0% found this document useful (0 votes)
64 views11 pages

E Commerce PRC

E-commerce is the buying and selling of goods and services online. It uses technologies like mobile commerce, electronic funds transfer, and online transaction processing. Popular e-commerce activities include online retail stores like Amazon, online music stores like iTunes, and online auction sites. Modern e-commerce uses websites and apps, as well as technologies like email and social media. Major e-commerce companies include Amazon, eBay, Flipkart, OLX, and Quikr. E-commerce business models include business-to-business, business-to-consumer, consumer-to-consumer, and others.

Uploaded by

saroj nigam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
64 views11 pages

E Commerce PRC

E-commerce is the buying and selling of goods and services online. It uses technologies like mobile commerce, electronic funds transfer, and online transaction processing. Popular e-commerce activities include online retail stores like Amazon, online music stores like iTunes, and online auction sites. Modern e-commerce uses websites and apps, as well as technologies like email and social media. Major e-commerce companies include Amazon, eBay, Flipkart, OLX, and Quikr. E-commerce business models include business-to-business, business-to-consumer, consumer-to-consumer, and others.

Uploaded by

saroj nigam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

E-commerce

E-commerce is the activity of buying or selling of products on online services or over


the Internet. Electronic commerce draws on technologies such as mobile commerce, electronic
funds transfer, supply chain management, Internet marketing, online transaction
processing, electronic data interchange (EDI), inventory management systems, and
automated data collection systems.
Modern electronic commerce typically uses the World Wide Web for at least one part of the
transaction's life cycle although it may also use other technologies such as e-mail. Typical e-
commerce transactions include the purchase of online books (such as Amazon) and music
purchases (music download in the form of digital distribution such as iTunes Store), and to a
less extent, customized/personalized online liquor store inventory services.[1] There are three
areas of e-commerce: online retailing, electric markets, and online auctions. E-commerce is
supported by electronic business.[2]
E-commerce businesses may also employ some or all of the followings:

• Online shopping for retail sales direct to consumers via Web sites and mobile apps,
and conversational commerce via live chat, chatbots, and voice assistants[3]
• Providing or participating in online marketplaces, which process third-party business-to-
consumer or consumer-to-consumer sales
• Business-to-business buying and selling;
• Gathering and using demographic data through web contacts and social media
• Business-to-business (B2B) electronic data interchange
• Marketing to prospective and established customers by e-mail or fax (for example,
with newsletters)
• Engaging in pretail for launching new products and services
• Online financial exchanges for currency exchanges or trading purposes.

E Bay

eBay Inc. is an American multinational e-commerce corporation based in San Jose,


California that facilitates consumer-to-consumer and business-to-consumer sales through its
website. eBay was founded by Pierre Omidyar in the autumn of 1995, and became a notable
success story of the dot-com bubble. eBay is a multibillion-dollar business with operations in
about 30 countries, as of 2011. The company manages the eBay website, an online auction and
shopping website in which people and businesses buy and sell a wide variety of goods and
services worldwide. The website e is free to use for buyers, but sellers are charge
ed fees for listing
items after a limited number of frree listings, and again when those items are solld.
In addition to eBay's original auuction-style sales, the website has evolved anda expanded to
include: instant "Buy It Now" sh hopping; shopping by Universal Product Code e, ISBN, or other
kind of SKU number (via Half..com, which was shut down in 2017); online o classified
advertisements (via Kijiji, or eBa
ay Classifieds); online event ticket trading (viia StubHub); and
other services. eBay previoussly offered online money transfers as part of its services
(via PayPal, which was a wholly owned subsidiary of eBay from 2002 to 2015)

eBay Inc.

Type Public

Traded as NASDAQ: EBAY


NASDAQ-100 Component
S&P 500 Compone
ent

Industry Internet

Founded September 3, 1
1995; 23 years ago (Originally
as AuctionWeb)

Founder Pierre Omidyar

Headquarters San Jose, California


ia, U.S.

Key people Thomas J. Tierney (Chairman)


Devin Wenig (CEO))

Services Online shopping

Revenue on (2018)[1]
US$10.746 billio

Operating n (2017)[1]
US$2.265 billion
income

Net income on (2017)[1]


US$-1.016 billio
Total assets on (2017)[1]
US$25.981 billio

Total equity n (2017)[1]


US$8.063 billion

Number of ~14,100 (December 2017)[1]


employees

Subsidiaries Auction
Co., eBayClassified
ds, Kijiji, iBazar, GittiGidiyor, Gumtree, G-
Market, Stubhub, H
Half.com, Marktplaats.nl, Qoo10.jp

