Ecom-6th 1726759684
Ecom-6th 1726759684
POLYTECHNIC
ROURKELA
E - COMMERCE
PREPARED BY
BIJAYALAXMI PADHIARY
SKDAV GOVT. POLYTECHNIC, ROURKELA
CHAPTER - 1
INTRODUCTION TO E-COMMERCE
1.1Introduction
Commerce is the exchange of something of value‖ between two entities. That
something‖ may be goods, services, information, money or anything else the two
entities consider to have value. As we enter the electronic age the question arises
whether these business activities could be carried out electronically.
1.2What is E-commerce
It is buying and selling of products and services by businesses and consumers through
an electronic medium, without using any paper documents.
Different application areas of e-commerce are
Education
Banking
Online order processing
Telecommunication
Financial services like stocks
Manufacturing
Entertainment
Customer relationship management
E-commerce is widely considered the buying and selling of products over the internet,
but any transaction that is completed solely through electronic measures can be
considered e-commerce.
It includes all inter-company and intra-company function (such as marketing, finance,
manufacturing, selling, and negotiation) that enable commerce and use electronic
mail, EDI, file transfer, fax, video conferencing, workflow, or interaction with a
remote computer.
Communication perspective:
From a communication perspective, e-commerce is the delivery of good, service,
information or payment over computer network, telephone lines or any other
electronics means.
Business perspective:
From a business perspective, e-commerce is the application of technology toward the
automation of business transactions.
Service perspective:
From service perspective, e-commerce is a tool that addresses the desire of firms,
consumers and management to cut service cost while improving the quality of goods
and increasing speed of service delivery.
Commercial(trading) perspective:
From a commercial perspective, e-commerce provides the capability of buying and
selling product, services and information on the internet and via other online services.
Learning perspective:
From a learning perspective, e-commerce is an enabler of online training and education
in schools, universities, and other organizations.
Collaborative perspective:
From a collaborative perspective, e-commerce is the frame work of inter-and-intra
organizational collaboration.
Community perspective:
From a community perspective, e-commerce provides a gathering place for community
members to learn transect and collaborate.
Framework of E-Commerce
Framework tells about the detail of how e-commerce can take place. It defines
actually how e-commerce is implemented, how online trading or business can be done.
It defines important components that should be present to do some transaction. The
Framework of E-Commerce shown in the fig.1.2.
E-Commerce Drivers:
There are six drivers that promote E-Commerce as shown in Fig.1.3.
Digital convergence:
Digital devices can now communicate with one another. The Internet
made it all possible.
Anytime, anywhere, anyone (Ubiquity):
This means that anyone can communicate with the e-merchant or shop
online 24 hours a day from anywhere in the world.
Changes in organizations:
Knowledge workers at the lower level in the organization can now take
on responsibilities were once were relegated to lower or junior managers. The
focus is on empowerment.
Information Density:
Global competitions and the proliferation of products and services
worldwide have added unusual pressure to keep a close watch on operating
costs and maximize profit margin. E-Commerce addresses these concerns
quickly (efficiently), effectively and at low cost.
Personalization/Customization:
Today‘s customers are expecting higher quality and better performance,
including a customized way of producing delivering and paying for goods and
services. Mass customization puts pressure on firms to handle customized
request on a mass market scale.
History of E-Commerce
In 1970s e-commerce meant the facilitation of commercial transactions
electronically, using technology such as electronic data interchange (EDI)
& electronic funds transfer (EFT), allowing businesses to send
commercial documents like purchase orders or invoices electronically.
In 1980s e-commerce meant the facilitation of commercial transactions
electronically, using technology such as the growth and acceptance of
credit cards, automated teller machines (ATM), telephone banking, and
airline reservation system help the businesses.
In 1990s the internet commercialized and users flocked to participate in
the form of dot-coms, or internet start-ups & innovative applications
ranging from online direct sales to e-learning experiences.
In 2000s many European &American business companies offered their
services through the World Wide Web. Since then people began to
associate a word ―E-Commerce‖.
How E-Commerce works:
The consumer moves through the internet the merchant‘s web site. From there he
decides that he wants to purchase something. So he is move to the online transaction server
where all of the information he gives is encrypted. Once he has placed his order, the
information moves through a private gateway to a processing network, where the issuing and
acquiring banks complete on deny the transaction. This generally takes place in no. more than
5-7 seconds. There are many different payment systems available to accommodate the varied
processing needs of merchants from those who have a few orders a day to those who process
thousands of transactions daily. With the addition of secure Socket Layer technology
eCommerce is also a very safe way to complete transaction. How E- Commerce works shown
in the fig.1.4.
Nature of E-Commerce
E-Commerce is a modern business methodology, which helps the companies and the
consumers to have better business facilities through less cost while improving the quality of
goods and services and increasing the speed of transaction.
E-Commerce covers online selling and transaction, web retailing and wholesaling,
electronic data and fund transfer, electronic banking interactive marketing etc. It involves
multimedia, advertising, product information, and customer support on the World Wide Web
via internet, payment mechanism through bank etc.
Scope of E-Commerce
1.3E-Business
E-Markets:
The principle function of an electronic market is to facilitate the search for required
product or services. Airline booking systems are an example of an electronic market.
Internet commerce:-
The internet (and similar network facilities) can be used for advertising goods
and services and transacting one-off deals. Internet commerce helps application for
both business – to-business and business to consumer transactions.
E-commerce has given a global platform to the manufacturers, traders, sellers &
buyers or consumers. Now seller can treat world as a global market and buyers also
have a wide range of choice to buy any product from anywhere in the world.
Some of possible factors to make it successful are
Providing value to customers.
Venders can achieve this by offering a product or product –line that
attracts potential customers at a competitive price, as in non-
ecommerce.
Providing service & performance.
Offering a responsive, user-friendly purchasing experience, may go
some way to achieving these goals.
Providing an attractive website.
The tasteful use of color, graphics, animation, photographs, fonts, and
white-space percentage may aid success in this respect.
Providing an incentive for customers to buy and to return.
Sales promotions to this end can involve coupons, special offers, and
discounts. cross-linked websites and advertising affiliate programs can
also help.
Providing personal attention.
Personalized web sites, purchase suggestions, and personalized special
offers may go some of the way to substituting for the face-to-face
human interaction found at a traditional point of sale.
Providing a sense of community.
Chat rooms, discussion boards, soliciting customer input, loyalty
schemes & affinity programs can help.
Providing reliability & security
Parallel servers, hardware redundancy, fail-safe technology, information
encryption, & firewalls can enhance this requirement
Providing a 360 degree view of the customer relationship, defined as ensuring
that all employees, suppliers, & partners have a complete view, & same view of
the customer.
Owning the customer‘s total experience.
E-tailers foster this by treating any contacts with a customer as part of a
total experience, an experience that becomes synonymous with the brand.
Streamlining business processes, possibly through re-engineering and
information technologies.
Letting customers help themselves.
Provision of a self-serve site, easy to use without assistance, can help in
this respect.
Helping customers do their job of consuming.
E-tailers can provide such help through ample comparative information
and good search facilities .Provision of component information and safety – and
–health comments may assist e-tailers to define the customer‘s job.
Engineering an electronic value chain in which one focuses on a ―limited‖
number of core competencies – the opposite of a one-stop shop.
Operating on or near the cutting edge of technology and staying there as
technology changes (but remembering that the fundamentals of commerce
remain indifferent to technology.)
Setting up an organization of sufficient alertness and agility to respond quickly
to any changes in the economic, social and physical environment.
Product suitability : Certain product s/services appear more suitable for online
sales; others remain more suitable for offline sales .Many successful purely
virtual companies deal with digital products, including information storage,
retrieval ,and modification, music, movies, education, communication, software
,photography, and financial transactions. Example of this type of company
includes Google, eBay, Schwab, Morpheus etc.
Consumers have accepted the e-commerce business model less readily than its
proponent originally expected. Even in product categories suitable for
ecommerce, e-shopping has developed only slowly. Several regions might
account for the slow uptake including:
Concern about security. Many people will not use credit cards over
Internet due to concerns about theft and fraud.
Lack of instant gratification with most e-purchases (non-digital
purchases). Much of a consumer‘s reward for purchasing a product lies in
the instant gratification of using and displaying that product. This reward
does not exist when one‘s purchases do not arrive for days or weeks.
The problem of access to web commerce, particularly for poor household
and for developing countries. Low penetration rates of Internets access in
some sectors greatly reduces the potential for e-commerce.
The social aspect of shopping. Some people enjoy talking to sales staff, to
other shoppers, or to their cohorts: this social reward side of retail therapy
does not exist to the same extent in online shopping. So the major
disadvantages can be outlined as:
Disadvantages
1.Security
Customers need to be confident and trust the provider of payment method. Sometimes,
we can be tricked. Examine on integrity and reputation of the web stores before you
decide to buy.
2. Scalability of System
A company definitely needs a well developed website to support numbers of customers
at a time. If your web destination is not well enough, you better forget it.
3. Integrity on Data and System
Customers need secure access all the time. In addition to it, protection to data is also
essential. Unless the transaction can provide it, we should refuse for e-commerce.
4. Products People
People who prefer and focus on product will not buy online. They will want to feel, try,
and sit on their new couch and bed.
5. Customer Service and Relation Problem
They sometimes forget how essential to build loyal relationship with customers.
Without loyalty from customers, they will not survive the business.
CHAPTER - 2
BUSINESS MODELS OF E-COMMERCE
2.1 Introduction
E-Business involves changes in an organizations business & functional
processes with the application of technologies of the new digital economy. It is an
internet initiative which transforms business relationships. It includes all aspect of
ecommerce.
There are five major activities involved in conducting B2C e-commerce. The B2B
ecommerce model uses a similar cycle, as shown in fig.2.2.
INFO SHARING
ORDERING
PAYMENT
FULFILLMENT
SERVICE &
SUPPORT
Inspection of goods:
In an internet based auction, it is not possible to physically inspect the goods. The
bidders have to rely on the information provided or sometimes, may have to rely on the
information provided or sometimes, may have to rely on some electronic images of the goods
on auction.
Potential for fraud:
Internet bidder has to trust that the seller would actually send the good for which he paid.
Also the payments are made by providing credit card details through the internet, which may
always safe.
Online Stores:
Online stores refer to marketing of a company‘s product through the web. It may be
done either to promote the company & its products & services or to actually sell the
products/services through this virtual store. Amazon.com is one of the best examples of an
estore which started selling books online & gradually extended to other product categories.
Benefits for the company
Increased demand
A low cost route to global reach
Cost-reduction of promotion and sales
Reduced costs
Benefits for the customers
Lower price
Wider choice
Better information
Convenience
Shopping through the online stores is fast gaining popularity
& acceptance. Although majority of the revenue is in the B2B sales, B2C sales are also
expected to improve in the coming years. However for this to occur, online stores need to
deliver far more value to the customers & at the same times find new ways to generate
revenues.
Delivering value to customers
Merchants have to try to find ways to gain competitive advantage in
factors other than just the price.
Online shops need to provide a shopping-experience that addresses all
of the customer‘s requirements. It should also try to provide an
environment that is easy to explore.
Expansion of the range of services.
Find cost effective ways to increase customer base
& generate higher revenues.
Online Services:
Many companies are using internet to provide customer service. Service sector banking &
stock trading is one of such example. Companies like Markethemove.com & eTrade.com
have brought the ease of trading stocks to customer‘s PC.
Types of B2C
B2C companies divide into five major categories: direct sellers, online intermediaries,
advertising-based models, community-based models and fee-based models. Each type is so
different from the others that they are not directly comparable. In fact, some B2C businesses
utilize more than one type to reach different audiences.
Direct Sellers
Direct sellers, such as online retailers, sell a product or service directly to the
customer via a website. Direct sellers can divide into e-tailers and manufacturers. E-tailers
are electronic retailers that either ship products from their own warehouses or trigger
deliveries from other companies & stocks. Product manufacturers use the Internet as a
catalog and sales channel to eliminate intermediaries.
Online Intermediaries
Online intermediaries perform the same function as any other broker. The business
allows non-B2C companies to reap some of the benefits. Brokers offer buyers a service and
help sellers by altering the price-setting processes, according to economics professors.
Advertising-Based Models
Popular websites rely on advertising-based models. These websites offer a free
service to consumers and use advertising revenue to cover costs. They draw a large number
of visitors, making them ideal advertising streams for other companies. Advertisers will pay a
premium to sites that deliver high traffic numbers.
Community-Based Models
Community-based models combine the advertising method that relies on traffic at
sites that focus on specialized groups to create communities. Community sales and
advertising take advantage of social and network marketing by focusing on specific groups
that want specific products. For example, sites used by computer programmers are perfectly
placed to advertise computer hardware and software products. At least one social media
website uses member information to target advertisements to interests and locations.
Fee-Based Models
Pay-as-you-buy or paid subscription services fall under fee-based models. The most
common of these are online subscriptions to journals or movie sites such as NetFlix. These
companies rely on the quality of their content to convince consumers to pay a usually
nominal fee.
Fulfillment:
E-commerce has increased the focus on customer satisfaction and delivery
fulfillment, when fulfillment problems caused some Christmas order to be delivered
late, then companies have spent billions to improve their logical system in order to
guarantee on time delivery.
B2B activity refers to all e-commerce transaction s that can occur between two
organizations. This includes purchasing & procurement, supplier management,
inventory management, channel management, sales activities, payment
management & service & support.
B2B include online companies that specialize in marketing strategies, advertising,
email companies, internet consultants, website development etc.
It is that portion of the internet market where transactions between organizations
and their partners take place. It involves information about development,
manufacturing, delivery, sales etc of product and services.
A well –executed B2B system can take care of a wide spectrum of activities .It
can take up the roll of a number of workers of a company. It reduces the cycle
time substantially. It assists a firm in replacing the existing business practices
with new, quick efficient and secure business practices.
By using B2B EC, business can reengineer their supply chain and partnership.
B2B will offer access to following types of information.
Product-price, sales history.
Customers-sales history and forecast
Suppliers –product line and lead-time, sales terms and conditions.
Product process –capacity, product plan.
Competitors –market share, product offerings.
Sales and marketing –promotions.
Supply chain process-quality, delivery time etc.
B2B exchange is a website we where many companies can buy from and sell to each
other using a common technology platform. Many exchanges also offer addition
services, such as payment or logistics services that help members complete a transaction.
Exchanges may also support community activities, like distributing industry news,
sponsoring online discussions and providing research on customer demand or industry
forecasts for components and raw materials.
Development of B2B e-commerce
MRO hubs
These hubs concentrate on goods with low values. The transaction cast is relatively
higher. These hubs provide value by increasing the efficiency in the procurement process.
These hub use third party logistics supplier to deliver goods, thus enabling them to
disintermidiate or bypass existing middlemen in the channel. Examples of hub are MRO.com,
bizbuier.com and Ariba.
Yield manager:
Yield managers focus on the spot procurement of operating inputs. These yield
managers aim to insulate buyers and sellers from ups and downs in operations by allowing
them to scale their operating resources upwards or downwards at short notice by participating
in the spot market. They add most value in situations where there is high degree of price and
demand volatility (e.g., utilities), or where there are huge fixed-cost assets that cannot be
liquidated or acquired at short notice. Yield managers tend to be more vertical in nature than
MRO hubs, but are less vertical in nature than industry-specific vertical hubs like Chemdex
or PlasticsNet.com. Examples of hub are utility sector, employease, elance for human
resources, and iMark for capital equipment and capacity web for manufacturing.
Exchanges:
Exchanges aim to create spot markets for commodities or near-commodities within
specific industry verticals. These exchanges approximate commodity exchanges, and largely
focus on transactional sourcing. The exchange maintains relationships with buyers and
sellers, but buyers and sellers rarely have direct relationships. In fact, in many exchanges,
buyers and sellers may not even know each others‘ identities. Exchanges serve a
yieldmanagement role, because they allow purchasing managers to smooth out the peaks and
valley in demand and supply by ―playing the spot market‖. Examples of exchanges include
E-Steel, PaperExchange, and IMX Exchange.
Catalog units:
Catalog hubs streamline the systematic sourcing of manufactured input within
specific vertical industries. These players start out by putting industry-specific catalogs
online, and creating a large universe of supplier catalogs within the vertical. They aim to
automate the systematic sourcing process, and create value for buyers by lowering transaction
costs. These catalog hubs can be buyer-focused or seller-focused, depending upon who they
create more value for. Examples include PlasticsNet.com, Chemdex, and SciQuest. Catalog
hubs need to work closely with distributors, especially on specialized fulfilment and logistics
Systematic sourcing
Spot
sourcing
Aggregation
The aggregation mechanism relies on bringing a large number of buyers and sellers
under one roof, and reducing transaction costs by ―one-stop shopping‖. For example,
PlasticsNet.com allows plastics processors to issue a single purchase order for hundreds of
plastics products, and PlasticsNet.com sources these products from a diverse set of suppliers.
Matching
The matching mechanism is a trade mechanism that creates value by bringing buyers
and sellers together to negotiate prices on a dynamic and real-time basis. For example,
iMark.com brings buyers and sellers together in the market for used capital equipment. In
contrast with the aggregation mechanism, buyers can be sellers in the matching mechanism.
So adding a buyer to the hub benefits buyers as well as sellers.
Private exchanges:
In these exchanges company connect with its supplier base or customer base. It is one
to many connections between the company and its trading partners. In private exchange
companies do not look beyond their existing customer /supplier base. These exchanges
provide deep collaboration and focus on direct material procurement capabilities and have
sophisticated e-market capabilities, develop through use of advance software application and
integration with trading partners ERP systems. Private exchange offer privacy, security and
superior collaborative capabilities.
Industry consortium:
This model provides some to many connection among industry members and their
trading partners. These e-markets give individual members industry members and their
trading partners. These exchanges also offer collaborative capabilities as private exchanges.
Industry consortium serve large customer base.
Independent market:
This type of e-market brings buyers and seller come together. This is many-to-many
connection among buyers and sellers. This market has widest variety of participants, but makes
collaboration difficult. These exchanges focus on low risk activities like MRO and indirect
material many independent markets will offer trust building services like supplier rating, created
verification.
E-HUB
An e-Hub is web enabled platform that allow trading partners to find , exchange &
share information related to buying & selling activities. Various transactions whether
inbound or outbound required in customer order fulfilment are automated.
The ehub is more suited for supply chain collaboration as ehub is accessible to several
different parties; all parties contribute their share of information to create a pool of dynamic
information at ―mission control center‖ in the ehub. Since all trading partners can tap into
this information it serves multiple functions. It provides not only current view of the order
but also provides visibility into other aspects of fulfilling that order, such as production
capacity, inventory availability and logistic and fulfilment status.
E-marketplaces should provide the participants with an open, flexible, reliable, highly
available and scalable environment. It should have functionalities & capabilities that
Capabilities:-
E-markets are not only bringing trading partners together but also competitors.
Private exchanges bring together trading partners while industry consortium
bring together industry competitors is to share information, increase collaboration to
increase the bottom line and provide greater value to business shareholders.
Competitors are working together with other competitors to determine market
demand, and share information to increase the efficiency across the entire supply
chain.
E-market should promote multi partner collaborative capabilities.
They should enable collaboration in inventory management, planning &scheduling.
Activities like collaborative product design have become possible as a result of
exchange capabilities.
E-market should have EAI (Enterprise Application Integration) capabilities.
This will allow even incompatible legacy systems to integrate with the e-market
using some translation technology like EDI, middleware or XML.
Functionality:-
E-market should provide functionality & services. Specialized functionality & service may
be developed for private exchanges, which are more closely centred on a company and its
trading partners.
Scalability/availability:
Security:
The e-market should have capabilities to provide secure transaction processing for its
customers. Technologies like encryption, SSL or validation keys are few technologies
that can be used. Proper authentication and authorization procedures should be in
place. Security can be a make-or-break issue.
Privacy:
Privacy policies should be in place and effectively implemented. Companies do not want
to share their proprietary information with anyone.
Content/catalog management:
Capability to create and manage web site elements such as text graphics, embedded
files and applets is important aspects. Web site should be user friendly and easy to
navigate.
Electronic marketing-
B2B platform can be used to sell the company‘s product and services to business
customers on the internet.
This model can be called seller oriented marketing because customers visit the web site
that the supplier has prepared.
Procurement management-
To implement b2b from the procurement management point of view the buyeroriented
market place can be used where the buyer announces the RFQ to the potential
suppliers for competitive purchasing.
To the suppliers, participating to the customers oriented marketplace & winning the bid is
the major concern.
Electronic intermediaries-
Individual consumers & business purchases a group of items such as books, stationary
and personal computers, in such cases the consumers and business buyers can share
the intermediary.
Since purchasing party is a business that has to deal with many suppliers and
intermediaries.
Just in time-
Direct marketing requires an internal JIT manufacturing system, the JIT delivery and
advanced confirmation of supplier‘s inventory are essential elements for B2B.
EDI-
Procurement processes
Almost half of companies in the survey said they were in the earliest state of using the
internet for purchasing. The larger organisations were more likely to have purchased
online and to have experienced major benefits from doing so and 27% claimed they
had actually saved money. The percentage of business carried out this way was still
small, with only 6% of the companies completing more than 40% of their purchasing
online.
Innovative product & service suppliers hoping to move into B2B have found
problems understanding the complex relationship that exists in the supply chain
scenario & are increasingly looking towards suppliers who have traditionally
operated.
Suppliers have found that the purchase of direct materials is much more complex than
indirect.
Fulfilment
Fulfilment depends on what products or services are being sold & indeed smaller
companies, with an easy-to-deliver product, can obtain significant new business
opportunities.
The companies involved in B2B deliveries have an advantage over those involved in B2C
trading.
They can design efficient routes fairly easily since business customers tend to be clustered
in areas.
Shipments are typically much larger and consequently, B2B shipments are usually two-to-
three times less expensive than B2C deliveries.
There are 12 major differences between B2B ecommerce and B2C ecommerce that are
Business to Business (B2B) is the means of conducting business between two or more companies over
the internet, it involves business dealing with each other as opposed to their customers.
EDI differs from electronic mail because it transmits an actual structured transaction in
contrast to an unstructured text message such as a letter. By minimizing the amount of
time used in the inventory, it also helps in minimizing the costs.
In the case of working with EDI, physical movements of paper are avoided and time per
each movement can be reduced since all these activate are computer to computer
exchange.
Organizations can most benefit from EDI when they integrate the data supplied by EDI
with applications such as accounts payable, inventory control, shipping and production
planning.
For proper working of EDI model, there are four key requirements:
Company uses EDI to automate price, shipping, receiving and payment transactions
with its customers. Price updates and shipping notices are entered by the appropriate
departments directly into company‘s material releases, receiving reports and payment
data are also transmitted directly through the computer system back to the company. EDI
has replaced paper for these transactions.
Components of EDI:
Trade agreement – a legally binding trade agreement between you and your trading partner.
Standard document format – the Standard agreed upon format for document to be
electronically transmitted.
EDI Translation management software – software used to convert the document your
application‘s format into the agreed upon standard format. For optimum performance the
translation software should be on the same platform as your business application.
Communications software – a programming tool that enable you to write communications
protocols, or a separateapplication.
Modem – a hardware device used to transmit electronic between computer systems.
Van – stands for value added network. A network to which you can connect to
transmit data from one-computer system to another.
Point-to- Point – a direct communication link from one computer system to another. Some
trading partners offer a direct connection to their EDI computer.
Features of EDI:
1. It is highly secure.
2. It offers speed.
3. It is reliable.
4. It will put you in a better market position in relation to non-EDI competitors.
EDI Model:
This involves two or more trading partners who want to exchange data from the
organizations (may be customer and supplier).
There may be two companies with a common customer or two banks whose customers
want to deal with one another.
Trading partners will have the flow of data between them through exchanges. The simplest
and the most common form of exchange is where one partner wants to send a single
message to the other and to know whether the other one has received the message or not.
The message if passed successfully and reliably from one partner to another, it is said that
EDI is operated. There a may be one message to reach several destinations also, through
the protocol of EDI does not permit this.
DES:
It was developed by IBM for the U.S. department of defence and was later on published as a
standard. The same key is used both for encryption and decryption of the messages.
RSA:
It was developed by a group of mathematicians who believed that it would not be possible
to devise a code that could be deciphered using a public key without giving away the
encryption key.
Applications of XML
The graphical user interface provided with OpenStage 60/80 phones can be used to
develop own applications for special purposes. XML applications enable the phone
to act as a front-end to a server-side program. Moreover, XML applications have the
capability of controlling calls.
The Push feature allows the server-side program to send data to the phone in an
unsollicited manner. The information is displayed immediately on the phone.
Possible uses are, for instance: Integration with groupware (e.g. Microsoft Exchange
Server) or Unified Messaging systems (e.g. Siemens OpenScape); gathering
information provided by web services (e.g. weather, traffic, stocks); dialing aids with
access to address databases.
Disadvantages of XML
More difficult, demanding, and precise than HTML.
Lack of browser support/ end user applications.
Still experimental/not solidified.
Design Goals of XML
The design goals for XML are:
XML shall be straightforwardly usable over the Internet.
XML shall support a wide variety of applications.
XML shall be compatible with SGML.
It shall be easy to write programs which process XML documents.
The number of optional features in XML is to be kept to the absolute minimum, ideally zero.
XML documents should be human-legible and reasonably clear.
The XML design should be prepared quickly.
The design of XML shall be formal and concise.
XML documents shall be easy to create.
Terseness in XML markup is of minimal importance.
<contact-info>
<name>Jane Smith</name>
<company>AT&T</company>
<phone>(212) 555-4567</phone></contact-info>
XML documents mix markup and text together into a single file:
Here's the same XML document again, with the markup highlighted to distinguish it from the text:
<?xml version="1.0"?>
<contact-info><name>Jane Smith</name><company>AT&T</company><phone>(212) 555-
4567</phone></contact-info>
Let‘s discuss how to use different kinds of markup and text in an XML document:
the XML
declaration;tags and
element;attributes;ref
erences; and text.
XML Declaration
All XML documents can optionally begin with an XML declaration. The XML declaration provides
at a minimum the number of the version of XML in use:
<?xml version="1.0"?>
Currently, 1.0 is the only approved version of XML, but others may appear in the future.
The XML declaration can also specify the character encoding used in the document:
All XML parsers are required to support the Unicode ―UTF-8‖ and ―UTF-16‖ encodings; many
XML parser support other encodings, such as ―ISO-8859-1‖, as well.
There a few other important rules to keep in mind about the XML declaration:
The XML declaration is case sensitive: it may not begin with ―<?XML‖ or any other variant;
If the XML declaration appears at all, it must be the very first thing in the XML document:
not even whitespace or comments may appear before it; and
It is legal for a transfer protocol like HTTP to override the encoding value that you put in the
XML declaration, so you cannot guarantee that the document will actually use the encoding
provided in the XML declaration.
XML tags begin with the less-than character (―<‖) and end with the greater-than character
(―>‖). You use tags to mark the start and end of elements, which are the logical units of information in
an XML document.
An element consists of a start tag, possibly followed by text and other complete elements,
followed by an end tag. The following example highlights the tags to distinguish them from
the text:
<p><person>Tony Blair</person> is <function>Prime
Minister</function> of <location><country>Great
Britain</country></location></p>.
Note that the end tags include a solidus (―/‖) before the element's name. There are five elements in
this example:
The p element, that contains the entire example (the person element, the text ― is ‖, the
function element, the text ― of ‖, and the location element);
The person element, that contains the text ―Tony Blair‖;
The function element, that contains the text ―Prime
Minister‖; The location element, that contains the country
element; and Thecountry element, that contains the text ―Great
Britain‖.
The following illustration shows this structure as a tree, with p (the outermost element) at the root:
Elements may not overlap: an end tag must always have the same name as the most recent
unmatched start tag. The following example is not well-formed XML, because
―</person>‖ appears when the most recent unmatched start tag was ―<function>‖:
<!-- WRONG! -->
<function><person>President</function>Habibe</person> The
<person><function>President</function>Habibe</person>
An XML document has exactly one root element. As a result, the following example
is not a well-formed XML document, because both the a and b elements occur at the
top level: <!-- WRONG! -->
<a>...</a>
<b>...</b>
The following example fixes the problem by including both the a and b elements within a
new x root element:
<x>
<a>...</a>
<b>...</b>
</x>
XML element (and attribute) names are case-sensitive, so ―location‖ and ―Location‖
refer to different elements. This is a very nasty trap for people used to working with
HTML or other SGML document types, because it can cause surprising bugs in
processing software, or can even lead to malformed XML documents, as in the
following example:
<!-- WRONG! -->
<a href="pbear.html">polar bear</A>
This example will cause a parser error because an XML processor considers a and A to be separate
elements, so the start and end tags do not match.
In some cases, an element may exist that has no content (for ex, the HTML hr element), but
the tag is still read by processors. Rather than type a start and end tag with nothing between
them (for example, ―<hr></hr>‖), XML has a special empty-element tag that represents
both the start tag and the end tag:
<p>Stuff<hr/>
More stuff.</p>
In this example, ―<hr/>‖ represents both the start and the end of the hr element; it could just as
easily have been written as ―<hr></hr>‖ (which is exactly equivalent).
Attributes
In addition to marking the beginning of anelement, XML start tags also provide a place to
specify attributes. An attribute specifies a single property for an element, using a
name/value pair. One very well known example of an attribute is href in HTML:
<a href="http://www.yahoo.com/">Yahoo!</a>
In this example, the content of the a element is the text ―Yahoo!‖; the attribute href provides
extra information about the element (in this case, the Web page to load when a user selects
the link).
Every attribute assignment consists of two parts: the attribute name (for example, href), and
the attribute value (for example, http://www.yahoo.com/). There are a few rules to remember
about XML attributes:
Attribute names in XML (unlike HTML) are case sensitive: HREF and href refer to two
different XML attributes.
You may not provide two values for the same attribute in the same start tag. The following
example is not well-formed because the b attribute is specified twice:
<a b="x" c="y" b="z">....</a>
Attribute names should never appear in quotation marks, but attribute values must always
appear in quotation marks in XML (unlike HTML) using the " or ' characters. The following
example is not well-formed because there are no delimiters around the value of the b
attribute:
<!-- WRONG! -->
<a b=x>...</a>
You can use the pre-defined entities ―"‖ and ―'‖ when you need to include quotation
marks within an attribute value.
Some attributes have special constraints on their allowed values: for more information, refer to
the documentation provided with your document type.
References
A reference allows you to include additional text or markup in an XML document.
References always begin with the character ―&‖ (which is specially reserved) and end with the
character ―;‖.
For advanced uses, XML provides a mechanism for declaring your own entities, but that is
outside the scope of this tutorial. XML also provides five pre-declared entities that you can
use to escape special characters in an XML document:
A Document Type Definition (DTD) defines the legal building blocks of an XML
document. It defines the document structure with a list of legal elements and attributes. A
DTD can be declared inline inside an XML document, or as an external reference. Declaring
elements in DTD
Element Type
Unrestricted: - The opposite of an empty element is an unrestricted element, which can be contain
any element declared elsewhere in the DTD.
Symbol Meaning Example Description
+ It indicates that there Course + There can be multiple
can be at least one or occurrences of course
multiple occurrences of element.
the element.
* It indicates that there Content * Any number of content
can be either zero or elements can be
any number of present.
occurrences of the
element.
? It indicates that there Content ? Content may not be
can be either zero or present or present only
exactly one occurrence. once.
| Or City | state City or state
Attribute Type
Type Description
Required If attribute of an element is specified as #
REQUIRED then the value of that attribute must
be specified if will not be specified then the xml
document will be invalid.
Fixed If an attribute of an element is specified as
#FIXED then the value of attribute can not be
changed in the xml document.
Implied If attribute of an element is specified as
#IMPLIED then attribute is optional i.e. this
attribute need not be used every time when its
associated element is used.
For example, while we haven't gone over the structure of a DTD yet, here is part of a simple
one. It states that there is a root element called "family" that has two possible elements within
it: "parent" and "child":
<!DOCTYPE family [
<!ELEMENT parent (#PCDATA)>
<!ELEMENT child (#PCDATA)>
]>
If you were to write an XML document based upon that DTD, you could write:
<family>
<parent>Judy</parent>
<parent>Layard</parent>
<child>Jennifer</child>
<child>Brendan</child>
</family>
This would be a valid XML document. But if I added extra text outside of the
<parent> or<child> tags, the document would be invalid until I changed the DTD:
3.13 E-Marketing
E-marketing is the use of web-based applications and services to select and segment customers, develop
and execute marketing campaigns.
E-marketing is a type of marketing that can be defined as achieving objectives through such as
internet, e-mail, e-book, database, and mobile phone.
In online marketing,
Companies devised plans to attract online visitors to a website and encourage them to
register or purchase products.
Direct communication takes place in real time.
Banner Ads
Banner ads are rectangle boxesthatsiton a web page and, when clicked, send a
visitor to the advertiser‘s web page. Animaed banners have higher click
through rates than standard banners.
Banner Exchanges
Banner exchange program, where random sites run your banner and you run
randon banner these sitesin return. guidelines differ between exchanges
services, but this option shouldn‘t cost your money, only space on yur web
page.
Ad Networks
Ad netwrk give you a targeted audience and updates about the success of your banner.
When you work with an ad network you have two options.
Involves paying the network to place and monitr the success of your banner.
You allow them to publish ther banners on your website and they pay you .
Both option gives the result.
Web Counter
A web counter or hit counter is a computer software program that indicates the
numberofvisitiors, or hits, aparticular web page has received.Once set up these
counters will be incremented by one every time the web page is acessed in a
web browser. The counter should accompanied by the date it was set up or last
reset, otherwise it becomes impossible to esimate within what time the number
of pages loads counted occurred. Web counter are not trustworthy. A
webmaster could start the counter high number, to give the impression that the
site is more popular than it actually is.
CHAPTER - 4 BUSINESS APPLICATIONS OF
E-COMMERCE
4.1 Introduction
Electronic commerce is the purchasing or selling of goods or services and the
transferof funds in any way using electronic communications inter-company and intra
company business activities.
A trade cycle is the series of exchanges, between a customer and supplier that take
place when a commercial exchange is executed. A general trade cycle consists of:
For business-to-business transactions the trade cycle typically involves the provision
of credit with execution preceding settlement whereas in consumer-to-business these two
steps are typically co-incident.
The nature of the trade cycle can indicate the e-Commerce technology most suited to
the exchange.
Commercial transactions that are repeated on a regular basis, such as supermarkets
replenishing their shelves, is one category of trade cycle. EDI is the e-Commerce
technology appropriate to these exchanges, see Fig 4.1.
Fig.4.1. EDI Trade Cycle.
Consumer transactions tend to be once-off (or at least vary each time) and payment is
made at the time of the order. Internet e-Commerce is the technology for these
exchanges, see Fig.4.2.
The third generic trade cycle is the non-repeating commercial trade cycle and Internet
e-Commerce or an electronic market is the appropriate e-technology.
Infrastructure
Support
Activities Human Resource Management
Technology Development
Procurement
Inbound Operations Outbound Marketing Service
Primary Logistics Logistics & Sales
Activities
Online marketing:
On line marketing provides product boundary extension, new products/ services
creation, new markets/ channels creation. Advantages of online marketing are Market
segment share. Customer reach.
4.4 E-Procurement
Electronic procurement is the use of electronic tools & system. To increase efficiency
& reduce cost during each stage of the purchasing process.
Sourcing activity
Transactional purchasing
The E-sourcing tools described can help buyers establish optimum contracts with
suppliers and manage them effectively. The tools include supplier database and electronics
tendering tools, evaluation, collaboration and negotiation tools. Also included are E-auction
tools and those tools which support contract management activity.
The e-purchasing tools can help procurement professionals and end users where more
efficient process and more accurate order details. The two main aims of
Minimizing control
Process efficiency is the function of E-purchasing tools such as purchase –to-pay
system, purchasing cards and electronic invoicing system.
Purchasing cards are similarly in principle to smart cards used by consumers but with
extra features which make them more suitable for b2b purchasing.
Implementing p-cards:-Card
holders (users)
p-cards should be distributed to anyone in the organisation who needs to re-question low
value goods same series .
Functionality:-
P-cards enables each cards holder to be allocated a spend limit per transaction and a
total spend limit per month.
The GPC and some other p-cards programmes also enable spend to require by
blocking spend categories for particular users.
Individual transaction data is captured by the supplier at time of sale and transmitted
to the issuing bank which provides the card programme.
Benefit of p-cards:-
Prompt payment discounts deduce the amount paid for goods and services.
Granting prompt payment is a significant benefit to supplier, particularly small and
medium sized enterprise as it generates cash flow increased compliance with
contracts.
E-auction:
E-auction can be based on price alone or can be weighted to account for other criteria. such
as quality ,delivery or service levels.
E-auction benefits:
Implementing e-auctions:
E-auctions do not replace tendering: they are a part of it and provide cost-
effective, fast and transparent conclusions not full tendering process.
Only those suppliers who have successfully pre-qualified (i.e. they have satisfied
all tendering criteria such as quality process, financial stability and environmental
policies) should be invited to participate. Identifying purchases suitable for e-auctions.
Advantages of e-procurement
Price savings
Process cost reduction (head count)
Reductions in cycle times (days/weeks)
Consequent reductions in inventory holdings (value/stock turnover)
Disadvantages of e-procurement
Bandwidth problems
Securityissues
Accessibility
Acceptance
Capabilities refer to the firm‘s ability to utilize its sources effectively. Example of a
capability is the ability to bring a product to market faster than competitors. Such capabilities
are embedded in the routines of the organization and are not easily documented as procedures
and thus are difficult for competitors to replicate
E-Commerce applied to the supply chain management process helps in reducing the
overall costs drastically and improves quality and efficiency by automating most of
the supply chain.
Enhancing efficiency.
Reducing cost/cycle time.
Providing accuracy and flexibility.
Supporting inventory levels.
Fig. 4.8. Manufacturing (supply chain)
4.8 E-Commerce Application in Wholesale
Selling goods or products in large quantities to anyone other than the consumers, for
example the retailers, industrial/ commercial or other business users or even
distributors are known as wholesalers.
Physical assembling, sorting & grading goods in large lots, breaking bulk, repacking
& redistributing in smaller lots is all a part wholesale.
The local wholesalers could not compete with the foreign wholesale enterprises who
had acquired highly advanced management and operational skills over due time.
The wholesale sector was characterized for its high input and low output.
Wholesale operating costs which included staffing, setting up and acquiring land for
local warehouses, establishing distribution centers, etc were extremely high.
Reduced operating costs, access to accurate and correct information on time & quick
responses helps in qualitative and efficient decision making.
Ability of doing global marketing in less time and cheaper
Gaining and catching up to the competitive edge held by foreign wholesalers such as
MNC‘s
Offers a wide and extensive range of information, intermediary and business services.
Retailers provide a link between the consumers and the manufacturers and add value
to the product and service by making their sales easier.
Retailers answer any queries that you may have they display and demonstrate
products to the consumers before selling it to them. This makes the services by
retailers less risky and more fun to buy products.
They even provide extra services from personal shopping to gift wrapping and home
delivery.
The Internet has made retailing an exciting and challenging field in recent days with
various companies hosting their stores online via the internet.
People can now sit at their computers, open the website they desire to do so and
browse their catalogues put up by the company (retailer), choose their product and
either pay for it online itself or on delivery. You don't need to step out to your room to
make a purchase nowadays.
Having your store online helps drastically in cost cutting as companies don't need to
purchase stores, they can cut down on staff, provide services to a much wider
audience, etc
It involves basically the provision of all services such as distribution and sales of
goods to other businesses and consumers such as pest control, entertainment and even
services such as transportation.
It also includes the public utilities and the soft parts of the economy such as
insurance, banking, education, etc.
5.1 Introduction
E-commerce brings new form s of markets to the consumer and to industry, though the
connectivity provided by the internet. The web is responsible for new kinds of markets.
5.2 IT infrastructure
Introduction to Information technology
Information technology refers to the creation, gathering, processing, storage, and
delivery of information and the processes and devices that make all this possible.
Characteristics of IT infrastructure
1. Efficient support for the exchange of information within the organization and with other
organizations.
2. Reliable availability of information processing capabilities whenever and wherever they are
needed.
3. Preservation of the integrity and confidentiality of information maintained by the
organization.
4. Sufficient flexibility to allow the timely and efficient addition of new information
management capabilities and modifications of established capabilities.
5. Consistency with a coherent set of technical and managerial standards for the employment of
information technology.
Elements of IT Infrastructure
1. Application system: The applications that an organization purchases and/or
develops to achieve personal productivity and program support benefits.
2. Architecture: The guidelines or blueprints that an organization follows in
designing, acquiring, and implementing information technology solutions.
Organizationally approved definitions, specifications, and standards are the
primary components in organization‘s information technology architecture.
3. Communications: Local area and wide area network components, including
linkages with other organizations.
4. Equipment: An organization‘s hardware platforms and components ranging
from individual personal computers to mainframes and associated peripherals.
5. Facilities: The electrical, ventilation, fire suppression, physical security,
wiring, and other components required to support an organization‘s information
technology capability, including the physical structure itself.
6. Funding: Current and projected funding for information technology planning,
acquisition, development, and operations activities.
7. Partnerships: Relationships with other public and private sector organizations
that support and enable the organization‘s pursuit and use of information
technology.
8. People: An organization‘s technical staff, user community groups, and
executive steering and oversight committees that are charged with information
technology planning, approval, development, management, operations , and
security responsibilities.
9. Plans: Detailed designs or methods for aligning information technology
activities with organization business strategies and accomplishing business
objectives. Typical organization information technology plans include strategic,
risk management and operational recovery.
10. Policies: The rules, conventions, and protocols adopted by the organizations to
govern the pursuit and use of information technology.
11. Processes and procedures: The defined steps for planning, approving,
acquiring, developing, operating, maintaining, enhancing, and using
information technology within the organization.
12. Service definitions: The types of service provided, accepted service levels, and
service delivery time frames established for an organization‘s information
technology support organization.
13. Software: The set of operating system , utility, communication, user interface ,
and management programmers that enables user to operate and control
computers and develop application systems.
14. The infrastructure includes elements owned by the organization and available
under contract or through inters organization agreement. For agencies that
employ the services of a consolidated data centre, for example, the required
data centre resources are considered part of the organization‘s infrastructure.
15. Reengineering the business process: The search for , and implementation of,
radical change in business processes that result in dramatic efficiencies,
reductions in turnaround time ,Improvement in quality, or improvement in
customer service.
16. Strategic planning process for information technology:The process of
aligning organization plans for, and uses of, information technology with the
organization‘s business strategies.
5.3 Internet
Internet is a global computer network providing a variety of information and
communication facilities, consisting of interconnected networks using standardized
communication protocols.
Characteristics of Internet:
Interoperable: Interoperable means that the standards allow communication across
networks. This does not limit the access of information to a proprietary site, location,
machine or band name.
Packet switched: Connection are not fixed from point to point for the duration of the
transmission. A telephone call is circuit switched-which means a dedicated path is
established to transmit your entire conversation. When data is sent packet switched
over the internet-it transmits a small part of the data, verifies it is correct then sends
more information toward the destination. Packet switched networks do not require all
of the information to be delivered through the same path. By not dedicating the path
for the duration of the connection, this method allows more connections to be sending
information across the same space or allows for sharing resources.
Data network: A network that carries data information (digital- computer) instead of
voice information (analog-telephone). There are many instances where these
―definition ―of data and voice are starting to overlap. Computers connecting to
regular phone lines are technically carrying data over a voice line and in some
progressive parts of the country digital phone lines are starting to make appearances.
History of Internet
1960’s
1969- The department of defence advanced research projects organization (ARPA)
creates an experiment network called ARPANET. This network provides a test-bed
for emerging network technologies. ARPANET continued to expand, connecting
many more sites throughout the 1970‘s and 1980‘s.
1970’s
Networking tools are developed in the 1970‘s such as
1972- The national centre for supercomputing applications (NCSA) develops the
telnet application for remote login, making it easier to connect to a remote computer.
1973- FTP (file transfer protocol) is introduced, standardizing the transfer of files
between networked computers.
1980’s
TCP/IP suite of networking protocols, or rules, becomes the only set of protocols used
on the ARPANET. To keep military and non-military network sites separates, the
ARPANET splits into two networks: ARPANET and MILNET.
1982-1983:-
The first desktop computers begin to appear. Many are equipped with an operating system
called Berkeley UNIX which includes networking software.
1985-86:-
The national science foundation(NSF) connects the nation‘s six supercomputing
centers together. This network is called the NSFNET, or NSFNET backbone. 1987:-
the NSF awards a grant to merit network, inc to operate and manage future
development of the NSFNET backbone.
1989- the backbone network is upgraded to ―TI‖ which means that it is able to
transmit data at speeds of 1.5 millions bits of data per second, or about 50 pages of
text per second.
1990’s
1990- the ARPANET is dissolved.
1991- gopher is developed at the university of Minnesota. Gopher provides a
hierarchical, menu-based method for providing and locating information on the
internet.
1993- European laboratory for particle physics in Switzerland(CERN) releases the
world wide web(WWW), developed by Tim burners-lee. The WWW uses hypertext
transfer protocol(HTTP) and hypertext links, changing the way information can be
organized, 1993- the NSFNET backbone network is upgraded to ―T3‖which means
that it is able to transmit data at speeds of 45 millions bits of data per second, of
about 1400 pages of text per second.
1993-1994- the graphical web browser mosaic and Netscape navigator are introduced and
spread through the internet community.
1995- the NSFNET back bone is replaced by a new network architecture, called
VBNS(very high speed backbone network system) that utilizes network service
providers, regional networks and network access points(NAPs).
To access the web we need a web browser, such as Netscape navigator or Microsoft internet explorer.
Web pages are written in a computer language called HTML
WWW:-
The World Wide Web, also referred to as the WWW and ―the web,‖ is the universe
of information available via hypertext transfer protocol (HTTP). The World Wide Web
and HTTP:
Allow you to create ―links‖ from one piece of information to
another; Can incorporate references to sounds, graphics, and movies, etc;
―Understand‖ other internet protocols, such as ftp, gopher, and telnet.
The web presents information as a series of ―document,‖ often referred to as web pages that
are prepared using the Hypertext Markup Language (HTML).
Using HTML, the document‘s author can specially code sections of the document to
―point‖ to other information resources. These specially coded sections are referred to as
hypertext links. Users viewing the web page can select the hypertextlinks and retrieve or
connect to the information resources that the link points to.Hypertext ―links‖ can lead to
other documents, sounds, images, databases (like library catalogs), e-mail addresses, etc.
The World Wide Web is non-linear:
Non-linear means you do not have to follow a hierarchical path to information resources.
You can jump from one link (resource) to another:
You can directly to a resource if you know the uniform resource locator (URL)
You can even jump to specific parts of a document.
Because the web is not hierarchical and can handle graphics, it offers a great deal of
flexibility in the way information resource can be organized, presented, and described.
Advantages of WWW:
The webs are flexibility in organizing and presenting information, it‘s non- hierarchical
easy-to-navigate structure, its ability to handle and ―understand‖ many different file
formats and internet protocols, and its overall ease of use.
Domain Name
A Domainname is a way to identify and locate computers connected to the internet. No two
organizations can have the same domain name.
A Domainname always contains two or more components separated by periods, called
―dots‖.
Once a Domainname has been established, ―sub domain‖ can be created within the
domain.
The structure for this is:
Hostname.subdomain.second-level domain.top-level domain
For ex- a,Indian.yahoo.com describes a single host computer named a, in the India office
of the yahoo company.
The top-level portion of a domain name describes the type of organization holding that
name. The major categories for top-level domains are:
COM-commercial entities
EDU-four year colleges and universities
NET- organization directly involved in internet operations, such as network providers and
network information centers.
ORG-miscellaneous organization that don‘t fit any other category, such as nonprofit
groups
GOV-government entities
MIL-united states military
COUNTRY CODE-a two letter abbreviation for a particular country. For example,
―IN‖For India or ―UK‖ forunited kingdom.
Client-Server
The client-server describes the relationship between the client and how it makes a
service request to the server, and how the server can accept these requests, process them, and
return the requested information to the client. The interaction between client and server is
often described usingsequence diagrams.
Client
In client –server architecture, client is a computer or process that request from a
server. It is often an application that uses a graphical user interface. Each instance of the
client software can send requests to a server.
Types of Client
Fat Clients: A fat client is also known as thick client or rich client. It is a client that
performs the bulk of any data processing operations itself, and does not necessarily
rely on the server. The fat client is in the form of a PC or laptop.
Thin clients: A thin client is a minimal sort of client. Thin client uses the resources of
the host computer. A thin client‗s job is generally just to graphically display picture
provided by an application server, which platforms the bulk of any required data
processing.
Hybrid clients: A hybrid client is also called a smart client. it is a mixture of the fat
and thin client. Similar to fat client, it is processed locally, but rely on the server for
the storage. This relatively new approach offers features from both the fat client and
the thin client.
Characteristics of Client
Server
In client –server architecture, server is simply a computer that is running software that enables it to
serve specific requests from computers called clients.
Characteristics of Server
Always wait for a request from one of the clients.
Serveclientsrequests then replies with requested data to the clients.
Aservermay communicate with other servers in order to serve a client request.
A server is a source which sends request to client to get needed data of users.
Basic server software
Network operating system:
There are many different operating systems for servers just like there are many
different operating systems for desktop computers. Windows server (NT, 2000, 2003),
Linux, Novell Netware are the main operating systems competitors.
A network operating system will have many build-in features including such as file
serving, print serving, back up and security. Some NOS also include a web server or
mail server.
Server application:
Server can be designed for nearly every purpose imaginable, from fax server
to remote acess servers. Every application will have specific server
requirements and will be typically designed to run on either Windows NT/
2000, Linux or Netware. Many servers often run multiple applications to serve
a variety of needs.
TCP/IP
1. Application layer
2. Transport layer
3. Network layer
4. Data link layer
Application layer
This is the top layer of TCP/IP protocol suite. This layer includes applications or processes
that use transport layer protocols to deliver the data to destination computers.
At each layer there are certain protocol options to carry out the task designated to that
particular layer. So, application layer also has various protocols that applications use to
communicate with the second layer, the transport layer. Some of the popular application layer
protocols are :
Transport Layer
This layer provides backbone to data flow between two hosts. This layer receives data from
the application layer above it. There are many protocols that work at this layer but the two
most commonly used protocols at transport layer are TCP and UDP.
TCP is used where a reliable connection is required while UDP is used in case of unreliable
connections.
Network Layer
This layer is also known as Internet layer. The main purpose of this layer is to organize or
handle the movement of data on network. By movement of data, we generally mean routing
of data over the network. The main protocol used at this layer is IP. While ICMP (used by
popular ‗ping‘ command) and IGMP are also used at this layer.
This layer is also known as network interface layer. This layer normally consists of device
drivers in the OS and the network interface card attached to the system. Both the device
drivers and the network interface card take care of the communication details with the media
being used to transfer the data over the network. In most of the cases, this media is in the
form of cables. Some of the famous protocols that are used at this layer include ARP(Address
resolution protocol), PPP(Point to point protocol) etc.
Fig. 5.2. TCP/IP layering model
Web Server
Web servers arecomputersthat deliver (serves up)Webpages. Every Web server has
anIPaddressand possibly adomainname. For example, if you enter
theURLhttp://www.pcwebopedia.com/index.html in yourbrowser, this sends a request to the
Web server whose domain name ispcwebopedia.com. The server then fetches the page
namedindex.html and sends it to your browser.
Any computer can be turned into a Web server by installing server softwareand
connecting the machine to theInternet. There are many Web server software applications,
including public domain software from NCSA and Apache, and commercial packages from
Microsoft,Netscapeand others.
FTP
FileTransferProtocol, theprotocolfor exchangingfilesover theInternet. FTP works in
the same way asHTTPfor transferring Web pages from aserverto a user's browser and
SMTPfor transferringelectronicmailacross the Internet in that, like these technologies, FTP
uses the Internet'sTCP/IPprotocols to enable data transfer.
FTP is most commonly used todownloada file from a server using the Internet or
touploada file to a server (e.g., uploading a Web page file to a server).
5.4 Middleware
Middleware is the layer of software between client and server processes that deliver
the extra functionality.
While network protocols such as TCP/IP enable the exchange of data between client
and server, more functionality required for communication in internet i.e. between client
and server. To support additional services a concept known as middleware.
Intranet is system in which multiple PCs are networked to be connected to each other.
PCs in intranet are not available to the world outside of the intranet.
Usually each company or organization has their own Intranet network and members/employees
of that company can access the computers in their intranet.
Every computer in internet is identified by a unique IP address.
Each computer in Intranet is also identified by a IP Address, which is unique
among the computers in that Intranet.
Communication
Intranet offers easy and cheap communication within an organization. Employees can communicate
using chat, e-mail or blogs.
Time Saving
Information on Intranet is shared in real time.
Collaboration
Information is distributed among the employees as according to requirement and it can be accessed
by the authorized users, resulting in enhanced teamwork.
Platform Independency
Intranet can connect computers and other devices with different architecture.
Cost Effective
Employees can see the data and other documents using browser rather than printing them and
distributing duplicate copies among the employees, which certainly decreases the cost.
Workforce Productivity
Data is available at every time and can be accessed using company workstation. This helps the
employees work faster.
Business Management
It is also possible to deploy applications that support business operations.
Security
Since information shared on intranet can only be accessed within an organization, therefore there
is almost no chance of being theft.
Specific Users
Intranet targets only specific users within an organization therefore, once can exactly know whom
he is interacting.
Immediate Updates
Any changes made to information are reflected immediately to all the users.
ISSUES
Apart from several benefits of Intranet, there also exist some issues.. These issues are shown in
the following diagram:
Applications
Intranet applications are same as that of Internet applications. Intranet applications are
also accessed through a web browser. The only difference is that, Intranet applications reside
on local server while Internet applications reside on remote server. Some of these
applications are:
Intranet Internet
5.6 Extranet
Extranet refers to network within an organization, using internet to connect to the
outsiders in controlled manner. It helps to connect businesses with their customers and
suppliers and therefore allows working in a collaborative manner.
Uses of Extranet
Exchange large volumes of data using EDI
Share product catalogs exclusively with wholesalers or those in the trade.
Collaborate with other companies on joint development efforts.
Jointly develop and use training programs with other companies.
Provide or access services provided by one company to a group of other
companies, such as an online banking application managed by one company on behalf
of affilitated banks.
Share news of common interest exclusively with partner companies.
Extranet vs. Intranet
The following table shows differences between Extranet and Intranet:
Extranet Intranet
For limited external communication between customers, Only for communication within a
suppliers and business partners. company.
5.7 VPN
VPN is anetworkthat is constructed by using public wires usually the Internet to
connect to a private network, such as a company's internal network. There are a number
of systems that enable you to create networks using theInternetas the medium for
transporting data. These systems useencryptionand othersecuritymechanisms to ensure
that onlyauthorizedusers can access the network and that the data cannot be intercepted.
Fig.5.7. VPN
Type of VPN
Early data networks allowed VPN-style remote connectivity throughdial-up
modemsor throughleased lineconnections utilizingFrame RelayandAsynchronous Transfer
Mode(ATM) virtual circuits, provisioned through a network owned and operated
bytelecommunication carriers. These networks are not considered true VPNs because they
passively secure the data being transmitted by the creation of logical data streams. They have
been replaced by VPNs based on IP and IP/Multiprotocol Label Switching(MPLS) Networks,
due to significant cost-reductions and increased bandwidth provided by new technologies
such as Digital Subscriber Line (DSL) and fiber-optic networks.
VPNs can be either remote-access (connecting a computer to a network) or site-to-site
(connecting two networks). In a corporate setting, remote-access VPNs allow employees to
access their company'sintranetfrom home or while traveling outside the office, and site-tosite
VPNs allow employees in geographically disparate offices to share one cohesive virtual
network. A VPN can also be used to interconnect two similar networks over a dissimilar
middle network; for example, twoIPv6networks over anIPv4network.
VPN systems may be classified by:
confidentialitysuch that even if the network traffic is sniffed at the packet level an attacker would
only seeencrypted data
Senderauthenticationto prevent unauthorized users from accessing the VPN.
Messageintegrityto detect any instances of tampering with transmitted messages.
Advantages of VPN
VPN can provide benefits for an organization. It can
Extend geographic connectivity.
Improve security where data lines have not been ciphered.
Reduce operational costs vs. traditional costs.
Reduce transit time and transportation costs for remote users.
Simplify network topology in certain scenarios.
Private global networking opportunities.
Provide telecommunication support.
Provide broadband networking compatibility.
Provide faster ROI (return on investment) than traditional carrier leased/ owned WAN
lines.
Show good economy of scale.
Scale well, when used with a public key infrastructure.
5.8 Firewall
Types of firewalls:-
The earliest firewalls functioned as packet filters, inspecting the packets that are
transferred between computers on the Internet. When a packet passes through a
packet-filter firewall, its source and destination address, protocol, and destination port
numberare checked against the firewall's rule set. Any packets that aren't specifically
allowed onto the network are dropped (i.e., not forwarded to their destination).
Packet-filter firewalls work mainly on the first three layers of the OSIreference model
(physical, data-link and network), although the transport layer is used to obtain the
source and destination port number
For example, if a firewall is configured with a rule to block Telnetaccess, then
the firewall will drop packets destined for TCPport number 23, the port where a
Telnet server application would be listening.
Advantage:-
The primary advantage of packet-filtering firewalls is that they are located in just about
every device on the network. Routers, switches, wireless access points, Virtual Private
Network (VPN) concentrators, and so on may all have the capability of being a packet-
filtering firewall.
The Biggest Advantage of Packet Filtering Firewalls is Cost and Lower Resource Usage
and best suited for Smaller Networks
Disadvantage:
Packet-filtering firewalls do not have visibility into the payload.
Packet Filtering Firewalls can work only on the Network Layer and these Firewalls
do not support Complex rule based models. And it‘s also Vulnerable to Spoofing in
some Cases.
Stateful Inspection
Stateful inspection takes the basic principles of packet filtering and adds the
concept of history, so that the firewall considers the packets in the context of previous
packets. For example it records when it sees a TCP SYN packet in an internal table
and in many implementations will only allow TCP packets that match an existing
conversation to be forwarded to the network.
Advantages
It is possible to build up firewall rules for protocols which cannot be properly controlled by
packet filtering.
Complete control traffic is possible.
Disadvantages
In stateful inspection implementation is necessarily more complex and therefore more likely
to be buggy.
It also requires a device with more memory and a more powerful CPU etc for a given traffic
flow seen over a period of time.
NAT can be used to allow selective access to the outside of the network, too.
Workstations or other computers requiring special access outside the network can be assigned
specific external IPs using NAT, allowing them to communicate with computers and
applications that require a unique public IP address. Again, the firewall acts as the
intermediary, and can control the session in both directions, restricting port access and
protocols.
NAT is a very important aspect of firewall security. It conserves the number of public
addresses used within an organization, and it allows for stricter control of access to resources
on both sides of the firewall.
Fig. 5.9. NAT
5.9 Cryptography
Cryptography is the process through which to achieving security by encoding messages to make
them non-readable.
Plain Text: Clear text or plain text signifies a message that can be understood by the sender, the
recipient and also by anyone else who gets an access to that message.
Cipher Text: When a plain text message is modified using any suitable scheme to protect its secrecy,
the resulting message is called as cipher text.
Encryption converts plain text to cipher text,decryption converts cipher text to plain text.
Fig. 5.10.Cryptography
Methods of Cryptography:
Private key Cryptography
In Public key Cryptography there is also a private key and in private key
cryptography this key is used to decrypt the cipher text. In public key cryptography
only the recipient has the private key. The sender has a public key anyone who wants
to send an encrypted message to the recipient can use the public key. Public key
Cryptography depends upon the one way functions. One way function s is a function
that is easy to apply but extremely difficult to invert. The public key algorithm uses a
one way function to translate plain text to cipher text. Then without the private key it
is very difficult for anyone to reverse the process.
How it works
Assume you send the draft of a contract to your lawyer in another town. You want
to give your lawyer the assurance that it was changed from what you sent and that
is a really from you.
Copy and paste the contract into an email note.
Using special software, you obtain a message hash (mathematical summery) of the
contract.
Then use a private key that you have previously obtained from a publicprivate
key authority to encrypt the hash.
The encrypted hash becomes your digital signature of the message.
Secure socket layer (SSL) protocols which allow for the transmission of
encrypted data access the internet by running above the TCP/IP protocols.
The effectiveness and easily accessible security technology such as PGP.
Other uses of encryption such as access controls and watermarks.
The technical means by which keys use hash table s to achieve the encryption and
decryption process.
Regulation of certificate authorities (CAs), registration authorities that validate
users as having been issued certificates and he directories that store certificates,
public keys and certificate management information.
Policies that identify how an institution manages certificates for its own
personnel, including legal liabilities and limitations, standards on contents of
certificates and actual user practices.
The implementation of digital certification involves signature algorithm that both hashes
the message and signs the hash with the private key rather than using a message digest
function followed by message digest encryption algorithm.
Server certificates are used to authenticate the identity of websites to make sure that
there is no impersonation. They facilitate the exchange of personal information like
credit card numbers among website visitors. Server certificate are a necessary for
ecommerce site that facilitates the exchange of confidential information among
customers, vendors and clients.
Personal certificates are used to authenticate visitors, identity and restrict their access
to specific content. These certificates are suitable for B2B transaction like inventory
management, updating product availability, shipping dates and so on.
The working of digital certificates is based on private/ public key technology. Each of
these keys is a unique encryption device. Since two keys are never similar, these keys can be
used to find the identity of the user. These keys are always work in pairs. The private key is
kept secret while the public key is distributed among the different users who want to
communicate. Whatever data is encrypted by the public key can only be decrypted by the
private key.
Certification Authorities:
Certificates are signed by the Certificate Authority (CA) that issues them. In essence, a CA is
a commonly trusted third party that is relied upon to verify the matching of public keys to
identity, e-mail name, or other such information.
A certificate shows that a public key stored in the certificate belongs to the subject of that
certificate. A CA is responsible for verifying the identity of a requesting entity before issuing
a certificate. The CA then signs the certificate using its private key, which is used to verify
the certificate. A CA's public keys are distributed in software packages such as Web browsers
and operating systems, or they can also be added manually by the user.
These types of digital certificate authenticate only e-mail and are not legally recognized in India as
per the IT Act 2002.
These types of digital certificate authenticate e-mail, name and identity and are legally recognized in
India as per the IT Act 2002.
These are used to authenticate e-mail, name and identity and are globally interoperable. These
certificates are legally recognized in India as per IT Act 2002.
5.13 Contents
Hypertext
Hypertext is text which contains links to other texts. The term was coined by Ted
Nelson around 1965. Hypermedia is a term used for hypertext which is not
constrained to be text: it can include graphics, video and sound, for example.
Apparently Ted Nelson was the first to use this term.
HTML
Html or hyper textmarkup language is the standard markup language used to create
web pages. Html is written in the form of html elements consisting of tags enclosed in
angle brackets (like <html>).amarkup language is a set of markup tags. Each html tag
describes different document content.
HTTP
HTTP stands for Hypertext transfer Protocol. It is the set of rules or protocol that
governs the transfer of hyper text between two or more computers. HTTP also
provides access to other internet protocols such as
FTP(file transfer protocol)
SMTP(simple mail transfer protocol)
NNTP(network news transfer protocol)
WAIS
Gopher
Telnet
CHAPTER - 6
ELECTRONIC PAYMENT SYSTEM
6.1 Introduction
E-commerce is growing rapidly and many merchants are asking themselves how they
can benefit from this new technology.
Features of EPS
There is no paper involved, so electronic payments can be effected directly from home or
office.
Fast, efficient, safe, secure and generally less costly than paper-based alternatives, e.g.
cheques.
Electronic payments are fully traceable.
Most banks offer same day value for payments made to other accounts held in that same
bank.
Many banks offer same day money transfer inter-bank services for large value payments.
Unlike cheques, electronic payments don‘t ‗bounce‘ – as payments will not be effected
unless the funds are available in the first place.
These are exchanged between buyer and seller their users pre-pay for tokens that serve
as currency. Transactions are settled with the exchange of these tokens. Examples of
these are dig cash, debit cards etc. Post paidtokens:-
These are used with fund transfer instructions between the buyer and seller. Example-
electronic cheques, credit card data etc.
Electronic Cheques:-
The electronic cheques are modelled on paper checks, except that they are
initiated electronically. They use digital signatures for signing and endorsing and
require the use of digital certificates to authenticate the payer, the payer‘s bank and
bank account. The are delivered either by direct transmission using telephone lines or
by public networks such as the internet.
Benefits of electronic cheques:-
Well suited for cleaning micro payments. Conventional cryptography of e-cheques
makes them easier to process than systems based on public key cryptography(like
digital cash).
They can serve corporate markets. Firms can use them in more cost-effected manner.
They create float and the availability of float is an important requirement of
commerce.
Credit Card :-
A credit card is apayment cardissued to users as a system ofpayment. It
allows thecardholderto pay for goods and services based on the holder's promise to
pay for them. The issuer of the card creates arevolving accountand grants aline of
creditto the consumer(or the user) from which the user can borrow money for
payment to amerchantor as acash advanceto the user.
A credit card issuing company, such as a bank or credit union, would enter
into agreements with merchants for them to accept their credit cards.
Debit Card:-
Debit cards are also known as check cards. They operate like cash cheque.
While a credit card is a way to pay later a debit card is a way to pay now. Debit
cards offer an alternative to carrying a check book or cash. Debit means ‗‘subtract‘‘
.In a debit card transaction, theamountof apurchaseis withdrawn from theavailable
balancein the cardholder'saccount. If theavailable fundsare insufficient, the transaction
is notcompleted. Alsocalledassetcard (in the US), orpaymentcard (in the UK).It has
following components like:-Signage
Transaction screen
Card reader
Receipt printer
Audio port
Cassette options
Envelope options(for cash deposition in some machines)
Credit risk:-
Credit risk is the risk that a counter party will not settle an obligation for full value,
either when due or at any time thereafter. Banks engaging in electronic banking activities
may extend credit via non-traditional channels, and expand their market beyond traditional
geographic boundaries. Banks engaged in electronic bill payment programs may face credit
risk if a third party intermediary fails to carry out its obligations with respect to payment.
Banks that purchase electronic money from an issuer in order to resell it to customers are also
exposed to credit risk in the event the issuer defaults on its obligation to redeem the
electronic money.
Legal risk:-
Legal risk arises from violations of or non-conformance with laws rules regulations or
prescribed practices or when the legal rights and obligation of parties to a transaction are not
well established. Legal risk may arise from uncertainty about the validity of some agreements
formed via electronic media.
Assessing risks:-
Assessing risks is an ongoing process. It typically involves 3 steps:-
First a bank may engage in a rigorous analytic process to identify risks and where
possible, to quantity them. In the event risks cannot be quantified management may
still identify how potential risks can arise and the steps it has taken to deal with and
limit those risks.
A second step in assessing risk is for the board of directors or senior management to
determine the bank‘s risk, tolerance, based on an assessment of the losses the bank
can afford to sustain in the event a given problem materialization.
Finally management can compare its risk tolerance with its assessment of the
magnitude of a risk to ascertain if the risk exposure fits within the tolerance limits.
Monitoring risks:-
For electronic banking and electronic money activities monitoring is particularly
important both because the nature of the activities are likely to change rapidly as innovations
occur, and because of the reliance of some products on the use of open networks such as the
internet.
Two important elements of monitoring are system testing and auditing:-
Auditing:-
Auditing internal and external provides an important independent control mechanism
for detecting deficiencies and minimizing risks in the provision of electronic banking and
electronic money services. The role of an auditor is to ensure that appropriate standards,
policies and procedures are developed, and that the bank consistently adheres to them.
Identification, confidentiality & payment integrity
Each party involved in the transaction must be sure that its counterparty is exactly
what she tells she is. People involved must be identified.
Data exchanged between buyers and sellers must remain confidential.
Buyers must be certain that the information they get about the payment are reliable.
Security:-
Gateways keep customer credit card data behind firewalls so that the merchant
doesn‘t have to worry about someone ―hacking in‖ to their system.
Encryption:-
Gateways use SSL encryption to prevent message tampering while the credit card
information is being transmitted over the Internet. EMS provides the most secure
encryption technology.
Back-up redundancy:-
Gateways have a backup in place to ensure that merchants can continue processing
in the event of an emergency.
Up-to-date technology:-
Gateways are services that are constantly upgraded to be to date with the latest
technology.
6.8 Recommendations
These recommendation cover payments by clients buying low priced documents,
information etc, an clients paying accounts such as rates, license fees etc.
To minimize liability an agency should outsource both merchant and payment
services. Providing there is an adequate contract and a reliable method of updating
the agency‘s information on the merchant server, essentially all liability will pass to
the merchant service and payment providers who will manage the risks and who can
insure against any losses.
It is important to note that the process of arriving at an adequate contract to achieve
this end is no trivial task.
When an agency succeeds in passing liability to an external provider, it may still
suffer serious embarrassment as the only political target for those suffering from a
failure in a payment scheme.
An agency which decides to retain the merchant server in-house but outsource
payment services should:
Avoid receiving clients details unless encrypted b arrangements between the
client and the payment provider.
Ensure that advice details passed by the payment provider cannot be
repudiated.
Install strong access control including firewalling and incident detection
measures to prevent hacking of its system. It is assumed that
The payment provider will take the necessary steps to avoid system
penetration and insure against the risk of failure
The agency will strenuously protect client if it holds them unencrypted,
including perhaps using AISEP-certified software/hardware, particularly for
communications between client and agency.
An agency which decides to operate both merchant and payment servers will need:
A highly reliable, preferably AISEP-certified, payments package and agency
to financial-instruction communications systems.
Strong access control entailing the maximum possible separation between the
merchant and the payment servers.
Strong protection of both merchant an payment servers against internal and
external attacks.
It is recommended that clients instruct their banks to make the transfer of large
payments directly to the agency‘s bank and not use internet-based payments systems.
Interbank transfer is a special service that allows you to transfer funds electronically to
accounts in other banks through NEFT and RTGS.
NEFT (National Electronic Fund Transfer):- funds are transfer to the credit account
with other participating bank using RBI‘s NEFT service. RBI act as a service provider and
trans he credit to the other banks account.
RTGS (real time gross settlement):-the RTGS system facilitates transfer of funds from
accounts in one bank to another one real time and on gross settlement basis. The RTGS
system fastest possible interbank money transfer facility available through secure banking
channel in India.
Minimum /maximum amount for RTGS/NEFT transaction under retail internet banking
are:
.
Type Minimum Maximum
RTGS Rs.1 lakh Rs 5 lakh
NEFT No limit Rs 5 lakh
Some of the market factors that may drive a bank‘s strategy include the following:
Competition:- studies show that competitive pressure is the chief driving force
behind increasing use of internet banking technology, ranking ahead of cost reduction
and revenue enhancement, in second and third place respectively. Banks see internet
banking as a way to keep existing customers and attract new ones to the bank. Cost
efficiencies:-national banks can deliver banking services on the internet at transaction
costs far lower than traditional brick-and –mortar branches. The actual costs to
execute a transaction will vary depending on the delivery channel used.
Geographical reach:- internet banking allows expanded customer contact through
increased geographical reach and lower cost delivery channels. In fact some banks are
doing business exclusively via the internet—they do not have traditional banking
offices and only reach their customers online.
Branding:- relationship building is a strategic priority for many national banks.
Internet banking technology and products can provide a means for national banks to
develop and maintain an ongoing relationship with their customers by offering easy
access to broad array of products and services. By capitalizing on brand identification
and by providing a broad array of financial services, banks hope to build customer
loyalty, cross-sell, and enhance repeat business.
Customer demographics: - internet banking allows national banks to offer a wide
array of options to their banking customers. Some customers will rely on traditional
branches to conduct their banking business. The demographics of banking customers
will continue to change. the challenges to national banks is to understand their
customer base and find the right mix of delivery channels to deliver products and
services profitably to their various market segments.
Financial institution Internet offerings can be broadly classified into three groups with
distinct risk profile.
Internet banking does not open up new risk categories, but rather accentuates the risks that
any financial institution faces. The board and senior management must be cognizant of these
risks and deal with them appropriately. These risks, which often overlap, are briefly described
below:
Strategic risk— This is the current and prospective risk to earnings and capital arising
from adverse business decisions or improper implementation of business decisions.
Many senior managers do not fully understand the strategic and technical aspects of
Internet banking. Spurred by competitive and peer pressures, banks may seek to
introduce or expand Internet banking without an adequate cost-benefit analysis. The
organization structure and resources may not have the skills to manage Internet
banking.
Transaction risk— This is the current and prospective risk to earnings and capital
arising from fraud, error, negligence and the inability to maintain expected service
levels. A high level of transaction risk may exist with Internet banking products,
because of the need to have sophisticated internal controls and constant availability.
Most Internet banking platforms are based on new platforms which use complex
interfaces to link with legacy systems, thereby increasing risk of transaction errors.
There is also a need to ensure data integrity and non-repudiation of transactions.
Third-party providers also increase transaction risks, since the organization does not
have full control over a third party. Without seamless process and system connections
between the bank and the third party, there is a higher risk of transaction errors.
Compliance risk— This is the risk to earnings or capital arising from violations of, or
nonconformance with, laws, regulations and ethical standards. Compliance risk may
lead to diminished reputation, actual monetary losses and reduced business
opportunities. Banks need to carefully understand and interpret existing laws as they
apply to Internet banking and ensure consistency with other channels such as branch
banking. This risk is amplified when the customer, the bank and the transaction are in
more than one country. Conflicting laws, tax procedures and reporting requirements
across different jurisdictions add to the risk. The need to keep customer data private
and seek customers' consent before sharing the data also adds to compliance risk.
Customers are very concerned about the privacy of their data and banks need to be
seen as reliable guardians of such data. Finally, the need to consummate transactions
immediately (straight-through processing) may lead to banks relaxing traditional
controls, which aim to reduce compliance risk.
Reputation risk— This is the current and prospective risk to earnings and capital
arising from negative public opinion. A bank's reputation can be damaged by Internet
banking services that are poorly executed (e.g., limited availability, buggy software,
poor response). Customers are less forgiving of any problems and thus there are more
stringent performance expectations from the Internet channel. Hypertext links could
link a bank's site to other sites and may reflect an implicit endorsement of the other
sites.
Information security risk— This is the risk to earnings and capital arising out of lax
information security processes, thus exposing the institution to malicious hacker or
insider attacks, viruses, denial-of-service attacks, data theft, data destruction and fraud.
The speed of change of technology and the fact that the Internet channel is accessible
universally makes this risk especially critical.
Credit risk— This is the risk to earnings or capital from a customer's failure to meet his
financial obligations. Internet banking enables customers to apply for credit from
anywhere in the world. Banks will find it extremely difficult to verify the identity of
the customer, if they intend to offer instant credit through the Internet. Verifying
collateral and perfecting security agreements are also difficult. Finally, there could be
questions of which country's (or state's) jurisdiction applies to the transaction.
Interest rate risk— This is the risk to earnings or capital arising from movements in
interest rates (e.g., interest rate differentials between assets and liabilities and how
these are impacted by interest rate changes). Internet banking can attract loans and
deposits from a larger pool of customers. Also, given that it is easy to compare rates
across banks, pressure on interest rates is higher, accentuating the need to react
quickly to changing interest rates in the market.
Liquidity risk— This is the risk to earnings or capital arising from a bank's inability to
meet its obligations. Internet banking can increase deposit and asset volatility,
especially from customers who maintain accounts solely because they are getting a
better rate. These customers tend to pull out of the relationship if they get a slightly
better rate elsewhere.
Price risk— This is the risk to earnings or capital arising from changes in the value of
traded portfolios or financial instruments. Banks may be exposed to price risk, if they
create or expand deposit brokering, loan sales or securitization programs as a result of
Internet banking activities.
Foreign exchange risk— This arises when assets in one currency are funded by
liabilities in another. Internet banking may encourage residents of other countries to
transact in their domestic currencies. Due to the ease and lower cost of transacting, it
may also lead customers to take speculative positions in various currencies. Higher
holdings and transactions in nondomestic currencies increase foreign exchange risk.
Risk management:-
Financial, institutions have a technology risk management process to enable them to
identify, measure, monitor, and control their technology risk exposure. Risk managements of
a new technologies has three essential elements
The planning process for the use of the technology.
Implementation of the technology.
The means to measure and monitor risk.
The risk planning process is the responsibility of the board and senior management. They
need to process the knowledge and skills to manage the banks use of internet banking
technology and technology-related risks. The board should review, approve, monitor internet
banking technology-related projects that may have a significant impact on the banks risk
profile. They should determine whether the technology and products are in line with in banks
strategic goals and met a need in their market. senior management should have the skills to
evaluates the technology employed and risks assumed
Periodic independent evaluations of the internet banking technology and products by auditors
or consultants can helps the board and senior managements fulfil their responsibilities
Implementing the technology is the responsibility of management. Management
should help the skills to effectively evaluate internet banking technologies and products,
select the right mix for the bank, and see that they are installed appropriately. If the bank does
not have the expertise to fulfill this responsibility internally, it should consider contracting
with a vendor how specializes in this type of business or engaging in an alliance with another
provider with complementary technologies or expertise.
Measuring and monitoring the risks is the responsibility of management.
Management should have the skills to effectively identify measure, monitor and control risks
associated with internet banking. The board should receive regular reports on the technologies
employed, the risks assumed, and how dose risks are managed. Monitoring system
performance is the keys success factor. As part of the designed process, in national bank
should include effective quality assurance and audit processes in its internet banking system.
The bank should periodically review the systems to determine whether they are meeting the
performance standards.
Internal controls:-
Internal controls over internet banking system should be commensurate with an institutions
level of risks. Management has the ultimate responsibility for developing and implementing
around system of internal controls over the banks internet banking technology and product
Regular audits of the control systems will help ensure that the controls are appropriate and
functioning properly. For example the control objective for an individual‘s banks internet
banking technology and product might focus on
Consistency of technology planning and strategic goals, including efficiency and
economic of operation and compliance with corporate policies legal requirements
Data availability , including business recovery planning
Data integrity including providing for the safeguarding of asset, proper authorization
of transactions, and reliability of process and output.
Data confidentiality and privacy safe guards.
Reliability of MIS.
Once control objectives are established, management has the responsibility to install
the necessary internal controls to see that the objectives are met. Management also has the
responsibility to evaluate the appropriateness of the control on a cost-benefit basis.
According to the information systems audit and control association (ISACA) basic internal
the basic internal components include:-
Internal accounting controls:-Used to safeguard the assets and reliability of financial
records. This would include transaction records and trial balances
Operational controls:-Used to ensure those business objectives are the met. this
would include operating plans and budges to compare actual against planned
performance
Administrative controls:-Used to ensure operational efficiency and adherence to
policies and procedures .this would include periodic internal and external audits.
Preventing control:-Prevent something(often an error or illegal act)from happing .An
example of this type of control is logical access control software that would allow only
authorized person to access a network using a combination of a user id and
password.
Detective controls:-Identify an action that has occurred. An example would be
intrusion detection software that triggers an alert all alarm.
Corrective control:-Correct a situation once it has been detected. an example would
be software back up that could be used to recover a corrupted file or database.
Banks or service providers offering transaction –based internet banking product need
to have high level of controls to help manage the banks transaction risk.
Example of this control could include
Monitoring transaction activity to look for anomalies in transaction types , transaction
volumes ,transaction values and time – of-day presentment
Monitoring log-on violation or attempts to identify patterns of suspect activity
including unusual request ,unusual timing or unusual formats.
Using trap and trace techniques to identify the source of the request and match this
against known customers
Regular reporting and review of unusual transactions will help identify
Intrusions by unauthorized parties
Customer input errors
Opportunities for customer education
Authentication
Authentication is the process of determining the true identity of buyer‘s before
payments are made. Authentication is also used in other ways - not just for identifying
users, but also for identifying devices and data messages.
Authentication is an important issue in an internet banking systems. Banks use
symmetric encryption technology to secure messages and asymmetric encryption to
authenticate parties.
Biometric devices are an advanced form of authentication. These devices may take
the form of a retina scan, figure or thumb print scan, facial scan, or voice print scan.
Biometrics may be used by some banks for authentication.
Trust
Another issue in internet banking is trust. Public and private key cryptography
systems can be used to secure information and authenticate parties in transactions in
cyberspace. A trusted third party certificate authority is necessary part of the process.
A certificate authority is a trusted third party that verifies identities in cyberspace.
Privacy
The important issue for a consumer is privacy. National banks that recognize
and respond to privacy issues in a proactive way make this positive attribute for the
bank and a benefit for its customers.
Non-repudiation
Non-repudiation is the undeniable proof of participation by both the sender and
receiver in a transaction. It is the public key encryption was developed, i.e. to
authenticate electronic message and prevent denial or repudiation by the sender or
receiver. Although technology has provided an answer to non-repudiation, and state
laws are not uniform in the treatment of electronic authentication and digital signature.
Availability
Availability is another component in maintaining a high level of public
confidence in an environment. Users of a network expect access to system 24 hours
per day, seven days in a week. Among the consideration associated with system
availability are capacity, performance monitoring, and redundance and business
resumption.
Performance monitoring technique will provide management with information
such as the volume of traffic, the duration of transaction and the amount of time
customers must wait for service. Monitoring capacity, downtime and performance on
a regular basis will help management assure a high level of availability for their
internet banking systems.
To ensure privacy of information both the client and the server must run compatible
security schemes.
Authentication is used for identifying the clients as well as the server in a network
environment. Client authentication refers to the identification of a client by a server. Server
authentication refers to identification of a server by a client.
The technology used to provide secure channel over the web are SSL and S-HTTP
(secure hyper text transfer protocol).
The SSL provides end-to-end secure data transmission between the web server and
the web client.SSL secures only web sessions and not e-mail or file transfer sessions. The
SSL ensures secure data transfer but is not responsible for security of data residing in the web
client or server.
The SSL performs two functions using either symmetric encryption or asymmetric
encryption.
In symmetric encryption, a key called the private key is used both for encrypting is
called the public key and the one used to decrypt is called private key. For symmetric
encryption to work, the sender and the receiver should share the secret key. This is possible
only when the sender and receivers know each other.
In asymmetric encryption two separate keys are used to encrypt and decrypt data. The
public key is shared with the other person and the private key is known only to the person
who decrypts‘ the data. So the private key will remain a secret while the public key will be
known to both the parties.
S-HTTP enables secure communication between the web server and the client that
allows the secure exchange of files on the World Wide Web. Each S-HTTP file is either
encrypted, contains adigital certificate, or both. S-HTTP was developed to support several
esecurity technologies like symmetric encryption for data confidentiality, message digest for
data integrity and PKI encryption. These technologies can be used individually or in
combination. It can be set to required, optional, or refused.
If the security property is required, include the type of technology to be used, the
algorithms that will be supported, and the direction in which the property is to be enforced.
If the security property has been set to optional, it means that the security property is
not mandatory for making connections.
If the security property is set to refuse, then it means that the negotiating party cannot
enforce this property.
Once the secure property has been set then the data is encapsulated.
The secure electronic transaction (SET) protocol is the protocol used to facilitate the
secure transmission of consumer credit card information over insecure networks, such as the
Internet. SET blocks out the details of credit card information, thus preventing merchants,
hackers and electronic thieves from accessing this information. SET was developed by
SETco, led by VISA and MasterCard starting in 1996. The first version was finalized in May
1997 and a pilot test was announced in July 1998.
SET makes use of Netscape's Secure Sockets Layer (SSL), Microsoft's Secure
Transaction Technology (STT), and Secure Hypertext Transfer Protocol (S-HTTP).
There are different kind of techniques and methodologies which are available for
authentication of an electronic banking product or service.
Shared secrets:-
Shared secrets (something a person knows) are information elements that are known
or shared by both the customer and the authenticating entity.
Questions or queries that require specific customer knowledge to answer, e.g
the exact amount of the customer‘s monthly mortgage payment.
Customer-selected images that must be identified or selected from a pool of
images.
The customer‘s selection of a shared secret normally occurs during the initial
enrolment process or via an offline ancillary process. Passwords of pin values can be chosen,
question can be chosen and responds provided, and images may be uploaded of selected.
Tokens:-
Tokens are physical devices (something the person has) and may be part of a
multifactor authentication scheme. Three types of tokens are discussed here:- the USB token
device, the smart card, and the password- generating token.
Smart Card
Smart card is the size of a credit card and contains a microprocessor that enables it to
store and process data. To be used, a smart card must be inserted into a compatible reader
attached to the customer‘s computer. If the smart card is recognized as valid (first factor), the
customer is prompted to enter his or her password (second factor) to complete the
authentication process.
Smart cards are hard to duplicate and are tamper resistant; thus they are a relatively
secure vehicle for storing sensitive data and credentials. Smart cards are easy to carry and
easy to use. Their primary disadvantages as a consumer authentication device is that they
require the installation of a hardware reader and associated software drivers on the
consumer‘s home computer.
Password-Generation Token
A password-generating token produces a unique pass-code, also known as a one-time
password each time it is used.
The token ensures that the same OTP is not used consecutively. The OTP is displayed
on a small screen on the token.
The customer first enters his or her user name and regular password (first factor),
followed by the OTP generated by the token (second factor). The customer is authenticated if
(1) The regular password matches and
(2) The OTP generated by the token matches the password on the authentication server.
A new OTP is typically generated every 60 seconds- in some systems, every 30
seconds. Password-generating tokens are secure because of the time-sensitive, synchronized
nature of the authentication. The randomness, unpredictability, and uniqueness of the OTPs
substantially increase the difficulty of a cyber thief capturing and using OTPs gained from
keyboard logging.
6.12 BIOMETRICS
The word ―biometrics‖ came from Greek and we can divide it into two roots: ―bio‖
means life and ―metrics‖ – to measure. Biometrics is the process of making sure that the
person is who he claims to be. Authentication of identity of the user can be done in 3 three
ways:
Fig.6.3. Biometrics
Biometrics is based on anatomic uniqueness of a person and as follow it can be used
for biometric identification of a person. Unique characteristics can be used to prevent
unauthorized access to the system with the help of automated method of biometric control
which, by checking unique physiological features or behaviour characteristics identifies the
person.
Enrolment
The system captures a characteristic trait from the person, for example his fingerprint, and it
processes this information to create an electronic representation called a template. This
template is saved in a database, a smart card or in another place that can be accessed during
the second step.
Verification
The person tells the system who he is by presenting a card with a magnetic strip, a barcode, or
using a PIN or password that only he knows. Immediately, the system asks for a biometric
sample. With this sample, the system creates an electronic representation called a live
template, which is compared with the reference model saved in the database.
Identification
The person does not tell the system who he is; he uses neither cards nor passwords. The
device uses his trait to identify him directly. The system captures this trait and processes it to
create a live template. Then, the system compares this with the reference models stored in the
database to determine the person‘s identity.
When looking at strong authentication, you want two out of three factors — something
you have something you are and something you know. While, eyes, hands and skin are
commonly used as biometric identifiers, more dynamic methodologies also are being
introduced, such as the following: Voice — Detects vocal pitch and rhythm;
Keystroke Dynamics — Analyzes the typing speed and rhythm when the user ID and
password are entered;
Signature — Matches the signature to one on record, as well as analyzing the speed and
pressure used while writing, and
Gait — Measures length of stride and its rhythm.
To keep performance high and storage requirements manageable, today's biometric
technologies don't have to store or analyze a complete picture of the body part or the physical
feature being used. Imagine the processing power that would be needed to store a
highresolutionpicture of someone's face and then compare it with a live imagepixelby pixel.
Instead, each method reduces the body part or activity to a few essential parameters and then
codes the data, typically as a series of hash marks. For example, a facial recognition system
may record only the shape of the nose and the distance between the eyes. That's all the data
that needs to be recorded for an individual's passport, Elements of Biometric system
A sensor unit that represents the interface between the user and the machine. This is
the point where the biometric trait is acquired.
A processing unit where the acquired biometric is sampled, segmented and features
are being extracted. It also includes quality assurance to determine if the quality of the
biometric is good enough to be used further in the process. If the quality of the
acquired biometric is poor, the user may be asked to present the biometric again.
A database unit where the entire enrolled biometric template are being stored and
where the templates are being retrieved from in the authentication process.
A matching unit that compares the newly acquired biometric template with the
templates stored in the database and based on decision rule s determine either if the
presented biometric is a genuine or if the user is identified or not
Types of Biometric
Biometric characteristics of a person are unique. All biometric identifiers can be
divided into two big groups:
1) Physiological
2) Behaviour
Though behaviour biometrics is less expensive and less dangerous for the user,
physiological characteristics offer highly exact identification of a person. Nevertheless, all
two types provide high level of identification than passwords and cards.
Spheres of use:
Criminalities (biometric identifiers are used to recognise victims, unidentified body
and protection of children against kidnapping.)
Marketing (methods of biometrics are used to identify owners of loyal cards)
Time accounting systems at work, schools, etc
Security systems ( areuse to control the access to the rooms and control access
to internet resources)
Voting system ( during the functionality of voting system identification/authentication
of people, that take part in voting is demanded)
According to actual international demands ( for example, according to the standard of
ICAO there should be biometric part in passport.)
Biometric identifiers are used for registration if immigrants and foreign workers. It
allows identifying people even without documents.
For organisation of distribution of social help.
Fingerprints
Fingerprint identification is also known as dactyloskopy or also hand identification is
the process of comparing two examples of friction ridge skin impression from human fingers,
palm or toes.
Method of fingerprinting helps police to investigate crimes during long period of time.
The most amazing fact how many details about person can be known using only his/her
fingerprints.
Voice Recognition
Voice, like many other characteristics that are used for biometric methods, is unique.
Like style of gait, it takes quite little time to analyze the voice and to identify the person.
Voice in biometrics or ―voice print‖ is presented as a numerical model of the sound.
Voice is often compared with fingerprints, because like fingerprints, due to their
unique form serve for biometric authentication, so the voice does.
The uniqueness of the voice is achieved due to the different physical components of a
human throat and mouth. To produce a sound, air leaves the body of a human being through
resonators: larynx, the oral cavity (mouth), nasal cavity (nose).
The form, tone of the sounds is depended on the size of the stream, obstructions.
Obstructions may include tongue, gums, teeth, lips, their position and size.
Voice has more than 100 separate characteristics that make voice biometrics to be one
of the most reliable. To identify the person with the help of voice print, a sample of speech
should be taken. This sample is analyzed. Different multiple measurements are taken and the
results are presented in the form of the algorithm.
Common delusion is that the voice itself is 47 stored in the database. No, the output
from the algorithm is stored in the database.
For verification, another sample of the speech is taken. As in identification process the
second sample is analysed, and measured. If the results match, the identity can be verified.
The first three systems belong to text-dependent type of the system, the last two- to the
textindependent.
Gait
Gait biometrics is a biometrics that is based on the way the person walks. It should be
mentioned that gait is not affected by the speed of the person‘s walk.
Some scientists differentiate gait from gait recognition, pointing out that gait can be
considered as a cyclic combination of movements that results in human locomotion and gait
recognition is recognition of some property style of walk, pathology, etc.
Such characteristic of human being as the ability to identify a person by analyzing the
manner of walk is very important for biometrics as it offers more reliable and efficient means
for identity verification.
Wearable Sensor Based: the new ―word‖ in gait recognition. The approach is
based on special motion recoding sensor that a person wears on the body. The
sensor can:
Measure acceleration,
Measure rotation and number of degrees per second of rotation,
Measure the force of walking.
Iris Recognition
Iris is a unique characteristic of a person. The primary visible characteristic of iris is the
trabecular meshwork that makes possible to divide the iris in a radial fashion. It is formed in
the eighth month of gestation. Iris is stable and does not change during the whole life.
Iris recognition is considered to be one of the exact methods of biometrics. Iris is
protected by eyelid, cornea and aqueous humour that make the likelihood damage minimal
unlike fingerprinting.
Some sources divide the process of iris recognition into two steps, some into three:
1. Capturing the image: The image can be captured by a standard camera using both
visible and infrared light. The procedure can be manual or automated. In the manual
procedure the iris should be in focus and the length between the camera and iris should be
within six and twelve inches, while in automated procedure the length is between three and a
half inches and one metre. In automated procedure the camera automatically locates the face
and iris into the focuse and makes the process rather easy and friendly.
2. Define the location of the iris and optimising the image: when the iris is in focused,
the iris recognition system just identifies the image with the best focus and clarity. The image
is analyzed. The purpose of the analysis is to identify the outer boundary of the iris where it
meets with white clera of the eye, the pupillary boundary and the centre of pupil. The result of
the analysis is the precise location of the circular iris. Iris recognition system tries to identify
the areas suitable for feature extraction and analysis: removing areas covered by the eyelids,
deep shadows, and reflective areas. This attempt is known as optimisation of the image.
3. Store and compare the image: the process of division, filtering and mapping
segments of the iris into hundreds of vectors ( phasors) takes place. The process is also known
as 2-D Gabor. 2-D Gabor phasor can be easily understand as ―what‖ and ―where‖ of the
image. Even after this procedure there are still 173 degrees of freedom to identify the iris. 2-D
Gabor takes into consideration the changes that may occur with an iris. Iris image is saved as
so-called Iris Code®, 512-byte record. The record is stored in a database.
Hand Geometry
Hand geometry is the use of geometric shape of the hand for recognition purposes. This
method was rather popular 10 years ago but nowadays it is seldom used. The method is based
on the fact that the shape of the hand of one person differs from the shape of the hand of
another person and does not change after certain age. But it is not unique. The main
characteristics for this method are measuring and recording the height, length of the fingers,
distance between joints, shape of the knuckles, surface area of the hand.
Facial Recognition
People used face to distinguish one person from the other. Facial (face) recognition is a
computer application that automatically identifies or verifies a person with the help of a
digital image or a video frame from a video source. One of the ways to do this is to compare
the given example with the examples in the database.
The face of a person has a numerous distinguishable characteristics. Face IT has 80 nodal
points and some of these points can be measured by software:
Distance between eyes
Width of the nose
Depth of the eye sockets
The shape of the cheekbones
The length of the jaw line
By measuring these nodal points a special numeric code is created. This code is called a
face print, and it is this code that represents the face in the database.
Facial recognition technologies can be divided into two
ways: 2-d
3-D.
The face recognition process normally consists of four phases:
1. Detecting a face
2. Normalization
3. Feature extraction and recognition
4. Recognise face image
Biometrics Characteristics
Universality- each person that is using the biometric system should posses the
biometric trait
Uniqueness- measures how well the biometric trait separates one individual form
another.
Performance- measures how well a biometric trait resists aging.
Collectability- eases of acquisition of the biometric trait without causing
inconvenience to the user.
Performance- accuracy, speed, robustness of technology used
Acceptability-degree of approval of the biometric technology by the users
Circumvention- eases of use of an imitation of the biometric treat.
7.1 Introduction
Electronic commerce may include any computer mediated business process, but a
common usage is to describe commerce taking place using the WWW as an enabling
transport.
Spyware
Spyware is software that is placed on your computer when you visit certain websites.
It is used to secretly gather information about your usage and sends it back to
advertisers or other interested parties. In addition to tracking your system use, it can
also slow down or crash your computer.
7.4 Protecting e-commerce system
Securing your e-commerce system
With this high level of dependency upon the services provided by e-commerce
systems, it is essential that they are protected from the threats posed by hackers,
viruses, fraud and denial-of-service (dos) attacks.
Types of threats
Hackers attempting to penetrate a system to read or alter sensitive data.
Burglars stealing a server or laptop that has unprotected sensitive data on its disk.
Imposters masquerading as legitimate users and even creating a website similar to
yours
Authorized users downloading a web page or receiving an email with hidden active
content that attacks your systems or sends sensitive information to unauthorized
people.
Where (or who) are the potential sources of threats?
What level of expertise is the hacker likely to possess? How much effort are they
likely to expand in attempting to breach your security? What facilities and tools
are available to them?
Risk assessment
A risk assessment can be carried out to provide an organization with a clear
understanding of the risks facing its e-commerce system and associated business
processes, and the potential impact if a security incident arises.
Intrusion detection
The software related to intrusion detection monitor system and network activity to spot
any attempt being made to gain access. If a detection system suspects an attack, it can
generate an alarm, such as an e-mail alert, based upon the type of activity it has identified.
Preventing problems from viruses, Trojans and worms Anti-virus software
There are different types of anti-virus software:
Virus scanners:-must be updated regularly, usually by connecting to the supplier‘s
website, in order to recognize new viruses.
Heuristics software:- detects viruses by applying general rules about what viruses
look like, while it does not require frequent updates, this software can be prone to
giving false alarms.
Using a virus checker on your internet connection to trap viruses both entering and
leaving he business it systems.
Running virus checkers on servers to trap any viruses that have managed to evade the
above check.
Running individuals virus checkers on users pc‘s to ensure the they have not down
loaded a virus directly of inadvertently introduced one via a cd of floppy disk.
Digital identity
Digital entity is the electronic representation of a real-world entity. The term is usually
taken to mean the online equivalent of an individual human being, which participates in
electronic transaction on behalf of the person in question.
Digital identity refers to the aspect of digital technology that is concerned with the meditation
of people‘s experience of their own identity and the identity of other people and things.