Ecommerce Note Unit 2
Ecommerce Note Unit 2
Mobile Computing refers a technology that allows transmission of data, voice and video via a
computer or any other wireless enabled device. It is free from having a connection with a fixed
physical link. It facilitates the users to move from one physical location to another during
communication.
It is a technology that provides an environment that enables users to transmit data from one
device to another device without the use of any physical link or cables.
It allows transmission of data, voice and video via a computer or any other wireless-enabled
device without being connected to a fixed physical link. In this technology, data transmission
is done wirelessly with the help of wireless devices such as mobiles, laptops etc.
This is only because of Mobile Computing technology that you can access and transmit data
from any remote locations without being present there physically. Mobile computing
technology provides a vast coverage diameter for communication. It is one of the fastest and
most reliable sectors of the computing technology field.
The concept of Mobile Computing can be divided into three parts:
i. Mobile Communication
i. Mobile Communication
Mobile Communication specifies a framework that is responsible for the working of mobile
computing technology. In this case, mobile communication refers to an infrastructure that
ensures seamless and reliable communication among wireless devices. This framework ensures
the consistency and reliability of communication between wireless devices. The mobile
communication framework consists of communication devices such as protocols, services,
bandwidth, and portals necessary to facilitate and support the stated services. These devices are
responsible for delivering a smooth communication process.
Mobile hardware consists of mobile devices or device components that can be used to receive
or access the service of mobility. Examples of mobile hardware can be smartphones, laptops,
portable PCs, tablet PCs, Personal Digital Assistants, etc.
These devices are inbuilt with a receptor medium that can send and receive signals. These
devices are capable of operating in full-duplex. It means they can send and receive signals at
the same time. They don't have to wait until one device has finished communicating for the
other device to initiate communications.
Mobile software is a program that runs on mobile hardware. This is designed to deal capably
with the characteristics and requirements of mobile applications. This is the operating system
for the appliance of mobile devices. In other words, you can say it the heart of the mobile
systems. This is an essential component that operates the mobile device.
o Emergency services.
o Entertainment services.
o Educational services.
Healthcare
Education
Other applications
• Mobile computing allows users to communicate through voice, messages, and mails
• WAP may be created on any kind of operating system, and it acts in an open application
environment.
• It is more beneficial for mobile users as it has the ability to deliver electronic
information efficiently.
• In 1998, Nokia, Motorola, Ericson, and Unwired Planet founded the WAP Forum,
whose objective was to standardize several wireless technologies with the help of
protocols.
• The WAP CSS (cascading style sheet) makes capable of developers to format screen
sizes in order to mobile device adaptability. When the WAP CSS content is used, then
reformatting is not required. It controls page layout compatibility with different mobile
device's display screens.
WAP Model
▪ In the mobile device, the user opens the web browser and access the website and visit
webpages accordingly.
▪ The mobile device forwards the URL request to a WAP gateway through the network
using the WAP protocol.
▪ Then, the WAP gateway refers to this request over the internet after translating it into a
conventional HTTP URL request.
▪ The specified Web server accepts the request and processes the request.
▪ Then, it returns the response to the mobile device in the WML file through the WAP
gateway that will be displayed in the web browser on the device.
It determines the session will be connection-oriented or connectionless between the device and
the network and offers a reconnection and fast connection suspension. The data is passed both
ways between the network and the device in the connection-oriented session. Then, WSP
forwards the packet to the next layer WTP (Wireless Transaction Protocol). When the
information is being streamed or broadcast from the network to the device, commonly, the
connectionless session is used. Then, WSP forwards the packet to the WDP (Wireless Datagram
Protocol) layer.
The Wireless Transaction Protocol offers transaction support. It is a part of TCP/IP and runs on
top of UDP, which stands for User Datagram Protocol.
4. Security Layer (WTLS)
The Wireless Transport Layer Security provides security in terms of data integrity, privacy and
authentication that help to save your data. It also has the ability to work like Transport Layer
Security. Also, it contains security features that have Transport Layer Security.
With the network carrier layer, the Wireless Datagram Protocol functions in conjunction and
presents a constant data format to higher layers of WAP protocol stack.