Website www.palesoko.com
m

AMAZON

Amazon is the largest e-comme erce marketplace and cloud computing platform m in the world as
measured by revenue and markket capitalization. Amazon.com was founded by b Jeff Bezos on
July 5, 1994, and start rted as an online bookstore but later expanded to
sell video downloads/streaming, MP3 downloads/streaming, audiobook downloa ads/streaming, s
oftware, video games, electroniccs, apparel, furniture, food, toys, and jewelry. Th
he company also
owns a publishing arm, Amazo on Publishing, a film and television studio, Amazon
A Studios,
produces consumer electron
nics lines including Kindle e-readers, Fire tabblets, Fire TV,
and Echo devices, and is th he world's largest provider of cloud infras structure services
(IaaS and PaaS) through its AW WS subsidiary. Amazon has separate retail we ebsites for some
countries and also offers inte ernational shipping of some of its products to certain other
countries.100 million people sub
bscribe to Amazon Prime.

FLIPKART

Flipkart Pvt Ltd. is an e-comm


merce company based in Bengaluru, India. Fou unded by Sachin
Bansal and Binny Bansal in 20 007, the company initially focused on boo ok sales, before
expanding into other product ccategories such as consumer electronics, fash
hion, and lifestyle
products.
The service competes prima arily with Amazon's Indian subsidiary, and d the domestic
rival Snapdeal. as of March 201 17, Flipkart held a 39.5% market share of Ind dia's e-commerce
industry. Flipkart is significantly d
dominant in the sale of apparel (a position that was
w bolstered by
its acquisitions of Myntra and Ja
abong.com), and was described as being "neck and neck" with
Amazon in the sale of electroniics and mobile phones.[8] Flipkart also owns Ph
honePe, a mobile
payments service based on the U Unified Payments Interface(UPI).
In August 2018, U.S.-based rettail chain Walmart acquired a 77% controlling stake in Flipkart
for US$16 billion, valuing it at $2
22 billion.
OLX

OLX Group (OnLine Excha


ange)

Type Incorpo
orated

Industry Markettplace classifiedsforums

Founded 2006

Founder Fabrice
e Grinda, Alec Oxenford

Number of locations 41+ co


ountries

Area served Worldw


wide

Key people Martin Scheepbouwer - CEO

Number of employees 4000

Parent Nasperrs

OLX Group is a global online m


marketplace (headquartered in Amsterdam, and owned by South
African media and technology grroup Naspers), founded in 2006 and operating in
i 45 countries.
The OLX marketplace is a platform for buying and selling services and goods such as
electronics, fashion items, furniture, household goods, Properties, cars and bikes. In 2014, the
platform reportedly had 11 billion page views, 200 million monthly active users, 25 million
listings, and 8.5 million transactions per month.
South African media group Naspers acquired a majority of OLX in 2010 and 95% of the
company in 2014.
Quikr

Quikr

Type Private

Industry Internet

Founded 2008 [1]

Founder Pranay Chulet [2] and Jiby


Thomas [3]

Headquarters Bangalore [1]

India

Number of India
locations

Area served India

Key people Pranay Chulet (Co-founder


& CEO)

Services Classified advertising


Quikr is an Indian classified advertising platform. It was founded by Pranay Chulet and Jiby
Thomas in 2008. Headquartered in Bangalore, Quikr has listings in over 900 cities in India in
categories such as mobile phones, household goods, cars, real estate, jobs, services and
education.

Using E Commerce Simulator Software for Marketplace Business Simulation.

E-commerce business models can generally be categorized into the following categories.

Business - to - Business (B2B)

Business - to - Consumer (B2C)

Consumer - to - Consumer (C2C)

Consumer - to - Business (C2B)

Business - to - Government (B2G)

Government - to - Business (G2B)

Government - to - Citizen (G2C)

Business -to –Business - A website following the B2B business model sells its products to an
intermediate buyer who then sells the product to the final customer. As an example, a
wholesaler places an order from a company's website and after receiving the consignment, sells
the end-product to the final customer who comes to buy the product at one of its retail outlets.

Business -to -Consumer - A website following the B2C business model sells its products directly
to a customer. A customer can view the products shown on the website. The customer can
choose a product and order the same. The website will then send a notification to the business
organization via email and the organization will dispatch the product/goods to the customer

Consumer -to –Consumer - A website following the C2C business model helps consumers to
sell their assets like residential property, cars, motorcycles, etc., or rent a room by publishing
their information on the website. Website may or may not charge the consumer for its services.
Another consumer may opt to buy the product of the first customer by viewing the
post/advertisement on the website.
1. Magento Open Source

If you know anything about eCommerce software, you’ve likely heard of Magento. It’s one of the
biggest names in eCommerce software, in general, not just open source.

