electronic commerce  strategy technologies and applications
e c o m m e r c e
Chapter 15: The elements of e-Commerce
Search Company Customer P e r f o r m a n c e E a s e o f U s e Product Negotiation Order Payment Delivery After-sales Community A e s t h e t I c E f f e c t
I n n o v a t i o n
E-Commerce David Whiteley/McGraw-Hill, 2000
electronic commerce  strategy technologies and applications
e c o m m e r c e
Elements
 The basic eleme ts:  e-Sho o a Server  User (customer) with a web Browser  I ter et co ectio  dditio al issues:  Visibility  Ease of Use  rder rocessi  li e ayme ts  Security  Delivery Systems  fter-Sales
E-Commerce David Whiteley/McGraw-Hill, 2000
electronic commerce  strategy technologies and applications
E-Commerce David Whiteley/McGraw-Hill, 2000
e c o m m e r c e
Elements
Customer Search Browser Delivery After Sales Internet Orders Payment Store Systems e-Shop
electronic commerce  strategy technologies and applications
e c o m m e r c e
e-Visibility
 Getti visiti
the site oticed a d the o li e customers the store.
 Ways of advertisi a web rese ce a d etti customers i throu h the door i clude:  Site ame  Co ve tio al dvertisi  ortals  Malls  Search Engines  Links  ersonal Recommendations
E-Commerce David Whiteley/McGraw-Hill, 2000
electronic commerce  strategy technologies and applications
E-Commerce David Whiteley/McGraw-Hill, 2000
e c o m m e r c e
e-Visibility  site name
 The surest way of finding a site is the url.  If the url is memorable then the site is made:  amazon.com 
sensible sim le site name can be guessed by users:  britishairways.com
electronic commerce  strategy technologies and applications
e c o m m e r c e
e-Visibility  conventional advertising
 An irony of e-Commerce sites is the a arent urge to advertise them through conventional media.  Conventional advertising of Internet addresses has a threefold effect:  It boosts the image of the organisation  it gives an air of modernity and high-tech;  It lets the customer know that the organisation has Internet facilities;  It can give users access via the url.
E-Commerce David Whiteley/McGraw-Hill, 2000
electronic commerce  strategy technologies and applications
e c o m m e r c e
e-Visibility  portals
 The first age a user sees is the ortal.  An advert on a o ular ortal is the web equivalent of a TV advert at half time in the cu final or in a break during the Su erbowl  it is seen by millions.  An advert on a o ular web search engine is a similar iece of ro erty.  Adverts on the ortal can be:  Banners  Little boxes  Menu of services
E-Commerce David Whiteley/McGraw-Hill, 2000
electronic commerce  strategy technologies and applications
e c o m m e r c e
e-Visibility  malls
 An Internet sho ing mall models itself on the American sho ing mall, a lot of sho s, under one roof with a leasant sho ing atmos here.  The intention is to generate interest and thus trade for all the sho s.  An Internet mall can rovide common services. include:  Shared advertising.  Common facilities.  e-Cash.  Common customer files. ossibilities
 The drawback of joining a mall is that, as for any good retail location, the rents can be high.
E-Commerce David Whiteley/McGraw-Hill, 2000
electronic commerce  strategy technologies and applications
e c o m m e r c e
e-Visibility  search engines
 A search engine is a standard way to find any Internet site and that includes e-Sho s.  Finding a s ecific e-Commerce site may or may not be easy - a successful e-Sho could do with a earing in that to ten list of hits.  The search engines index the web by:  Manual indexing;  Automatic Indexing (web crawlers).  Crawlers look at:  The <TITLE> tag is a rime target.  The <META> is also checked  and many other as ects of the site and its use,  Also one can ask the search engine to list the site.  ote, the best of the search engines list only about 15% of internet sites.
9
E-Commerce David Whiteley/McGraw-Hill, 2000
electronic commerce  strategy technologies and applications
E-Commerce David Whiteley/McGraw-Hill, 2000
e c o m m e r c e
e-Visibility  links
 Online adverts on the web are also links to the site  hy ertext links.  Links are included on a variety of other sites with a variety of deals being done.
10
electronic commerce  strategy technologies and applications
E-Commerce David Whiteley/McGraw-Hill, 2000
e c o m m e r c e
e-Visibility  personal recommendations
 Satisfied customers will bookmark the site, come back to the site again and recommend it to their friends  ossibly the best way of getting business.
11
 The full service e-Store needs: an extensive range of facilities; these include:  Com any information  Customer registration electronic  Dynamic web ages commerce  Site indexes and search facilities  strategy  Online order entry and ayment systems technologies  So histicated security rotection systems and  After sales service and su ort applications  Feedback systems
E-Commerce David Whiteley/McGraw-Hill, 2000
e c o m m e r c e
The e-Shop
 e-Sho s come in all sha es and sizes. They range from:  A few sim le web ages for a local craftsman  Com lex sites offering services that include online ordering and ayment
12
electronic commerce  strategy technologies and applications
e c o m m e r c e
The e-Shop  online information
 Trust is an issue on the Internet and it is not an issue that is likely to go away.  Trust can be engendered by:  Brand name and trading record.  A site that gives a rofessional image.  The inclusion of com any information.  All of this does not rove that a site is genuine but it can reassure otential customers.
E-Commerce David Whiteley/McGraw-Hill, 2000
13
electronic commerce  strategy technologies and applications
e c o m m e r c e
The e-Shop  customer registration
 e-Commerce customers have to give their su liers details about themselves. It is less information than would be required to o en a bank account but more than is normally needed to buy some cornflakes.  roviding this information raises rivacy issues:  Will the information be ut to other uses?  Will the e-Vendor com ile a customer rofile?  Is the information secure?  The context in which the e-Commerce vendor asks for this information is also im ortant:  Customer registration rior to using the site  Customer details only when an order is laced.
E-Commerce David Whiteley/McGraw-Hill, 2000
14
electronic commerce  strategy technologies and applications
e c o m m e r c e
The e-Shop  site navigation
if a site is not designed with usability in mind, people will be frustrated with the site. People that are frustrated with the site dont bookmark, dont buy, dont revisit, and wont tell other people about the site. (Rhodoes, 1999)
 Site navigation is aided by:  A site index;  A site search engine;  Logical sequencing of facilities with clear links to the next stage in any rocess.
E-Commerce David Whiteley/McGraw-Hill, 2000
15
electronic commerce  strategy technologies and applications
e c o m m e r c e
The e-Shop  product database
 The use of a roduct database facilitates:  U dating of roducts and their attributes  Common data for e-Sho and back office   and requires the construction of the web age on the fly.  Exam les are:  The Online Booksho  The Airline Website (integrated with the airline booking system)
E-Commerce David Whiteley/McGraw-Hill, 2000
16
electronic commerce  strategy technologies and applications
e c o m m e r c e
The e-Shop  online orders
 The most common analogy is a sho ing basket in the UK and a sho ing cart in the US.
 Tangible goods are (electronically) laced in the basket and checked-out when sho ing is com lete.  For services, such as an airline booking, the search rocess is also the sho ing rocess and the customer acce ts or rejects the resulting ro osal(s).
E-Commerce David Whiteley/McGraw-Hill, 2000
17
electronic commerce  strategy technologies and applications
e c o m m e r c e
Online payments
 Options for online payment are:  Credit Cards  Debit Cards  Stored Value Cards  e-Cash  Delayed ayments  ote, in a shop there is an exchange of value  online it is pay now and hope that the goods arrive later.
E-Commerce David Whiteley/McGraw-Hill, 2000
18
electronic commerce  strategy technologies and applications
e c o m m e r c e
Online Payments  credit cards
 Options for online payment:  The most common way of paying for an e-Commerce transaction is with a credit card.  The online use of credit cards is an extension of the customer not present (CNP) protocol  which is intrinsically less secure than the conventional use.  Potential problems include:  Fraudulent Use of Credit Cards  Interception of Credit Card Details  Remote Storage of Credit Card Details
E-Commerce David Whiteley/McGraw-Hill, 2000
19
electronic commerce  strategy technologies and applications
e c o m m e r c e
Online Payments
 Debit Cards  Similar to Credit Cards but less secure.  Stored Value Cards  Not widely used  fraud limited to value on card  requires a card reader.  e-Cash  Suitable for small payments  as yet no generally accepted scheme.  Delayed Payments  Off-line payments - limited acceptance  normally delays transaction.
E-Commerce David Whiteley/McGraw-Hill, 2000
20
electronic commerce  strategy technologies and applications
e c o m m e r c e
Delivery of goods (e- fulfilment)
 Internet e-Commerce allows users to order what they want, when they want but then they have to wait until the postman arrives.  Delivery depends on the size, nature, urgency and value. Options include:  Post. (You can sell anything online provided it will fit through a letter box.)  Packet/parcel delivery service.  Local Delivery. (Perishable goods often require such a service.)  Collect your Own.  Electronic Delivery.  No delivery. (Intangibles such as an e-Ticket.)
E-Commerce David Whiteley/McGraw-Hill, 2000
21
electronic commerce  strategy technologies and applications
e c o m m e r c e
Delivery of Goods (e- fulfilment)
 For the delivery stage of the trade cycle the task of delivery is transferred from the retail customer to the vendor and the vendor generally finds it necessary to recoup those costs as delivery charges.  Delivery issues:  cost  picking, posting and packaging  trust  will the right goods be sent?  security  does someone have to be at home to accept delivery?  Online grocery deliveries work to booked delivery slots  often a day or two later.
E-Commerce David Whiteley/McGraw-Hill, 2000
22
electronic commerce  strategy technologies and applications
E-Commerce David Whiteley/McGraw-Hill, 2000
e c o m m e r c e
After Sales
 Advantages:  Online manuals and diagnostics  Online Support  Problem areas:  Return of goods
23
electronic commerce  strategy technologies and applications
E-Commerce David Whiteley/McGraw-Hill, 2000
e c o m m e r c e
Internet e-Commerce Security
 Security breaches can occur on:  The customer side  impersonation.  The Internet  hacking, etc.  The vendor side  inappropriate or dishonest trade.
24
electronic commerce  strategy technologies and applications
e c o m m e r c e
Internet e-Commerce Security
The four pillars of secure e-Commerce:  Authentication:  The sender of a document must be identified precisely and without any possibility of fraud;  Confidentiality:  The contents of a message may not be scanned by unauthorised parties;  Integrity:  Changes made in messages without according remarks must be impossible;  Non-Repudiation:  The sender of a message is directly connected to the contents of the message (and the recipient cannot deny that the message was received).
E-Commerce David Whiteley/McGraw-Hill, 2000
25
electronic commerce  strategy technologies and applications
e c o m m e r c e
Security - encryption
 Encryption is the conversion of data into a code so that it cannot be read by unauthorised users.  The data is converted into the code by the sender and then decoded by the receiver.  Modern encryption methods use an encryption algorithm and a binary number that is the key. The main options are:  Secret key system  Public key / private key system.  Encryption should be used for transmission but also for customer data on the e-Vendors server.
E-Commerce David Whiteley/McGraw-Hill, 2000
26
electronic commerce  strategy technologies and applications
e c o m m e r c e
Security  Secure Sockets Layer (SSL)
 The stages are:  The vendor transmits the public key (ka) to the intending customer's web browser.  The customers browser generates a secret key (kc) for the session.  The customers browser encrypts the secret key (kc), using the public key (ka) and transmits it to the vendor.  The vendor decodes the message using a private key (kb) and now has the secret key (kc).  Further interchanges between the customers browser and the vendors server can now be encoded and decoded using the secret key (kc).
E-Commerce David Whiteley/McGraw-Hill, 2000
27
electronic commerce  strategy technologies and applications
E-Commerce David Whiteley/McGraw-Hill, 2000
e c o m m e r c e
Security  digital signatures
 A digital signature is used to authenticate the sender of the message and to check the integrity of the message, i.e. that it has not been altered in transit.
28
electronic commerce  strategy technologies and applications
E-Commerce David Whiteley/McGraw-Hill, 2000
e c o m m e r c e
Security  trusted third parties
 This addresses non-repudiation  a copy of the transaction is transmitted to a third party and the record of the transaction can be used to settle any disputes.
29
electronic commerce  strategy technologies and applications
e c o m m e r c e
A Web Site Evaluation Model
S C Cust P r f r f n c U s P li E s Pr uct rc p n r A s t t I c E f f c t t i n I n n
N g ti ti n Or r nt r
Aft r-s l s C
E-Commerce David Whiteley/McGraw-Hill, 2000
unit
30
electronic commerce  strategy technologies and applications
E-Commerce David Whiteley/McGraw-Hill, 2000
e c o m m e r c e
Chapter 15  Exercise 1
 Select two categories of goods, for example groceries and books, and list the advantages and disadvantages to you of ordering these products online. The lists can be compared across a group of students and the differences analysed.
31
electronic commerce  strategy technologies and applications
e c o m m e r c e
Chapter 15  Exercise 2
 Use the Web Site Evaluation Model and the associated questions from Section 15.7 to evaluate a couple of web sites.
For this evaluation use two web sites from the same sector, possibly one of the sectors used in Exercise 1. Compare the results of the two evaluations and compute an overall score for each of the sites.
E-Commerce David Whiteley/McGraw-Hill, 2000
32