Beruflich Dokumente
Kultur Dokumente
ABSTRACT..................................................................................................................................... 1 INTRODUCTION ........................................................................................................................... 2 WORKING ...................................................................................................................................... 3 STAGES IN EVOLUTION ............................................................................................................. 4 VARIOUS E-COMMERCE MODELS ........................................................................................... 5 E-COMMERCE CATALOUGE & PRODUCTS............................................................................ 6 Ecommerce Administration ......................................................................................................... 6 Ecommerce Technical:.............................................................................................................. 7 Ecommerce Customer Convenience ............................................................................................ 7 ELECTRONIC PAYMENT SYSTEMS ......................................................................................... 9 Electronic Data Interchange ......................................................................................................... 9 POTENTIAL IMPACT OF BLUETOOTH ON E-COMMERCE ................................................ 11 The potential Impact: ................................................................................................................. 11 Bluetooth-facilitated e-commerce:............................................................................................. 11 SECURE ACCESS TO E-COMMERCE NETWORKS ............................................................... 14 E-SERVICE ....................................................................................................................................... 15 E-COMMERCE SECURITY ..................................................................................................... 18 CONCLUSION .............................................................................................................................. 19 REFERENCES .............................................................................................................................. 20
ABSTRACT
E-commerce represents an ultimate state of the technology-driven market structure. To know the technological and business realities that impact on the existence and survival of a business venture is the concern of all. The Net is the backbone of the emerging digital economy that is shaping the future of businesses, organizations, and institutions of all kinds. Even individuals are at the mercy of these rapid changes. The simplest way to view web services is as software that knows how to talk to other types of software over a network. A web service can be nearly any type of application that has the ability to define to other applications what it does and can perform that action for authorized applications or parties. Though e-commerce is growing at a very fast rate as well as reducing a lot of information that needs to be repeatedly transferred from one location to another which involves wastage of money as well as time has got many holes in it. The security is the major criterion that has to be taken under consideration all times. The field of ecommerce is not totally a secured one. Though online supply chains are becoming the norm, electronic retailing requires an effective strategy for both B2B and B2C operations.
Dept of CSE
2011-12
INTRODUCTION
E-commerce is a technology-induced market. E-commerce technologies enable enterprises to exchange information instantaneously, eliminate paper work and advertise their products and service range to global market. E-commerce covers inter and inter company operations. E-commerce brings every business operation-finance, human resources, marketing, or any other function-onto the electronic platform. E-commerce may take many forms. It may include: Supply management/buying/auctioning. Internet order, status, and availability tracking. Placing Internet orders with suppliers. Accepting Internet orders from suppliers.
Some of the denitions of e-commerce often heard and found in publications and the media are: Electronic Commerce (EC) is where business transactions take place via telecommunications networks, especially the Internet. Electronic commerce describes the buying and selling of products, services, and information via computer networks including the Internet. Electronic commerce is about doing business electronically. E-commerce, or electronic commerce is dened as the conduct of a nancial transaction by electronic means.6 The wide range of business activities related to e-commerce brought about a range of other new terms and phrases to describe the Internet phenomenon in other business sectors. Some of these focus on purchasing from on-line stores on the Internet. Since transactions go through the Internet and the Web, the terms I-commerce (Internet commerce), icommerce and even Web-commerce have been suggested but are now very rarely used. Other terms that are used for on-line retail selling include e-tailing, virtualstores or cyber stores. A collection of these virtual stores is sometimes gathered into a virtual mall or cybermall.
Dept of CSE
2011-12
WORKING
The E-commerce process works in the following manner: A consumer uses a web browser like the Internet Explorer to connect to the home page of a commercial website on the Internet. The consumer browses through the product catalogue available on the site and selects the item(s) to purchase. The selected items are placed in a shopping cart. When the consumer finalizes the list of elected items he/she provides a ship-to and bill-to address for delivery and purchase. When commercial web server receives this information, it processes the order and prepares a bill after totaling the items cost and adding tax and handling charges. The consumer may now provide payment information by mentioning the name and number of his/her credit card and submit the order. When the credit card details are verified and authenticated and the order is completed, the commercial web server displays the receipt for the just concluded purchase. The commercial web server then forwards the order to a processing network for fulfillment.
STAGES IN EVOLUTION
E-commerce is an evolving process. Based on the underlying technology and business approach the following stages are recognized in the e-commerce evolution. Brochureware: Despite the early technological limitations of the Internet, companies were quick to recognize the value of the value of the Internet and the World Wide Web, in particular, as a medium to reach out to customers around the world. Web presence meant providing some static documents in simple multimedia. Customer interaction was often limited to reading text and viewing pictures. Actual transactions and customer interaction were still conducted over traditional media such as telephone or fax. E-Commerce: In the e-commerce stage, companies focused on consumer applications (B2C) that allow transactions and interaction between the company and the consumer over the net. The dot-com boom was mostly due to such companies that were pure net players; a kind of business model designed specifically for the purpose of buying and selling to consumers online. Many variations of the application came into being like eretailing, consumer portals, bidding and auctioning and electronic bill payment. E-Business: In this stage of e-commerce evolution, business started focusing on B2B applications that allow transactions and interactions between the company and its business customers partners over the Internet. Some of the unique applications of this phase include customer relationship management (CRM), virtual market places and extended value chain. E-enterprise: In an e-Enterprise, the whole value chain from procurement of raw materials on the supply side to consumer retailing and customer management on the demand side happens by combining the traditional brick-and-mortar assets with efficiency of cyber mediation. Fundamentally an e-Enterprise aims at engineering and reengineering inward and outward facing business processes by leveraging unique strengths offered by the net.
Dept of CSE
2011-12
Dept of CSE
2011-12
Ecommerce Administration:
On-Screen help is available for most functions. Easily manage Products, Categories, Options, Customers, Shipping, Locations, Orders and much more. Upload Product Images from your browser to your web server. Store shipping rates are calculated by order weight and/or price. The amount charged for shipping can be calculated via fixed price or percentage. Ability to assign Free Shipping to an individual product. Dept of CSE
6 2011-12
Activate/Deactivate individual customers. Manage your orders from an intuitive screen. Order stock levels can be adjusted when the order ships. Add private comments to each order, or comments that the customer can also see. Statistical Charting tool. Emails sent to customer via the store can be customized to suit your requirements. Dynamic replacement of text can also be done.
Ecommerce Technical:
ASP/ VBScript based software comes with full source code. No additional components needed for core functions. Runs on IIS 4.0/5.0 and PWS with Database support for MS Access 97/2000, SQL Server 7.0/2000. Built-in support for 5 of the most popular email components. Database based cart, from start to finish. Admin tool comes with several troubleshooting tools to help novice users track down web server configuration errors. Skinnable design allows for enormous flexibility in changing the look and feel of your store, without impacting future upgrades. Separate customizable language file for the front-end of your store allows you to present the front-end to your customers in the language of your choice. Newsletters to your customers directly from your store.
Dept of CSE
2011-12
Email a Friend" functionality allows customer to send a link to a Product via email. Convenient Order Print function from the customer's account area. Advanced search function. Contact us" script to send queries via email from your store. "Save Cart" functionality. See shipping estimates before checkout.
Dept of CSE
2011-12
communications lines without human handling. Documents representing purchase orders, invoices, and so on are encoded and transmitted between computers belonging to business. Businesses that engage in EDI with each other are called Trading Partners. Quiet early business realized that many of the documents they exchange with others, such as invoice, purchase orders, bills of lading, and many more included same set Dept of CSE
9 2011-12
of information for almost every transaction. Business also realized that it was spending a great deal of time and money entering these data into computers, printing paper forms, and re-entering the same data on the other side of transaction. Even though purchase order, invoice, and the bill of lading for each transaction contained much the same information, such as item names, quantities, descriptions, and so on-each paper form had its own unique format for presenting that information. By creating a set of standard for transmitting that information electronically, businesses were able to reduce errors, avoid printing and mailing costs, and eliminate the need to repeated data entry. EDI is the exchange of well-defined business transactions in a computer process able format. EDI provides a collection of standard message format to exchange data between companies computer via any electronic media. United Nations/electronic data interchange for Administration, commerce, and transport (UN/EDIFACT) standard for messages was developed under the United Nations. EDI covers such regular business facets as enquiries, planning, purchasing, acknowledgements, pricing, order status, scheduling, test results, shipping and receiving, invoices, payments and financial and business reporting. Additional standards cover industry specific requirements like in Financial EDI or FEDI that is used by banking industry. One serious drawback of EDI is the high upfront cost of implementation. For long time, using EDI infrastructure means establishing direct networks connections using dedicated telephone lines to all trading partners. Another way for small players is to subscribe to service provider called VAN (Value-Added Network). A value added network is third party that offers connection and EDI transaction forwarding services to buyers and sellers engaged in EDI.
Dept of CSE
10
2011-12
Bluetooth-facilitated e-commerce:
The functional characteristics of Bluetooth feed directly into the ability of the technology to transform existing forms of e-commerce and to develop new ones. Ecommerce without wires could look very different to the situation prevailing today: Before Bluetooth and penetration of the mobile Internet, as we know it today; and, Where Bluetooth becomes a key mode of SRW data exchange and mobile data.
Dept of CSE
11
2011-12
In the current situation prior to widespread Bluetooth and mobile device use, users are usually obliged to access networks through wired connections on their coputers at work, at home or though ad hoc facilities (e.g. a cyber caf). The networks used to conduct electronic commerce typically include the Internet, intranets and extranets, with possible use of, for example, local area networks (LANs), wide area networks (WAN s), value added networks (VAN s), or virtual private networks (VPN s). Through the network, services may be accessed from remote networked computers and devices, such as those on the Internet, or from more local computers and devices, such as those within an organizations LAN. The basic e-commerce activities offered include those of sharing information, communicating, trading, and distributing products between consumers and organizations and even between consumers. In the situation where Bluetooth-enabled mobile devices become pervasive, a very different model of e-commerce is likely to emerge. The functional characteristics of Bluetooth afford a new mode of access without wires. The user with a mobile Bluetooth device can access any other compatible devices on Bluetooth networks within range. These networks can appear in many different locations than has traditionally been the case for ad hoc computer networking, including homes, airports, aircrafts, motor vehicles, ATM s. hotels, shopping malls and other public infestations . Bluetooth network can even be created ad hoc by devices being brought together in a new location, e.g. at a business conference. Moreover, each separate Bluetooth network can be linked to a wired network, such as the Internet, opening the door to full e-commerce capability via the short range device, expanding the potential for informing, communicating, trading, and product and service distribution by connection to other computers or devices, whether connected via Bluetooth or not. In a situation where the businessperson is in a car, an in-vehicle network based on Bluetooth could allow connectivity of personal devices; using a mobile phone as the WAN connection, the employee could connect to the Internet or corporate intranet to receive information such as e-mail (Miller 2000). Voice recognition and Bluetooth headsets could automate this even further.
Dept of CSE
12
2011-12
Microsoft and five Japanese companies recently agreed to develop software for embedded wireless in the automobile industry, enabling in-car computers capable of hands-free communication access to the Internet, and instant summoning of emergency services or roadside assistance. Within an aircraft, subway or rail train device connectivity provides similar benefits. Plane manufacturers such as Boeing have already invested large sums in developing sophisticated in-flight entertainment and wok systems. Here, connectivity can be provided for gaming, collaboration with fellow passengers, email and web access alternatively, offline data transfer can be used; every time the user passes near an infestation , such as in the airport, selected information is transferred. Unlike traditional e-commerce, which has tended to focus on remote services, Bluetooth e-commerce (b-commerce) further enables interaction close physical proximity. It thus has a much greater potential impact on the day-to-day physical activity of the roaming user than traditional e-commerce.
Dept of CSE
13
2011-12
B-commerce telemetry:
In the utilities industry Bluetooth meters installed at customers homes connected to a wired hub have the potential to be read remotely. This saves considerable cost and information can be used to create more advanced differential pricing structures, based on the fuller understanding of the demand for resources and cost of supply.
B-commerce alerts:
With widespread Bluetooth access, the roaming phone user can be provided with information, alerts or even advertisement based on the location. An alert could inform the user of a security threat in a certain part of the city, or information could be given on an exhibition outside an art gallery.
E-SERVICE
The Internet customer service, also called e-service, works by shifting repetitive customer inquiries from a live incoming question allows CRSs to quickly handle the remaining few needing live assistance. E-service includes taking orders transparently, putting them into fulfillment, replacing them from inventory, moving them through shipping, and touches the accounts receivable lines and the financial lines. Since repeat visitors are the key to any websites success, it is crucial to keep them from going astray. This means that the website needs to act like the best customer service employeeresponsive, knowledgeable, accurate and ready to help any time of the day or night. Good, up-to-date information needs to be easily accessible. This empowers customers to help themselves; that is, find immediate answers to their questions on the website.
of the fingerprint includes several unique features in terms of ridge bifurcations and ridge endings, collectively referred to as minutiae. The next step is to locate these features in the fingerprint image using an automatic feature extraction algorithm. Each feature is commonly represented by its location and the ridge direction at that location. However, due to sensor noise and other variability in the imaging process, the feature extraction stage may miss some minutiae and may generate spurious minutiae. Furthermore, due to elasticity of the human skin, the relationship between minutiae may be randomly distorted from one impression to the next. In the final stage, the matcher subsystem attempts to arrive at a degree of similarity between the two sets of features after compensating for the rotation, translation and scale. Fingerprint verification is a good choice for in-house systems.
Face Recognition
Face recognition analysis facial characteristics. An image of a persons face is stored digitally when the person opens an account. At each transaction, a tiny camera feeds a live image of the person to the database, which compares the image to the one stored in and to the account figure. The most famous early e.g. of a face recognition system is that of Keuvo Kohonen of the Helsinki University of Technology.
Optical Recognition
The two common types of optical biometrics are the retina and iris. Retina and iris biometric devices are more accurate than fingerprint and hand biometric devices because both the retina and iris have more characteristics to identify and match than those found on the hand. A retina-based biometric involves analyzing the layer of blood vessels situated at the back of the eye. It involves using a low intensity light source through an optical coupler to scan the unique pattern of the retina. An iris-based scan on the other hand involves analyzing features found in the colored ring of tissues that surround the pupil. The iris code is calculated using the eight circular bands that have been adjusted to confirm to the iris and pupil boundaries and a 512-byte code is generated. Iris codes derived from this process are compared with the previously generated iris codes.
Dept of CSE
16
2011-12
Voice Authentication
Voice authentication products create a voice print based on the inflection points of the speech, emphasizing the highs and lows, specific to the way of talking. Voice authentication is not based on voice recognition but on voice to print authentication. Vector quantification is used to classify the audio sequence.
Keystroke Recognition
This concept is based on the current password system and adds an extra dimension of keystroke dynamics. An intruder must know the correct password as well as replicate the rate of typing interval between the letters to gain access to the information.
Signature Recognition
Signature verification analyses the way a user signs his name. Signing features such as speed, velocity and pressure are as important as the finished signature s static shape. Signature recognition operates in a three-dimensional environment where height , width and depth of pen stroke are measured. Its Applications are: e-commerce uses Covert surveillance Drivers license Immigration Airport security Welfare
Dept of CSE
17
2011-12
E-COMMERCE SECURITY
Support for SSL, including most "shared" SSL certificates. Encryption of Passwords and Credit Card numbers in the database. Robust user input validations throughout the store to trap possible SQL string hacks. Critical information (such as the RC4 key) is kept separate from the database. Assign additional login to the admin for staff that can't modify the stores configuration settings.
Merits:
Increased customer satisfaction-customers get answers faster. Reduced costs-the cost of delivery self-help via a knowledge base on the Internet is significantly less than a human answering an e-mail or phone. Increased revenue the right information at the right time means more orders. Reduce shopping cart abandonment. Retain more customers. We can base campaigns on facts rather than on opinions.
Demerits:
Security: the security still remains a major fact that needs a lot of attention. The data not secure totally. Data mismanagement.
Dept of CSE
18
2011-12
CONCLUSION
E-commerce is a technology-induced market. E-commerce technologies enable enterprises to exchange information instantaneously, eliminate paper work and advertise their products and service range to global market. E-commerce covers inter and inter company Operations. E-commerce is growing at a very fast rate with new technologies like Bluetooth, Biometrics. E-commerce has reduced the amount of information to be transferred as well as time and money considerably. E-commerce has played a vital role in the field of business and customer satisfaction but still needs a secure environment. Besides, the demerits people still prefer e-commerce. Thus, at this point of time we would like to say that e-commerce requires an overall improvement in terms of security.
Dept of CSE
19
2011-12
REFERENCES
Wilson Swapna Veldanda Chakravarty Borah S. S. Thatte Stuart J. Barnes
Dept of CSE
20
2011-12