• You can make landing pages and content for your products, manage your shipping and
fulfillment in almost any manner you see fit, and generate a host of useful reports
(including sales tax, stock, and on-site search terms).
• Magento works on a core system with add-ons; its extensions marketplace is full of
options to add sales tax integrations, custom stock systems, and live customer chat
integrations, to name a few. Prices range from free to more than $5,000 per extension.
• Users can buy pre-made themes to dress their sites up. There are a few free theme
options, or you can pay up to around $500 for a responsive Argento theme—which isn’t
all that much compared to how much a web developer charges per hour.

2. OpenCart

• OpenCart doesn’t require a whole lot for installation; if you have a LAMP (Linux, Apache,
MySQL, PHP) stack on a server, you’re off to the races. This setup is typical for most
web servers, so you’re likely already set. You can always check with your service
provider if you’re not sure.

• Customers can visit OpenCart’s marketplace to find add-ons that extend its functionality,
including free basic integrations (such as Squarepayments or Facebook plugins). The
marketplace also offers more powerful tools (SEO insights or Excel tie-ins for product
management), costing up to $2,000 for something like a Microsoft Dynamics integration.
3. osCommerce

• osCommerce integrates with all types of third parties through its Apps Marketplace.
M You
can integrate with Sage P Pay and Facebook, and present your site in mu
ultiple languages.
• osCommerce isn’t an ovverly complex program, making it a solid con ntender for early
entrants into eCommerce e software.
• If you have trouble makking it do exactly what you want it to do, you u can turn to the
OsCommerce communityy’s years of growth and experience working with w the software.
While support from the company comes at a fee, the user community y is an excellent
resource for finding aid a
among other retailers and developers.

4. PrestaShop

• PrestaShop offers over 1,500 templates, 500 of which are premium.A Add-ons allowing
integration with Stripe, Google Merchant Center, and Amazon Mark ketplace—among
other offerings—can makke your life a lot easier and tighten your operatio
onal ties.
• PrestaShop supports intternational stores and multiple stores within one
o back end. If
you’ve got separate U.S S. and Canadian storefronts, you can take carre of both in one
place.
• PrestaShop also has re eporting capabilities, such as unique Intelligen
nt Merchant KPI
feature and forecast abilitity.

5. Spree Commerce

• Spree is a lightweight ssystem, due in large part to its coding. Users s saythat it runs
quickly and doesn’t take up a lot of online resources. If your host charge
es you for activity,
Spree can really help in tthat area.
• Unlike a lot of other optio
ons, Spree doesn’t work on the core-extension model.
m There are
a handful of well-develop ped extensions for Spree, but nothing like the huge set offered
for other software option ns. This means that there are fewer moving parts to concern
yourself with, but also lim
mits your options for easy expansion. It’s also worth
w noting that
all of Spree’s extensions are free.
• Spree’s core functionaliity allows you to manage orders, products,, payments, and
shipping right out of the e box. The software is in almost constant development
d and
expands functionality all tthe time.

6.WooCommerce

WordPress—easily confused d with, but different from, WordPPress.com—is the


most popular, content managem ment solutions out there. WooCommerce is an open source
plugin that businesses using W WordPress can use to turn their sitesinto a store.
s If you don’t
already have a site, you can stilll use WooCommerce just download WordPress (also free) first.

• If you’re used to working g with WordPress already, adding WooComme erce is a breeze.
It’s fully functional out o
of the gate and requires minimal customization.. If you’re not as
experienced with WordP Press, the good news is that help is only a quic
ck Google away.
There are a lot of resourccesout there on how to tackle WordPress’s learnning curve.
• One of WooCommerce’s most popular features is its one-page checkout process, which
allows users to easily pay for the items you’re selling.

