MEERA FOLDER.docx

December 18, 2016 | Author: Sandy Jo | Category: N/A
Share Embed Donate


Short Description

Download MEERA FOLDER.docx...

Description

1. E- Shopping

Definition The act of purchasing products or services over the Internet. Online shopping has grown in popularity over the years, mainly because people find it convenient and easy to bargain shop from the comfort of their home or office. One of the most enticing factor about online shopping, particularly during a holiday season, is it alleviates the need to wait in long lines or search from store to store for a particular item. Online shopping is the process whereby consumers directly buy goods or services from a seller in real-time, without an intermediary service, over the Internet. It is a form of electronic commerce. An online shop, eshop, e-store, Internet shop, webshop, webstore, online store, or virtual store evokes the physical analogy of buying products or services at a bricks-andmortar retailer or in a shopping center. The process is called business-to-consumer (B2C) online

shopping. When a business buys from another business, it is called business-to-business (B2B) online shopping. Online shopping has become a popular shopping method ever since the internet has declared a takeover. There are many individuals that are looking for other amazing alternatives shopping and online shipping is just the fix for that. There are many advantages of online shopping; this is the reason why online stores are a booming business today. Online shopping includes buying clothes, gadgets, shoes, appliances, or even daily groceries. Listed below are several online shopping advantages and these are the following. Advantages of Online Shopping • Save Time – Do you have the specific list that you want to buy? With just a couple of clicks of the mouse, you can purchase your shopping orders and instantly move to other important things, which can save time. • Save Fuel – The market of fuel industries battles from increasing and decreasing its cost every now and again, but no matter how much the cost of fuel are it does not affect your shopping errands. One of the advantages of shopping online is that there is no need for vehicles, so no purchase of fuel necessary. • Save Energy – Admit it, it is tiresome to shop from one location and transfer to another location. What is worse is that there are no available stocks for the merchandise you want to buy. In online shopping, you do not need to waste your precious energy when buying. • Comparison of Prices – The advanced innovation of search engine allows you to easily check prices and compare with just a few clicks. It is very straightforward to conduct price comparisons from one online shopping website to another. This gives you the freedom to determine which online store offers the most affordable item you are going to buy. • 24/7 Availability – Online shopping stores are open round the clock of 24/7, 7 days a week and 365 days. It is very rare to find any conventional retail stores that are open 24/7. The availability of online stores give you the freedom to shop at your own pace and convenience. • Hate Waiting in Lines – When buying items online, there are no long lines you have to endure, just to buy your merchandise. The idea of shopping online is cutting down those bad habits of standing in a long line and just waiting. Every online store is designed with unique individual ordering features to purchase the item. • Too Ashamed to Buy – There are times that you want to purchase something out of the ordinary that can be a bit embarrassing when seen by other people. Items like weird ornaments,

sexy lingerie, adult toys, etc. In online shopping, you do not need to be ashamed; your online transactions are basically done privately. • Easy to Search Merchandise You Want to Buy – You are able to look for specific merchandise that includes model number, style, size, and color that you want to purchase. In addition, it is easy to determine whether the products are available or out of stock.

Disadvantages of Online Shopping If there are advantages, most likely there will be disadvantages. Despite the success of purchasing through online shopping stores, there are still some disadvantages that most people complain about. These include: • Personally Check the Item – If you are one of those shoppers who want to touch, see, and test the product personally, at online shopping, you are not able to do so. Online stores are only showing product description and photos of the merchandise, which can be a disadvantage for many online shoppers. • Diminished Instant Satisfaction – Unlike buying at retail stores, you are able to use the product instantly after you buy it, which can be satisfying. However, online shopping requires patience to wait for the item to arrive at your door step about 2 to 3 days or even longer depending on the location you've ordered it from. Online shopping is continuously becoming more popular and improving every single day. Knowing the advantages of online shopping and its disadvantages is additional knowledge for a lot of online shoppers that are useful before shopping online. Highlight of Information: 1. 2. 3. 4. 5. 6.

What is online shopping system. The history of online shopping. Advantages of online shopping. Disadvantages of online shopping. Online shopping security tips. Top online shopping sites in the world.

First learn the online shopping system:Introduction Shopping is one of the essential part of our daily life. We're using different types of shops to buy

different kind of things everyday. Today we can divide our life into two parts- 1. Physical life, 2. Virtual life. In physical life, we meet each other physically. But, in virtual life we're using digital technologies (like internet) to meet each other. Today virtual life is also very true as our real life, we are doing almost everything in our virtual life. Yes! everything like- talking, communicating, entertainment, business, banking, playing, shopping, educating and many more. The History of Online shopping Father of online shopping is- Michael Aldrich, who invented online shopping in the year of 1979 (according to the Wikipedia) Online shopping started at 1994 by pizza Hut. In the same year a German company Intershop Communication introduced world's first online shopping software . After that Amazon (1995) and eBay (1996) was launched one by one. Now online shopping is so much popular that Ecommerce B2C product sale in USA touched around $200 billion, it is almost 1/10 of total retail product sale in USA. Research says that online retailer in the USA will worth around $300 billion by 2015. Not only in the USA, online shopping is now becoming too popular to all nations and all kinds of people. Advantages of shopping online! It is very easy to shop your favorite items from a large number of online shopping sites available on the internet. You can perform an online shopping from your home comfort. Here is no need to go to the crowed supermarkets or shopping malls during festival seasons. You just need a PC or a laptop and one necessary payment sending option to shop online.

All types of items like-cars, books, apparel, jewellery, baby care, gifts, tools, etc. can be shipped using online shopping system. Not only these, you can also buy from foreign countries by few clicks on your mouse. And of course you will get your ordered items at your door. Just take a look what type of facilities you'll get by using the online shop-

  

It is very easy. You will choose your favorite items from variety of online shopping sites comparing price and quality. No need to go physical shops. You will have more time for your family.



Just need a computer and a payment sending option (like-net banking, credit card, ATM card).



Almost all kinds of items can be brought through online shopping system.



You can buy foreign goods from your bedroom.



You will get your goods at your home.



It is very secure.



Customer service is available. Disadvantage of shopping online!

There are also have many disadvantages of online shopping system. Those are  



You can never verify your purchased goods using your own hands. Here you have to depend on picture, videos and descriptions. But the chance of defects is low. Sometime you will pay much higher price for a particular item. If you using ATM card, debit card, credit card, then there will be a question about your bank account security. Think twice before putting your card information into an unknown shopping site (site without HTTPS). Here is no guarantee that you will receive your goods at time. Shipping will be delayed.



You have to pay a lot of extra if you buy form foreign shopping site. Advantages 

Access - Online shopping allows you to shop from any vendor, at any time, anywhere in the world. Virtual window shopping enables all users to shop at their leisure and across multiple marketplaces.



Time Saver - You no longer have to get in your car and have to drive to the mall to shop. There are no lines and you can come back to your cart whenever you want.



Online Deals and Promotions - Before you checkout, you can scour the Internet for online coupon codes or special discounts. Many companies send coupons to their customers who have opted into their email marketing campaigns, delivering them with the latest product or service information and what current promotions they are currently holding.

Disadvantages



Shipping Rates - Though some companies offer free flat rate shipping, it still may come at a cost. For instance, a clothing store may offer free shipping but at a minimum of a $50 purchase.



Waiting - If you're an impatient person, waiting for your product to be delivered can be a pain. There is a lack of instant gratification and even possibilities of delay when it comes to receiving your items.



Refunds/Returns Disputes - If an item comes damaged or not as described, you will want to return the item or be refunded your money. Depending on where you purchased your item, there can be different policies for refunds and returns; this process is tedious and is prolonged since you would have to ship back the item and wait on the buyer to refund your payment. 2. The concept of business process reengineering and its relationship with the productivity paradox and ERP Enterprise resource planning (ERP) is an industry term for the broad set of activities that helps an organization manage its business

2.Definition - What does Business Process Re-Engineering (BPR)mean? 1.Introduction: Business Process Reengineering (BPR) is a management approach aiming at improvements by means of elevating efficiency and effectiveness of the processes that exist within and across organizations. The key to BPR is for organizations to look at their business processes from a "clean slate" perspective and determine how they can best construct these processes to improve how they conduct business. Business process reengineering is also known as BPR, Business Process Redesign, Business Transformation, or Business Process Change Management. In 1990, Michael Hammer, a former professor of computer science at the Massachusetts Institute of Technology (MIT), published an article in the Harvard Business Review, in which he claimed that the major challenge for managers is to obliterate non-value adding work, rather than using technology for automating it (Hammer 1990). This statement implicitly accused managers of having focused on the wrong issues, namely that technology in general, and more specifically information technology, has been used primarily for automating existing work rather than using it as an enabler for making non-value adding work obsolete.

Business process re-engineering refers to the analysis, control and development of a company’s systems and workflow. The principal idea behind business process re-engineering is that a

company is a collection of processes that evolves over time. Business processing re-engineering engineering gained prominence in the 1990s, but has re-emerged as business software and enterprise applications have provided more in-depth analytics with which to evaluate business systems. An important goal of ERP is to facilitate the flow of information so business decisions can be data-driven. ERP software suites are built to collect and organize data from various levels of an organization to provide management with insight into key performance indicators (KPIs) in real time. ERP software modules can help an organization's administrators monitor and manage supply chain, procurement, inventory,finance, product lifecycle, projects, human resources and other mission-critical components of a business through a series of interconnected executive dashboards. In order for an ERP software deployment to be useful, however, it needs to be integrated with other software systems the organization uses. For this reason, deployment of a new ERP system in-house can involve considerable business process reengineering, employee retraining and back-end information technology (IT) support for database integration, data analytics and ad hoc reporting. Legacy ERP systems tend to be architected as large, complex homogeneous systems which do not lend themselves easily to a software-as-a-service (SaaS ERP) delivery model. As more companys begin to store data in the cloud, however, ERP vendors are responding withcloudbased services to perform some functions of ERP -- particularly those relied upon by mobile users. An ERP implementation that uses both on-premises ERP software and cloud ERP services is called two-tiered ERP. Business process re-engineering is a business management strategy, originally pioneered in the early 1990s, focusing on the analysis and design of workflows and business processes within an organization. BPR aimed to help organizations fundamentally rethink how they do their work in order to dramatically improve customer service, cut operational costs, and become world-class competitors.[1] In the mid-1990s, as many as 60% of the Fortune 500 companies claimed to either have initiated reengineering efforts, or to have plans to do so.[2] BPR seeks to help companies radically restructure their organizations by focusing on the groundup design of their business processes. According to Davenport (1990) a business process is a set of logically related tasks performed to achieve a defined business outcome. Re-engineering emphasized a holistic focus on business objectives and how processes related to them, encouraging full-scale recreation of processes rather than iterative optimization of subprocesses. [1]

Business process re-engineering is also known as business process redesign, business transformation, or business process change management

.

3.security issues of e-commerce Introduction I. INTRODUCTION E-commerce Security is a part of the Information Security framework and is specifically applied to the components that affect e-commerce that include Computer Security, Data security and other wider realms of the Information Security framework. E-commerce security has its own particular nuances and is one of the highest visible security components that affect the end user through their daily payment interaction with business. E-commerce is defined as the buying and selling of products or services over electronic systems such as the Internet and to a lesser extent, other computer networks. It is generally regarded as the sales and commercial function of eBusiness. There has been a massive increase in the level of trade conducted electronically since the widespread penetration of the Internet. A wide variety of commerce is conducted via ecommerce, including electronic funds transfer, supply chain management, Internet marketing, online transaction processing, electronic data interchange (EDI), inventory management systems, and automated data collection systems. US online retail sales reached $175 billion in 2007 and are projected to grow to $335 billion by 2012 (Mulpuru, 2008).

This massive increase in the uptake of ecommerce has led to a new generation of associated security threats, but any ecommerce system must meet four integral requirements: a) privacy – information exchanged must be kept from unauthorized parties b) integrity – the exchanged information must not be altered or tampered with c) authentication – both sender and recipient must prove their identities to each other and d) non-repudiation – proof is required that the exchanged information was indeed received (Holcombe, 2007). These basic maxims of eCommerce are fundamental to the conduct of secure business online. Further to the fundamental maxims of eCommerce above, eCommerce providers must also protect against a number of different external security threats, most notably Denial of Service (DoS). These are where an attempt is made to make a computer resource unavailable to its intended users though a variety of mechanisms discussed below. The financial services sector still bears the brunt of e-crime, accounting for 72% of all attacks. But the sector that experienced

the greatest increase in the number of attacks was eCommerce. Attacks in this sector have risen by 15% from 2006 to 2007 (Symantec, 2007). 2. Privacy Privacy has become a major concern for consumers with the rise of identity theft and impersonation, and any concern for consumers must be treated as a major concern for eCommerce providers. According to Consumer Reports Money Adviser (Perrotta, 2008), the US Attorney General has announced multiple indictments relating to a massive international security breach involving nine major retailers and more than 40 million credit- and debit-card numbers. US attorneys think that this may be the largest hacking and identity-theft case ever prosecuted by the justice department. Both EU and US legislation at both the federal and state levels mandates certain organizations to inform customers about information uses and disclosures. Such disclosures are typically accomplished through privacy policies, both online and offline (Vail et al., 2008). In a study by Lauer and Deng (2008), a model is presented linking privacy policy, through trustworthiness, to online trust, and then to customers’ loyalty and their willingness to provide truthful information. The model was tested using a sample of 269 responses. The findings suggested that consumers’ trust in a company is closely linked with the perception of the company’s respect for customer privacy (Lauer and Deng, 2007). Trust in turn is linked to increased customer loyalty that can be manifested through increased purchases, openness to trying new products, and willingness to participate in programs that use additional personal information. Privacy now forms an integral part of any e-commerce strategy and investment in privacy protection has been shown to increase consumer’s spend, trustworthiness and loyalty. The converse of this can be shown to be true when things go wrong. In March 2008, the Irish online jobs board, jobs.ie, was compromised by criminals and users’ personal data (in the form of CV’s) were taken (Ryan, 2008). Looking at the real-time responses of users to this event on the popular Irish forum, Boards.ie, we can see that privacy is of major concern to users and in the event of their privacy being compromised users become very agitated and there is an overall negative effect on trust in e-commerce. User comments in the forum included: “I’m well p*ssed off about them keeping my CV on the sly”; “I am just angry that this could have happened and to so many people”; “Mine was taken too. How do I terminate my acc with jobs.ie”; “Grr, so annoyed, feel I should report it to the Gardai now” (Boards.ie, 2008). 3. Integrity, Authentication & Non-Repudiation In any e-commence system the factors of data integrity, customer & client authentication and non-repudiation are critical to the success of any online business. Data integrity is the assurance that data transmitted is consistent and correct, that is, it has not been tampered or altered in any way during transmission. Authentication is a means by which both parties in an online transaction can be confident that they are who they say they are and non-repudiation is the idea

that no party can dispute that an actual event online took place. Proof of data integrity is typically the easiest of these factors to successfully accomplish. A data hash or checksum, such as MD5 or CRC, is usually sufficient to establish that the likelihood of data being undetectably changed is extremely low (Schlaeger and Pernul, 2005). Notwithstanding these security measures, it is still possible to compromise data in transit through techniques such as phishing or man-in- themiddle attacks (Desmedt, 2005). These flaws have led to the need for the development of strong verification and security measurements such as digital signatures and public key infrastructures (PKI). One of the key developments in e-commerce security and one which has led to the widespread growth of e-commerce is the introduction of digital signatures as a means of verification of data integrity and authentication. In 1995, Utah became the first jurisdiction in the world to enact an electronic signature law. An electronic signature may be defined as “any letters, characters, or symbols manifested by electronic or similar means and executed or adopted by a party with the intent to authenticate a writing” (Blythe, 2006). In order for a digital signature to attain the same legal status as an ink-on-paper signature, asymmetric key cryptology must have been employed in its production (Blythe, 2006). Such a system employs double keys; one key is used to encrypt the message by the sender, and a different, albeit mathematically related, key is used by the recipient to decrypt the message (Antoniou et al., 2008). This is a very good system for electronic transactions, since two stranger-parties, perhaps living far apart, can confirm each other’s identity and thereby reduce the likelihood of fraud in the transaction. Non-repudiation techniques prevent the sender of a message from subsequently denying that they sent the message. Digital Signatures using public-key cryptography and hash functions are the generally accepted means of providing non-repudiation of communications 4. Technical Attacks Technical attacks are one of the most challenging types of security compromise an e-commerce provider must face. Perpetrators of technical attacks, and in particular Denial-of-Service attacks, typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, large online retailers and popular social networking sites. Denial of Service Attacks Denial of Service (DoS) attacks consist of overwhelming a server, a network or a website in order to paralyze its normal activity (Lejeune, 2002). Defending against DoS attacks is one of the most challenging security problems on the Internet today. A major difficulty in thwarting these attacks is to trace the source of the attack, as they often use incorrect or spoofed IP source addresses to disguise the true origin of the attack (Kim and Kim, 2006). The United States Computer Emergency Readiness Team defines symptoms of denial-of-service attacks to include (McDowell, 2007):

• Unusually slow network performance • Unavailability of a particular web site • Inability to access any web site • Dramatic increase in the number of spam emails received DoS attacks can be executed in a number of different ways including: ICMP Flood (Smurf Attack) – where perpetrators will send large numbers of IP packets with the source address faked to appear to be the address of the victim. The network’s bandwidth is quickly used up, preventing legitimate packets from getting through to their destination Teardrop Attack – A Teardrop attack involves sending mangled IP fragments with overlapping, over-sized, payloads to the target machine. A bug in the TCP/IP fragmentation re-assembly code of various operating systems causes the fragments to be improperly handled, crashing them as a result of this. Phlashing – Also known as a Permanent denial-of-service (PDoS) is an attack that damages a system so badly that it requires replacement or reinstallation of hardware. Perpetrators exploit security flaws in the remote management interfaces of the victim’s hardware, be it routers, printers, or other networking hardware. These flaws leave the door open for an attacker to remotely ‘update’ the device firmware to a modified, corrupt or defective firmware image, therefore bricking the device and making it permanently unusable for its original purpose. Distributed Denial-of-Service Attacks Distributed Denial of Service (DDoS) attacks are one of the greatest security fear for IT managers. In a matter of minutes, thousands of vulnerable computers can flood the victim website by choking legitimate traffic (Tariq et al., 2006). A distributed denial of service attack (DDoS) occurs when multiple compromised systems flood the bandwidth or resources of a targeted system, usually one or more web servers. The most famous DDoS attacks occurred in February 2000 where websites including Yahoo, Buy.com, eBay, Amazon and CNN were attacked and left unreachable for several hours each (Todd, 2000). Brute Force Attacks – A brute force attack is a method of defeating a cryptographic scheme by trying a large number of possibilities; for example, a large number of the possible keys in a key space in order to decrypt a message. Brute Force Attacks, although perceived to be low-tech in nature are not a thing of the past. In May 2007 the internet infrastructure in Estonia was crippled by multiple sustained brute force attacks against government and commercial institutions in the country (Sausner, 2008). The attacks followed the relocation of a Soviet World War II memorial in Tallinn in late April made news around the world. 5. Non-Technical Attacks

Phishing Attacks Phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication. Phishing scams generally are carried out by emailing the victim with a ‘fraudulent’ email from what purports to be a legitimate organization requesting sensitive information. When the victim follows the link embedded within the email they are brought to an elaborate and sophisticated duplicate of the legitimate organizations website. Phishing attacks generally target bank customers, online auction sites (such as eBay), online retailers (such as amazon) and services providers (such as PayPal). According to community banker (Swann, 2008), in more recent times cybercriminals have got more sophisticated in the timing of their attacks with them posing as charities in times of natural disaster. Social Engineering Social engineering is the art of manipulating people into performing actions or divulging confidential information. Social engineering techniques include pretexting (where the fraudster creates an invented scenario to get the victim to divulge information), Interactive voice recording (IVR) or phone phishing (where the fraudster gets the victim to divulge sensitive information over the phone) and baiting with Trojans horses (where the fraudster ‘baits’ the victim to load malware unto a system). Social engineering has become a serious threat to e-commerce security since it is difficult to detect and to combat as it involves ‘human’ factors which cannot be patched akin to hardware or software, albeit staff training and education can somewhat thwart the attack (Hasle et al., 2005). 6. Conclusions In conclusion the e-commerce industry faces a challenging future in terms of the security risks it must avert. With increasing technical knowledge, and its widespread availability on the internet, criminals are becoming more and more sophisticated in the deceptions and attacks they can perform. Novel attack strategies and vulnerabilities only really become known once a perpetrator has uncovered and exploited them. In saying this, there are multiple security strategies which any e-commerce provider can instigate to reduce the risk of attack and compromise significantly. Awareness of the risks and the implementation of multi-layered security protocols, detailed and open privacy policies and strong authentication and encryption measures will go a long way to assure the consumer and insure the risk of compromise is kept minimal. 4.what is E-Payment? E payment is a subset of an e-commerce transaction to include electronic payment for buying and selling goods or services offered through the Internet. Generally we think of electronic payments as referring to online transactions on the internet, there are actually many forms of electronic payments.

As technology developing, the range of devices and processes to transact electronically continues to increase while the percentage of cash and check transactions continues to decrease. In the US, for example, checks have declined from 85% of non-cash payments in 1979 to 59% in 2002, and electronic payments have grown to 41%. The Internet has the potential to become the most active trade intermediary within a decade. Also, Internet shopping may revolutionize retailing by allowing consumers to sit in their homes and buy an enormous variety of products and services from all over the worlds. Many businesses and consumers are still wary of conducting extensive business electronically. However, almost everyone will use the form of E Commerce in near future. The standardised ISO 20022 CGI message format (based on XML1 ) for global payments is increasingly gaining ground and provides many benefits to companies. These include, among others: uniform communication with numerous banks, standardised and automated processes across the group, lower costs for payments, faster transactions even if business volume increases, and a future-proof format due to interoperability with other standards. Based on these advantages, there is a marked trend towards utilisation of standardised formats for payments by both corporates and banks. This whitepaper will provide an introduction to ISO 20022 CGI for all interested companies and will highlight how companies can benefit from going beyond SEPA and choosing ISO 20022 CGI for SEPA and world-wide payments. 3.2. Functional Requirements 1) System must be able to add/modify customer. 2) Customer must be able to view his/her personal details only. 3) System must be able to accept orders from the customer via email or online form. 4) Customer must be able to view his/her orders history. 5) Each customer must be able to view placed order status. 6) System must alert Fortex AB for new orders. 7) Fortex should be able to change the status of the order between order executions. 8) System must generate pro forma and customer invoice against an order. 9) Customer should be able to validate and confirm their invoice. 10) Fortex AB must be able to view pro forma invoice and packing list sent by the mill. 11) Fortex AB must be able to view order history of a customer. 12) Fortex AB must be able to validate and manage customers order against payments. 13) System must store information related to shipment and banking for each order. 14) The system must guarantee secure access to the stored data, managing the permissions according to the user profile. 15) The system must support easy addition of functionalities and enhancements 16) The system should support device upgrading or changing of devices.

6.what do u understand by www? What is the use of hypertext links in internet access:

The World Wide Web is a system of Internet servers that supportspecially formatted documents. The documents are formatted in a markup language called HTML (HyperText Markup Language) that supports links to other documents, as well as graphics, audio, and video files. This means you can jump from one document to another simply by clicking on hot spots. Not all Internet servers are part of the World Wide Web.

Def: The term WWWrefers to the World Wide Webor simply the Web. The World Wide Web consists of all the public Web sites connected to the Internet worldwide,including the client devices (such as computers and cell phones) that access Web content. The WWW is justone of many applications of the Internet and computer networks. The World Wide Web (www, W3) is an information space where documents and other web resources are identified by URLs, interlinked by hypertext links, and can be accessed via the Internet. It has become known simply as the Web. The World Wide Web (www, W3) is an information space where documents and other web resources are identified by URLs, interlinked by hypertext links, and can be accessed via the Internet.[1] It has become known simply as the Web. The World Wide Web was invented by English scientist Tim Berners-Lee in 1989. He wrote the first web browser in 1990 [2][3]. The World Wide Web is the primary tool billions use to interact on the Internet, and it has changed people's lives immeasurably.[4][5][6] Web pages are primarily text documents formatted and annotated with Hypertext Markup Language (HTML). In addition to formatted text, web pages may contain images, video, and software components that are rendered in the user's web browser as coherent pages of multimedia content. Embedded hyperlinks permit users to navigate between web pages. Multiple web pages with a common theme, a common domain name, or both, may be called a website. Website content can largely be provided by the publisher, or interactive where users contribute content or the content depends upon the user or their actions. Websites may be mostly informative, primarily for entertainment, or largely for commercial purposes. In March 1989 Tim Berners-Lee distributed the first written proposal for the Web, which was then called "Mesh". [7][8] The initial proposal was presented as a more efficient system for CERN to communicate, but Berners-Lee also realized the concept could be a "boon" to the academic world in general.[9] In November 1990 during the coding of the first browser Berners-Lee and his colleague Robert Cailliau proposed to use hypertext "to link and access information of various kinds as a web of nodes in which the user can browse at will",[9] and Berners-Lee finished the

first website in December of that year.[10] The first test was completed around 20 December 1990 and Berners-Lee reported about the project on the newsgroup alt.hypertext on 7 August 1991. 8.what are the key technologies for B2B E-Commerce? Explain architectural models of B2B E-Commerce B2B buyers have special needs when purchasing online. FitForCommerce founder and CEO explains how to make B2B e-commerce sites effective purchasing tools for customers. Recent growth of business-to-business e-commerce is led by higher buyer expectations and technological advances. Most business buyers have adopted e-commerce as private consumers and are, therefore, increasingly demanding the same convenience and options from B2B organizations. However, an optimal B2B multichannel selling approach cannot be obtained by simply providing a business-to-consumer way to buy online. This is because B2B selling typically involves much more complex processes, such as configurable product offerings, pricing and promotions based on the needs of the individual business buyer, and often with the cooperation of teams of sales reps. Beyond basic commerce capabilities, such as product merchandising and order processing, B2B enterprise commerce platforms should include these five key criteria for B2B commerce effectiveness: 1. B2C best practices to meet buyer expectations for superior online product research and purchasing Advances in B2C online shopping have changed the expectations of the business buyer. B2B commerce platforms can no longer simply replicate an offline catalog; they need to include more and better product content, personalization, dynamic on-site searching, user reviews, social integration, video, and even mobile sites and apps. Effective B2B commerce platforms incorporate best practices from B2C commerce, such as presenting products in a way personalized to a customer’s needs. On a B2B site, this can mean configuring product displays and prices according to a client company’s business rules, permitting the company’s buyers to choose only among approved products and make purchases within spending limits. Furthermore, the platform must capture proprietary customer purchasing information such as Cost Center, Job Code or Purchase Order Number, and include reporting tools that provide customers a variety of selection and sorting criteria to review past purchases in detail or summary form. 2. Advanced configurability, not only of end-user capabilities and pricing options, but also of complex product and service combinations for quoting and ordering

The complexities of B2B online selling translate into customer hierarchies, with differing pricing for each, contract terms, multiple payment options, purchase authorization rules and approval workflows, product portfolios, product configuration and marketing. The result is a complicated purchasing environment that requires unique processes and technology capabilities. The B2B channel requires advanced functionality to support sophisticated pricing and product configurations. This includes business rules and workflows that dictate specific pricing for individual customers, approval processes and governance rules in order to execute the sales and marketing strategy across all channels. Furthermore, authorized users should have access to the system and be empowered to set business rules, by segment and channels, without I.T. involvement, to ensure that sales representatives do not spend unnecessary time on internal processes and instead can focus on current and new customer sales. 3. Analytics and segmentation for creating separate and distinct product offerings and pricing, quotation and contracts Most B2B organizations dedicate resources to analyzing product, customer and sales data. Leveraging this data enables the B2B seller to develop segmented strategies to offer the optimal pricing and product mix personalized to each customer’s needs. However, many B2B organizations find that their customer-facing commerce platforms are not fully capable of displaying products and pricing based on real-time updates of data on available products and customer demand. If such data on product, pricing and governance rules are not included in the offer, then the analytics and segmentation efforts will be wasted. An effective B2B enterprise commerce platform must include tools that can execute strategies and rules based on advanced analytics and segmentation to enable guided selling through the online channel. 4. Sophisticated workflows to support complex buying cycles and selling execution across multiple channels and markets B2B enterprise commerce platforms need to be able to handle the complexities of selling through both a company’s own sites and its channel partners’ sites, which requires tight integration of and visibility into the technology systems of all supply chain partners. An effective B2B enterprise commerce platform must have capabilities to provide insights into all aspects of the order across channels. This includes delivery dates for products and services, monitoring of order processes, and automatic notifications to customers regarding their order status. The commerce platform should be the single source of truth across business units, divisions and brands, and provide consistent product and order information regardless of whether the customer is interacting with a field sales rep, a call center rep, or the web site. Additionally, no matter how the seller manages inventory and processes and fulfills a customer’s order, it should provide customers with the same ease of placing orders and receiving order confirmations. 5.

Single, global platform that can adapt to local market execution

B2B enterprises that target multiple markets will likely have sales and marketing strategies that are tailored to local market conditions. This typically includes offers and pricing that vary by geography or market segments. Organizations should deploy a centralized platform that allows for global control of product information and customer orders, yet offers the flexibility to adapt product information, marketing campaigns and order processes according to the interests and needs of customers in each targeted market. Bernardine Wu is founder and CEO of FitForCommerce, a multichannel consulting firm that helps B2B companies and retailers define and execute growth strategies and select technologies. Other professionals at FitForCommerce also contributed to this article. Follow Wu and other FitForCommerce B2B commerce experts @FitForCommerce.     

Electronic Data Interchange (EDI) − EDI is an inter organizational exchange of business documents in a structured and machine processable format. Internet − Internet represents World Wide Web or network of networks connecting computers across the world. Intranet − Intranet represents a dedicated network of computers within a single organization Extranet − Extranet represents a network where outside business partners, supplier or customers can have limited access to a portion of enterprise intranet/network. Back-End Information System Integration − Back End information systems are database management systems used to manage the business data.

E-Commerce - B2B Model Advertisements

Website following B2B business model sells its product to an intermediate buyer who then sells the product to the final customer. As an example, a wholesaler places an order from a company's website and after receiving the consignment, sells the end product to final customer who comes to buy the product at wholesaler's retail outlet. DAIGRAM

B2B implies that seller as well as buyer is business entity. B2B covers large number of applications which enables business to form relationships with their distributors, resellers, suppliers etc. Following are the leading items in B2B e-Commerce. 

Electronics



Shipping and Warehousing



Motor Vehicles



Petrochemicals



Paper



Office products



Food



Agriculture

Key technologies Following are the key technologies used in B2B e-commerce − 

Electronic Data Interchange (EDI) − EDI is an inter organizational exchange of business documents in a structured and machine processable format.



Internet − Internet represents world wide web or network of networks connecting computers across the world.



Intranet − Intranet represents a dedicated network of computers within a single organization



Extranet − Extranet represents a network where outside business partners, supplier or customers can have limited access to a portion of enterprise intranet/network. .



Back-End Information System Integration − Back End information systems are database management systems used to manage the business data.

Architectural Models Following are the architectural models in B2B e-commerce − 

Supplier Oriented marketplace − In this type of model, a common marketplace provided by supplier is used by both individual customers as well as business users. A supplier offers an e-stores for sales promotion.



Buyer Oriented marketplace − In this type of model, buyer has his/her own market place or e-market. He invites suppliers to bid on product's catalog. A Buyer company opens a bidding site.



Intermediary Oriented marketplace − In this type of model, an intermediary company runs a market place where business buyers and sellers can transact with each other.

Models for B2B e-commerce  searching the Web for new suppliers/customers  Company Web site  Communities  improving the sales process  E-procurement  Extranet applications with chosen suppliers  participating in electronic marketplaces

View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF