E-Commerce Unit-2

E-Commerce Notes
Unit-2
Lecture-1
Security Issues in E-Commerce Transactions
Ø Authentication:- Authentication ensures that the origin of an electronic message is correctly identified. This means having the capability to determine who sent the message and from where or which machine. Without proper authentication, it will be impossible to know who actually placed an order and whether the order placed is genuine or not.
Ø Non-Repudiation:- Non-Repudiation is closely related to authentication and this ensures that the sender cannot deny sending a particular message and the receiver cannot deny receiving a message.
Ø Access Control:- If access control is properly implemented, many other security problems like lack of privacy will either be eliminated or mitigated. Access control ensures only those that legitimately require accesses to resources are given access and those without valid access cannot have access.
Ø Confidentiality or Privacy:- Privacy ensures that only authorized parties can access information in any system. The information should not be distributed to parties that should not receive it. Issues related to privacy can be considered as a subset of issues related to access control.
Ø Integrity:- Integrity ensures that only authorized parties can make changes to the documents transmitted over the network.

Secure Electronic Transaction (SET)
v Secure Electronic Transaction (SET) is an open protocol which has the potential to emerge as a dominant force in the security of electronic transactions.
v Jointly developed by Visa and MasterCard, in conjunction with leading computer vendors such as IBM, Microsoft, Netscape RSA, and GTE.
v SET is an open standard protocol for protecting the privacy and ensuring the authenticity of electronic transactions.


Functions of SET
§  Provide confidentiality of payment and ordering information.
§  Ensure the integrity of all transmitted data.
§  Provide authentication that a card holder is a legitimate user of a credit card account.
§  Provide authentication that a merchant can accept credit card transactions through its relationship with a financial institution.
§  Ensure the use of best security practices and system design techniques to protect all legitimate parties in an electronic commerce transaction.
§  Create a protocol that neither depends on transport security mechanisms nor prevents their use.
§  Facilitate and encourage interoperability among software & network providers.

Participants in the SET system

Scope of SET
1.     Motivated by the large amount of unsecured credit-card based transactions on the Internet.
2.     Network payments treated in a similar way to Mail Order/Telephone Order (MOTO) transactions.
3.     SET applies only to the ‘front end’ of payment no need to change the ‘back end’.
4.     SET only addresses Payment - other protocols for shopping, payment method selection etc. will be developed by others.

Secure Socket Layer (SSL)
v  SSL is a protocol developed by Netscape for transmitting private documents via the Internet.
v  SSL uses cryptographic system that uses two keys to encrypt data a public key known to everyone and a private or secret key known only to the recipient of the message.
v  The SSL provides end-to-end secure data transmission between the web server and the web client.
v  It is sandwiched between the TCP/IP and the application layer.
v  Unlike TCP/IP that offers only reliable packet transfer, SSL ensures secure packet transfer.
How SSL works?
The SSL performs two functions-it authenticates the websites and ensures secure data transmission between the web server and the client.
It achieves this either by using symmetric encryption or asymmetric encryption.
In symmetric encryption, a key called the private key is used both for encrypting and decrypting the data. For symmetric encryption to work, the sender & receiver should share the private key. This is possible only when the sender & receiver know each other.
In asymmetric encryption, two separate keys are used to encrypt & decrypt data. The public key is shared with the other person and the private key is known only to the person who decrypts the data. So, the private key will remain a secret while the public key will be known to both the parties.


















E-Commerce Notes
 Unit-2
Lecture-2
Cryptography
Cryptography is the process through which the messages are altered so that their meaning is hidden from adversaries who might intercept them.

Plain text is a message readable by anyone. Cipher text is plain text that has been modified to protect its secrecy.
Encryption converts plain text to cipher text; Decryption converts cipher text to plain text.
Cryptography addresses the principles, means and methods used to disguise information in order to ensure its authenticity”.
Cryptography is used to achieve:-
·        Confidentiality: only authorized persons can access information.
·        Integrity: information that was sent is what was received.
·        Authentication: guarantee of originator of electronic transmission.
·        Non-repudiation: originator of information cannot deny content or transmission.
Types of Cryptography:-
Ø Private Key Cryptography
Ø Public Key Cryptography
Private Key Cryptography
In private-key cryptography, the sender and receiver agree beforehand on a secret private key. The plain text is somewhat combined with the key to create the cipher text. The method of combination is such that, it is hoped, an adversary could not determine the meaning of the message without decrypting the message, for which he needs the key.
Private-key methods are efficient and difficult to break. However, one major drawback is that the key must be exchanged between the sender and recipient beforehand, raising the issue of how to protect the secrecy of the key.



Public Key Cryptography
In public-key cryptography, two separate keys are used to encrypt & decrypt data. The public key is shared with the other person and the private key is known only to the person who decrypts the data. So, the private key will remain a secret while the public key will be known to both the parties.
Public-key cryptography depends upon the notion of one-way functions: a one way function is a function that is easy to apply, but extremely difficult to invert.


Digital Signature
A digital signature is an electronic signature that can be used to authenticate the identity of the sender of a message or the signer of a document, and possibly to ensure that the original content of the message or document that has been sent is unchanged.
Digital signature is a computer data compilation of any symbol or series of symbols, executed, adopted or authorized by an individual to be legally binded equivalent to the individual’s handwritten signature
v  A digital signature authenticates electronic documents in a similar manner a handwritten signature authenticates printed documents.
v  A digital signature is issued by a Certification Authority (CA) and is signed with the CA’s private key.
v  The recipient of a digitally signed message can verify that the message originated from the person whose signature is attached to the document and that the message has not been altered either intentionally or accidentally since it was signed. Also the signer of a document cannot later disown it by claiming that the signature was forged.
v  When a message with a digital signature is transmitted & received, the following parties are involved:-
Ø The signer who signs the document.
Ø The verifier who receives the signed document & verifies the signature.
Ø The arbitrator who arbitrates any disputes between the signer & the verifier if there is a disagreement on the validity of the digital signature.
v  A digital signature typically contains the Owner’s public key, the Owner’s name, Expiration date of the public key, the name of the issuer (the CA that issued the Digital ID), Serial no. of the digital signature and the digital signature of the issuer.
v  Digital signatures are based on a combination of public key encryption and one way hash function that converts a message of any length into a fixed length message digest known as hash function. The value of hash function is unique for the hashed data. Any change in the data, even deleting or altering a single character, results in a different value. The content of the hash data cannot be deduced from hash which is why it is called ‘one way’. The encrypted hash, along with other information, such as hashing algorithm is known as digital signature.




E-Commerce Notes
 Unit-2
Lecture-3
Virtual Private Network
Ø A Virtual private network (VPN) extends a private network across a public network, such as the internet.
Ø It enables a computer to send and receive data across shared or public networks as if it were directly connected to the private network.
Ø This is done by establishing a virtual point-to-point connection through the use of dedicated connections, encryption or a combination of the two.
Ø VPN allows employees to securely access their company’s intranet while travelling outside the office.
Ø Similarly, VPNs securely and cost effectively connect geographically disparate offices of an organization, creating one cohesive virtual network.
Ø VPN technology is also used by ordinary Internet users to connect to proxy servers for the purpose of protecting one’s identity.


Types of VPN:
·           Remote Access VPN
·           Site-to-Site VPN

Ø  Remote Access VPN:- Remote access VPNs allow employees to access their company’s intranet from home or while travelling outside the office.

Ø  Site-to-Site VPN:- Site-to-Site VPN allow employees in geographically disparate offices to share on cohesive virtual network.

VPN systems may be classified by:-
·        The protocols used to tunnel the traffic.
·        The tunnel’s termination point location.
·        Whether they offer site-to-site or remote access connectivity.
·        The level of security provided.

VPN Architecture
There are two basic VPN architectural choices:-
Ø   Service provider independent VPN
Ø   Service provider dependent VPN

·              Service provider independent VPN:- In a service provider independent solution, a VPN enabled client(such as a desktop or laptop) initiates the tunnel through the public network to the central site. To access the computer network, the client first establishes a PPP (Point-to-Point protocol) session to a local Internet Service Provider (ISP) for internet access. The client then connects across the Internet to the central site and establishes a tunnel to carry the data traffic. To the ISP the tunnel is simply data, and there is no requirement for processing.
Advantage:
The advantage to the corporation is that it can use any Point of Presence (POP) anywhere in the world, as long as it provides Internet access. In addition, since the tunnel is initiated at the location of the client, the client can travel with the same ease as carrying a laptop.

Disadvantage:
The disadvantage of this solution is that the client must be VPN enabled. This could be prohibitively expensive to deploy for a large no. of remote users.

·              Service provider dependent VPN:- With a service provider dependent VPN model, the corporation enters into an agreement with a service provider such as an ISP. The corporation user dials into a local POP with a PPP client, and the tunnel session is initiated at the POP. The crucial difference is that the client can be any PPP client.

Advantage
This arrangement can be combined with quality of service agreements to guarantee a level of VPN performance, although few service providers offers true guarantees today. Another advantage is that no additional skills are required by the user to execute a tunnel to the company LAN.

Disadvantage
Data security is critical because VPN encryption does not occur until the POP, thus leaving the enterprise communication unprotected between the remote PC and the POP.

VPN Security
v To prevent disclosure of private information, VPNs typically allow only authenticated remote access and make use of encryption techniques. VPN provides security by the use of tunneling products and through security procedures such as encryption.
v The VPN security provides:
·           Confidentiality
·           Authentication
·           Integrity

v VPNs ensure privacy by providing a private tunnel through the internet for remote access to the network. For full VPN security, your VPN must be enhanced with a reliable user authentication mechanism, protecting end points of the VPN.

v Username and password authentication is not enough-this method is weak and highly susceptible to hacking, cracking, key loggers and other attacks. It only takes one compromised password for your organization to lose control over gains network access. Strong user authentication with a VPN provides true secure remote access for today’s mobile workforce.






E-Commerce Notes
Unit-2
Lecture-4
Types of Security Attacks
v Passive Attack
v Active Attack

Ø  Passive Attack: In Passive attack a network intruder intercepts data travelling through the network. A passive attack monitors unencrypted traffic. Passive attacks include traffic analysis, monitoring of unprotected communications, capturing authentication information such as passwords.

Types of Passive Attacks:

a)     Wire Tapping or Telephone Tapping: Telephone tapping is the monitoring of telephone and internet conversations by a third party. Passive wire tapping monitors or records the traffic.

b)    Port Scanner: A port scan can be defined as an attack that sends client requests to a range of server port addresses on a host, with a goal of finding an active port and exploiting a known vulnerability of that service.

c)     Idle Scan: The idle scan is a TCP port scan method that consists of sending spoofed packets to a computer to find out what services are available. This is accomplished by impersonating another computer called a “zombie” and observing the behavior of the “zombie” system.

Ø Active Attack: In active attacks intruder initiates commands to disrupt the network’s normal operation. In an active attack, the attacker tries to bypass or break into secured systems. This can be done through viruses or worms. Active attacks include attempts to break protection features to introduce malicious code, and to steal or modify information.

Types of Active Attacks

a)     Denial-of-service Attack (Dos): Denial of service attack is an attempt to make a machine or network resources unavailable to its intended users. It generally consists of efforts to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet. One common method of attack involves saturating the target machine with external communication requests, so much so that it cannot respond to legitimate traffic or responds so quickly as to be rendered essentially unavailable. Such attacks usually lead to a server overload.

b)    Spoofing attack: A spoofing attack is when a malicious party impersonates another device or user on a network in order to launch attacks against network hosts , steal data, spread malware or bypass access controls.

c)     Man-in-the-middle attack: The man-in-the middle is a form of active eves dropping in which the attacker makes independent connections with the victims & relays messages between them, making them believe that they are talking directly to each other over a private connection, while in fact the entire conversation is controlled by the attacker. The attacker must be able to intercept all messages going between the two victims & inject new ones.

d)    SQL injection: Sql injection is a code injection technique, used to attack data driven applications, in which malicious SQL statements are inserted into an entry field for execution.

Difference between Computer Virus and Computer Worm
Sno.
Computer Virus
Computer Worm
1.
It cannot be controlled remotely.
It can be controlled remotely.
2.
It deletes, modifies the files and also change the location of file.
It only monopolies the CPU & memory.
3.
It is slower than worm
Worm is faster than virus.
4.
The virus is the program code that attaches itself to application program and when application program run it runs along with it.
The worm is code that replicate itself in order to consume resources to bring it down.







E-Commerce Notes
 Unit-2
Lecture-5
Intranet
Intranet Software enables an organization to securely share it's information or operations with it's members. It enables the efficient use and more importantly reuse of an organization's gathered business knowledge and intelligence, which increases productivity and knowledge transfer in any organization. Increasingly, extranets are also coming into use, where external partners, customers can also interact with an organization. E.g. ERP software that provides a centralized repository of information for massive amount of transaction and details generated daily.
The cost of converting an existing client-server network to an intranet is relatively low, especially when a company is already using the Internet.

Applications of Intranet:
The most popular intranet application is obviously:
1.      Inter-office e-mail, this capability allows the employees of a company to communicate with each other swiftly and easily. If the intranet has access to the Internet, e-mail can be accessed through the Internet connection. If the intranet is running without the Internet, special e-mail software packages can be bought and installed so that employees can take advantage of its many benefits.
2.     An intranet has many other different applications that can be utilized by a company. These include the Web publishing of corporate documents, Web forms, and Web-to-database links that allow users to access information.
3.     Newsletters, information on benefits, job listings and classifieds, libraries, stock quotes, maps, historical data, catalogs, price lists, information on competitors' products, and customer service data are just a few examples of these types of applications.
In addition, there are several other main applications that is very popular in the intranet format:-
1.     Document publication applications
The first application that always comes to mind for intranets in and of themselves is the publication and distribution of documents. This application allows for paperless publication of any business information that is needed for internal employees or external customers or suppliers. Any type of document may be published on an intranet: policy and procedure manuals, employee benefits, software user guides, online help, training manuals, vacancy announcements--the list goes on to include any company documentation.

2.     Electronic resources applications
In the past it has not been easy to share electronic resources across network nodes. Employees have had problems sharing information for various reasons including software version inaccuracies and incompatibilities. Intranets provide the means to catalog resources online for easy deployment across the network to any authorized user with the click of a mouse. Software applications, templates, and tools are easily downloaded to any machine on the network.

3.     Interactive communication applications
Two-way communications and collaboration on projects, papers, and topics of interest become easy across the intranet. Types of communications that are enhanced and facilitated include e-mail, group document review, and use of groupware for developing new products.

4.      Support for Internet applications
Even though organizational full-service intranets are the next step in enterprise-wide computing and have enough value to make them desirable simply for the organizational benefits they bring, they are also necessary for supporting any Internet applications that are built.
The transactional processes and trading of information that will be done by all but the most elementary Web applications will require an infrastructure to store, move, and make use of the information that is traded. The infrastructure to accomplish those tasks is the organizational intranet.


Generic Functions of Intranet:
                                           
Major generic functions that intranet can provide are:
·        Corporate/ department/ individual WebPages: Access the web- pages of corporate, departments and individual.
·        Database access: Web- based database.
·        Search engines and directories: It assists the keyword- based search.
·        Interactive communication: chatting, audio and videoconference.
·        Document distribution and workflow: web- based download and routing of documents.
·        Groupware: E-mail and bulletin board.
·        Telephony: intranet is the perfect conduit for computer-based telephony.
·        Extranet: linking geographically dispersed branches, customers and suppliers to authorized sections of intranets creates happiest customers, more efficient suppliers, and reduced staff cost.
Considerations in Intranet Deployment:
1.     Collections of web links
2.     Company news and department newsletters
3.     Organization charts
4.     Manuals, documentation, policies
5.     Basic collaboration tools (groupware)
6.     Directory services (gateway to phone and other staff contact info)
7.     Human resources information
8.     Threaded discussions on current company topics/issues
9.     Web–based email access
10.                        Web–based discussion list management and participation
11.                        Access to company databases — sales, inventory, pricing
12.                        Calendaring (company–wide events calendar)
13.                        Scheduling (meetings, personal scheduling)
14.                        Document management
15.                        Search engine of company documents
16.                        Employee time logging
17.                        Employee expense reporting
18.                        Forms to help automate other business processes – work orders, job descriptions, mileage, maintenance requests, etc.
Intranet Application Case Studies:
Now, let us investigate some typical application case in depth, including their return on investment (ROI).
Intranet Case studies with ROI Analysis:
The need for accountability and for clear measures of success is increasingly demanded for all corporate expenditures, including intranets. If you are responsible for an intranet, you need to know how build a business case and develop a return on investment (ROI) strategy.

Intranet ROI

Intranets and corporate portals are expensive endeavors. Despite the expense, many organizations understand the implicit and/or explicit value. Intranets are widely valued for:
  • Streamlining business processes and driving operational efficiencies
  • Significantly reducing cost of internal business functions
  • Enhancing communications and collaboration between employees, managers, suppliers and partners
As with any critical business system, an intranet or portal must be delivering measurable performance and remain accountable to the investment. If the site’s value is not being measured, then it risks failing the needs and demands of employees and management.
When asked how executives determine whether an intranet or portal is delivering value, they typically point to reducing costs and improving productivity.
Of course, IT budgets are increasingly tied to company-wide business and strategic initiatives. The cost justification for any expenditure, including IT must have a clear bottom line that answers the question, “What’s the payback?”
In recent years, business challenges and subsequent solutions/applications have been the driving force behind intranet investments. They will continue to play this role in the future.
Executives will make investments in intranets and portals (see defining in the adjacent glossary) if such investments spur growth, cut the cost of operations, and/or help enhance the customer experience (retaining and building the customer base).
The challenging economic climate of the past few years means that more and more organizations will allocate dollars to IT systems and applications that can demonstrate a measured solution and ROI to a business problem or provide enhanced service and growth.
Short Intranet Application Cases
Prescient Digital Media is a veteran web and intranet consulting firm. It provides strategic Internet and intranet consulting, planning and design services to many Fortune 500 and big brand clients, as well as small and medium-sized leaders. It treat each client as unique; It  listen to their needs, goals and challenges; understand a client's requirements and potential; and deliver highly effective and innovative website and intranet plans, designs and solutions.
 ROI Study Of the respondents to the Prescient Digital Media ROI survey that undertake ‘rough estimates’ of their organization’s intranet, answers varied from $0 to $20M. The average annual ROI of respondent intranets fell just shy of $1 million ($979,775.58).
While less than 20% of organizations have measured specific benefits, a majority of organizations have at the very least made a ‘rough estimate’ or guess of the value of their ROI. While only a handful of technology companies measured intranet ROI three years ago, there are encouraging signs of change. A recent study, conducted by Prescient Digital Media Ltd., finds that 6% of organizations undertake ongoing, specific measurement of the ROI of their intranet. Occasional measurement is undertaken by 26% of the respondent organizations.
While extensive ROI measurement has not yet become mandatory at a majority of organizations with intranets, ROI is a priority in 76% of the survey respondents. Rather than attempt to measure the intranet or portal’s entire value, those companies that are successfully gauging value are measuring specific benefits. This paper lists intranet benefits in 10 key categories – including hard costs, increased revenue, etc. – with two supporting categories: content management and procurement.
The precision, scope of work and execution required to build and maintain a successful intranet or portal is massive – from governance to content management, and from technology to business processes. At the heart of a successful intranet is the strength of the underlying plan. Failure to develop an integrated plan that accounts for an organization’s structure, stakeholder, and user requirements will almost certainly ensure failure and, with it, a loss of significant time, money and jobs.
Finally, while appraising the ROI of an intranet or portal is critical for most executives, there exists a great deal of untapped, intangible value that is perhaps even more critical than the measured dollars and cents. When properly deployed, intranets improve communication and collaboration and improve employee satisfaction, which in turn can improve productivity. All benefits are clearly important to any organization, but not always a measurable ROI.
Share Knowledge Among Corporate Employee
Intranets offer several facilities that aid knowledge sharing:
Easy-to-access and use: The use of World Wide Web (WWW) browsers give a low cost and easy-to-use interface to information and applications
Universal access to information: Information can be kept on any 'server' on the network, and can be accessed from anywhere within the Intranet.
Person-to-person interaction: Intranets simplify interaction between people in different locations, through electronic mail, and computer conferencing
Informal networks: Publishing information and making contact is quick and informal on an Intranet.
Scalable networks: As organizations restructure, it is easy to add or remove servers to the overall network.
Access to external information and knowledge: Intranets usually have gateways to the external Internet, which give access to a rapidly growing global information resource


E-Commerce Notes
 Unit-2
Lecture-6
Firewall
v Firewall is software or hardware based network security system that controls the incoming and outgoing network traffic by analyzing the data packets and determining whether they should be allowed through or not, based on a rule set.
v A firewall establishes a human barrier between a trusted, secure internal network & another network that is not assumed to be secure and trusted.
v Many personal computer operating systems include software-based firewalls to protect against threats from the public Internet. Many routers that pass data between networks contain firewall components and conversely many firewalls can perform basic routing functions.




Types of Firewall
Ø Network Layer or Packet Filters Firewall
Ø Application Layer Firewall
Ø Proxy Firewall
Ø Unified Threat Management(UTM)
Network Layer or Packet Filters Firewalls
Network layer firewalls, also called packet filters, operate at a relatively low level of the TCP/IP protocol stack, not allowing packets to pass through the firewall unless they match the established rule set.
A simple router is the traditional network layer firewall, since it is not able to make particularly complicated decisions about what a packet is actually taking to or where it actually came from. Modern network layer firewalls have become increasingly more sophisticated & now maintain internal information about the state of connections passing through them at any time.

Application Layer Firewalls
Application layer firewalls work on the application level of the TCP/IP stack, and may intercept all packets traveling to or from an application. They block other packets (usually dropping them without acknowledgement to the sender).
On inspecting all packets for proper content, firewalls can restrict or prevent outright the spread of networked computer worms and Trojans.
Proxy Firewalls
Proxy firewalls offer more security than other types of firewalls. Unlike application layer firewalls which allow or block network packets from passing to and from a protected network, traffic does not flow through proxy. Instead computers establish a connection to the proxy which serves as an intermediary and initiate a network connection on behalf of the request. This prevents direct connections between systems on either side of the firewall and makes it harder for an attacker to discover where the network is, because they will never receive packets created directly by their target system.
Unified Threat Management
A product category called unified threat management (UTM) has emerged. These device promise integration, convenience & protection from pretty much every threat out there and are especially valuable to small & medium-sized businesses.
Unified Threat Management is a firewall appliance that not only guards against intrusion but performs content filtering, spam filtering, intrusion detection & anti-virus duties traditionally handled by multiple systems. These devices are assigned to combat all levels of malicious activity on the computer network.



E-Commerce Notes
 Unit-2
Lecture-7
Electronic Payment Systems
Electronic Payment is a financial exchange that takes place online between buyers and sellers. The content of this exchange is usually some form of digital financial instrument (such as encrypted credit card numbers, electronic cheques or digital cash) that is backed by a bank or an intermediary, or by a legal tender.
The various factors that have lead the financial institutions to make use of electronic payments are:
1.     Decreasing technology cost:
The technology used in the networks is decreasing day by day, which is evident from the fact that computers are now dirt-cheap and Internet is becoming free almost everywhere in the world.
2.     Reduced operational and processing cost:
Due to reduced technology cost the processing cost of various commerce activities becomes very less. A very simple reason to prove this is the fact that in electronic transactions we save both paper and time.
3.     Increasing online commerce:
The above two factors have lead many institutions to go online and many others are following them.
There are also many problems with the traditional payment systems that are leading to its fade out. Some of them are enumerated below:
1.     Lack of Convenience:
Traditional payment systems require the consumer to either send paper cheques by snail-mail or require him/her to physically come over and sign papers before performing a transaction. This may lead to annoying circumstances sometimes.
2.     Lack of Security:
This is because the consumer has to send all confidential data on a paper, which is not encrypted, that too by post where it may be read by anyone.
3.     Lack of Coverage:
When we talk in terms of current businesses, they span many countries or states. These business houses need faster transactions everywhere. This is not possible without the bank having branch near all of the company’s offices. This statement is self-explanatory.
4.     Lack of Eligibility:
Not all potential buyers may have a bank account.
5.     Lack of support for micro-transactions:
Many transactions done on the Internet are of very low cost though they involve data flow between two entities in two countries. The same if done on paper may not be feasible at all.

Types of Electronic Payment System
1.    Electronic Tokens
An electronic token is a digital analog of various forms of payment backed by a bank or financial institution. There are two types of tokens:
·        Real Time: (or Pre-paid tokens) - These are exchanged between buyer and seller, their users pre-pay for tokens that serve as currency. Transactions are settled with the exchange of these tokens. Examples of these are DigiCash, Debit Cards, Electronic purse etc.
·        Post Paid Tokens – are used with fund transfer instructions between the buyer and seller. Examples – Electronic cheques, Credit cards etc.

2.    Credit Cards
·        A credit card is a small plastic card issued to users as a system of payment.

·        It allows its holders to buy goods & services based on the holder’s promise to pay for these goods and services.

·        Essentially a credit card allows you to:-
Ø Purchase products or services whenever and wherever you want, without ready cash and paying for them at a later date.
Ø Have an option of paying only a part of the total expenses. The balance amount can be carried forward, with an interest charged.
Ø Enjoying a revolving credit limit without any charges for a limited period (mostly 20 to 50 days).
Types of Credit Cards
1.        Standard Credit Card: The most common type of credit card allows you to have a revolving balance up to a certain credit limit. These credit cards have a minimum payment that must be paid by a certain due date to avoid late payments.
2.        Premium Credit Cards: These cards offer incentives and benefits beyond that of a regular credit card. Examples of premium credit cards are gold and platinum cards that offer cash back, reward points, travel upgrades and other rewards to cardholders.
3.        Charge Cards: Charge cards do not have a credit limit. The balance on a charge card must be paid in full at the end of each month. Charge cards do not have a minimum payment since the balance is to be paid in full. Late payments are subject to a fee, charge restrictions, or card cancellation depending on your card agreement.
4.        Limited Purpose Card: Limited purpose credit cards can only be used at specific locations. Limited purpose cards are used like credit cards with a minimum payment & finance charge. Store credit cards & gas credit cards are examples of limited purpose credit cards.
5.        Secured Credit Card: Secured credit cards are an option for those without a credit history or those with blemished credit. Secured cards require a security deposit to be placed on the card. The credit limit on a secured credit card is equal to the amount of the deposit made.
6.        Prepaid Credit Card: Prepaid credit cards require the cardholder to load money onto the card before the card can be used. The credit limit does not renew until more money is loaded onto the card. Prepaid cards are similar to debit cards, but are not tied to a checking account.
7.        Business credit card: Business credit cards are designed specifically for business use. They provide owners with an easy method of keeping business & personal transactions separate.
The Players

Before exploring the process of using credit card online, let’s identify the players in the credit card system. They are:

The card holder: a consumer or a corporate purchaser who uses credit cards to pay merchant.
The merchant: the entity that accept credit cards and offers goods or services in exchange for payments.
The card issuer: a financial institution (usually a bank) that establishes accounts for cardholders and issues credit cards.
The acquirer: a financial institution (usually a bank) that establishes accounts for merchants and acquires the vouchers of authorized sales slip.
The card brand: bank card associations of issuers acquires ( like Visa and MasterCard) which are created to protect and advertise the card brand, establish and enforce rules for use and acceptance of their bank cards and provide networks to connect the involved financial institutions. The brand authorizes the credit- based transaction and guarantees the payment to merchants. Sometimes the issuing bank performs the business of the brand.

The process of using credit card:

1.     Issue a credit card to a potential card holder.
2.     The cardholder shows the card to a merchant whenever he/she needs to pay for a product or services.
3.     The merchant then asks for approval from the brand company, and the transaction is paid by the credit. The merchant keeps a sales slip.
4.     The merchant sells the slip to the acquiring bank and pays a fee for the service. This is called the capturing process.
5.     The acquiring bank requests the brand to clear for the credit amount and gets paid. Then the brand asks for clearance to the issuer bank.
6.     The amount is transferred from issuer to brand. The same amount is deducted from the cardholder’s account in the issuing bank.

Advantages of Credit Cards:
Ø  They allow you to make purchases on credit without carrying around a lot of cash.
Ø  They allow convenient remote purchasing ordering/shopping online or by phone.
Ø  They allow you to pay for large purchases in small, monthly installments.
Ø  Many cards offer additional benefits such as additional insurance cover on purchases, cash back, air miles & discounts on holidays.
Ø  Under certain circumstances, they allow you to withhold payment for merchandise which proves defective.
Disadvantages of Credit Cards:
Ø You may become an impulsive buyer and tend to overspend because of the ease of using credit cards. Cards can encourage the purchasing of goods & services you cannot really afford.
Ø Lost or stolen cards may result in some unwanted expense & inconvenience.
Ø The use of large no. of credit cards can get you even further into debt.
Ø Using a credit card especially remotely introduces an element of risk as the card details may fall into the wrong hands resulting in fraudulent purchases on the cards. Fraudulent or unauthorized charges may take months to dispute, investigate and resolve.

3.    Smart Cards
Ø A smart card is a plastic card about the size of a credit card, with an embedded microchip that can be loaded with data.
Ø Smart cards are made of plastics generally polyvinyl chloride.
Ø Smart cards can provide identification, authentication, data storage & application processing.
Ø A smart card contains more information than a magnetic strip card and it can be programmed for different applications.
Ø Smart cards within the next five years will be the industry standard in debit and credit cards. As the major high street banks and finance houses are now investing in the changeover to smart card technology.
Ø You may use a smart card to:-
·        Establish your identity when logging on to an Internet access provider or to an online bank.
·        Pay for parking at parking meters or to get on subways, trains or buses.
·        Give hospitals or doctors personal data without filling out a form.
·        Make small purchases at electronic stores on the web.
Advantages of Smart Cards:
§  Greater Reliability
§  Storage Capacity is increased up to 100 times.
§  Smart cards are multifunctional.
§  The anticipated working life of a smart card is ten years compared to that of a magnetic strip card.

4.     Electronic Cheques
The electronic cheques are modeled on paper cheques, except that they are initialted electronically.
They use digital signatures for signing and endorsing and require the use of digital certificates to authenticate the payer, the payer’s bank and bank account.
Electronic checks allow merchants to convert paper check payments made by customers to electronic payments that are processed through  the Automated Clearing House (ACH).
How Electronic Cheques work:
When you receive a paper cheque payment from your customer , you will run the cheque through an electronic scanner system supplied by your merchant service provider. This virtual terminal captures the customer’s banking information and payment amount written on the cheque. The information is transferred electronically via the Federal Reserve Bank’s ACH Network, which takes the funds from your customer’s account & deposits them to yours.
Once the cheque has been processed & approved, the virtual terminal will instantly print a receipt for the customer to sign & keep.
Benefits of Electronic Cheques:
·        Secure and quick settlement of financial obligations.
·        Fast cheque processing
·        Very low transaction cost.

5.     Electronic or Digital Cash
A system that allows a person to pay for goods or services by transmitting a number from one computer to another.
Like the serial numbers on real dollar bills, the digital cash numbers are unique. Each one is issued by a bank & represents a specified sum of money.
Digital Cash combines computerized convenience with security and privacy that improve upon paper cash. Cash is still the dominant form of payment as: The consumer still mistrusts the banks. The non-cash transactions are inefficiently cleared. In addition, due to negative real interests rates on bank deposits.
Digital cash is based on cryptographic systems called "Digital Signatures" similar to the signatures used by banks on paper cheques to authenticate a customer.
 Some qualities of cash:
a.  Cash is a legal tender i.e. payee is obligatory to take it.
b.  It is negotiable i.e. can be given or traded to someone else.
c.   It is a bearer instrument i.e. possession is proof of ownership.
d.  It can be held & used by anyone, even those without a bank certificate.
e.  It places no risk on part of acceptor.
The following are the limitations of Debit and Credit Cards:
i.            They are identification cards owned by the issuer & restricted to one user i.e. cannot be given away.
ii.            They are not legal tender
iii.            Their usage requires an account relationship and authorization system.
Properties of Digital Cash
o    Must have a monetary value: It must be backed by cash (currency), bank authorized credit or a bank certified cashier’s check.
o    Must be interoperable or exchangeable: as payment for other digital cash, paper cash, goods or services, lines of credit, bank notes or obligations, electronic benefit transfers and the like.
o    Must be storable and retrievable: Cash could be stored on a remote computer’s memory, in smart cards, or on other easily transported standard or special purpose devices. Remote storage or retrieval would allow users to exchange digital cash from home or office or while traveling.

6.    Debit Cards
A debit card is a plastic payment card that provides the cardholder electronic access to his or her bank account at a financial institution.

Types of Debit Card Systems:
·        Online Debit or Pin Debit
·        Offline Debit or Signature Debit
Online Debit System: Online debit system requires electronic authorization of every transaction and the debits are reflected in the user’s account immediately. The transaction may be secured with the personal identification number (PIN) authentication system.
Offline Debit System: Offline debit system may be subject to a daily limit. Transactions conducted with offline debit cards, require 2-3 days to be reflected on user’s account balances.
Advantages of Debit Cards:
·        There is no need to carry cash
·        It is quick and less complicated than using a cheque.
·        It can be used for withdrawals of cash.
·        It can be issued to any individual without assessing credit worthiness.
·        Its holders can have a record of the transactions in his bank statement which will enable him to plan and control the expenditure.

7.    Electronic Wallet/Purse
A digital/electronic wallet refers to an electronic device that allows an individual to make electronic commerce transactions. This can include purchasing items on-line with a computer or using a smartphone to purchase something at a store.
Increasingly, digital wallets are being made not just for basic financial transactions but to also authenticate the holder's credentials. For example, a digital-wallet could potentially verify the age of the buyer to the store while purchasing alcohol.
It is useful to approach the term "digital wallet" not as a singular technology but as three major parts: the system (the electronic infrastructure) and the application (the software that operates on top) and the device (the individual portion).
An individual’s bank account can also be linked to the digital wallet. They might also have their driver’s license, health card, loyalty card(s) and other ID documents stored on the phone. The credentials can be passed to a merchant’s terminal wirelessly via near field communication (NFC). Certain sources are speculating that these Smartphone “digital wallets” will eventually replace physical wallets.
A digital wallet has both a software and information component. The software provides security and encryption for the personal information and for the actual transaction.

Typically, digital wallets are stored on the client side and are easily self-maintained and fully compatible with most e-commerce Web sites. A server-side digital wallet, also known as a thin wallet, is one that an organization creates for and about you and maintains on its servers. Server-side digital wallets are gaining popularity among major retailers due to the security, efficiency, and added utility it provides to the end-user, which increases their enjoyment of their overall purchase.

Advantages of Electronic Payment System
·        Decreasing Technology cost
The technology used in the networks is decreasing day by day, which is evident from the fact that computers are now dirt cheap and Internet is becoming free almost everywhere in the world.
·        Reduced operational and processing cost
Due to reduced technology cost the processing cost of various commerce activities become very less. A very simple reason to prove this is the fact that in electronic transactions we save both paper and time.
·        Increasing online commerce:
The above two factors have lead many institutions to go online and many others are following them.
Drawbacks or Risks in Electronic Payment System
Electronic payment is a popular method of making payments globally. It involves sending money from bank to bank instantly -- regardless of the distance involved. Such payment systems use Internet technology, where information is relayed through networked computers from one bank to another. Electronic payment systems are popular because of their convenience. However, they also may pose serious risks to consumers and financial institutions.
·        Tax Evasion
Businesses are required by law to provide records of their financial transactions to the government so that their tax compliance can be verified. Electronic payment however can frustrate the efforts of tax collection. Unless a business discloses the various electronic payments it has made or received over the tax period, the government may not know the truth, which could cause tax evasion.
·        Fraud
Electronic payment systems are prone to fraud. The payment is done usually after keying in a password and sometimes answering security questions. There is no way of verifying the true identity of the maker of the transaction. As long as the password and security questions are correct, the system assumes you are the right person. If this information falls into the possession of fraudsters, then they can defraud you of your money.
·        Impulse Buying
Electronic payment systems encourage impulse buying, especially online. You are likely to make a decision to purchase an item you find on sale online, even though you had not planned to buy it, just because it will cost you just a click to buy it through your credit card. Impulse buying leads to disorganized budgets and is one of the disadvantages of electronic payment systems.
·        Payment Conflict
Payment conflicts often arise because the payments are not done manually but by an automated system that can cause errors. This is especially common when payment is done on a regular basis to many recipients. If you do not check your pay slip at the end of every pay period, for instance, then you might end up with a conflict due to these technical glitches, or anomalies.






E-Commerce Notes
 Unit-2
Lecture-8
Extranet
·        Extranet is an extended intranet that connects multiple intranets through a secured tunneling internet.
·        Extranets act as a link to select individuals outside the company by allowing them access to the information stored inside the intranet.
·        Internet protocols are typically utilized by extranets so as to provide browser navigation even though the network is situated on a private server. A username and password system can be configured to sectors of the content so as to prevent users from accessing information they have no authorization for.


·        Extranets combine the privacy and security of intranets with the global reach of the internet, granting access to outside business partners, suppliers, and costumers to a controlled portion of the enterprise network. Extranets are becoming the major platforms for B2B EC replacing or supplementing EDI. They provide flexibility serving internal and external users.
Extranets generally have the following features:
Ø  The use of Internet technologies and standards. These include the standardized techniques for transmitting and sharing information and the methods for encrypting and storing information, otherwise known as the Internet Protocol, or IP.
Ø  The use of Web browsers. Users access extranet information using a web browser like Microsoft Internet Explorer, Netscape Navigator or, more recently, Mozilla’s Firefox. Browser software uses relatively small amounts of memory and resources on a computer. The great thing about browsers is that an application written for a browser can be read on almost any computer without regard to operating system or manufacturer. That makes an application developed for a browser a snap to deploy. A browser on a user’s machine is all the software he or she needs to take full advantage of the extranet application. No messy and confounding installation disks; fewer clogged hard drives.
Ø  Security. By their very nature, Extranets are embroiled in concerns about security. To protect the privacy of the information that is being transmitted, most Extranets use either secure communication lines or proven security and encryption technologies that have been developed for the Internet.
Ø  Central Server/Repository. Extranets usually have a central server where documents or data reside. Members can access this information from any computer that has Internet access.
While these are the broad attributes shared by most Extranets, Extranets vary dramatically in their design and implementation. They can be employed in a wide variety of environments and for very different purposes, like:
  • Sharing case information
  • Sharing of case-related documents—many Extranets contain document repositories that can be searched and viewed by both lawyer and client on-line
  • Calendaring—key dates and scheduling of hearings and trials can be shared on-line
  • Providing firm contact information
  • Acting as a “work flow engine” for various suppliers
  • Providing access to firm resources remotely
  • Sharing time and expense information.
Extranet applications Case
An extranet application is a software data application that provides limited access to your company's internal data by outside users such as customers and suppliers. The limited access typically includes the ability to order products and services, check order status, request customer service and much more.

A properly developed extranet application provides the supply chain connection needed with customers and suppliers to dramatically lessen routine and time consuming communications. Doing so frees up resources to concentrate on customer service and expansion as opposed to administrative office tasks such as data entry.

Just as intranets provide increased internal collaboration, extranets provide increased efficiencies between your company and its customers and/or suppliers. Developing and implementing an extranet application can provide you the competitive edge to stay ahead of the competition in the eyes of your customers and a better ability to negotiate prices with your suppliers.
Potential of Extranet Market
Internets are included in extranets, the forecasted potential of extranets is frequently combined with that of the intranets. According to a study by Gartner Group, Extranets are expected to be a platform of choice of more than 80 % of B2B EC. This increasing acceptance is expected to surpass B2C EC which is also expected to be conducted across intranets, by about 40 percent. Most of the B2C EC traffic will be done on the regular internet. However many companies, such as FedEx, will allow costumer to enter their intranets.

Planning Extranet
If you are considering introducing an intranet or extranet into your business, you should ensure that it is flexible enough to meet not only your immediate requirements, but also your needs as your business grows. Make sure your objectives are clear. Will you restrict access to your site, or will you allow all of your customers to use it? Do you want to promote flexible working in your business by catering for your remote workforce? How will you measure the success of your investment?
Identify the information that will need to be made available in order to meet your objectives:
  • What kind of company information do you need on your intranet? For example, company policies, news, forms and corporate branding.
  • Do you need to make all of your production and sales information available to your partners via your extranet, or will discrete sub-sections be sufficient?
  • Web server hardware and software. The size of the server will depend on the number of potential users and whether or not you will need a lot of bandwidth to support audiovisual content, eg video feeds.
  • Computers connected via a local area network - a closed, private network.
  • Firewall software and hardware, which will prevent unauthorized access from outside your organization.
  • A content management system to add and update intranet content.
This might be a good arrangement if your business is just starting up - you can develop your own intranet once your business has grown and you have more funds available. Once you have your intranet up and running, you can create your extranet by giving partners access to the necessary company data via a log-in page. Identify the support costs that will be required to run the site on a day-to-day basis. Will you require technical support - if so, at what level? You should also consider how the content will be managed. Remember that security is paramount, since any security incident will directly affect not only you but also your key business partners. You should establish what levels of security are provided when choosing a technology solution.
Advantages/Benefits of Extranet
Ease of set-up, use and maintenance: Extranets should be simple to set-up, use and maintain. The time it takes to develop a complete and functioning extranet with a robust Web-standard software solution amounts to days or weeks, rather than months or years with proprietary networks solutions. Modifications can also be implemented with little or no interruption to the extranet’s activities.
Scalability: Extranets require the flexibility to grow to include additional users or organizations, or to expand to a new hardware server array without compromising the system's usability or integrity. Solutions written using non-industry standard format or proprietary architectures can significantly restrict an extranet's ability to scale to include new users, applications, servers or other components. Extranet solutions eliminate the lock-in strategies used by software vendors and allow for greater extensibility of the extranet to meet the growing and changing demands of the on-line user community.
Versatility: An extranet should serve fundamental business activities such as document exchange, collaborative discussion groups, on-line submission forms, database queries, etc. yet have the ability to be customized to satisfy a particular business purpose. For example, companies transferring text or document files have different requirements than those that transfer movies, video clips, other multimedia files to be viewed on-line. Some organizations may wish to sell directly on-line through the extranet and others may wish to only automate the back office operations. Regardless of the business objective, extranets require versatility to accommodate a dynamic company's changing mission, goals and objectives.
Security: Security is perhaps the single most important characteristic possessed by an extranet that serves multi-organizational interests. Ensuring that all participant and contributor content is protected within a secure and accountable framework provides the basis for system usability and dependability. Although no system is ever 100% secure, recent advances in security technology provide extranets with security that exceeds industry standards and protects on-line information and intellectual property.
Business Models of Extranet Applications
The extranet represents the bridge between the public Internet and the private corporate intranet. The extranet connects multiple and diverse organizations on-line, enabling strategic communities of stakeholders with common interests (communities of interests) to form a tight business relationship and a strong communication bond, in order to achieve commerce-oriented objectives. The extranet defines and supports this extended business enterprise including partners, suppliers and distributors, contractors, customers and others that operate outside the physical walls of an organization but are nonetheless critical to the success of business operations. With the Internet providing for public outreach or communication, and intranets serving internal business interests, extranets serve the business-critical domain between these extremes where the majority of business activity occurs.

                    Fig: Business Model for Extranet


The unification of robust enabling technologies and ubiquitous access through the Web is resulting in unique and interesting market dynamics that are changing the way many companies are doing business.
Interactive communities are beginning to emerge that exist solely in cyberspace, where information travels faster, more cost effectively, and with greater accuracy when compared to other forms of communication and information exchange. These interactive communities are the driving and sustaining force behind the extranet concept, and their insatiable collective need to access content when, where, and how they want to see it will continue to push the limits of what is technologically possible. Extranet solutions built to engage and support these interactive communities are designed to emphasize and foster customer relationships. As successful businesses know, the cost of obtaining a new customer far outweighs the cost of maintaining a current one.
With commerce-enabled extranets, companies are now able to establish and maintain one-to-one relationships with each of their customers, members, staff or others at very low cost through the Web, offering a customized and individualized experience that can be dynamically generated or modified based upon a user's privileges, preferences, or usage patterns. Information entered by the user (registration form, on-line surveys, etc.) can be compiled with statistics and other information that is captured automatically by the system (searches performed, products purchased, time spent in each site area, etc.) to provide the company a complete picture for each and every visitor of the system. This comprehensive user profile offers unprecedented opportunities to present relevant information, advertising, product and service offerings and other content to a qualified, targeted interactive user community on a one-to-one basis.


                     Fig: Interaction of consumer community and Organization

Managerial Issues

Management is no longer worries about whether or not to adopt the intranet/ extranet but is concerned about how to utilize them successfully for business.  Intranets/ Extranets are already two facts of life in many large corporations. Thus management needs to review it’s own company’s position in dealing with a verity of issues in installing the internet/ extranet. The following are the guidelines for managerial issues:
1.     Find the business opportunities by utilizing the intranet and extranet: for example, consider connecting the customer, suppliers and internal branches that are geographically dispersed.
2.     Analyze whether the connectivity requirement suits the intranet and extranet: it is mainly dependent upon whether the network is composed of one LAN or multiple LANs. The former is suitable for internet and the latter for extranet. Individual’s remote access should also be considered.
3.     Plan the most secure economical choice for implementation: consult the technical persons and outside the company for implementation. Review the current proprietary or leased network and determine if it can be replaced by intranet and extranet. It may reduce costs and widen connectivity for the customers and suppliers.
4.     Select the best outsourcers for implementation: compare the outsourcers who can implement the internet/ extranet. The extranet solution providers can cultivate new opportunities in this big market.
5.     Selling the intranet: corporate intranet can serve as a wonderful pool, where employees can do many things ranging from taking classes to updating benefit plans. Too often employees are not using the intranet to its fullest capacity. Businesses are exploring innovative ways to market their intranet to their employees. For example some companied are making presentation to employees, other give prizes, yet other created an “Intranet Day”.              

13 comments:

  1. Like the written by hand signature, which approves physical reports, electronic records can be approved by marking them utilizing an advanced mark. Vakilsearch site to get Class 3 digital signature

    ReplyDelete
  2. Great article! Thanks for sharing an informative blog with us. I learn many new things from your article. I really like your post, It is very helpful for us. Please keep sharing these types of articles.

    Fantasy Sports App Development

    ReplyDelete
  3. Thanks for the information, click here to class 2 digital signature online

    ReplyDelete
  4. Scale up your business with the CreditQ 2.0. Join CreditQ and progress towards your goal with the Business Credit Management services

    ReplyDelete
  5. Thanks for sharing this post with us.Wikivela

    ReplyDelete
  6. Unit 2, Lecture 1 on e-commerce notes provides valuable insights. It covers fundamental concepts crucial for understanding the digital marketplace. Why Can't Support From transaction security to customer experience.

    ReplyDelete

FEEDBACK

Name

Email *

Message *