Identifying and solving security issues in E- commerce and payment operations

Today the security issues that threaten Electronic payment systems are changing constantly,
and often extremely quickly. The most common threats include viruses, worms and Trojan
horses. Viruses are spread via email or by downloading infected files. Viruses are a nuisance
threat that can be categorized as a Denial of Service (DoS) tool due to the fact that they only
disrupt electronic communications18 . Nowadays there are thousands of different types of
computer viruses and internet malicious programs. Malicious software can easily attack the
mobile banking payment system by taking up passwords on the web browser or any cached
information on operating system. For example the Zeus Trojan was used to target mobile bank
users by inflicting defect SMS banking19 . Worms can be categorized as special viruses that
spread using direct Internet connections. They are standalone programs that do not require a
host program for activation and spread themselves independently from computer to computer
by exploiting security vulnerabilities or configuration errors in operating systems or
applications20 . Trojan horse programs launched against client systems pose the greatest
threat to the e-Payment systems because they can bypass or subvert most of the authentication
and authorization mechanisms used in an electronic transaction. The Trojan horses aim to spy
on sensitive data (e.g. passwords, confidential data, etc.) and send it back to their owners to
gain access to third-party computers and thus take control of them remotely21. Trojans are
normally disguised as applications that are useful to users of the computers they infect. These
programs can be installed on a remote computer by the simplest of means, for example an
email attachment or when users visit certain websites and download a so called "harmless"
program22. As they do this, a key logger program that has bound to the downloaded program is
also installed on their computer without their knowledge. When the users log into their bank’s
website, the information keyed during the session will be captured and sent to the attacker. This
is one of the most effective ways of stealing information because it captures everything the user
is doing on his device. The key loggers or spyware, as they are also known are particularly
dangerous because they can trace any kind of activity a user performs on his computer
system23 . Another common method that is used to disrupt the security of the e-payment
system is a denial-of-service attack (DoS) or a distributed denial-of-service attack (DDoS) that
involves hackers placing software agents onto a number of third-party systems and setting them
off to simultaneously send requests to an intended target. By doing this they attempt to make
computer resources unavailable to its intended users (for example "flooding" a network in order
to prevent access to a service or a particular device by disrupting the service and not allowing
access to a specific device). The DoS attacks typically target sites or services hosted on web
servers such as banks or credit card payment gateways. The illegitimate use involves the use of
information by unauthorized persons or for unauthorized purposes24 . Phishing and Pharming
are methods used to solicit personal information by posing as a trustworthy organization. In
recent years both pharming and phishing have been used for online identity theft information.
Phishing attacks use email or malicious websites to solicit personal information. Usually the
attacker sends an email seemingly from a reputable credit card company or financial institution
that requests account information, often suggesting that there is a problem. When users
respond with the requested information, attackers can use it to gain access to the accounts25.
Pharming is a type of fraud that involves diverting the client Internet connection to a counterfeit
website, so that even when he enters the correct address into his browser, he ends up on the
forged site. Pharming can be conducted either by changing the hosts file on a victim’s computer
or by exploitation of a vulnerability in DNS server software Recent developments in e-payment
has led to the creation of new kind of attacks. Intrusive methods that have a high degree of
aggression are more and more used. Man-In-The-Middle is one of those methods that involves
a type of attack where attackers intrude into an existing connection to intercept the exchanged
data and inject false information. It involves eavesdropping on a connection, intruding into a
connection, intercepting messages, and selectively modifying data27. Man-In-TheMiddle can be
combined with Spamming or E-mail bombing that is caused by a hacker targeting one computer
or network, and sending thousands of email messages to it. Sending unsolicited commercial
emails to individuals is also achieved placing software agents into a third-party system and
setting it off to send requests to an intended target28 . Drive-by downloads are malware
infections that represent a major threat to epayment. Users get infected with such malware
simply by visiting a particular website. These websites often contain legitimate content, but have
been contaminated by harmful programs that smuggle malicious codes into the site29 . A
Masquerading or a spoofing attack as it is also known is a situation in which one person or
program successfully masquerades as another by falsifying data and thereby gaining an
illegitimate advantage. A common method of Masquerading is consists in sending a message
that appears to be from someone else 30 . The impersonator is typically another user that has
changed the username or the IP levels by changing the source and/or destination IP of the
address of packets in the network.

Solutions
An effective authentication program should be implemented to ensure that controls and
authentication tools are appropriate for all e-payment based products and services. No single
control or security device can adequately protect a system connected to a public network. The
method and system can be augmented by requesting for different security credentials such as
PIN, cryptographic key, digital signature, biometrics, etc, to establish multiple layers of
authentication32 . The electronic payment system with a higher number of authentication factors
may have higher secure level. This means that an electronic payment system with higher
authentication factors will have a stronger security level which lowers or reduces the fraud
vulnerability of the electronic payment system, and this eventually boost users confidence33 . In
order to properly protect the e-payment system both technical and legal solutions must be
found. In Romania, specific legislation has been created by the development of Government
Ordinance no. 130/2000 on the regime of distance contracts 34 , Law no. 455/2001 on
Electronic Signatures 35 , the Government Emergency Ordinance no. 193/2002 concerning the
introduction of modern means of payment36 , Law no. 677/2001 on the protection of the
processing of personal data and free movement of such data, with subsequent amendments37 ,
Regulations of National Bank of Romania no. 4/2002 concerning transactions by electronic
payment instruments and the relationship between participants in these transactions38, the Law
no. 365/2002 on electronic commerce39 and the Order of the Ministry of Communications and
Information Technology no. 389/27.06.2007 regarding the approval procedure of payment
instruments with remote access applications such as Internet banking, home-banking or mobile
banking40 . Biometric based authentication and identification systems are the new solutions to
address the issues of security and privacy that are expected in the future years. Biometrics can
become a possible solution that allows the automatic identification of a person based on her
physiological or behavioral characteristics. It provides a better solution for the increased security
requirements of our information society.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy