardholders load
Mondex value on their card from a bank ATM, or a Mondex telephone.
           It can then be used as cash for shopping. Using a wallet, which resembles a
pocket calculator, customers can also exchange electronic value between individuals.
Therefore, once the electronic value has been drawn from a bank, only the person
involved in the transaction knows the history of the monetary movement.
           No one else can trace it. In addition, using a private or a public telephone
connected to the Mondex system. the electronic value can be withdrawn, deposited, or
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
sent to a person at a remote location over the telephone network. By adding reader/writer
functions to a personal computer, it will also be possible to send money over the
Internet.
E-cash in Action :-
         E-cash is based on cryptographic systems called digital signatures. This method
involves a pair of numeric keys (very large integers or numbers) that work in tandem: one
for locking (or encoding), and the other for unlocking (or decoding).
         Messages encoded with one numeric key can only be decoded with the other
numeric key and none other. The encoding key is kept private and the decoding key is
made public.
         By supplying all customers (buyers and sellers) with its public key, a bank
enables customers to decode any message (or currency) encoded with the bank's private
key.
         If decoding by a customer yields a recognizable message, the customer can be
fairly confident that only the bank could have encoded it. These digital signatures are as
secure as the mathematics involved and have proved over the past two decades to be
more resistant to forgery than handwritten signatures.
         Before e-cash can be used to buy products or services, it must be procured from a
currency server.
         None of the above hurdles are insurmountable. Most of these will be overcome
within the next few years. These technical problems, experts hope, will be solved as
technology is improved and experience is gained. The biggest question concerns how
customers will take to a paperless and (if not cashless) a less-cash world.
Letter Pairing :-
         This method is similar to Caesar's method. Here, instead of shifting each letter to
some places to its right, letters are paired off with each other in a random manner. For
example, consider the pairing A , B Y, C X , and so on.
         The method overcomes the limitation of Caesar's method and cannot be encrypted
even by using various values of k. Yet, this is not a safe method at all, and can easily be
decrypted by using techniques such as frequency analysis. If a large enough message is
intercepted, then by counting the number of times a letter appears, the third party can
judge which letter stands for which by comparing the data with the average frequencies
of usage of letters of the language. For example, we know that 'E' is the most often used
letter, and hence the most repeated letter would probably stand for 'E'.
         The two examples given above are simple yet interesting encryption techniques.
In the following few pages, we will discuss some of the latest and most widely used
encryption techniques.
RSA :-
         RSA stands for Rivest; Shamir and Adleman—the three cryptographers who
invented the first practical commercial public key cryptosystem. Today it is used in Web
browsers, e-mail programs, mobile phones, virtual private networks, secure shells, and
many other places. With sufficiently large keys, you can be confident of foiling the vast
majority of attackers.
         Until recently, the use of RSA was very much restricted by patent and export
laws. However, the patent has now expired and US export laws have been relaxed. RSA
encryption uses large prime numbers for its purposes.
         It works on the basic fact that large numbers are extremely difficult to factorize. If
we take the product of two arbitrarily large (but secret) prime numbers of say, 50 digits
each and multiply them, then using the most current supercomputing technology it would
take more than a thousand years to factorize them. This method has brought to the fore a
branch of mathematics called 'number theory that is till now considered to have no
practical applications.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
         RSA uses two large prime numbers. Numbers must be quite large in length, 100
to 300 bits, and must have a prime value. Only the person who wants to decrypt the
message should know these. Using these, a mathematical algorithm is developed which
produces a public key. Anyone who wants to encrypt a message uses this algorithm. The
key is based on the two large primes used, and is known only to the person who has
developed the particular algorithm.
         RSA seems to be a reliable and a fast algorithm, but the serious persisting flaws
consist of the hiding of two initial numbers chosen from the IP table. Once discovered,
intruders can use these numbers to reconstruct the message and the keys.
DES :-
         This is an example of a widely used secret key encryption system. In 1972, the
National Institute of Standards and Technology (NIST) decided that a strong
cryptographic algorithm was needed to protect non-classified information. The algorithm
was required to be cheap, widely available, and very secure.
         NIST envisioned something that would be available to the general public and
could be used in a wide variety of applications. So they asked for public proposals for
such an algorithm. In 1974, IBM submitted the Lucifer algorithm, which appeared to
meet most of NIST's design requirements.
         The modified Lucifer algorithm was adopted by NIST as a federal standard on
November 23, 1976. Later its name was changed to Data Encryption Standard (DES).
The algorithm specification was published in January 1977, and with the official backing
of the government it became a very widely employed algorithm in a short time.
         DES encrypts and decrypts data in 64-bit blocks, using a 64-bit key (although the
effective key strength is only 56 bits, as explained below). It takes a 64-bit block of plain
text as input, and outputs a 64-bit block of cipher text. It always operates on blocks of
equal size, and it uses both permutations and substitutions in the algorithm.
         Unfortunately, over time, various short cut attacks were found that could
significantly reduce the time needed to find a DES key by brute force. And as computers
became progressively faster and more powerful, it was recognized that a 56-bit key was
simply not large enough for high security applications.
         As a result of these serious flaws, NIST abandoned their official endorsement of
DES in 1997 and began work on a replacement, to be called the Advanced Encryption
Standard (AES). Despite the growing concerns about its vulnerability, DES is still widely
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
used by financial services and other industries worldwide to protect sensitive online
applications.
         In Figure 4.2, the message is encrypted with a public key and sent to the recipient.
The recipient opens it with his public key.
 Note: This Study material is still under development and editing process. This draft is being made
 available for the sole purpose of reference. Final edited copies will be made available once ready.
            For asymmetric key crypto systems, the situation is different. It is generally
 believed that the difficulty of finding an unknown private key depends upon the difficulty
 of some well-known mathematical problems. The problem of finding an RSA private key
 is believed to be equivalent to factorizing a large number that is the product of two large
 primes. From
“Hey Ravi, The terms                                                    HNFmsEm6Un
getting too hectic. I’m                                                 BejhhyCGKOK
  having too many                                                   JUxhiygSBCEiC0QYih/H
  sleepless nights”                                                 n3xgiKBcyLK1UcYiYlxx2
                                                                          ICFHDC/A
Digital Signature :-
         Digital signatures provide information regarding the sender of an electronic
document. The technology has assumed huge importance recently, with the realization
that it may be the remedy to one of the major barriers to growth of electronic commerce:
fear of lack of security.Digital signatures provide data integrity, thereby allowing the data
to remain in the same state in which it was transmitted. The identity of the sender can
also be authentication by third parties.
         The most widely used type of cryptography is public keycryptography, where
thesender is assigned two keys-one public, one private. The original message is encrypted
using the public key while the recipient of the message requires the private key to decrypt
the message. The recipient can then determine whether the data has been altered.
However, although this system guarantees the integrity of the message, it does not
guarantee the identity of the sender public key owner). In order to remedy this, a
Certificate Authority is required.
         In Figure 4.3, Ravi (the sender) uses his private key to compute the digital
signature. In order to compute the digital signature, a one-way hashing algorithm may be
used to first calculate a message digest, as is done by RSA.
         The message digest is an efficient way to represent the message, as well as being
a unique number that can only be calculated from the contents of the message. The
sender's private key is used at this point to encrypt the message digest. The encrypted
message digest is what is commonly called a digital signature.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
         A certification authority (CA) performs the task of managing key pairs, while the
verification of the person or entity bound to that key pair is initially ascertained at the
time of application by the registration authority. A certificate is issued by a CA and links
an individual or entity to its public key, and in some cases to its private key. Certification
authorities can offer different grades of certificates, depending upon the type of initial
identification provided by the individual.
         From an information security viewpoint, these simple electronic signatures‖ are
distinct from the "digital signatures‖ and in the technical literature, although "digital
signature‖ is sometimes used to mean any form of computer-based signature. These
guidelines use "digital signature" only as it is used in information security terminology,
as to mean the result of applying the technical processes. :
Evidence :-
         A signature authenticates the writing by identifying the signee with the signed
document. When the signer makes a mark in a distinctive manner, the writing becomes
attributable to the signer,
Legality :-
         The act of signing a document calls to the signer's attention, the legal significance
of the signer's act, and thereby helps prevent "inconsiderate" engagements.
Approval :-
         In certain contexts defined by law or custom, a signature expresses the signer's
approval or authorization of the writing, or the signer's claim that it has legal validity.
Affirmation :-
         The affixing of the signature should be an affirmative act, which serves the
ceremonial and approval functions of a signature and establishes the sense of having
legally consummated a transaction.
         Digital signature technology generally surpasses paper technology in all these
attributes. To understand why, one must first understand how digital signature technology
works.
Message Authentication :-
         The digital signature also identifies the signed message, typically with far greater
certain and precision than paper signatures. Verification reveals any tampering, since the
comparison of the hash results (one made at signing and the other made at verifying)
shows whether message is the same as when signed.
Affirmative Act :-
         Creating a digital signature requires the signer to use the signer's private key. This
act perform the "ceremonial" function of alerting the signer to the fact that the signature
consummating a transaction with legal consequences.
Assurance :-
         The processes of creating and verifying a digital signature provide a high level of
assurance that the digital signature is genuinely the signer's. As with the case of modern
Electronic Data Interchange (EDI), the creation and verification processes are capable of
complete automation (sometimes referred to as machinable), with human interaction
required only in exceptional cases. Compared to paper methods such as checking
specimen signature cards methods so tedious and laborious that they are rarely used in
practice-digital signature yield a high degree of assurance without adding greatly to the
resources required for processing.
         The processes used for digital signatures have undergone thorough technological
peer review for over a decade. Digital signatures have been accepted in several national
and international standards developed in cooperation with, and accepted by many
corporations, banks, and government agencies. The likelihood of a malfunction or a
security problem in a digital signature cryptosystem designed and implemented as
prescribed by the industry standards is extremely remote and is far less than the risk of
undetected forgery or alteration on paper or of using other less secure electronic signature
techniques.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
                                 TABLE 4.8
                INDIAN WEBSITES THAT USE DIGITAL SIGNATURE
SSL :-
         SSL is a secured socket layer between HTTP and TCP on a Web server. It is a
transport layer security protocol. SSL provides a simple encrypted connection between
the client's computer and merchant's serverover Internet. It also provides authentication
for the merchant's server with its digital certificate from a certificate authority.
         This is a secured connection for cyber shoppers 'to send payment information to
e-tailor's Web-shop. It can be used as a simple order form including payment information
on the Web. But it does not include the payment process protocol with credit card
company and issuing banks.
         Currently, the fast growing Internet consumer commerce is mainly based on
acceptingcredit card over SSL. One of the reasons for the growth in this direction is that
SSL provides secured connection with encryption and authentication between two
computers over the Internet: SSL provides a security handshake in which the client and
server computers exchange a brief burst of messages.
         In these messages, they agree upon the level of security they will use to exchange
digital certificates and perform other tasks. Each computer unfailingly identifies the
other. It is not a problem if the client does not have a certificate, because the client is the
one who is sending sensitive information. On the other hand, the server with whom the
client is doing business ought to have a valid certificate.
         Otherwise, you (the " client) cannot be certain that the commerce site actually
belongs to the one whom it refers to. After identification, the SSL encrypts and decrypts
information flowing between the two computers. This means that information in both the
HTTP request and the HTTP responses are encrypted.
         Encrypted information includes the URL the client is requesting, any form
containing information the user has completed (which might include a credit card
number), and HTTP access authorization data such as user names and passwords. In
short, all communication between SSL-enabled clients and servers is encoded. When SSL
encodes everything flowing between the client and the server, an eavesdropper will
receive only the unintelligible information.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
         Is SSL really secure? Yes, SSL indeed provides the secured connection for
payment transaction between customers and merchants. It is more secure than phone and
postal mail delivery. But the security ends at the merchant's site. It does not keep the
credit card numbers after the transaction is completed.
SET :-
         SET is a messaging protocol designed by VISA and MasterCard for securing
credit card transactions over open-networks, such as the Internet.
         In the SET protocol, a transaction has three players--the customer, the merchant,
and the merchant's bank. SET protocol has three principal features as listed in the
following:
        All sensitive information sent within the three parties are encrypted.
        All three parties are required to authenticate themselves with certificates from
         the SET certificate authority.
        The merchant never sees the customer's card number in plain text.
         The third feature actually makes Internet commerce more secure than traditional
credit card transactions, such as pay by credit card in-store, over phone, or through mail
order form. It is also more secure than SSE.
         To implement SET in e-commerce on Internet, it requires the SET point-of-sale
client software such as SET ―electronic wallet‖ implemented widely in the client's Web
browser. It is a big challenge to make such a point-of-sale software widely available to
the Internet community.
    International banking, and the ability to handle trades in multiple currencies are
critical for international trade. Although some international retail purchasing can be done
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
with a credit card number, other transactions require international banking support. Many
banks offer such services online.
Personal Finance :-
         Online Often electronic banking and portfolio management are combined with
personal finance. However, specialized personal finance vendors offer more diversified
services, with features like:
    1. Bill tracking
    2. Tracking of bank accounts, expenditures, and credit cards
    3. Portfolio management, including reports and capital gain (losses) computations
    4. Investment tracking and monitoring of securities
    5. Stock quotes
    6. Personal budget organization
    7. Record keeping of cash flow, and profit and loss computations
    8. Tax computations and preparations
    9. Retirement goals, planning, and budgeting.
    1. Trading in shares
    2. Trade in derivatives
    3. Investing in mutual funds
    4. IPOs and bonds online
    5. Personal finance and portfolio, risk management
    6. Customer servicing
    Some banks like SBI also offer other features like telephone and SMS alerts.
         These services are available online and provide useful advice on fund
management and investments.
         While online services are useful and easy to handle, they are definitely not risk
free. There are repeated cases of fraud, carding cash, and liquidity risks, etc. which
probably deter many. Again, while these are few online financial services available in
India, they are definitely not exhaustive, as many we still in the pipeline and yet to hit the
market, but the day is not far away!
                                         Exercise :
Q.1 what is Digital Payment Requirements?
Q.2 Explain Classification of New Payment Systems.
Q.3 Explain smart card cash payment systems.
Q.4 Explain Properties of Electronic Cash (E-Cash) and how to manage electronic
cheque on internet.
Q.5 How to manage risk in E-payment system
Q.6 explain how u can manage information privacy in e-payments systems.
Q.7 explain how you can manage credit risks in e-payment systems.
Q.8 Explain the characteristics of online payment system?
Q. 9 explain different online payment categories.
Q.10 what is electronic cash? Explain its properties and how it can be used in e-
payment systems.
Q.11 what are the advantages of E-cash.
Q.12 explain different types of electronic money.
Q.13 Discuss about legal issues and operational risks in electronic cash.
Q.14 What are the factors for design of electronic payment system?
Q.15 What is electronic cash? Present the properties of it.
Q.16 Write about credit card based electronic payment systems.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
Q.17 Write about debit card based electronic payment systems.
Q.18 Explain about digital token based electronic payment system.
Q.19 Discuss about the risks in electronic payment systems.
Q.20 Explain digital signature. How it can be used to provide security to E-payments
     System.
Q.21 The public is highly concerned with the safety of e-payment. What are the
     Specific measures put forward in the Guidance in this respect?
Q.22 What is e-payment? Why is orientation and standardization required for e-
     Payment businesses?
Q.23 What are the risks involved in Electronic Payment Systems?
Q.24 What are the advantages and disadvantages of a Smart Card?
Q.25 Briefly explain the various electronic payment systems.
Q.26 What are the security requirements for using online e-cash services?
Q.27 Define Digital Token Based E-payment system.
Q.28 What are the different method of Online payment.
Q.29 Illustrate the concept of Digital signature.
OR
Explain the working of digital signature
Q.30 Explain the advantages of Electronic cash.
Q.31 What does the verification require for electronic transaction on the internet?
Q.32 Explain the advantages of digital token based electronic payment system to
Buyer‘s and sellers.
Q.33 Explain the classification of payment system in detail.
Q.34 Explain in detail public key certificates.
Q.35 explain in detail digital wallet.
Q.36 explain in detail web-based money.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
UNIT 5
E-CRM Solutions
                                                                                                      Stage 3
                                                       Stage 2
              Stage 1                                                                        Customer Loyalty
                                                    Customer Value
                                                                                          * Communities
                                                     Orientation
  Customer information                                                                    *Learning organization
      Environment
                                                 * Behavior analysis
                                                 *Profitability analysis
 * Metrics programmer
                                                 * Lifecycle modeling
 * Customer
                                                 *Tuned marketing
   Information
   Repository
 *Customer profiles
 * Transaction and
   Behaviors
In the second stage, operational effectiveness is the focus. Customers want value for their
money. They believe that they have got value, when the perceived benefits they receive
from something exceed the costs of owning it. These components are represented in
Figure 5.3
Customer Loyalty
In the third stage, the focus is on the integration of internal process of the organization
with the customer in creating a community.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
                                                   (Obtained)
               Customized service
                    benefits
Perceived value
Price
                                                   Perceived sacrifice
                                                        (given)
               Costs other than
                     price
When Humans Are Not Enough- Or when There Are Not Enough
Of Them
For many e-customers, the Web is like an infinitely large shopping mall they have all to
themselves. Although the absence of long lines at the checkout counter and the freedom
form the difficulty of parking are welcome, the lack of other shoppers and even
salespeople can make them feel lonely. For a Social shopper- a woman who enjoys
shopping with friends- looking for a product on the Web can be similar to going a movie
all alone. Then fun factor is missing, regardless of how great the move is. On the other
hand, if she‘s mission shopper- she enters, extracts the goods, and then makes her exit as
soon as possible-than shopping on a highly structured website can be a welcome respite
from the time-consuming task of searching the malls. In either case, even a potentially
annoying salesperson can be a welcome sight when the woman simply cannot find the
product she is looking for.
         These two aspects highlight several important elements in human customer
service interactions. The most obvious is variability. What constitutes a good customer
service in one and individual levels. For example, an individual may have different
expectations of what constitutes a good customer service in the airline, hotel, and
restaurant industries. He probably has specific expectations about his favorite airline or
hotel chain. Furthermore, he no doubt expects different levels of service at each location.
         Variability in service can result from a variety of factors. Perhaps the staff in one
location has insufficient training to understand their customer‘s needs. May be, they just
do for three months in the marketplace, making it virtually impossible for a salesperson
to become an expert on a particular product before another replaces it. Clearly, with
some products and services, it is simply absurd to expect a salesperson without extensive
training to become proficient in interfacing with customers in more than a superficially
way.
         If someone were to ask the person who manages the customer service division of
a business to name his greatest assets and liabilities, he will say it is the people, it is a
challenge to attract people and keep them attentive and educate them, but it is usually
worth the effort. Good customer service representatives can provide personal, empathetic,
quality, reassuring service, especially when they interact with the customer in person.
Nothing beats an attentive, knowledgeable sales or support person in terms of bonding
customers to a company. Great sales and service representatives create a loyal following
that is often independent of the company they represent.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
         Although there are situations when only a live customer service representative is
required, this is not always possible. With today‘s busy lifestyle, there is simply not
enough time to have face-to-face interaction. Increasingly, sales and support interactions
occur with the assistance of communications and computer technology, even for costly
items. For Example, when time is a scarce resource and a unstructured conversation can
resolve things in a few seconds, telephone is of great help, especially since it is
universally available.
         Against these advantages of personal service sales and service representatives are
expensive from a practical perspective, especially in a 24 hours, 7 days support model. In
addition, there is the aforementioned variability in service, due to dozens of possible
issues, such as a representative‘s disinterest in a particular product because there are
dozens of other products he needs to know about. One of the major limitations of human
customer service representatives is that they normally work with customers on a one-on-
one basis. Scalability, the ability to work with multiple customers at once, is possible in
group presentation situations, but then the personal, one-on-one interaction. Suffers.
There are also errors, of both omission and commission, which can appear in any human-
mediated transaction, regardless of the touch point. This is especially true when the
transaction involves the manual entry of data.
         As the effective interaction distance between customer and support staff increases
from personal to phone, to live Web chat, to e-mail interactions, many of the positive
qualities of personal interaction normally ascribed to a good customer service
representative decrease. The potential for using the touch point in an emotionally
intelligent interface diminishes as well. For example, it is much easier to foster an
emotional bond with a customer through personal interaction than through e-mail. In
addition, human- mediated interactions tend to Often; this is simply because someone has
to take time to record the data. Furthermore, it may be impossible for some employees to
fulfill their data- logging requirements because they may lack the education needed to
understand the product or service. For example, a new employee may not be able to
understand the product or service. For example, a new employee may not be able to
differentiate between fabric types, sari styles, or designer labels. Another characteristic of
human customer representatives is that they bring with them a variety of security and
confidentiality issues, from both an employee and a technology perspective. That is the
equipment the support staff uses must be protected from viruses and break-ins, and
employees must be trusted or guarded as well.
Interactive computer and communications technology can assist in the sales and support
process in several ways. Telephone, live chat and e-mail can enhance the effectiveness of
customer service representatives. Computer- mediated e-mail, chat and animated chat can
take over when a human representative is exhausted. They can serve as a filter, answering
all but the most difficult questions for the representatives.
        Web technology can also help offload the support issue to customers who enjoy
helping each other on the Web. For example, Lands‘ End adds to the fun of shopping
with its shop with FriendTM option. Two shoppers can browse together and add items to
the same shopping cart. For example, two friends working in different companies can go
shopping during their lunch break, just as though they had met and gone shopping in the
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
same brick-and mortar retail outlet. There is no busy date warehousing or cluster analysis
involved, just a two-way Web chat connection and a slight modification in their shopping
cart model. The customers take care of navigating the Web and helping each other with
product selection.
        In a similar vein, several vendors, including Cahoots, Hyper nix, ICQ, My ESP
com, and Third Voice, and Web Side Story, offer live-chat technology to make online
shopping less sterile and more emotionally engaging. Their idea is to create a sense of
Community for a particular website by allowing prospective customers to communicate
with each other at any time, even without knowing each other‘s name.
        For example, customers shopping for widgets on a particular website could ask if
other customers had a good or bad experience with widgets purchased there, anyone
visiting that website could respond to the query and discuss the merits and demerits of
those widgets. The goal is to improve upon the Web‘s record of two-thirds cart
abandonment. That is about two- thirds of all shopping carts are abandoned at some point
before final checkout. From the perspective of a website owner and the one paying for the
live-chat capabilities, the danger is that the discussions may become critical and out of
control.
        Human-mediated personal contact, phone contact, live web chant, e-mail, and
animated Web chat are representatives of the range of possibilities currently available,
where animated Web chat represents the greatest level of technological involvement.
There are also several technologies on the horizons, such as two-way Web-based video
links, but the realities of current bandwidth limitations of the Internet are holding these
technologies at bay. Also, the value for each characteristic attributed to a touch point
represents a typical case. As with any measurement or estimate, there is variability in the
actual value shown.
One of the effects of adding the appropriate technology to the customer support or sales
mix is that there is often a reduction in the cost per contact, i.e. the money spent to
connect with each customer. The cost per contact tends to be highest for personal. One-
on-one interactions, simply because the representative‘s full attention is necessarily
focused on a single customer. The customer receives the full benefit of the
representative‘s training during the period of contact, as well as many of the resources
that result in direct and indirect costs to the company.
        With the addition of phone technology, the support representative is freed
somewhat from dealing with one customer to the exclusion of all others. For example, he
might be on potential customer or client, filing papers, cleaning up his desk, or in some
way contributing to his own and the company‘s future success.
        Similarly, live, Web-based that and e-mail have a relatively low cost per contact,
in part because the support representative can multitask. For example, in the case of a
live chat, the representative can communicate with potential customers on the Web in
spurts, and in between sessions, handle other support issues. Furthermore, since e-mail is
normally handled in batches, often with canned responses, a customer service
representative has time between email runs to perform other functions.
        Moving from primarily human to computer- mediated interactions, the cost per
contact is potentially even lower. Computer-mediated e-mail is generated by a bot, can
respond to hundreds of e-mails during the time it takes a human to answer one or two.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
Similarly, computer- mediated chat, where real-time chat bots help customers, can reply
to hundreds of queries per second. The same rationale holds for animated chat bots that
incorporate emotive animated graphic characters. The marginal cost of handling an
additional customer is an insignificant increase in the server power and Internet
bandwidth requirements.
TABLE 5.2
Although the golden standard for creating an emotional bond between the customer and a
company is to have dedicated. Charismatic salesperson or a representative, technology
can be of great help in creating an emotional bond. As illustrated in Table 5.2, personal
contact is capable of creating the most profound emotional bond. Live chat is also
capable of supporting a meaningful dialogue that can help create an emotional bond, but
it is not as powerful as the phone or direct contact. Since e-mail lacks most of the cues
we normally associate with a conversation, such as immediacy, it has the lowest
likelihood of creating a meaningful emotional bond.
         Computer-mediated chat and animated chat, when appropriately implemented,
have the best chances of creating an emotional bond with the customer.
Presenting Emotive
Human beings are emotional creatures. We react to not only language and voice
intonation and the subject, but also to dozens of subtle cues, in the form of physical
gestures. For this reason, it can be stated that personal interactions convey the most
emotive content. E-mail has the lowest emotive content capacity, in part because of the
time factor. Both chat and e-mail can enhance the messages with the use of emotive icons
or emotions. Of the computer-mediated options available, animated chat has the greatest
potential for conveying emotive message to a customer.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
Displaying Empathy
Great salespeople and customer representatives are sensitive; they can understand the
customer‘s situation or at least give the impression that they do. It is the impression that
matters to customers; they want to feel that they have been listened to. This felling can be
communicated best in person, but to some degree over a phone conversation and to a
lesser extent over a live chat conversation. Because it lacks immediacy, e-mail tends to be
a poor communications conduit for sensitive thoughts and feelings. Computer-mediated
communication, such as e-mail and live chat, do not very well when the goal is to
communicate feelings that may be difficult for a computer to convey. In this regard,
animated chat communications can sometimes convey a sense of understanding, when
used as the touch point.
Humans are simply more error-prone than computers when it comes to manipulating
symbols and values. Assuming there is an accurate customer data to work with;
computer-mediated customer communications can have a much lower error rate than
human-mediated communications in tracking orders, verifying charges, and identifying
repeat customers.
Increasing Flexibility
While computers might excel in flawlessly following human instructions, good customer
service representatives excel in flexibility. Regardless of the touch-point, a good
representative, when properly trained, can help rectify errors or retrieve missing data that
current computer-mediated systems cannot.
Improving Interactivity
Increasing Continuity
Communicating Personality
Computer hardware, programs and websites, all have personalities, However, just as
personal interactions tend to have a great potential to exhibit personality, animated chat,
where an anthropomorphic figure can communicate with visual cues, text and even voice,
has a much greater chance of communicating personalities to customers. The challenge is
to create personalities that customers can relate to in a positive way.
Increasing Quality
Providing Reassurance
An important aspect of the sales process is reassuring customers that their purchase
decisions are correct, their problems have been solved, and that their products are on the
way. Computer technology can be used for something as ordinary as helping reassure
customers about the status of their order, or as sophisticated as creating a personal profile
of customers and using it to explain why the products they just ordered are in their best
interest.
Increasing Reliability
Humans vary in their reliability from person to person and from day to day. Computers
are reliable machines as long as human-generated viruses to not attack them. A business
can rely on computer mediated communications with customers as long as it has tightly
controlled parameters. In short, computers excel where reliability is an issue.
Improving Responsiveness
Properly trained sales and support staff can do a good job of responding to customer
needs in a timely manner. E-mail has the lowest responsiveness of the human-mediated
communication, simply because of the inherent delays in e-mail communications. By
definition, e-mail carries with it, a perceptible delay that is not noticed or at least is not
significant in a live chat, for example. Because of the rapid 24 X 7 response made
possible by computers, computer-mediated chat and animated chat are potentially much
more responsive that a customer representative or salesperson could be.
Increasing Scalability
In general, humans do not scale very well. Most interactions are on a one-on-one basis,
such as personal, phone. And live-chat communications. E-mail is scalable because it
may be handled in batchers, with same generic answer being applied to hundreds of
questions. In contrast, computer-mediated touch points are virtually infinitely scalable,
given an adequate infrastructure, including supporting server hardware.
Controlling Transference
Decreasing Variability
From the above discussion, it is apparent that of the characteristics listed in Table 5.2
web-based customer support has the following advantages.
    1. Lower cost per contact
    2. An emotional bond with the customer
    3. An ability to communicate with more emotive content
    4. Fewer errors
    5. Greater customer interactivity with a website
    6. Improved reliability
    7. Greater responsiveness
    8. Greater return on investment
    9. Improved scalability
    10. Less variability in the quality and content of communications.
        What really matters is how businesses apply these potential benefits of interactive
technology to their Web presence. If the goal is to create an Emotionally Intelligent
Interface, then a business could use these technologies towards setting the tone of
interaction, involving
Its customers in a mutually beneficial dialogue, and using interactivity to establish a
meaningful relationship
        When potential customers visit a website, they should be made to feel
comfortable with the company and confident that it can fill their needs efficiently and
economically. At a brick- and –mortar store, the sales staff and the layout and decoration
of the reception area of the store perform this function. The environment established by
the technologies incorporated in the website can dictate customer‘s responses to the
business, and how long their visit to the website lasts. Creating a welcoming
environment can entail something as simple as creating a panel of potential customer
service representatives and allowing customers to choose which one they would like to
interact with, whether the representatives are real or virtual.
E-CRM Toolkit
An E-CRM ‗toolkit‘ covers a wide diversity of channels (see Figure 5.4) In order to bring
true customer management across online business; one needs the E-CRM Products to
fulfill the following criteria:
                                                 E-mail management
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
Content E-marketing
Assisted selling
Content
Is the system delivering the contents a customer wants to see? How is being managed on
the IT Platform?
Storefront and Merchandising Services
With large numbers of visitors failing to complete transaction at the checkout, it is
needed to ensure that your storefront services propel your customers to the cash point.
E-mail Management
Are e-mail campaigns focused to provide an offer that customer cannot refuse? How are
these tied in with websites so that customers enjoy a seamless experience?
Customer Management
Is the company managing date across all the sales and marketing functions to its best?
E-marketing
How well are e-marketing efforts targeted? How well do they combine with online
selling operation?
Assisted Selling
One needs only to look at the Dell business model to see how assisted selling can
enhance the shopping experience and achieve business success. But what assisted selling
approach will work best for any company?
Media
Web Physical
                                              Business
                E-Mail
                                                                               Personal
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
                                                                             Mail
                        Fax
Phone
Figure 5.5 illustrates the state where every touch-point is significant. The arrows therein
indicate the relative significance of each touch-point. For any company, it simply is not
enough to know ―who buys what?‖ order to build a successful, profitable marketing
campaign. It needs to know who its customers are, and how much it should invest on
them. This necessitates the maintenance of a consolidated database. The Components of
the data warehouse can be found in Figure 5.6
                                   Consolidated                               Payment
                                    Database                                    Cash
                                                                            Bank account
                                                                              Defaults
          Delivery                                                           Controlling
       TrackingPack                                                            Targets
            aging                                                              Actuals
          delivery                                                            Revenues
        information                                                             Costs
                                      Order       Inventory
                        CRM
                                      Entry        Items in
                      Marketing                      Stock
                                      Order
                      Campaigns                   Threshold       Procurement
                                      Data
                        Sales                         for      Suppliers Lead times
                                      Prices
                       Contacts                   reordering          Costs
To leverage technology and thereby realize the greatest benefit from a web presence, a
business must first know what it is after, in terms of relationship with its customers.
Assuming that the goal is to provide a website with an Emotionally Intelligent Interface,
management also has to appreciate the possibilities within the business resource and
technology constraints. Note that the technologies with the greatest degree of interactivity
provide the greatest potential for a sale. A business needs to pull everything together in a
way that harmonizes with its customers; the business should use the technology at its
disposal so that the odds of creating a loyal customer following are maximized.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
Managing Customer Value Orientation and Life Cycle
The CRM industry has matured rapidly over the past few years. Contact managers have
evolved into full-function sales force automation systems. CRM front-office suites now
support marketing, sales and service. Integration between CRM systems and enterprise
resource planning (ERP) systems is becoming more common. If not commonplace.
        The E-CRM market is new and rapidly evolving. Implementing CRM for
traditional front-office marketing. A sales and service operation is becoming the top
priority for most companies. That prospect has been challenging enough, being
formidable to the new touch-point such as the Web. Integration is still the key. Online or
offline, client/server technology is still a major factor. Anyone who has implemented
client/server applications between the various contact centers and touch points within an
enterprise can afford the complexity and the cost involved in them. In short, CRM is a
square peg and e-business is a round hole. However, everything is changing with the
introduction of new, Web-based CRM solutions.
        To help organize the chaos, E-CRM solutions can be grouped into two categories
Web-based solutions and Web-extended solutions.
        The Web-based CRM solutions are designed from the bottom up, exclusively for
the Internet. These are very innovative products, initially focused on the sales (e-
commerce) function, more marketing and service capabilities will be soon added.
        Web-extended CRM solutions are established (primarily client/server-based)
CRM suites, originally designed for enterprise users with extensions, to include web-
interface functions. There are three phases of CRM:
   1. Acquisition
   2. Enhancement
   3. Retention
       Each has a different impact on the customer relationship, and each cans more
olooelytie a company with its customer‘s life.
Acquisition
You acquire new customers by promoting product/service leadership that pushes
performance boundaries with respect to convenience and innovation. The value
proposition to the customer is the offer of a superior product backed by excellent service.
Enhancement
You enhance the relationship by encouraging excellence in cross-selling. This deepens
the relationship. The value proposition to the customer is an advantage with greater
convenience at low cost (one-stop shopping).
Retention
Retaining profitable customers for life should be the aim. Retention focuses on service
adaptability, i.e. it delivers not what the market wants, but what the customers want. The
value proposition to the customer enhances a proactive relationship that works well with
the best interest of the customers. Today, leading companies focus on retention of
existing customers much more than on attracting new customers. The reason behind this
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
strategy is simple: If you want to make money hold on to your good customers. But do
not be fooled: it is not as easy as it seems.
        All the phases of CRM are interrelated as shown in Figure 5.7 However,
performing the tasks well in all the three phases is a difficult proposition even for the best
of companies. Companies often have to choose which one on these dimensions will be
their primary focus.
Acquisition
Innovation
Convenience
Enhancement
Reduce Cost
                                                                                   Products
                                                                                   Listening New
                                                                                                   Retention
                Customer Service
Customer Service
Attracting and retaining customers has rapidly emerged to be the most mission-critical
function of leading businesses. Everything (Products, services, pricing, and the like) is a
commodity. Customer retention has replaced cost-effectiveness and cost- competitiveness
as the greatest concern of business executives today. It costs five to ten times more to get
new customers than to retain the existing ones. It is going to involve more efforts than
web interactions to keep the customer brand-loyal.
Give customers what they want. This can be a challenge, or it can be an opportunity. The
same technology that has made it more difficult can also make it easier. Customers are
more important than business people. Companies need to do business with customers in
their own way. The key is integration of the various points of customer contact, including
Web, contact centers, wireless (field) and others. All customer interactions must be
consistent, with clear value delivered to the customer and the company.
        E-CRM is not the single answer to attracting and retaining customers, nor is e-
customers the only valuable customers. Indeed, Internet is not the only point of contact
with the customers, nor are the other digital.
        Customers should not be segmented, based on the assumption that they will
predominantly choose one point of contact with business. More likely, customers will
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
have multiple points of contact, including our website, contact centre, sales and field
service representatives. They expect a consistent experience from point to point. They
expect the company to be easy to do business with.
        Very soon, the ―e‖ fancy will subside. Executives in every industry will recognize
that the next major phase of the Web phenomenon is actually integration with other
points of contact. Blended media is the true killer solution for business.
        In the past, if marketers wanted to incorporate technology into their environment,
they often looked outside the enterprise for help. Sales frequently outsourced lead
management separated from each other and the enterprise. There were a number of
reasons for this, such as the following:
        1. Their internal IT department did not understand what was needed.
        2. The IT department had other priorities and would take too long to develop the
            needed technology.
        3. The functional areas did not trust their own internal data, believing it to be of
            too poor a quality to be useful.
        4. The business people did not understand the technology, and so could not
            explain what was needed, technologically, to their IT personnel.
        To support the transition of the enterprise from a customer focused approach to
doing business, individuals throughout the enterprise must have access to a set of
capabilities necessary to plan and manage customer interactions or customer touches.
These capabilities can be categorized in two ways.
    1. Operational, Tactical, or Strategic capabilities to the enterprise.
    2. Acquisition, Retention, and Expansion of a Customer Relationship
        These two categories represent the business perspective of the capabilities and
how they relate to the customer. However, it is probably more useful to look at
capabilities from the customer‘s perspective. After all, the purpose of these capabilities is
to gather customer information and use this information to modify customer behavior in a
mutually beneficial way. To look at these capabilities from the perspective of the
customer, it is necessary to way. To look at these capabilities from the perspective of the
customer, it is necessary to realize how the customer interacts with the enterprise over
time, as the enterprise:
Global Marketplace
                                                       Acquisitio
                                                          n
                         Attrition
                                           Consumers
                                                                                       Evaluatio
                                                             Prospective                   n
                                                             Customers
Retention
Service
Customer acquisition consists of the business processes in the CLC leading up to the
customer moment, when consumers become customers...Or not. This includes awareness
generation knowledge transfer, consideration, pre-sales, and evaluation. Capabilities
include consumer surveys in business operations, tracking enterprise-wide customer
interactions in business management, and market basket analysis in business intelligence.
The enterprise clearly requires customer acquisition to maintain and expand revenues and
profits. A business without new customer acquisition will shrink and eventually fail. But
compared to customer retention and expanding ―share of customer‖ customer acquisition
can be expensive.
        Expanding the ―share of customer‖ is gaining the largest portion of acquisitions
made by each individual customer in the global marketplace. The proportion of a
customer‘s money that goes to a particular enterprise is known as the share of customer.
Example capabilities include delivery of new information to customer through business
operations management capabilities, and identifying cross-sell opportunities through
business intelligence additional sales without the cost of acquiring a new customer.
However, expanding the share of customer is as valuable as customer retention. Most
companies find that their most profitable customers are the ones that spend the largest
percentages of their budgets with the enterprise. For example, one bank recently
indentified that every one of their most profitable customers (the top 20 per cent) gave
their business to the bank. What is new is the customer-centered nature of applications,
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
which means organizing CRM processes around the customer rather than marketing,
sales, or any other internal function. Measurements and feedback from the customer
enable improvements in the CRM process. The customer‘s viewpoint becomes an integral
part of the process, allowing it to change with the customer‘s needs. In other words,
companies base their actions not on the priorities of functional fiefdoms, but on the
overall corporate objective of providing customer satisfactions.
        However, before aggressively deploying CRM applications (see Figure 5.09),
managers might have to restructure customer-interaction processes. Functional and
organizational structures tend to compartmentalize the various activities that go into
serving the customer. Such fragmentation prevents customer information from being
dispersed far enough within the organization to be useful; in fact, it often stands in the
way of efforts to build a relationship. As a result, customized service is difficult and
consequently. Organizations tend to treat all customers the same – a damning impediment
to building closer relationships.
        To counter fragmentation, leading-edge companies strive to take a more customer
centered approach to CRM. There is a growing trend towards managing all the activities
that identify, attract, and retain customers in an integrated fashion that is, managing them
as a CRM processes, organizations can create end-to-end communications and
performance accountability for entire sets of activities. In short, a CRM infrastructure is
really a portfolio of process competencies.
Customer
Life cycle                  Acquire                         Enhance                       Retain
Direct marketing
Each of these capabilities can play a key role in the interaction of the enterprise and the
customer. Functions of business operations include some capabilities that are not always
associated with CRM, such as billing. But a bill is a regular, predictable customer touch.
Why not include a cross-sell offer or product coupon with the bill? Many companies now
to this, requiring coordination of billing with CRM capabilities. After all, a consumer
who often moves an unsolicited mail directly from the mailbox nearly always opens a
bill.
The most sensitive aspect of customer relations is privacy. All of us have boundaries, and
don‘t trust people who become too familiar too soon.
        From the business perspective, ubiquitous data and information that flow
seamlessly from one touch point to another represents a kind of selflessness, regardless of
the business from one touch point to another represents a kind of selflessness, regardless
of the business model. The goal of every service-conscious business is to understand not
only all customers, but their circumstances as well, and this requires information. In
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
addition to the obvious business opportunities, there are numerous consumer benefits for
ready access to personal information, no matter where the location is.
        Paradoxically, Internet initially gave the illusion of privacy and anonymity.
People could voice their opinions on any subject, view pornography, and read any topic
they wanted, without disclosing their identity. However, it was a very short, temporary
illusion. In the workplace, e-mails as well as the employees activities on the Web are
often monitored.
        There is currently a hot debate over the rights of companies to create dossiers on
consumers without their knowledge and then sell the information to third parties. Other
companies such as America Online, which have much more consumer information at
their fingertips, have maintained a low profile, America Online, for example, maintains
information on 21 million subscribers, including demographics, credit card numbers, and
their whereabouts. Although America Online is not currently in the business of selling
consumer data, it sells names and addresses to bulk mailers, and buys information about
subscribers for targeted advertisements. Some service providers intentionally track
subscriber movements with subscribers‘ knowledge, and sell the information to third
parties. Subscribers are given free Internet access and extensive personal profiles.
        Tracking consumer –purchasing patterns is not always used with the consumer‘s
best interest in mind. For example, personal tracking data are often used in yield
management, a technique designed to maximize reverence and profitability. The idea is
that some customers are more profitable than others, especially those placing orders with
short lead times. Since suppliers can charge higher prices for orders with short lead times,
they reserve capacity for such orders and turn down less profitable, long-range orders. As
customers are ranked in terms of profitability and system compatibility, less-profitable
customers are deleted from the list and their orders declined. For example, a company
may not be able to purchase hotel rooms in bulk for conferences, unless its conferences
are to certain minimum size. This mechanism is great for businesses. But may not be
appreciated by some customers.
        It is now clear that customer relations re based on a timeless, technology-
independent, triad-service, trust, and loyalty. Customers have to trust, and loyalty.
Customers have to trust that a business is working with their best interests in mind.
Without trust. Which is a major contributor to the emotional bond between a business and
its customers, there can be no relationship. Furthermore, even the best intentions are
worthless without action. A business must repeatedly provide a valuable, consistent
service to prove its customers that the company stands behind its marketing rhetoric. If a
business provides its customers with a valuable service and develops a trusting
relationship, the business can do all it can to galvanize a loyal customer following.
Over the past few decades, there has been a constant shift in the way the companies react
with their customers. Companies have found that they need to know the customers
better. And for that they need to quickly respond to their needs and wants. It is no longer
possible to wait until the signs of customer dissatisfaction are obvious, before taking
action. To succeed, companies must be proactive and anticipate what a customer desires.
This has made the companies to invest heavily into CRM.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
        To be successful, database marketers must firs identify market segments
containing customers or prospects with high-profit potential. They then build and execute
campaigns that favorably impact the behavior of these individuals.
        The first task, i.e. identifying market segments, requires significant data about
prospective customers and their buying behaviors. In practice, massive data stores often
impede marketers, who struggle to sift through the minutiae to find the nuggets of
valuable information. Data mining applications automate the process of searching the
mountains of data to find patterns that are good predictors of purchasing behaviors.
        After mining the data, marketers must feed the results into campaign management
software that, as the name implies, manages the campaign directed at the defined market
segments. In the past, the link between data mining and campaign management software
was mostly manual. Successful companies need to react to each and every one of these
demands in a timely fashion. The market will not wait for your response, and customers
that you have today could vanish tomorrow. Interacting with your customers is also not
as simple as it has been in the past. Customers and prospective customers is also not as
simple as it has been in the past. Customers and prospective customers want to interact
on their terms,
E-logistics of UPS
United Parcel Service has introduced UPS e-logistics, a provider of integrated, end-to-
end supply chain management packages for e-business. UPS e-logistics is marrying the
expertise of its partners Oracle, Price Waterhouse Coopers and EXE Technologies with
its global fulfillment and distribution network, information technology infrastructure and
logistics expertise of the UPS Logistics Group, to offer a complete range of services
tomanage the back-end of the e-business supply chain.
        The company‘s services include warehousing and inventory management, order
fulfillment, inbound and outbound transportation, returns management, customer call
centre and management reporting. UPS e-logistics said that the pre-built services are
standardized, can be bundled and configured, and are scalable for future growth.
        UPS e-logistics serve both business-to-business and business-to-consumer-
commerce clients, ranging from e-business start-ups to the dot-com divisions of
established corporations. Nearly a year in the marking, it is the first business to be
lunched by the UPS e-ventures incubator.
        Partners Price Waterhouse Coopers provides over all systems integration
consulting and project management services; software maker Oracle Corp. offers full
enterprise resource planning with integral order management and advanced planning and
scheduling functionality EXE Technologies, a leading provider of multi-channel
fulfillment, warehouse and distribution software, provides warehouse management
systems at all ups e-logistics distribution centers. United Parcel Service is extending its
reach to services traditionally performed by distributors and integrators: logistics
fulfillment, call centre support and website development and implementation. And the
delivery giant‘s move could pave the way for other carriers, such as Federal Express,
DHL and Airborne Express, to enter or boost their presence in this space down the road.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
Question Bank
Unit 6
Supply Chain Management covers all aspects of a business. From the stage of raw
material to the end user, each and every aspect of the cycle is covered by the management
system be it sourcing product design, production planning, order processing, inventory
management, transportation and warehousing, and customer service. This complex
sequence of steps used to be very difficult to manage efficiently and in the days when
organizations have to fight hard to maintain their bottom-line, optimizing these steps
become a necessity.
        While you enter a store to buy a certain material, just try to imagine the sequence
of steps that had brought the material where you see it. On the material, you will find a
price tag with all the details of its date of manufacture, date of expiry, lot number, etc.
The shop that you have entered has carefully placed it on the shelf after procuring it from
a distributor and noting all these details for billing and tracking future complaints. The
store also maintains an inventory of this material and hundreds of similar materials that
are available in the store and along with this a minimum stock level and a reorder level.
This product, like all other products in the store, has been sourced from a distributor who
sourced it from the manufacturer. The manufacturer had procured the raw materials
required for the production from one or many of his suppliers. A third-party transport and
warehousing infrastructure was utilized to ship the material from the manufacturer to the
distributor and from the distributor to the store that you have just entered.
        After your purchase is complete, the point-of sale updates this information at
various places-the stock level comes down and revenue increase. The information of
decrease in stock level should reach the distributor who has to refill the stock before it
becomes zero and the distributor is also to be paid his due amount. This chain is again
pushed backwards to the lowest level of the supplier who has to supply the material in
time. So, there is a constant flow of money and material between these establishments in
order to satisfy the needs of the customer.
        The Supply chain Management manages the flow between different stages to
maximize productivity and minimize stock-outs or overstocking. The solution spans
across the different companies involved, and the system used by these companies should
be able to talk to each other and understand each other‘s requirement. An SCM system is
a combination of many applications- demand, inventory and transportation planning –
covering the stages of the supply chain. The increase in product variety and demand for
customized products increases demand
An efficient supply chain management can bring down the prices of seller by as high as
40 per cent. This is not with the help of a budget sop, but by reducing average inventory
levels, lowering transport costs, lowering warehousing costs, lowering warehousing
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
costs-among others. Children will be excited on having Maggi at Rs. 6 against the
prevalent price of Rs. 10.
         Industry estimates show that a company spends between 17 per cent and 50 per
cent of the price for just moving the goods from their manufacturing plant to shop
shelves. This includes the margin of the retailer and of the distributors. Most of it is taken
up by logistics and holding inventory and these costs can be controlled, optimized and
reduced, thus reducing price or increasing profit.
         Now if we can practically apply this model on a Rs. 50,000 crores FMCG
company with thousands of wholesalers and retailers, the result will be mined
disorganized. This will not only give the company a cost benefit but will also result in
improved customer service levels, improved competitiveness and an overall gain in
profitability for the organization.
         Managing logistics is a nightmare for all company executives in the sales and
purchase departments. Handling logistics not only adds cost to the business but also
increase the number of business processes and involves lot of resources. The logistics
chain starts from the supplier end, continues to the customer end involving members in
surface, air, sea express, couriers, brokers, customs, excise, etc. This is for the sales part.
Later it will also include similar contacts for the after sales support, repair and
maintenance. Many of the companies cannot take up this load and outsource these
activities to experts, and many companies manage this efficiently and make huge profits.
         Technology in logistics has been advancing in three phases. The first phase is to
monitor the logistics chain. Herein, technology helps companies monitor orders,
inventory and shipments with all parties. Since logistics is a business a process at the
most basic level. It is used to automate the process to gain visibility. This is primarily
done through enterprise-wide software developed in-house or procured from the solutions
already available. Companies like Blue Dart, an integrated air express carrier, use an in-
house developed package called COSMAT-II (Computerized Online System for
Monitoring and Tracking) They started using this software way back in 1989 when very
few standard solutions were available, and have improved it all through these years with
changing needs of business.
         Gati, another Indian pioneer multimodal express cargo company, also uses an in-
house system that links their various processes in the logistics chain. Over the years, they
have included features like vehicle monitoring system, web enabled access to various
applications etc., and TheLemur group has further included warehousing, transportation
and distribution system with full visibility of the processes. They found it very useful as
they could adapt to any internal or external changes or requirements within hours.
         Wal-Mart, starting with P&G has incorporated vendor-managed inventory,
category management, and other inter-company innovations. In order to build this strong
SCM infrastructure, Wal-Mart entered into an alliance with P&G and in return got a
dedicated account team representing key P&G functions of sales/marketing, distribution /
supply chain management, IT and Finance. P&G had one Vice President dedicated for
this project, who made the CFO of Wal-Mart as his customer. Customer value
maximization was their only drive. Over the past decade, Wal-Mart has invited more of
its major suppliers to jointly develop powerful supply chain partnerships. These are
designed to increase product flow efficiency and, consequently, Wal-Mart‘s profitability.
         Top managers have learned how to integrate their supply chains with major
customers like Wal-Mart. What most companies have not sorted through, however, is
what to do with all of their other customers. A common answer to the question of how to
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
structure relationships with other customers is to try to apply the Wal-Mart relationship to
all customers. This approach is implicit in commonly shown Power Point slides that
offer a view of a company‘s evolving supply chain role. In one version of this view, the
company starts as a stable supplier, evolves into a reactive supplier, then an efficient
reactive supplier, then an efficient proactive supplier, and finally becomes a revenue and
margin driver. This seems logical, with the company‘s supply chain capabilities
inexorable increasing in experienced over time, enabling the company to develop even
more effective integration with its customers.
         The problem, however, is that developing Wal-Mart-like supply chain
partnerships requires a lot of resources and management attention. It also requires
willing, innovative partners. Pursuing this approach too widely would be both costly and
stuffy. In the past, Suppliers to the retail trade typically had rather monolithic supply
chains. The order fulfillment process was designed with a ―one size fits all‖ approach.
Customer generally received the same list price, regardless of ordering efficiency. There
was very little effective forecasting. Some inventory priority was given to major
customers in the event of allocations. Products were delivered in the manner that
customers requested, regardless of the inefficiency entailed.
         But today, the retailers themselves are changing dramatically. There is very
visible consolidation, with the top ten retailers expected to comprise about half of the
industry‘s revenues in a few years. Retailers have very different degrees of willingness
to innovate, and the innovators are growing fast. Most retailers were used to having
significant buyer power, and many are still very focused on exerting price pressure on
their suppliers rather than seeking increased profitability through process innovations. At
the same time, the leading retailers are consolidating their supplier bases they are looking
more to major suppliers for supply chain innovations and prioritization, and in return,
they are giving them increasing shelf space.
         As a result of this history, major retail suppliers find themselves stretched. They
are forced to meet the increasing needs of their largest customers while they are forced to
meet the increasing needs of their largest customers while they are devoting
disproportionate resources to their smaller customers. This untenable situation is forcing
major suppliers to rethink their account relationships and extended supply chains. The
key to providing excellent, consistent service at a reasonable cost is service
differentiation. This concept can be adapted to guide the development of an appropriate
set of broader supply chain policies. It is essential for successful profitability
management, because it enables a supplier to match its cost structure and innovation
initiatives to account potential. Service differentiation is also goodfor the customers. It
enables them to plan their operations around a very high and consistent level of service.
However, it does require that customers establish well-disciplined operations, as the
supplier should adhere to a specific set of agreed-upon processes.
An outstanding example of e-supply chain is the one in force at Dell Computers, the Us-
based PC manufacture. The company publicizes its products through the Internet. Any
customer can order a PC of a configuration of his choice and pay for it online, using his
credit card. Once the order is registered, the e-supply chain takes control of the
execution. The system triggers three actions simultaneously- one to Dell‘s suppliers in
Taiwan for providing parts, second to its assembly shop in Singapore, and third to its
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
courier company, with all the data being transferred through the extranet. The intranet
takes care of internal transactions relating to realization of collections from customers
and effecting payments to the suppliers/service providers. Dell‘s success lies in reducing
costs and improving customer satisfaction. Figures 6.5 and 6.6 explain how the model for
supply chain operates.
Manufacture
Distributor Distributor
Customer Reseller
Customer
Manufacture
Customer
Every company aims at reducing costs and cycle time and increasing revenue. E-supply
chain supports these objectives. Companies find that enterprise integration leads to a new
level of relationship, be it with its customers or suppliers. Customers can quite literally
check the status of their orders, and suppliers can gain access to inventory levels to find
out whether they need to replenish stock, all through the extranet. The benefits of reduced
cycle time provide measurable competitive advantage in terms of both cost and
performance. When we speak of cycle time, we refer to the time it takes to react to a new
demand from the customers. The faster we move a critical data through the Internet, the
quicker we can react and deliver the end product to the customer. This leads to enhanced
customer satisfaction and promotes revenue growth.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
Seven Ways to Reduce Inventory
How much inventory does he need to run a business effectively, is a perpetual concern of
every manager. If he has too much, he may find himself confronted with cash-flow
problems; if too little, he runs the risk of customers accusing him of poor service. So
what is the way out? Here are seven tips that can help him strike the right balance.
    1. Improve data accuracy. Introduce a well-designed cycle counting system. It will
       help you know how much of inventory to have and where you are. A well-
       designed and implemented cycle counting system pays for itself within a short
       time.
    2. Cut your lead-time. If lead-time is long, you cannot but have more inventories in
       your system. Think of a ‗rush‘ order in one week for a valued customer. The
       rush order does not wait in the long queue of WIP (Work-in Progress) inventory
       for something to happen.
    3. Increase the velocity of your operation. The amount of inventory you have has
       a lot to do with how fast you can replace it. If for instance, you can replace the
       same item in one day, a two-day supply will be more than enough to fill any order
       and, a stock out- if it occurs-will be for only one day. Not until the next batch is
       produced. On the other hand, if it takes six weeks to replace an item, you will
       need to re-order with at least six weeks (plus safety stock and Just in Case
       inventory) supply or be at the risk of a stock out.
    5. Clean your attic. There are companies, which carry an item that typically may
       be ordered once a year, if at all. Some companies may keep an item in the fond
       hope that someone will buy it someday or other, or hold on to an item because too
       most of money was spent on it. The answer to all this is simple, donate or his
       sale.
    6. Eliminate variation. Erratic vendors may have product quality related problems
       to the shop floor, which can cause unnecessary inventory to pile up. The typical
       was of dealing with such situations is to order early, order more than needed, a
       increase safety stocks throughout the system.
This module supports a range of statistical tools and business forecasting techniques. It
constantly takes into account changing market scenarios and economic factors while
making decisions.
This programme facilitates resource allocation and execution to ensure that materials and
finished goods are delivered at the right time and at the right place, according to the
planning schedule , at minimal cost. It considers such variables as transportation mode
and availability of each mode such as airlines, trains, and trucks.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
Distribution Planning Programme
Order Commitment
Order commitment is linked to all the other modules so that accurate delivery of goods
and services can be guaranteed. These are illustrated in Figure 6.7
Advanced scheduling
                       Order                                                          Demand
                       Commitment                   Customer Order                    forecasting
                                Distribution                      Transportation
                                 Planning                            logistics
Complete
Integrated                                     Integrated E-SCM Application
Solution
What does e-SCM trend mean for e-business? When one considers the challenge of
meeting the demands of busy, time-starved, dissatisfied consumers in an environment of
hostile competition, low margins and countless sales outlets selling similar products, it
becomes clear that changing the entire business model is the only plausible strategy (see
Table 6.1). E-business applications must cut the time customers wait for service.
Customers now penalize companies that infringe on their time through delays, mistakes,
or inconveniences. If companies do not dispatch processes, customers will go to
someone who does it faster. It is very important that managers understand and diagnose
the cause behind service delays. They need to analyze if an integrated system can speed-
up service. If so, they need to strategize, design and implement such systems as soon as
possible. Unfortunately for some
                                         TABLE 6.1
                                   MAJOR TRENDS IN E-SCM
          Trends                                                  Characteristics
Consumer trends                       Speed of service
                                      Self-service.
                                      Integrated solutions, not piecemeal products.
Service/ Process trends               Convergence of sales and services; Customization and integration
                                      Ease of use: Making service consistent and reliable
                                      Flexible and convenient service delivery.
                                      Streamlining the supply chain
QUESTION BANK
                                           Chapter- 7
                                           E-strategy
Introduction
Whether they call it ―the post-industrial society‖, ―the third wave‖ or ―the knowledge
era‖ most policy makers, academics and business leaders would agree that we have
recently entered a new era. Undoubtedly, some of the defining characteristics of this era -
which shall here be referred to as ―the information age‖ – are still to emerge and develop.
However, we now recognize that the information age differs markedly from the industrial
age in several important respects. These differences can be summarized as in Figure 7.1.
Marketplace                                                                               Marketplace
                                         Doing business
Machine/craft                                                                             Knowledge/
                                   Populating business
Workers                                                                                   intelligent
workers
         Over the past 40 year or so, many business analysts have tried to determine what
has been driving these changes. The consensus has shifted over time. At first, it was
thought to be the automating power of computers and computation. Then, it was the
ability to collapse time and space through telecommunications. More recently, it is found
to be the value- creating power of information, a resource which can be reused, shared,
distributed or exchanged without any inevitable loss of value; indeed, value is sometimes
multiplied. And today‘s fascination with competing on invisible assets means that
people now see knowledge and its relationship with intellectual capital as a critical
resource, because it undermines innovation and renewal.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
Information and strategy
All these claims are valid in some ways and therefore, there are diminishing returns to
arguing which is the critical motive force. But we can recognize that today every
business is an information business. Let us first take the perspective of industrial
structure. We see battles in the marketplace all the time, as ―content‖ companies try to
acquire related content businesses, not only because of their thirst for information but
also because of the opportunities for synergy created by repackaging, reuse and
navigation. More significantly perhaps, content companies acquire or build alliances
with communication companies, and vice versa. Both sides recognize that to command
the airwaves is to command the distribution channels of the information age, and that the
high value added opportunities are likely to rely on selling content and repackaging and
reusing it in manifold ways. Sometimes, novels are made into television films. That is
an example of repackaging opportunity.
        It is not just the obviously information-intensive companies that are trying out
these when smith Kline Beecham acquired Diversified Pharmaceutical Services in 1994,
the purchase was as much about buying the data embedded in prescriptions and
healthcare administration processes- which could then guide research and development
programmers and sales management – as about more conventional synergies.
        When India world was bought by Satyam Online, the sale soon turned out to have
a similar information thread. So, we need to rewrite, or at least re-examine, the industrial
economic rules of vertical integration and diversification.
        Indeed, it becomes difficult in the world of intangible assets and electronic
distribution channels to be clear to define vertical or horizontal integration. Microsoft
takes stakes in software, communications and information-providing businesses, and
America Online acquires Netscape. Are these ―horizontal‖ or ―vertical‖ man oeuvres?
        If you choose to take an information perspective, businesses converge, partly
because of the integrated e-strategy, true in Figure 7.2. In other words, brand,
technology, market and service are the four aspects of e-strategy. In some cases this
happens because the product is information-based, as in the cased of Disney and ABC, in
other cases, it is because processes are information-based, such as in our pharmaceuticals
examples. In still other cases, it is simply because market understanding or decision-
making is information-based. So retailers, financial services, organizations and airlines
will form alliances because of the information (and sales) Potential of customer cards.
Technology
Market
Information can be captured at all stages of the physical value chain. Such information
can be used to improve performance at each stage of the physical value chain and to
coordinate across it. However, it can also be analyzed and repackaged to build content-
based products or to create new lines of business.                  Thus, insurance companies, for
example, are becoming adept at analyzing customer and claims information and then tele-
selling both financial and physical products. A company can also use its information to
reach out to other companies, customers or operations, thereby rearranging the value
system of an industry; if you like, sectors become ―value jigsaws‖ which can be
rearranged so that traditional sector boundaries disappear.
         As digital technologies converge, the whole concept of physical value chain
undergoes a change. Today the focus is on the virtual value chain, which can be seen in
Figure 7.3
         And while entrepreneurs are often adept at collecting and processing information
about threats and opportunities-by networking, observing and getting about- many look
to information and IT as their source of new products and services. The promoter of the
future are ―infopreneurs‖
         Figure 7.4 summarizes the discussion so far. From at least six perspectives, every
business is an information business. One consequence of this is that either no business
Logistics
                 Fig 7.3The new value chain and the physical value chain.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
           What ?                                                       Where ?
  Information systems                                                   /??????
                                                                  Information resource
        strategy                                                        ?//.???/
                                                                        strategy
                                                                            ?
                                          Why ?
                                      Organization
                                        Strategy
Who ? How ?
        Now we can see that a fifth domain is missing-one we still find difficult to
formalize but in which companies increasingly have objectives, principles and policies.
The fifth domain is the domain of information as a resource, or of Information Resource
(IR) strategy. It is perhaps the ―where‖ question; where are we going? Much value
creation can come from information, but it is not always clear what the end result will
look like.
        In more traditional content companies, such as advertising agencies, broadcasters
and move companies, you will find policies about not giving away or even releasing
content that other could reuse. And in financial services companies, you will find
executives scratching their heads as to ―Why they never collected critical data such as
date of birth when their customers registered with them? And ―Why information resellers
make money out of their transaction data;
        One aspect of IR strategy is the increasing interest in the distinction among data,
information and knowledge. Some chief information officers and chief knowledge
officers believe that such classifications are of little help, and some academics have
certainly put their careers behind by agonizing over such questions. Others, however,
feel that conceptualizations such as that tin Figure 7.6 offer the solution.
        What are clear are that such frameworks and the past works of philosophers,
economists, political scientists, computer scientists, psychologists and management
scholars on the nature age. There are some old lessons to be re-learnt but some new rules
and ideas are also required, for the world of information and intangible assets is very
different from that of the industrial age and physical assets.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
Seven Dimensions of E-commerce Strategy1
Leadership
Technology Service
Infrastructure
Brand Markets
                                                     Organizational
                                                       Learning
        It can be argued that this model can be applied to all forms of organizations in the
traditional sectors. However, this model is especially applicable to assisting the needs of
e-commerce strategies. The bonds of an e-strategy lie in the preparation of the ground
before the functional issues are addressed. Leadership, organizational learning, and
infrastructure form the bonds as shown in Figure 7.8 Clearly; there is a strong interaction
among these three components.
Leadership
        The primary drivers and the creators of strategic vision in an organization are the
CO and the senior executives. The market for intellectual capital in the form of
experienced, proven, and successful leadership has never been more extreme. Once the
need to develop e-strategy is identified, the single most important issue facing the
executives is the IT infrastructure. These spas the technology spectrum from a single
internet file serve connected to an ISP to the information-intense online transaction
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
processing. Leadership with vision facilitates, encourages and allows an environment to
develop within the organization, where institutional learning and memory thrive.
Structure
Strategy Systems
Shared Values
                                                                                   Style
          Skill
Staff
ERP systems can help cut costs across the value chain by re-engineering their processes.
For this, the ERP systems should incorporate flexibility without complexity. And to
improve their relationships with customers, organizations need to generate information
and content that add value from the processes themselves.
       Data warehousing can be seen as the basis of a knowledge repository that, when
used effectively, enables cost reduction strategies to be identified, added-value services to
be achieved at a manageable cost, and the delivery of improved data effectiveness within
the organization.
       The third dimension of an organization‘s e-commerce infrastructure is that of
knowledge management, an area that can be defined as the formal management of an
organization‘s knowledge resources.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
Staffing:
Human capital is the bedrock of any organization. As organizations evolve towards
becoming knowledge-based, the value of an organization‘s intellectual assets cannot be
overstated and magnified by a scarcity of IT skills. So outsourcing has been a trend in
many organizations.
Skills
The two skills that form the pillars between which the Information Systems structure is
supported are the technical skills and relationship management skills.
Style
Style can be defined as ‗characterization of how key managers behave in achieving the
organization‘s goals, and also the cultural style of the organization‘. Managers succeed
and fail in inspiring peak performance, not only according to their ability to appreciate
the values and motives of those they direct, but also according to their willingness to
align their own managerial styles to the personal, situational and organizational
environment. The bottom line for every effective manager is to deliver results. Since
management is also an art, every manager has a personalized way of doing things.
Shared Values
Shared values can be defined as the significant meaning or concepts that on organization
utilize to drive towards a common goal through common objectives and a common value
set. Key to achieve these is the driver for flexibility in process, for lower transaction
costs, and for achieving mass customization for the customers.
Value Activities
Value chain activities are the things that the company does to design, produce, sell, and
service products. Typical value activities for a manufacturing firm would be things like;
        Gathering customer needs
        Designing products
        Purchasing materials
        Producing products
        Promoting products
        Selling products
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
        Servicing Products
        Servicing customers
    1.   Provides information
    2.   Involves information processing
    3.   Requires the buyer to process a lot of information
    4.   Has high user training costs
        Locking at the value chain for a business helps to define areas of focus such as
what the business is best at or where the most emphasis should be given. Even in
businesses that may appear to be very similar, differences in emphasis can have major
effects, both for Internet commerce and for more traditional forms.
The key components of the value chain can be very different for different industries, and
even among different businesses within a particular industry, such as in the following
example. In this section, we will look at a generic value chain for Internet commerce. In
part it serves as an example of how one might break down a value chain to analyze it
more closely, and in part it exemplifies some of the most important components of
business on the Internet, throughout this section, we use catalogues for consumer retail
purchases as examples. In the next chapter, we will look at several different kinds of
business and how the commerce value chain applies to them.
Attract customers:
The first component of the generic Internet commerce value chain is to attract customers.
By this we mean, whatever steps we take to draw customers into the primary site,
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
whether by paid advertisements on other websites, e-mail, television, print, or other forms
of advertising and marketing. The point here is to make an impression on customers and
draw them into the detailed catalogue or other information about products and services
for sale. Instead of attract, the catchword today is ‗addict‘ the customers.
The second component is integration. By this we mean, turning customer interest into
orders. This phase is generally content oriented and includes the catalogue, publication,
or other information available to the customer on the Internet. The content may be
distributed by many different mechanisms, such as the World Wide Web or e-mail. In
some cases, there may be links between Internet commerce and contents distributed by
other media, such as CD-ROMs.
        Editorially, contents may change infrequently or frequently. Technically, content
may be static or dynamic. Static content typically consists of prepared pages, such as
those from a catalogue, that are sent to a client upon request. These pages must be
recreated and updated whenever the information on them changes. Dynamic content, on
the other hand, is generated at the time of the request, drawing upon request. Upon one
or more information sources to produce an appropriate page of information for the client.
Some sources of information for dynamic content include databases, such as a parts
database with pricing information, the capabilitieswith pricing information, the
capabilities of client software, such as what graphic formats can be used or even who the
clients are, or what organizations they are with. Dynamic content is often used when the
editorial content changes frequently, or when the natural storage medium for the
information is a database, or when the information, is used for multiple purposes.
The next component in the commerce value chain is to act. Once a buyer has searched
through a catalogue and wishes to make a purchase, there must be a way to capture the
order process payment, handle fulfillment and other aspects of order management.
Order processing: - Often a buyer wishes to purchase several items at the same time, so
the order processing must include the ability to group items together for later purchase.
This capability, sometimes called a shopping cart in the case of retail transactions,
usually includes the ability to modify the contents of the shopping cart at any time. Thus,
the buyer is able to discard items, add new ones, change the quantities, and so on. When
the buyer is ready to complete the purchase, it is often necessary to compute additional
charges, such as sales tax and shipping costs. The order processing system then presents
the buyer can pay for the items.
Payment – Depending on the terms of the order, the buyer may pay for it (or provide
payment instructions) as part of the order capture. Once an order is finalized, the buyer
can of the methods may be online analogies developed especially for a networked system.
For example, in an online publishing system, it may be feasible to charge a small amount
for a single magazine article, rather than requiring someone to purchase the entire
magazine.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
         The most important property of an online payment system is that the seller can
use it to collect payment from the buyer. That is, no matter which payment mechanisms
each one may be capable of their must be at least one they can agree on. This property
has several suggestions. First, the seller‘s system must be able to handle the kinds of
payment important to the seller‘s business. For example, credit cards are commonly used
for consumer retail transactions, but businesses often buy from each other using purchase
orders. There may also be non-technical control on what payment methods can be used.
To accept credit cards, a merchant must have an account with an acquiring bank that
handles the transactions. Without such an account, creating the technical infrastructure to
allow for credit card payment is useless.
         Second, the seller must be careful about imposing requirements on the buyer‘s
system. If the buyer must have a particular software package to handle a particular kind
of payment system, the universe of possible buyers is likely to be much smaller than it
would be otherwise. In some cases, of course, all of the desired customers will have such
software, or be willing to obtain it. Again the key point is to keep the customer and the
business in mind when selecting the technology.
         Note also that completing this stage does not necessarily mean that funds have
been transferred into theseller‘s bank account. Some payment instruments, including
both credit cards and purchase orders, extend credit to the buyer who will make the actual
payment later. In such cases, it is common for the seller‘s system to authorize the
transaction, whether by requesting such authorization from a third party (such as the bank
that issued a credit Card.) or its own internal rules (such as whether a purchase order
relationship has been established). As such, final settlement of a transaction may not take
place until the item has been shipped.
Fulfillment. Now the order has been placed and the payment made (or at least a
satisfactory promise of payment). The next step is fulfilling the order. How that happens
depends on the type of thing purchased. If the item ordered is a physical good
(sometimes, called a hard good), it will be delivered to the buyer. The order is usually
forwarded to a traditional order processing system, with the result that someone picks up
the object, packs it, and ships it. In this case, the online commerce system must have a
method for forwarding orders. This step could be as simple as printing out or faxing an
order form form fora person to handle, or it may use a more complicated interface, such
as EDI, with another computer system. The precise mechanism, of course, depends on
how orders are handled by the rest of the business.
         A second kind of order is a request for a service to be performed in the real world.
For example, one might order a singing telegram online although the fulfillment happens
in the physical world; this is a service, not a physical good. For our purposes, however,
we can think of these as being handled like physical goods. The order is passed on to a
system or a person who fulfils it.
         The third kind of order is more closely tied to the Internet commerce system. We
call this category, digital goods. Digital goods include a wide variety of online delivery,
including software that is delivered online, magazine or news articles, reports, access to
database for a period of time, and so on.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
React to Customer Inquiries
Finally, after a sale is complete, the customer may have some questions or difficulties
that require service. Although many questions require persons to answer, others can be
answered with the appropriate information system. For example, a transaction system.
Customers, who wonder whether or not their orders have been shipped, might check back
with the system. A more complicated example is how the system handles a failure when
delivering a digital good.
        Suppose that a customer buys software packing online. While the software is
being downloaded to the customer‘s computer, an error in the network cause the
download to fail what can the customer does? Clearly they should not buy the item
again, so they need some allow the customer to attempt another download.
        Using people to answer customer service calls can be very expensive, so it is
worth investing in systems that eliminate questions that do not require the capabilities of
a person. As noted previously, these systems often provide routine (or even exceptional)
information in response to simple queries. But it is very important to design the system
to cater to the needs of the customer in solving any problems that may arise in the process
of transaction.
Speed, round-the clock availability and security are the most common indicators of
quality of service of an e-business site. Management faces a two-fold challenge. On the
one hand, companies must meet customer expectations in terms of quality of service. On
the other reliability, scalability, and security are key issues to e-business site managers E-
business sites are complex computer-system architectures, with multiple interconnected
layers of software and hardware components, such as networks, caching proxies, routers,
high speed links, and mainframes with large databases. The nature of e-business sites are
complex computer-system architectures, with multiple interconnected layers of software
and hardware components, such asnetwork, caching proxies, routers, high speed complex
due to its transactional nature, secure requirements, payment protocols, and the
unpredictable characteristics of service requests over the Internet. Planning the capacity
of e-business sites requires more than just adding extra hardware. In requires more than
intuition. Ad hoc procedures and rules of thumb. There are many possible alternatives
and one has to be able to determine the most cost-effective architecture. This is where
the quantitative approach of this book and capacity planning techniques for e-businesses
come into pay.
A successful business plan for an e-commerce initiative should include the following
activities.
    1. Identifying the initiative‘s specific objectives
    2. Linking objectives to business strategies.
    3. Managing the implementation of business strategies.
    4. Overseeing the continuing operations of the intuitive, once it is launched.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
        In setting the objectives for an e-commerce initiative, managers should consider
the strategic role of the project, its intended scope, and the resources available for
executing it.
Identifying Objectives
Businesses can use downstream strategies, which are tactics that improve the value that
the business provides to its customers. Alliteratively, businesses can pursue putrefies that
focus on reducing costs or generating value by working with suppliers or inbound
logistics.
        You have already learnt about the different things that companies do on the Web.
Although the Web is a tremendously attractive sales channel for many firms, companies
can use e-commerce in a variety of ways to do much more than selling; they can use the
Web to improve their business strategies and their competitive positions. As described in
earlier chapters of this book, e-commerce opportunities can inspire businesses to
undertake activities such as:
     Building brands
     Enhancing existing marketing programs
     Selling advertising
     Improving after-sale serviced and support
     Purchasing products and services
     Managing supply chains
     Operating actions
     Creating virtual communities and web portals.
        Although the success of each of these activities is measurable to some degree,
many companies have undertaken these activities on the Web without setting specific,
measurable goals. In the mid 1990s the early days of e-commerce- businesses that had
good ideas could start a business activity on the Web and not face competition. Successes
and failures were measured in broad strokes. A company would either become the
amazon.com or the eBay of its industry, or it would disappear, either slipping into
bankruptcy or be acquired by another company.
    As e-commerce is now beginning to mature, more companies are taking a closer look
at the benefits and cost of their e-commerce projects. Measuring both benefits and costs
is program at the Massachusetts Institute of Technology, funded by Procter & Gamble,
Gillette, Wal-Mart, Unilever, Tesco, Target, and other corporations. One of the goals of
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
the Auto- program is to keep store-shelves full. On any given afternoon. 8 per cent of the
items that US shoppers are looking for are out of stock. Auto-ID uses passive tags that
respond to a specific radio signal. A tiny capacitor on the chip stores enough energy from
the incoming signal to send out a response. The tags only respond when near device.
The tags also have a miniature chip and enough memory to keep track of a digital
identity. The memory is of 96 bits, tiny by computer standards but provides a huge
number of combinations of ones and zeros.
        The technology is set up to identify more than 268 million manufacturers with
more than a million individual products each. The memory stores an electronic product
code. Or EPC.
        There is a growing need for the wireless services in health care and medicine. In
the US, the Institute for Safe Medication Practices has called for the elimination of
handwritten prescriptions by 2003. The provision of wireless hand-held devices means
that prescribing can be done electronically. In addition, other tasks that can be carried
out wirelessly include billing, lab ordering, referrals, and clinical decision support. The
same technology could be used to reduce medical error or give health care providers the
information resources to make life-critical decisions whilst on the move.
        The benefits of the wireless technology can be illustrated with a number of
different examples. Patient information can be obtained by health care professionals
from any given location because they can be connected wirelessly to the institution‘s
information system. Physicians access to patient histories, lab results, pharmaceutical
information, insurance information and medical resources would be enhanced
immeasurably, thus drastically improving the quality of patient care. Hand-held devices
can also be used in home healthcare as for example, effective monitoring of blood sugar
and blood pressure levels.
        Connecting hospitals wirelessly does not impersonalize medicine or change the
way a physician interacts with a patient. Yet it gives opportunity for efficient collection
of information. Entered on hand-held devices-information which is then easily made
available to any health care professional who is able to access it from the hospital‘s
wireless LAN. In exactly the same way, a change in the status or location of a patient can
be immediately documented wirelessly, and medication profiles can be checked. The
ultimate effect of Wireless local Area Network (WLAN) is to free hospital staff from the
tether of a stationary PC. Where handhelds are in use, there are two operating systems
vying for market share-Palm OS and Windows CE. The Palm OS is currently the most
popular, a likely reason being its comprising over 90 per cent of all new WLAN
installations. In 2001, the 802, 11b standard became the format of choice within the
hospital segment. Network unit sales in this marked continued. To be brisk into 2002,
with a noticeable demand increase for the newly released 802.11 a chipset-equipped
hardware.
        The sensitive nature of patient‘s medical records has made information protection
a genuine concern among buyers of 802.11b products. Currently, the only native wireless
encryption system that exists to safeguard data during transmission is the Wireless
Equivalent Protocol (WEP) that utilizes basic access control mechanisms such as user
authentication. Keys. The reported design flaws in WEP architecture are now forcing
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
802.11 working group committees to consider viable add-on encryption schemes for the
ultimate goal of a secure WLAN environment.
                                TABLE 7.2
         PROJECTED USE OF WIRELESS DATAAPPLICATIONS 2000-20054
(In millions)
         Application      2000    2001    2002   2003  2004    2005
Messaging                   100      230     399   611    916   1268
E-commerce / retail          12       36     107   195    318    469
Financial services           50      123     225   357    529    798
Intranet (corporate)          5       20      49    81    129    206
Internet, WAP                 4       20      85   183    344    614
Entertainment                61      143     246   372    554    775
Navigation                   47      146     239   345    488    785
Wireless Spectrum
The electromagnetic spectrum, or simply spectrum, is the entire range over which
communicating devices transmit energy waves. The electromagnetic spectrum is assigned
common groupings of energy waves, commonly called airwaves that make bands of the
spectrum. Over the airwaves, TV, radio, cell phones, or any wireless Internet devices
communicate with a transceiver, Each kind of transceiver uses dedicated frequency
ranges that are measured in hertz (Hz); I Hz is one cycle per second.
        An interesting property of the spectrum is that higher frequencies travel shorter
distances. They take more power to transmit. With enough power, they can be life-
threatening Higher frequencies can be modulated to carry more bits per second than
longer waves, but they are subject to atmospheric interference. Broadcasters generally
prefer owning a lower frequency because it costs less to transmit a signal, it carries
farther, and it is generally ―safer‖.
        The US federal communications Commission (FCC) and similar agencies around
the world break up the spectrum and assign bands for specific purposes. Bands are
ranges of frequency with common mames. Worldwide bodies. Such as the International
Telecommunications Union (ITU), also make frequency agreements, so that devices will
operate clearly worldwide, Regulating radio interference is necessary so that wireless
devices do not interfere with one another. To prohibit interference from a neighboring
transmitter, the FCC restricts bands of coverage.
        The owner of popular mobile cellular bands must obtain an FCC license, which
guarantees the owner, exclusive use in territory. Other parts of the spectrum go
unlicensed, such as the Instrument Medical Scientific (ISM) at 2.4 GHz and Unlicensed
National Information Infrastructure (U-NII) at 5 GHz. Unlicensed sections of the
spectrum are open to use by any transmitting device. It may interfere with, and- to
express colorfully -it may step on the signal of another wireless devices. With intelligent
signal processing, interference conflicts can be minimized.
        Over the time, the FCC has been licensing higher spectrum with wireless
technology. In the 1980s. The FCC licensed 800 MHz for cell phones; this part of the
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
spectrum sits above the established AM and FM spectrum. When cellular spectrum was
used up in 1996, the FCC auctioned off the higher-spectrum 1900 MHz licenses to
operate at a lower power range called Personal Communications Services (PCS). Your
cell phone today typically uses either the 800 MHz or the newer 1900 MHz band of
spectrum to transmit signals. A ‗DUAL-band‘ cell phone can use either of these parts of
the spectrum.
When companies began establishing their presences on the Web the typical website was a
static brochure that was not updated frequently with new information and seldom had any
capabilities for helping the company‘s customers or vendors transact business. As
websites have become the home not only of transaction processing but also of automated
business processes of all kinds, these websites have become important parts of
companies‘ information systems infrastructures.
        The transformation occurred rapidly, taking only a year or two for most
companies. But very few businesses have caught up with the changes in terms of how
they develop and businesses today manage them as the dynamic business applications
they have now become. The tools that companies have developed over the years to
manage software development projects are designed to help those companies meet the
needs of their current customers, and operate more effectively within existing value
chains.
        Many large and medium-sized companies have found it extremely difficult to
develop few information systems and websites that work with such systems to create new
markets new ways of working with their customers and suppliers by reconfiguring supply
chains have had the luxury of time- in many cases, years to complete those
reconfigurations. However, the speed at which the Internet has changed markets and
marketing channels throughout entire industry value chains precludes lengthy
reconfigurations. Now companies that want to successfully adapt to the changed
business environment of the information age must explore alternatives to traditional
systems development methods.
Although many companies would like to think that they can avoid electronic commerce
site development problems by outsourcing the entire project, savvy leaders realize that
they cannot. No matter what kind of e-commerce3 initiative a company is contemplating,
the initiatives success depends on how well it is integrated into and supports the activities
in which the business is already engaged. However, few companies are large enough or
have sufficient in house expertise to launch an electronic commerce project without some
external help Even Wal-Mart, with an annual sale of more than $150 billion, did not
undertake is 2000 website prelaunch all alone. The key to success is finding the right
balance between outside and inside support for the project. Hiring another company to
provide the outside support for the project is called outsourcing.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
The Internal Team
Early Outsourcing
In May e-commerce project, the company outsources the initial site design and
development to launch the project quickly. The outsourcing team then trains the
company‘s information systems professionals in the new technology before handing the
operation of the site over to them. This approach is called early outsourcing. Since
operating an e-commerce site can rapidly become a source of competitive advantage for a
company, it is best to have the company‘s own information systems professional in the
new technology before handling the operation of the site over to them this approach is
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
called early outsourcing. Since operating an e-commerce site can rapidly become a
source of competitive advantage for a company, it is best to have the companies own
information systems in which people work closely with the out-sourcing team and
develop ideas for improvements, as early as possible, within the tenure of the project.
Late Outsourcing
Partial Outsourcing
In both the early outsourcing and the late outsourcing approaches, a single group is
responsible for the entire design, development, and operation of a project group-either
inside or outside the company. This typical outsourcing pattern works well for many
information systems projects. However, electronic commerce initiatives can benefit from
a partial outsourcing approach too. In partial outsourcing, which is also called
component outsourcing, the company identifies specific portions of the project that can
be completely designed, developed, implemented, and operated by another firm that
specializes in a particular function.
        Many small websites outsource their e-mail handling and response function.
Customers expect rapid and accurate responses to any e-mail inquiry they make of a
website with which they are doing business. Many companies like to send an automatic
order confirmation via e-mail auto-response functions on an outsourcing basis.
        Another common example of partial outsourcing is an electronic payment system.
Many vendors are willing to provide complete customer payment processing. These
vendors provide a site that takes over when customers are ready to pay and returns the
customers to the original site after processing the payment transaction.
        Internet service providers (ISPs) offer Web hosting services to companies that
want to operate e-commerce site but that do not want to invest in the hardware and the
staff needed to create their own Web servers. ISPs are usually willing to accommodate
requests for a variety of service levels. Small businesses can rent space on an existing
server at the ISP‘s location. Larger companies can purchase the server hardware and
have the ISP install, and maintain it at the ISP‘s location. Larger companies can purchase
the server hardware and have the ISP install, and maintain it at the ISPs Location. ISPs
provide the continuous staffing and expertise needed to keep an e-commerce site up and
running 24 hours a day, seven days a week. Most ISPs offer a wide range of services,
including personal Web access for individuals. Some ISPS specialize in services to
business. These larger ISPs cater to companies that want to operate e-commerce sites.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
They usually offer wider bandwidth connections to the Internet than smaller ISPs, and
offer more reliable and continuous service.
       A number of ISPs and other firms offer services beyond basic Internet
connectivity to companies that want to do business on the Web. Many of these services
were described earlier as candidates for partial outsourcing strategies, and include
automated e-mail response, transaction processing, payment processing, security,
customer service and support, order fulfillment, and product distribution.
For larger website implementations, the team will want to obtain the advice of
consultants or other firms that rate ISPs and CSPS, such as Keynote Systems and the
Directory of Internet Service Providers published by Board watch Magazine. The most
important factors to evaluate when selecting a hosting service include:
    Functionality
    Reliability, hand width and server scalability
    Security
    Back-up and disaster recovery
    Cost
    Companies that sell hosting services provide different features and different levels of
service. The functionality offered by a service provider can include credit card
processing and the ability to link to existing databases that store customer and product
information. Some tracking software provides much more detailed information and easy-
to-use report generators than other tracking software. You should determine the
functionality offered by a hosting service and carefully evaluate whether that
functionality will be sufficient to meet the needs of your website.
    The service should offer a guarantee that limits possible down time. E-commerce
buyers expect hosting services to be up and running 24 hours a day, every day. Of
course, no hosting service can promise never-to-fail service, but some can provide
staffing and back-up hardware that minimizes reliability problems. Coordination of this
function with the service provider can be very important. Usually, a business must have
some round-the clock staff available or on-call to work with the service provider when an
interruption occurs.
    The bandwidth of the service‘s connection to the Internet must be sufficient to handle
the peak transaction loads that its customers require. Sometimes a service provider will
sign up new accounts faster than it can expand the bandwidth of its connections, resulting
in access bottlenecks. A guarantee that specifies bandwidth availability or server
response times is worth negotiating into a service provider contract. If you expect your
site‘s traffic to increase rapidly, it is important that your service provider increases
rapidly the server capacity and the bandwidthprovided. In general larger hosting services
can scale up more easily than smaller hosing services. Again, it is worth negotiating
some scalability into the service provider contract in such situations.
        Since the company‘s information on customers, products, pricing, and other data
will be placed in the hands of the service provider, the vendor‘s security policies and
practices how it implements security. No matter what security guarantees the service
provider offers, the company should monitor the security of the e-commerce operation
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
through its own personnel or by having a security consulting firm. Security consultants
can periodically test the system and launch attacks on the security features used by the
service provider to determine whether they are easily breached.
          The hosting service should be able to guarantee close to 100 per cent reliability by
having a workable disaster recovery plan in place. In addition to having off-site data
back-up or mirroring, the hosting service should have a way to restore your site very
quickly in the case of a natural disaster? Service providers offer many different pricing
plans for will require, and having a goods estimate of the range of transaction loads the
site is likely to generate, can help in negotiating a price for the hosting services a price for
the hosting service.
Question Bank
Q.1 what is the virtual value chain and information strategy framework?
Q.2 Explain Seven Dimensions of E-Commerce Strategy.
Q.3 Explain following-Value Chain and E-Strategy, Strategies for Web Site Development
Q.4 Explain E- strategy/IT strategy
Q.5 what is IT Strategy and Why it is Important?
Q.6 Explain Alignment of IT Strategy to Corporate and Business Strategies
Q.7 Explain the relationship between Value Chain and E-Strategy.
Q.8 Explain strategies for Web Development.
Q.9 Write a short on Virtual Value Chain.
Q.10 Explain the importance of values chain and E-strategy
Q.11 Write down step by step procedure of web site development in detail.
Q.12 what are the planning require for E-commerce business?
Q.13. Explain value activities in Virtual Value Chain.
Q.14 Explains components of commerce value chain.
Q.15 Explain different strategies or steps in planning the E-commerce project. OR Write down
step by step procedure of E-commerce web site development in detail
Q.16 what is data mining. Explain its applications in E-business.
Q.17 what is data warehousing. How it is useful in E-business.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
                                       Chapter 8
                                    Mobile Commerce
Wireless Application Protocol (WAP)
Wireless Application protocol (WAP) was invented and driven by the WAP Forum – a
group originally formed by Nokia. Ericsson, Motorola and Phone. Com in 1997. WAP
is an open specification that offers a standard method to access Internet- based content
and services from wireless devices such as mobile phones and PDAs ( personal Digital
Assistants) The embedded browser , and the operators network that optimizes the
transmission of the content software that connects to a WAP Gateway (software
infrastructure residing in for the wireless URL. The content for wireless devices can be
stored on any Web server on the Internet. Content must be formatted suitably for the
mobile phone‘s small screen and low bandwidth/ high latency connection. Content is
written in a markup language called Wireless Markup Language (WML) WML script
enables client side intelligence.
        The main benefits of WAP include:
    1. Non-proprietary method to access Internet-based content and services.
    2. It is network independent
    3. It has been adopted by 95 per cent of handset manufacturers and being
        implemented by the majority of carriers.
    4. WAP browsers can be built on top of any operating system, including PalmOS,
        FPOC, Windows CE, FLEXOS, OS/9, JavaOS, etc.
Origins of WAP
While all the four companies that founded the WAP Forum had a hand in the currently
available WAP technology set, its basis was a gift from Phone. Com the company
incorporated in 1994 as Libras Inc., changed its name twice: first to Unwired Planet and
then to Phone. Com. By November 1995 the company hosted the first public
demonstrations of its U. P. Browser a micro-web browser for cellular phones.
        While HTML and related technologies such as Java Script, Java, and Flash work
well for desktop computers and laptops with large displays, it is a poor markup language
for devices with small screen and limited resolution. Color graphics, animation, and
sound, challenge the developers under the best of conditions. Additionally, these types of
devices lack the processing power and memory to handle multimedia.
        To combat this, Phone.Com developed a set of technologies related to HTML but
tailored to the small screens and limited resources of hand-held, wireless devices, Most
notable is Handheld Device Markup Language (HDML) HDML on paper looks similar to
HTML, but has a feature set and programming paradigm tailored to wireless devices with
small screens.
        Between November 1995 and June 1997, Unwired Planet negotiated major
contracts with many prominent cellular phone makers to use their HDML-based U P.
Browser, and with cellular phone infrastructure companies to install U P Link Servers to
handle requests from the UP Browser. Mitsubishi demonstrated the U P Browser running
on their Mobile Access Phone in January 1996. AT & T wireless, Bell Atlantic Mobile
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
Samsung, QUALCOMM, and GTE quickly followed with announcements that they too
would utilize Unwired Planet‘s technology.
       In June 1997, Unwired Planet, along with Ericsson, Nokia, and Motorola,
announced the formation of the WAP Forum. Instead of fighting imminent competition
from other companies offering their own standards, these companies sought to make their
technologies the standard for mobile Internet access. Unwired Planet offered HDML- the
markup language, and the Handheld Device Transport Protocol (HDTP); Nokia brought
their Smart Messaging protocol; Ericsson offered their Intelligent Terminal Transfer
Protocol (ITTP). This alphabet specification. This specification is a set of documents
describing the protocol. There are several of them and, they are long and technical. They
cover everything from the overall architecture and security information to the binary
format of a WAP application and a description of WML Script (similar to Java Script).
The documents contain enough information for any developer to learn the minutiae
needed for creating WAP- based products.
PHILOSOPHY of WAP5
Client
Content
                                                                                                       Content
                   Encoded response                             Response (document)
 File into a WAP binary file and encrypt it. A file in this format is more suitable for
 wireless transmission to the device that requested the information.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
        The gateway is also responsible for knowing the character sets and languages of
the WAP devices that use it. Whether it is an English WAP device talking to German
Web server or a Japanese WAP device requesting information from a French Web server,
the gateway needs to ensure that the requester receives a coherent message.
Let us walk through a typical WAP transaction. So as to understand the steps involved in
retrieving information from the Web server.
     A user requests a URL by entering into a WAP device (Alternately, an already-
        running WAP program requests a URL on behalf of the user.)
     The WAP device encodes the request into an encrypted. Compact binary format
        suitable for transmission over a wireless link and sends it to the WAP gateway.
     When wmlserver.com receives the request, it fulfils it by returning the requested
        documents back to the gateway.
     The gateway converts the HTTP response back into an encrypted binary format
        and ships it off to the WAP device.
     The WAP device decodes the response and displays the results on the WAP
        device‘s screen.
         As you can observe, there are some similarities between the Web and the WAP
transactions. For instance, they both use a request-response process, whereby the browser
initiates the process. They both also use Web servers to deliver the requested content.
These similarities let companies with investments in Web technology and resources
leverage that knowledge to design WAP based systems.
WAP Architecture:
Figure 10.5 shows the Wireless Application Protocol in a series of layers. This layered
format mimics the International Standards Organization (ISO) Open systems
Interconnection (OSI) network model. The OSI Model defines a layered framework for
generically describing and designing protocols. The OSI model has seven layers. WAP
device start at the application layer.
And get processed until the request goes out over a bearer network to the gateway
Responses enter the device at bearer level, and are transformed and finally displayed at
the applications layers.
        WAP request from an application must be transformed into a certain format
before being sent wirelessly to a gateway and finally off to a web server to have the
request fulfilled. The response on the return trip is unencrypted and decoded before
being displayed on the screen each request and response must precede through the set of
layers in Figure 8.5 in the correct order each and every time. With all these in mind. Let
us analyze the WAP architecture layers.
The Wireless Application Environment layer is the one you are most likely concerned
with if you are considering deploying WAP applications. It encompasses the devices, the
content- development languages you use (WML and WML Script) the telephony APIs
(WTA) for accessing telephony functionality from within WAE programs, and some
well- defined content formats for phone book records, calendar information, and
graphics.
WSP layer provides a consistent interface to WAE for two types of session services: a
connection mode, and a connectionless service. Without getting bogged down into the
details. It is important to note the services this layer enables, such as the following:
     Creating and releasing a connection between the client and server.
     Exchanging data between the client and server using a coding scheme that is
         much more compact than traditional HTML text.
     Suspending and releasing sessions between the client and server.
Now we are getting a bit more technical. WTP provides transaction services to WAP; it
handles acknowledgements so that you can tell if a transaction succeeded. It also
provides retransmission of transactions in case they are not successfully received, and
removes duplicate transactions.
         WTP manages different classes of transactions for WAP devices; unreliable one-
way requests, reliable one-way requests, and reliable two-way requests. A reliable
request means that acknowledge are sent from the receiving device. An unreliable
requests from a makes it to the server. You might think that this is a ludicrous
transaction type. Why would anyone request something, but not care if it was actually
fulfilled? One-way paging networks work is in this fashion. If you page someone and the
pager is off or out of range, that person does not receive the message. Since these
commands are routed back to the home mobile network‘s Home Location Register
(HLR), services based on USSD work just as well and in exactly the same way when
users are roaming. USSD works on all existing GSM mobile phones. Both SIM
Application Toolkit and the WAP, support USSD, USSD stage has been incorporated
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
into the GSM standard. While USSD was previously a one-way bearer useful for
administrative purposes such as service access, Stage 2 is more advanced and interactive.
By sending in a USSD2 command, the user can receive an information services menu. As
such, USSD Stage2 provides WAP-Like features on existing phones.
        USSD strings are typically too complicated for the user to remember. Involving
the use of the * and # charters to denote the start and finish of the USSD string. However,
USSD strings for regularly used services can be stored in the phone book, reducing the
need to remember and re-enter them. As such, USSD could be ideal bearer for WAP on
GSM networks.
GPRS is a new packet-based bearer that has been introduced on many GSM and Time
Division Multiple Access (TDMA) Mobile networks from the year 2000 onwards. It is an
exciting new bearer because it is immediate (there is no dial-up connection), relatively
fast (up to 177.2 Kbps in the very best theoretical extreme), and supports virtual
connectivity. Allowing relevant information to be sent from the network as and when it is
generated.
        There are two efficient means of proactively sending (―pushing‖) content to a
mobile phone; by the Short Message service, which is of course one of WAP bearers; or
by the user maintaining more or less a permanent GPRS (mobile originated) session with
the content server. However, mobile terminated IP traffic might allow unsolicited
information to reach the terminal Internet sources originating such unsolicited content
may not be chargeable. A possible worst case scenario would be that mobile users would
have to pay for receiving unsolicited junk content. This is a potential reason for mobile
vendors to not support GPRS Mobile Terminate in their GPRS terminals. However, by
originating the session themselves from their handset, users confirm their agreement to
pay for the delivery of content from that service. Users could make their requests via a
WAP session, which would not therefore need to be blocked. As such, a WAP session
initiated from the WAP micro-browser could will be the only way that GPRS users can
receive information onto their mobile terminals. Since all but the early WAP-enabled
phones will also support the General Packet Radio Service, WAP and GPRS could well
be synergistic and be used together widely. For the kinds of interactive, menu-based
information exchanges that WAP anticipates, CSD is not immediate enough because of
the need to set up a call. Early prototypes of WAP services based on CSD were therefore
close to unusable. SMS on the other band. Is immediate but is always stored and
forwarded, such that even when a subscriber has just requested information from their
micro-browser, the SMS Centre resources are used in the information transfer. As such,
GPRS and WAP are ideal bearers for each other.
        Additionally, WAP incorporates two different connection anodes WSP
connection mode, or WSP connectionless protocol. This is very similar to be two GPRS
Point-to Point services – connection oriented, and not connection- oriented. The
predominant bearer for WAP- based services will depend on delays in the availability of
WAP handsets and delays in the availability of GPRS terminals.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
Applications
WAP is being used to develop enhanced forms of existing applications and new versions
of today‘s applications. Existing mobile data software and hardware supplies are adding
WAP support to their offering, either by developing their own WAP interface or more
usually, partnering with one of the WAP Gateway suppliers profiled above. Previously,
application developers wrote proprietary software applications and had to port that
application to different network types and bearers within the same platform. By
separating the bearer from the application, WAP facilitates easy migration of applications
between networks and bearers. As such, WAP is similar to Java in that, it simplifies
application development. This reduces the cost of wireless application development and
therefore, encourages entry to the mobile industry by software developers.
Pull Architecture
Push and Pull are two ways of transferring information to and from a phone, via WAP.
Pulling occurs when the sure opens an Internet connection and initiates a request through
the phone. Push does not require the use to initiate the request instead a third-party
application begins the information transfer. Whether the user is the one to open the
Interned connection or not, depends on the network being used. Figure 10.6 illustrates a
simple pull transaction and the steps involved in it.
Step 1 :- The client (1) marks a request to a URL through his or her device.
Step 2:- The URL request is encoded and sent over the airwaves through a wireless
protocol (2)
Step 3:- The URL is received by the WAP gateway (3) and is decoded.
Step 4:- The info is transferred to a web server via a normal HTTP request (4)
Step 5:- The Web server (5) retrieves an answer to the request using CGI scripts, ASP, or
           WML script. Calls to databases or other websites might be made to retrieve
the
          Answer.
Step 6:- A WML or HDML packet is sent back to the gateway via HTTP.
Step 7:- The packet is encoded once more and sent back to the client via wireless
protocol.
Step 8:- The phone interprets the packet and displays the response on its display screen.
Note: This Study material is still under development and editing process. This draft is being made
      1 Client
available                                                 3
          for the sole purpose of reference. Final edited copies will be made available once ready.        5
Micro-browser
We have already discussed what the general duties of a micro-browser are. Like a
regular Web browser, it submits requests for information, receives results, and interprets
and displays those results on screen. There are also some secondary tasks associated with
the job of a micro-browser.
        The micro-browser includes both WML and WML Script interpreters. As the
phone receives binary information in this format, the micro-browser interprets that data
decides how to display and execute WML Script.
        Though not specified in the WAP specification, the micro-browser may have
additional capabilities. For example, the phone may include RAM for caching
information in the same way computer hard drives cache information for regular Web
browsers. If so, the micro-browser will have the software that helps it decide when a page
should be cached, how log the information in the cache is valid, and when to remove
items form the cache
        The micro-browser is also responsible for understanding the HTTP I.I. protocol.
As already described, the gateway is responsible for much of the translation between the
WAP and HTTP protocols, However, when a request is sent from a WAP device, the
micro-browser must be able to include valid HTTP information in the request so that the
Web server knows how to interpret the request.
        Finally, the micro-browser needs to know how to manage the limited resources of
the WAP device. These devices are limited in screen size, processing power, RAM,
ROM, and input/output capabilities. The micro-browser is responsible for juggling the
demands of this limited environment.
WML
WML is similar to HTML. However, WML borrows heavily from the constructs of the
Extensible Markup Language (XML) the Internet successor to HTML. The creators of
WML accounted for the limited resources of WAP devices. However, they kept the tag-
based design of HTML and in some areas, built more robust features into WML than
those provided by HTML.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
       To see what we are talking about, look at the following snippet of HTML;
       <Html>
       <Head>
       <Title> Empyrean Design Works</title></head>
       <Body>
       <Hl> Welcome </hl>
       <p> Empyrean Design works is a firm for mobile, wireless
       Full service software design and strategy, and handheld technologies.
       <Html>
Now, here is an example of WML code.
       <Wml>
       <card id= ―first‖ title = ―Empyrean Design Works‖>
       <p> Empyrean Design Works is a full service software design and strategy from
for mobile, wireless, and handheld technologies </p>
       </card>
       </wml>
        While the two pieces of code do not look identical, notice the similarities between
HTML and WML Instead of starting and ending the document with < html > and < /
html >, a WML document uses < wml > and < /wml > . Also notice that <p > is used in
both languages as a way to mark a new paragraph within the document.
        Both WML and HTML render similarly in their respective browsers. WAP
browsers are just much more screen size challenged.
        WML as a language has the following general features.
Support for text and images. This includes presentation hints like line breaks,
formatting (bold, italic, and emphasis) and other placement clues. Not all devices support
all text styles. WAP- compliant devices are not required to support images (this should
change over time as devices become more capable), although the protocol does support
them.
Support for user input.WML includes text entry fields, choice lists, and controls that
invoke tasks. For instance, you can assign a URL to a specific button on a device such
that when the user presses the button, a request is sent for a new document. The WAP
specification has no specific definitions on how user input is accomplished. For example,
if a WML program includes a list of options, the user may have to make their choice by
pressing hardware buttons, tapping an on-screen button, or using voice input. It is up to
each device manufacturer to determine how an options list is implemented.
Support for multiple languages and dialects. WML provides support for multiple
languages and dialects by using the 16-bit Unicode character set.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
State and context management features. State management implies that variable
values can be passed from document to document. Additional capabilities include
variable substitution and caching of variables and documents to maximize cache hits on
the device and minimize wireless server requests.
WML Script
WML Script adds a lightweight procedural scripting language to each WAP device.
Loosely based on JavaScript, WML Script lets programmers add intelligence to WAP
programs. And reduces the necessity for requesting information from the Web server.
       Programmers can use WML Script for the following:
Input validation. As users enter data like their name, a dollar amount, or a phone
number, WML Script can validate the input against some template. For example, it can
check that the dollar amount entered is under $100 and includes two digits after the
decimal.
User interaction. WML Script lets an application interact with a user without constantly
needing to contact a Web server for more documents, For instance, the If…… then
………else capability lets the program logic decide which document to show next or
display an error message of some sort without first going over the network.
       WML Script also includes libraries that provide a wide range of functionality,
including math calculations, string processing, and URL manipulation, for instance.
WTAI is designed to let network operators access the telephony features of a WAP
device. They can do such things as initiate phone calls using WML and WML Script
accept incoming calls, hang up calls, send and receive text messages and manipulate
phone book entries on the device. Besides those functions that are common to all WAP
devices, WTAI supports telephony extensions that are specific to certain wireless
telephone networks like GSM and Personal communication Services (PCS).
        WAP is a feature-rich application environment. It programmability and telephony
features make it very suitable for creating mobile applications. Its compact form.
Encryption and error-handling make WAP suitable for the challenges of wireless
transactions.
        WAP will undoubtedly continue to evolve to support advanced features and
functionality that will appear in smart phones in the near future.
Wireless Technologies
Advanced Mobile Phone Service or AMPS, is the analog cellular transport used
throughout North America and in other parts of the world, notably Central and South
America, New Zealand, and Australia. It has the best coverage of all North American
Systems.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
        AMPS operate at 800 MHz It is a voice-only analog transport. You can also use it
with a cellular modem for circuit-switched data communications. AMPS are slowly being
replaced with various competing digital networks. For the foreseeable future however, it
will be the most readily available cellular network in North America.
        At the same time AMPS systems were being built in the United States, a variety
of incompatible analog systems were when being promoted in Europe and the rest of the
world. Although they all operated in the 900 MHz frequency range, the European
systems did not work well with each other. These 900 MHz European analog systems,
which we do not identify individually, are rapidly being phased out in favor of all-digital
systems.
TDMA
Time Division Multiple Access (TDMA) is a digital transport that divides the frequency
range allotted to it into a series of channels. Each channel is then divided into time slots.
Each conversation within that channel gets a time slot hence the term ―division‖ in the
name.
       TDMA has been in use for quite some time in Europe as the basis for the GSM
(Global System for Mobile Communications. More recently, it is being adopted in North
America, in some PCS systems.
       It is possible to overlay TDMA on top of an AMPS transport, converting an
analog network to a hybrid analog/digital network. Some AMPS carriers in North
America have been doing this to add security, capacity, and data capabilities to their older
voice systems. This type of network has several names, such as Digital AMPS (D-
AMPS) and North American TDMA (NA-TDMA)
CDMA
Code Division multiple Access (CDMA) is a digital transport that has been in use by the
US military since the 1940s. However, as a commercial wireless transport, it is the new
kid on the block compared to TDMA and AMPS.
        Pioneered by US-based QUALCOMM a CDMA transmitter assigns a unique
code to each wireless connection and then broadcasts its data out on the channel
simultaneously with all other connections. The receiver is able to decode each
conversation by knowing the unique code assigned to each connection.
        CDMA is offer described as a party in a room where everyone speaks a different
language. If everyone speaks at approximately the same volume, you should be able to
hear all the conversations. If you know the unique code (language) used by each speaker,
you can hear and understand all the conversations.
        CDMA advocates the claim that it has some definite advantages over TDMA.
First and foremost, CDMA enables simultaneous usage: approximately 10-20 times
AMPS, and three times TDMA. It uses less power, giving you much better phone battery
life. It is also more secure, because it hops from one frequency to another during a
conversation, making it less prone to eavesdropping and phone fraud. Other benefits
include fewer dropped calls and better voice quality.
        CDMA is being widely deployed in North America in new PCS systems, but less
widely throughout the world. Like TDMA, it can also be overlaid on top of AMPS
systems to create hybrid analog/digital networks.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
GSM
In the late 1980s, noting the wide disparity of analog cellular systems in Europe, various
European political, trade, and academic interests started collaborating on an all-digital
cellular communications network, Eventually called GSM, it has gone on to be the most
widely deployed digital network in the world to date. It is used by millions of people in
more than 200 countries.
        Using an all-digital, TDMA-based network, every GSM phone has access to a
variety of data functions at speed limited to 9600 bps (the effective throughput is
typically about half that speed). These services include direct-connect Internet access
(both circuit-switched and packet data) without requiring a modem, mobile fax
capabilities, and short message service.
        GSM started operating in the 900 MHz frequency range in all European countries.
Additional networks are being deployed in the 1800 MHz frequency range. An alternate
name for GSM in PCN (personal Communication Network) the European equivalent of
PCS (Personal Communication Services.
CDPD
Cellular Digital Packet Data of CDPD is a TCP/IP based mobile data-only service that
runs on AMPS networks. Since CDPD runs on analog networks, it requires a modem to
convert friendly networks offer analog voice, circuit-switched data (made possible by the
modem), and packet data service.
       CDPD has a raw throughput of 19,200 bps. Unfortunately, the TCP/IP protocol
consumes about half of that, giving you an effective data throughput of about 9,600 bps.
CDPD is designed for relatively quick set-up and tear down, making it similar to packet
data connections. However, it is not as efficient as digital-only networks for short, burst
data communications.
       CDPD is a uniquely North American protocol that is not widely used elsewhere in
the world in fact; it has not been widely deployed in the US. CDPD will most likely be
replaced by various all- digital networks in the coming years.
Table 10.3 lists each of the major cellular voice communications networks that also
support data. The table lists alternate names, the type of technology (analog, digital, or
hybrid) the frequency range used by the network, and the part of the world where it‘s
predominant.
     Note that the locations are either US or Europe, which indicate that most of these
networks are most popular in either the United States or Europe. However, they also
enjoy some degree of success in other parts of the world. This is indicated by the word
―global‖ in the location column.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
                                         TABLE 8.3
                                   VOICE/DATA NETWORKS
        Note that the locations are either US or Europe, which indicate that most of these
networks are most popular in either the United States or Europe. However, they also
enjoy some degree of success in other parts of the world. This is indicated by the word
―global‖ in the location column.
        A network is a unique combination of a spectrum block, a transport, and a
protocol, Different networks offer have multiple common names and transport, and
protocol names are often used interchangeably. This can make things a bit confusing.
        All of these networks support circuit-switched data connections. You can use
circuit-switched connections to access WAP data, but it‘s very inefficient. All of these
networks, except for pure AMPS, support packet data connections or SMS, both of which
can be used for WAP.
        In spite of the fact that the cellular communications landscape is currently a mess,
particularly in North America, proponents of the various networks are hard at work on
two more generations of their respective technologies, insuring that things will get even
more chaotic. What is being promised is an increase in speed. By 2005, speeds should
reach up to 2 Mbps (million bits per second) letting us do such things as quickly send
photographs from digital cameras to our friends and family, and receive real-time video
using portable wireless devices.
        Like the current state of affairs, there are several high-speed wireless data
technologies with names such as GPRS, CDMA2000, and EDGE that are being touted as
the next have of wireless data. Several of these systems are currently being tested in
limited trials in various parts of the world. This means that the current confusing
wireless communications landscape will get even more complicated as current
technologies are replaced by their younger siblings. In general, data speeds will get
faster. Data connections with cell phones (or data-only devices like two-way pagers)
should also get easier and less expensive. That is great news for WAP.
        In stark contrast to other technologies and markets, these companies created the
WAP Forum to share information and to create an open standard. Each of the companies
independently recognized the imminent convergence of voice and data communications.
Due to this openness WAP has escaped the tragic end that other technologies often
encounter as companies and alliances struggle to establish their standard. Additionally,
this openness has fostered a rapid adoption rate by the majority of handheld paging and
cellular phone companies.
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
Question Bank
       Q.1 what do you mean by mobile commerce.
       Q.2 Explain about WAP origin.
       Q.3 Explain applications of mobile commerce
       Q.4 Explain wireless technologies for mobile commerce.
       Q.5 what are technologies used in Mobile Commerce?
       Q.6 Write notes on secure messaging in e-commerce.
       Q.7 Write a short note on Wireless Application Programming Model
       Q.8 Write down the concept of WAP Model.
       Q.9 Explain the basic concept of wireless technology.
       Q.10 Describe the metrics for the design model of a WAP.
       Q.11 Write a short note on GPRS (General Packet Radio Service)
       Q.12 Write a short note on WDP (Wireless Datagram Protocol)
       Q.13 Write a short note on SMS (short message service)
       Q.14 Write a short note on USSD (unstructured supplementary services data)
       Q.15 Write a short note on CDC (circuit switched data)
       Q.16 Explain mobile web payments (WAP)
       Q.17 Write a short note on: Mobile Wallets
       Q.18 define cellular network.
       Q.19 Explain different types of mobile payment methods
       Q.20 explain challenges/ security issues to cellular technology in India
       Q.21 explain broadcast messaging and paging in cellular networks.
       Q.22 Write a short note on direct mobile billing payment method.
       Q.23 Write a short note on SMS/USSD based mobile payment method.
       Q.24 Write a short note on Direct Operator Billing mobile payment method.
       Q.25 Explain micro-browser.
       Q.26 Explain different generations of wireless communication.
   Q.27 Explain WAP Architecture.
   Q.28 Define Web Applications. Give suitable examples