Advantages of WAP
o Portability
o Cost and Application Development Time Reduction
o No hardware obsolescence
o Time-saving
o Personalized
Disadvantages of WAP
o Limited bandwidth
o Speed of access and limited availability
o At some places it is very difficult to access the Internet, and also at some places it is
totally impossible.
o Less secure.
Features
• Wireless: Can connect to the internet or other devices using Wi-Fi, Bluetooth, cellular
networks, or near-field communication
• Power: Uses a battery to store power and operate without a physical connection to
electricity
• Sensors: May have sensors to record and store information, such as a camera, compass,
or activity monitor
Web Security
Web Security is an online security solution that will restrict access to harmful websites, stop
web-based risks, and manage staff internet usage.
For example- when you are transferring data between client and server and you have to protect
that data that security of data is your web security.
Security Threat
A threat is nothing but a possible event that can damage and harm an information system.
A security Threat is defined as a risk that, can potentially harm Computer systems &
organizations.
• SQL Injection
• Phishing
• Ransomware
• Code Injection
• Spyware
• Denial of Service
Security Consideration
• Updated Software: You need to always update your software. Hackers may be aware
of vulnerabilities in certain software, which are sometimes caused by bugs and can be
used to damage your computer system and steal personal data. Older versions of
software can become a gateway for hackers to enter your network. Software makers
soon become aware of these vulnerabilities and will fix vulnerable or exposed areas.
That’s why It is mandatory to keep your software updated, It plays an important role in
keeping your personal data secure.
• Beware of SQL Injection: SQL Injection is an attempt to manipulate your data or your
database by inserting a rough code into your query. For e.g. somebody can send a query
to your website and this query can be a rough code while it gets executed it can be used
to manipulate your database such as change tables, modify or delete data or it can
retrieve important information also so, one should be aware of the SQL injection attack.
• Cross-Site Scripting (XSS): XSS allows the attackers to insert client-side script into
web pages. E.g. Submission of forms. It is a term used to describe a class of attacks that
allow an attacker to inject client-side scripts into other users’ browsers through a
website. As the injected code enters the browser from the site, the code is reliable and
can do things like sending the user’s site authorization cookie to the attacker.
• Error Messages: You need to be very careful about error messages which are generated
to give the information to the users while users access the website and some error
messages are generated due to one or another reason and you should be very careful
while providing the information to the users. For e.g. login attempt – If the user fails to
login the error message should not let the user know which field is incorrect: Username
or Password.
• Data Validation: Data validation is the proper testing of any input supplied by the user
or application. It prevents improperly created data from entering the information
system. Validation of data should be performed on both server-side and client-side. If
we perform data validation on both sides that will give us the authentication. Data
validation should occur when data is received from an outside party, especially if the
data is from untrusted sources.
• Password: Password provides the first line of defense against unauthorized access to
your device and personal information. It is necessary to use a strong password. Hackers
in many cases use complex software that uses brute force to crack passwords.
Passwords must be complex to protect against brute force. It is good to enforce
password requirements such as a minimum of eight characters long must including
uppercase letters, lowercase letters, special characters, and numerals.
Firewall
A firewall is a network security device either hardware or software-based which monitors all
incoming and outgoing traffic and based on a defined set of security rules it accepts, rejects, or
drops that specific traffic. It acts like a security guard that helps keep your digital world safe
from unwanted visitors and potential threats.
A firewall is a type of network security device that filters incoming and outgoing network
traffic with security policies that have previously been set up inside an organization. A firewall
is essentially the wall that separates a private internal network from the open Internet at its very
basic level.
• Prevention of Malware and Other Threats: Malware and other threat prevention:
Firewalls can be set up to block traffic linked to known malware or other security
concerns, assisting in the defense against these kinds of attacks.
• Monitoring of Network Activity: Firewalls can be set up to record and keep track of
all network activity.
• Regulation Compliance: Many industries are bound by rules that demand the usage
of firewalls or other security measures.
• Network Segmentation: By using firewalls to split up a bigger network into smaller
subnets, the attack surface is reduced and the security level is raised.
• False Sense of Security: Some businesses may place an excessive amount of reliance
on their firewall and disregard other crucial security measures like endpoint security or
intrusion detection systems.
• Limited adaptability: Because firewalls are frequently rule-based, they might not be
able to respond to fresh security threats.
• Limited Scalability: Because firewalls are only able to secure one network, businesses
that have several networks must deploy many firewalls, which can be expensive.
• Limited VPN support: Some firewalls might not allow complex VPN features like
split tunneling, which could restrict the experience of a remote worker.
• Cost: Purchasing many devices or add-on features for a firewall system can be
expensive, especially for businesses.
Transaction security
Transaction security, also known as payment security, refers to a category of practices,
protocols, tools and other security measures used during and after business transactions to
protect sensitive information and ensure the safe and secure transfer of customer data.
While online transactions pose unique challenges for transaction security, they are critical for
both online and offline businesses in building consumer trust, mitigating fraud and maintaining
regulatory compliance.
Coinciding with the accelerated rise of e-commerce and online transactions, transaction
security has become a major concern for any business that handles payments and the transfer
of valuable assets, such as financial institutions, cryptocurrency exchanges and retailers. Other
use cases include online gaming marketplaces, alternative payment methods like ApplePay and
Venmo and any service responsible for processing sensitive legal documents (such as online
tax filing services or various official government offices).
To prevent financial losses resulting from fraudulent transactions and provide a trustworthy
user experience for customers and clients sharing their personal data, common transaction
security measures include advanced modern data encryption, multi-factor authentication
(MFA) and digital signatures. These security protocols mitigate the risk of payment fraud and
customer data theft resulting from a security breach, for which many businesses might be
legally liable, depending on their jurisdiction.
While most transaction security measures are put in place during the transaction itself,
transaction security also extends to internal business policies that govern the treatment of any
sensitive transaction data stored by an organization or business, such as credit card numbers
and account numbers. For cybersecurity professionals invested in database security,
transaction security means not only monitoring online transactions in real-time for suspicious
activity and unauthorized transactions but also proactively identifying and mitigating any
internal security vulnerabilities. Modern transaction security system service providers often
incorporate a customizable notification functionality and other automation to facilitate secured
transactions at scale.
• Card-not-present fraud
While in-person transactions typically require a physical credit card, transactions made online
or over the phone often require only a credit card number. This loophole can open up online or
telephone-based transactions to card-not-present fraud, in which fraudsters use stolen numbers
to make fraudulent transactions. While a customer may still retain their physical credit card,
they may be totally unaware that their card details have been stolen.
• Tokenization
Tokenization is a process that replaces sensitive customer data, like credit card numbers, with
unique tokens that can neither be used to make fraudulent transactions nor reverse engineer the
original payment information. These tokens are then used to reference the original payment
information, which is stored in a secure token vault. Tokenization both reduces the risk
associated with data breaches and simplifies regulatory compliance since the tokens
themselves are useless even if they fall into the wrong hands.
• Authentication
As a foundational form of transaction security, authentication practices long predate the internet
age. Whereas in the past a merchant might request a form of photo identification before
accepting a personal check, modern digital authentication measures have increased in
sophistication. Single-factor authentication (SFA) requires one form of identification, such as
a password or a pin; two-factor authentication (2FA) requires additional forms of identification,
such as a one-time passcode sent to a registered device or email. Other standard authentication
methods include requiring a card verification value (CVV) for credit card payments and
biometric authentication (such as facial recognition or fingerprint scanning).
Network Security
Any action intended to safeguard the integrity and usefulness of your data and network is
known as network security. In other words, Network security is defined as the activity created
to protect the integrity of your network and data.
Network security is the practice of protecting a computer network from unauthorized access,
misuse, or attacks. It involves using tools, technologies, and policies to ensure that data
traveling over the network is safe and secure, keeping sensitive information away from hackers
and other threats.
It uses several layers of protection, both at the edge of the network and within it. Each layer
has rules and controls that determine who can access network resources. People who are
allowed access can use the network safely, but those who try to harm it with attacks or other
threats are stopped from doing so.
The basic principle of network security is protecting huge stored data and networks in layers
that ensure the bedding of rules and regulations that have to be acknowledged before
performing any activity on the data. These levels are:
• Physical Network Security: This is the most basic level that includes protecting the
data and network through unauthorized personnel from acquiring control over the
confidentiality of the network. The same can be achieved by using devices like
biometric systems.
• Technical Network Security: It primarily focuses on protecting the data stored in the
network or data involved in transitions through the network. This type serves two
purposes. One is protected from unauthorized users, and the other is protected from
malicious activities.
There are several types of network security through which we can make our network more
secure, Your network and data are shielded from breaches, invasions, and other dangers by
network security. Here below are some important types of network security:
Email Security
Email Security is defined as the process designed to protect the Email Account and its contents
safe from unauthorized access. For Example, you generally see, fraud emails are automatically
sent to the Spam folder. because most email service providers have built-in features to protect
the content.
The most common danger vector for a security compromise is email gateways. Hackers create
intricate phishing campaigns using recipients’ personal information and social engineering
techniques to trick them and direct them to malicious websites. To stop critical data from being
lost, an email security programme restricts outgoing messages and stops incoming threats.
Network Segmentation
Network traffic is divided into several categories by software-defined segmentation, which also
facilitates the enforcement of security regulations. Ideally, endpoint identity—rather than just
IP addresses—is the basis for the classifications. To ensure that the appropriate amount of
access is granted to the appropriate individuals and that suspicious devices are controlled and
remediated, access permissions can be assigned based on role, location, and other factors.
Access Control
Your network should not be accessible to every user. You need to identify every user and every
device in order to keep out any attackers. You can then put your security policies into effect.
Noncompliant endpoint devices might either have their access restricted or blocked. Network
access control (NAC) is this process.
Sandboxing
This is very vulnerable to the malpractices that few unauthorized dealers might pertain to. This
data must be protected and it should be ensured that this protection is not jeopardized by
anything. Many businesses embrace SaaS applications for providing some of their employees
the allowance of accessing the data stored in the cloud. This type of security ensures creating
gaps in the visibility of the data.
Workloads and applications are no longer solely housed in a nearby data centre on-site. More
adaptability and creativity are needed to protect the modern data centre as application
workloads move to the cloud.
Web Security
A online security solution will restrict access to harmful websites, stop web-based risks, and
manage staff internet usage. Your web gateway will be safeguarded both locally and in the
cloud. “Web security” also include the precautions you take to safeguard your personal website.
This type of network security ensures that any malicious software does not enter the network
and jeopardize the security of the data. Malicious software like Viruses, Trojans, and Worms is
handled by the same. This ensures that not only the entry of the malware is protected but also
that the system is well-equipped to fight once it has entered.
Firewalls Security
A firewall is a network security device, either hardware or software-based, which monitors all
incoming and outgoing traffic and based on a defined set of security rules accepts, rejects, or
drops that specific traffic. Before Firewalls, network security was performed by Access Control
Lists (ACLs) residing on routers.
Application Security
Application security denotes the security precautionary measures utilized at the application
level to prevent the stealing or capturing of data or code inside the application. It also includes
the security measurements made during the advancement and design of applications, as well as
techniques and methods for protecting the applications whenever.
Wireless Security
Wireless networks are less secure than wired ones. If not properly secured, setting up a wireless
LAN can be like having Ethernet ports available everywhere, even in places like parking lots.
To prevent attacks and keep your wireless network safe, you need dedicated products designed
to protect it from exploits and unauthorized access.
Web Security
A web security solution manages how your staff uses the internet, blocks threats from websites,
and stops access to harmful sites. It safeguards your web gateway either onsite or in the cloud.
Additionally, “web security” involves measures taken to protect your own website from
potential attacks and vulnerabilities.
Cybercriminals are focusing more on mobile devices and apps. In the next three years, about
90 percent of IT organizations might allow corporate applications on personal mobile devices.
It’s crucial to control which devices can connect to your network and set up their connections
securely to protect network traffic from unauthorized access.
VPN Security
A virtual private network (VPN) encrypts the connection between a device and a network,
usually over the internet. A remote-access VPN commonly uses IPsec or Secure Sockets
Layer (SSL) to verify and secure the communication between the device and the network. This
encryption ensures that data transmitted between the device and the network remains private
and secure from unauthorized access.
Network Security has several benefits, some of which are mentioned below:
• Network Security helps in protecting clients’ information and data which ensures
reliable access and helps in protecting the data from cyber threats.
• Network Security protects the organization from heavy losses that may have occurred
from data loss or any security incident.
• It overall protects the reputation of the organization as it protects the data and
confidential items.
• Data Confidentiality: Encryption technologies ensure that data transmitted over the
network remains confidential and cannot be intercepted by unauthorized parties.
• Cost: Effective network security often requires investment in hardware, software, and
skilled personnel, which can be expensive for organizations, especially smaller ones.
• Privacy Concerns: Some network security measures, such as deep packet inspection
and monitoring, may raise privacy concerns among users and stakeholders, requiring
careful balancing of security needs with individual privacy rights.
E-Commerce Concepts Page | 1.33
including order placement, order status updates, order tracking and coordination
with logistics for delivery.
Inventory Management: The inventory management system tracks the availability
of products and services, updating the stock levels in real-time, and ensuring that
customers are not sold items that are out of stock.
Mobile Analytics: Mobile analytics tools provide valuable insights into user
behavior, preferences, and purchasing patterns. This information can be used to
optimize the m-commerce platform, enhance user experience, and refine marketing
strategies.
Security and Encryption: Security measures, such as data encryption, secure socket
layers (SSL), and two-factor authentication, are vital to protect sensitive user
information and ensure secure transactions.
Customer Support: This component offers customer support features like- chat
support, FAQs, and contact forms, allowing users to seek assistance or resolve issues
related to their purchases.
Push Notifications and Alerts: The system can utilize push notifications to inform
users about new products, special offers, order updates, and other relevant
information.
Mobile Marketing and Promotions: The system should support targeted marketing
and promotional activities, allowing businesses to reach their mobile customers with
personalized offers and campaigns.
Feedback and Reviews: This functionality enables users to provide feedback,
ratings, and reviews for products and services, helping other customers make
informed decisions.
The M-commerce Information System Functional Model serves as a blueprint for
designing, developing, and operating an effective and efficient mobile commerce platform,
ensuring a seamless and engaging experience for mobile users while supporting the
business's growth and success in the mobile marketplace.
modern business, which addresses the need of business organizations, vendors and
customers to reduce cost and improve the quality of goods and services while
increasing the speed of delivery.
The term ‘e-Commerce’ also comprises other activities including- online auctions,
internet banking, payment gateways, and online ticketing.
Some popular e-Commerce platforms are: Amazon, Flipkart, Myntra, IndiaMART,
and Snapdeal.
Q.2. Discuss the major objectives of E-Commerce.
Ans: The various objectives that businesses typically strive to accomplish through e-
commerce are:
To provide online customers with quick delivery of products or services.
To gain access to a worldwide market.
To increase sales in existing market and opening new market.
To develop business opportunities over the internet.
To improve productivity and competitiveness.
To improve customer experience and satisfaction.
To offer more customizable products.
To keep the virtual shop open 24x7.
Q.3. What is Mobile Commerce?
Or
What is M-Commerce?
Ans: Mobile commerce, also known as m-commerce, is defined as the process of
conducting commercial transactions such as online banking, paying bills or making
purchases using portable mobile devices like- mobile phones or tablets online.
You can’t use your laptop or PC (Personal Computer) everywhere, but you can use
your mobile phones easily. You can do online shopping while travelling, transfer
money easily with the help of mobile phones. Thus, this wireless solution is very
much helpful and rising day by day.
Q.4. Explain the types of M-Commerce.
Or
Define the following in M-Commerce:
(a) Mobile Shopping
E-Commerce Concepts Page | 1.35
users can access online shopping sites as well as other online services anywhere and
anytime.
Mobile commerce, which uses wireless technology, offers some additional
advantages over internet-based e-commerce. In e-commerce, the internet provides
information at any time of the day; in m-commerce; the information is available
anytime, anywhere. In e-commerce, the information is available as long as the user is
connected to the internet, i.e. connected to the wired network. If the user is involved
in some other activities, i.e. travelling or doing some offline job, which forces
him/her to become disconnected from the internet, the information becomes
unavailable. M-commerce removes such uncertainties. Wireless networking enables
the user to be connected to the wireless internet even when on the move. This means
that in m-commerce it is possible to stay online anywhere in the world and at any
time of the day. The user can instantly access information with the help of the mobile
device and the wireless network or the Internet, even when he/she is doing other
activities such as travelling or shopping. This helps employees to make spontaneous
decisions, customers to ask questions spontaneously, and business owners to
conduct transactions at any time regardless of their geographic location.
Q.7. Discuss the impact of ‘Wireless Communication Technology’ in Mobile
Commerce.
Ans: Mobile commerce is based on wireless communication technology. Wireless
communication technology has emerged as the new choice of the modern corporate
world. The wireless network has some distinct advantages over traditional wired
networks, which use coaxial, twisted pair, or fibre optic cables to physically connect
two or more computing devices. In wireless networks, data transmission between
computers is facilitated by microwaves, radio waves, or infrared waves. It eliminates
the cumbersome cabling process with bulky cables and significantly reduces labour
and material costs as well as development time. The wireless network technology,
together with the wireless application protocol, forms the backbone of mobile
commerce applications. In various vertical markets such as retail, healthcare,
manufacturing and warehousing, mobile commerce gained acceptance and
increased productivity through the use of mobile devices. The mobile handheld
devices are used to transmit data to centralized hosts in real time over wireless
networks.
Mobile commerce, which uses wireless technology, offers some additional
advantages over internet-based e-commerce. In e-commerce, the internet provides
E-Commerce Concepts Page | 1.37
The start-up cost of traditional commerce is The start-up cost of e-commerce is low.
very high.
Its accessibility is for limited time in a day. Its accessibility is 24 x 7. 24 x 7 means "24
hours a day, 7 days a week".
Traditional commerce is done where digital E-commerce is used to save valuable time
network is not reachable. and money.
E-Commerce M-Commerce
The process of buying and selling products The process of buying and selling products
or services over the internet by using or services over the internet by using
personal computers or laptops is called as wireless handheld devices (like- mobile
E-commerce. It refers to ‘Electronic phones or tablets) is called as M-commerce.
commerce’. It refers to ‘Mobile Commerce’.
E-commerce activities are performed with M-commerce activities are performed with
the help of desktop computers and the help of mobile devices like-
laptops. smartphones, tablets, PDA’s (Personal
Digital Assistant) etc.
E-commerce is an older concept developed M-commerce is a newer concept developed
in 1970’s. in 1990’s. It is actually a subset ofe-
commerce.
In e-commerce, the use of internet is In case of m-commerce, some activities can
mandatory. be performed without internet also. Like-
Sending SMS to promote a product/service
via. Mobile.
Its reachability is comparatively low than Its reachability is more than that of e-
the m-commerce as it is not so good in commerce only due to the use of mobile
portability. devices.
In e-commerce, location tracking In m-commerce, location tracking
capabilities are limited due to the non- capabilities is so good as mobile apps track
portability of devices. and identify user locations with the help of
GPS technology, Wi-Fi, and so on.
E-commerce fails in push notification. In m-commerce, push notification can be
achieved.
Mobility is high. Users can make Mobility is low. Users can make
transactions everywhere as long as they transactions on their computers and
are connected to the Internet. laptops with limited mobility.
M-commerce is available anyplace you go, For E-commerce, you still need to go to a
even if there is no internet. place where there is internet to access your
online transactions.
E-Commerce Concepts Page | 1.41
ie s
u ppl
3. S
Bus ine s s 2
2. O rde r
Proce s s ing
1. O rde r
W h ol
e s al
er
W e bs ite
4. Se l
ls
Cus tom e r
Example: CUSTOMER 1 wants to sell a car, so he/she can place his/her car on a
website like- OLX or eBay, while the CUSTOMER 2 wants to buy that car. So, the
CUSTOMER 2 can contact CUSTOMER 1 and buys the car from him/her.
Example: A customer places some of their services or products on the website. If the
services or products create value for the business organization, then they order these
services or products, but in most cases, services. When the deal is done, they receive
services or products, and the customer receives money.
Note: Freelancing websites like- Fiverr, Freelancer work on C2B business model.
Q.5. What is Mobile Commerce? Discuss the scope of Mobile Commerce.
Ans: Mobile commerce, also known as m-commerce, is defined as the process of
conducting commercial transactions such as online banking, paying bills or making
purchases using portable mobile devices like- mobile phones or tablets online.
You can’t use your laptop or PC (Personal Computer) everywhere, but you can use
your mobile phones easily. You can do online shopping while travelling, transfer
money easily with the help of mobile phones. Thus, this wireless solution is very
much helpful and rising day by day.
Scope of Mobile Commerce:
Mobile commerce provides instant connectivity between mobile users regardless of
their geographic location or time of day. With the tremendous growth of wireless
and mobile technology and the rapid production of cell phones in developing
countries around the world, the scope of m-commerce has expanded many times
over. With the advent of super-fast 4G access technology, which ensures high-speed
data transmission rates in the order of 50Mbps, m-commerce opens up new
perspectives for digital media applications. So, it is now possible for mobile users to
E-Commerce Concepts Page | 1.45
watch their favorite TV programmes or download and view famous movies in their
mobile devices while travelling.
Downloading MP3 music, playing online games or participating in live video
conferencing while in transit have become a reality now. Apart from such
audio/video applications, SMS-based text messaging is widely accepted in day-to-
day business transactions. Whether to display product promos, to announce new
product launches or to give attractive discounts, SMS have become an effective tool
for mobile marketing. SMS-based advertisements have become an integral part of m-
commerce. The role that SMS play in giving instant support to customers in the
event of any kind of product failures or delivery delays cannot be ignored or
downplayed.
Another major application area of m-commerce is in the field of micro payments.
Mobile devices will replace users' debit/credit cards in the near future. The mobile
phone replaces the money in your pocket and offers an affordable, low-risk
alternative to credit / debit cards to pay anytime, anywhere and for anything.
within a few seconds and at the cost of an SMS. In case of mobile billing, users
can pay for electricity bills, telephone bills, petrol, grocery, etc. through their
mobile phones. The payments made in the mobile phones for such items will
appear as part of their mobile phone bills, thus eliminating the need for a third
party payment mechanism such as, credit cards. This reduces the cost of
payment to a large extent.
Personalized Service
Mobile commerce offers a number of personalized services to the mobile users
depending on their various requirements and purposes. The digital cellular
technology can monitor the location of user performing mobile transactions.
Knowledge of the user's location may be used to deliver timely and useful
contents such as product availability and discount information to the potential
customer. Timely information, such as flight schedules and flight availability can
be delivered to the user at the last minute. Delivery of time critical as well as
emergency information, SMS-based notifications and alerts can be easily made if
the location of the user is tracked. The location tracking is also utilized in offering
customized services to the user, such as delivery of discount coupons that can be
cashed in and around of the location of the customer. Delivery of regional maps,
driving directions and online directories are also possible if the location of the
mobile user is known. Another major advantage of location tracking is that, in
criminal investigation, the location of the mobile user can be monitored and
recorded as part of the investigation process.
Savings
Companies try to reach to the consumer directly through M-Commerce, so users
have no need to go far to the store physically and at the end it saves user’s time
and money.
Q.7. Discuss the major limitations of Mobile Commerce.
Ans: Although mobile commerce has some distinctive advantages, such as instant
connectivity and location and time independence over electronic commerce and
offers low cost personalized services to the mobile users, it suffers from some serious
limitations which restrict its use in mainstream business world. The mobile device
limitations, such as small screen size, small memory capacity and lower processor
speed makes it unsuitable for high quality internet graphics applications. The limited
availability of bandwidth to various mobile operators imposes a limitation on the
E-Commerce Concepts Page | 1.49
Content Management
[Creation, Distribution and Management of Digital Contents]
Technology Infrastructure
Wireless Networks, Wireless Application Protocol (WAP)
Security Protocols, WML, Mobile Browsers
(M obil
e Com m e rce Fram e w ork )
and formulation of the entire business strategy of the organization. E-commerce has
some traditional business models that are widely used by all of the major e-
commerce providers around the world. These include the dealer model, broker
model, service provider model, advertiser model, etc. Mobile commerce business
models differ from electronic commerce because of their fundamental differences in
operation and technology. Since mobile commerce gives users additional mobility,
the business models also reflect the nature of mobility. The four most important
services of mobile commerce are payment services, mobile advertising, mobile
shopping and mobile entertainment. Accordingly, the business models of mobile
commerce also revolve around these four applications.
The four major mobile commerce business models are described below:
(1) Payment Model
In this model, mobile payment service providers offer mobile payment services that
enable users to conduct cashless payment transactions including bank transactions,
stock trading, tax / bill payments, and ticket or other retail purchases using a credit /
debit card or bank PIN. The payment service providers work with banks (or other
financial institutions) and / or mobile network operators and accordingly receive a
bank-controlled mobile payment model or an operator-controlled mobile payment
model. The payment service provider charges a certain percentage fee for each
payment transaction made using the payment application. Alternatively, the user
can pay a nominal monthly subscription fee to the payment service provider and can
use the service as and when required.
(2) Advertiser Model
This model is an extension of traditional e-commerce advertiser model and provides
mobile websites that can be viewed by mobile users on their portable mobile devices.
Advertising companies can display their advertising messages on the website and
pay a rental fee to the hosting website for displaying their messages. These mobile
advertising websites usually offer users some basic services such as email services,
search engines, news services or social networking services, and publish promotional
messages on these websites for wider reach. The advertisements often come with
purchase buttons that allow users to purchase the product directly from their mobile
devices. The mobile payment service is also provided to facilitate mobile purchase
directly from the advertising websites. The advertising companies pay a fixed fee to
the advertising website for the presentation of their advertising messages.
Page | 1.56 E-Commerce Concepts
Additional revenue is generated for every purchase transaction the user makes
through the website
(3) Shopping Model
This model is similar to the e-commerce retailer model, in which retailers create
mobile websites to display their range of products on customers' mobile devices. The
mobile users can browse the mobile websites on their WAP enabled mobile screens
and select and purchase any product of their choice. Mobile payment option is also
provided in the website so that the users can make mobile payment for the
purchased product and complete the deal even while in transit or far away from the
actual store location. Thus, shopping model allows retailers to generate additional
revenues through mobile shopping and can improve their profit margins.
(4) Content Provider Model
In this model, mobile service providers offer a variety of entertainment content such
as breaking news, weather forecast, traffic information, music, mobile games, TV
shows, video content, movies, etc., which can be downloaded to users' mobile
devices. Network operators are connected to various content providers and offer
mobile customers both subscription-based services and pay-per-use services.
Location-based services, such as map-based navigational services, discount coupons
offered in local retail stores or restaurants, news of local events, etc. are also
delivered in customer mobile devices. The revenue is generated through
subscription fees (for news, traffic/weather updates, movies, and games), usage fees
(TV shows, videos, games etc.) or data download fees (for e-mails, e-books, etc.).
Various media houses, press agencies or content aggregators follow this model in
order to generate additional income via the mobile channel.
Q.10. What is the impact of M-Commerce?
Ans: In general, mobile commerce is viewed as an extension of traditional internet-based
e-commerce. However, because the number of mobile device owners is far larger
than that of internet users, mobile commerce has a huge impact on the daily
activities of both customers and business owners.
By providing instant internet connectivity and greater mobility to billions of mobile
users, m-commerce is redefining the relationship between customers and providers
of goods and services. It is predicted that in the near future mobile commerce will
significantly influence the marketing orientation of almost all major industrial
sectors and thus change the general market dynamics.
E-Commerce Concepts Page | 1.57