E Commerce PRC
E Commerce PRC
• Online shopping for retail sales direct to consumers via Web sites and mobile apps,
and conversational commerce via live chat, chatbots, and voice assistants[3]
• Providing or participating in online marketplaces, which process third-party business-to-
consumer or consumer-to-consumer sales
• Business-to-business buying and selling;
• Gathering and using demographic data through web contacts and social media
• Business-to-business (B2B) electronic data interchange
• Marketing to prospective and established customers by e-mail or fax (for example,
with newsletters)
• Engaging in pretail for launching new products and services
• Online financial exchanges for currency exchanges or trading purposes.
E Bay
eBay Inc.
Type Public
Industry Internet
Founded September 3, 1
1995; 23 years ago (Originally
as AuctionWeb)
Revenue on (2018)[1]
US$10.746 billio
Operating n (2017)[1]
US$2.265 billion
income
Subsidiaries Auction
Co., eBayClassified
ds, Kijiji, iBazar, GittiGidiyor, Gumtree, G-
Market, Stubhub, H
Half.com, Marktplaats.nl, Qoo10.jp
Website www.palesoko.com
m
AMAZON
Amazon is the largest e-comme erce marketplace and cloud computing platform m in the world as
measured by revenue and markket capitalization. Amazon.com was founded by b Jeff Bezos on
July 5, 1994, and start rted as an online bookstore but later expanded to
sell video downloads/streaming, MP3 downloads/streaming, audiobook downloa ads/streaming, s
oftware, video games, electroniccs, apparel, furniture, food, toys, and jewelry. Th
he company also
owns a publishing arm, Amazo on Publishing, a film and television studio, Amazon
A Studios,
produces consumer electron
nics lines including Kindle e-readers, Fire tabblets, Fire TV,
and Echo devices, and is th he world's largest provider of cloud infras structure services
(IaaS and PaaS) through its AW WS subsidiary. Amazon has separate retail we ebsites for some
countries and also offers inte ernational shipping of some of its products to certain other
countries.100 million people sub
bscribe to Amazon Prime.
FLIPKART
Type Incorpo
orated
Founded 2006
Founder Fabrice
e Grinda, Alec Oxenford
Parent Nasperrs
Quikr
Type Private
Industry Internet
India
Number of India
locations
E-commerce business models can generally be categorized into the following categories.
Business -to –Business - A website following the B2B business model sells its products to an
intermediate buyer who then sells the product to the final customer. As an example, a
wholesaler places an order from a company's website and after receiving the consignment, sells
the end-product to the final customer who comes to buy the product at one of its retail outlets.
Business -to -Consumer - A website following the B2C business model sells its products directly
to a customer. A customer can view the products shown on the website. The customer can
choose a product and order the same. The website will then send a notification to the business
organization via email and the organization will dispatch the product/goods to the customer
Consumer -to –Consumer - A website following the C2C business model helps consumers to
sell their assets like residential property, cars, motorcycles, etc., or rent a room by publishing
their information on the website. Website may or may not charge the consumer for its services.
Another consumer may opt to buy the product of the first customer by viewing the
post/advertisement on the website.
1. Magento Open Source
If you know anything about eCommerce software, you’ve likely heard of Magento. It’s one of the
biggest names in eCommerce software, in general, not just open source.
• You can make landing pages and content for your products, manage your shipping and
fulfillment in almost any manner you see fit, and generate a host of useful reports
(including sales tax, stock, and on-site search terms).
• Magento works on a core system with add-ons; its extensions marketplace is full of
options to add sales tax integrations, custom stock systems, and live customer chat
integrations, to name a few. Prices range from free to more than $5,000 per extension.
• Users can buy pre-made themes to dress their sites up. There are a few free theme
options, or you can pay up to around $500 for a responsive Argento theme—which isn’t
all that much compared to how much a web developer charges per hour.
2. OpenCart
• OpenCart doesn’t require a whole lot for installation; if you have a LAMP (Linux, Apache,
MySQL, PHP) stack on a server, you’re off to the races. This setup is typical for most
web servers, so you’re likely already set. You can always check with your service
provider if you’re not sure.
• Customers can visit OpenCart’s marketplace to find add-ons that extend its functionality,
including free basic integrations (such as Squarepayments or Facebook plugins). The
marketplace also offers more powerful tools (SEO insights or Excel tie-ins for product
management), costing up to $2,000 for something like a Microsoft Dynamics integration.
3. osCommerce
• osCommerce integrates with all types of third parties through its Apps Marketplace.
M You
can integrate with Sage P Pay and Facebook, and present your site in mu
ultiple languages.
• osCommerce isn’t an ovverly complex program, making it a solid con ntender for early
entrants into eCommerce e software.
• If you have trouble makking it do exactly what you want it to do, you u can turn to the
OsCommerce communityy’s years of growth and experience working with w the software.
While support from the company comes at a fee, the user community y is an excellent
resource for finding aid a
among other retailers and developers.
4. PrestaShop
• PrestaShop offers over 1,500 templates, 500 of which are premium.A Add-ons allowing
integration with Stripe, Google Merchant Center, and Amazon Mark ketplace—among
other offerings—can makke your life a lot easier and tighten your operatio
onal ties.
• PrestaShop supports intternational stores and multiple stores within one
o back end. If
you’ve got separate U.S S. and Canadian storefronts, you can take carre of both in one
place.
• PrestaShop also has re eporting capabilities, such as unique Intelligen
nt Merchant KPI
feature and forecast abilitity.
5. Spree Commerce
• Spree is a lightweight ssystem, due in large part to its coding. Users s saythat it runs
quickly and doesn’t take up a lot of online resources. If your host charge
es you for activity,
Spree can really help in tthat area.
• Unlike a lot of other optio
ons, Spree doesn’t work on the core-extension model.
m There are
a handful of well-develop ped extensions for Spree, but nothing like the huge set offered
for other software option ns. This means that there are fewer moving parts to concern
yourself with, but also lim
mits your options for easy expansion. It’s also worth
w noting that
all of Spree’s extensions are free.
• Spree’s core functionaliity allows you to manage orders, products,, payments, and
shipping right out of the e box. The software is in almost constant development
d and
expands functionality all tthe time.
6.WooCommerce
• If you’re used to working g with WordPress already, adding WooComme erce is a breeze.
It’s fully functional out o
of the gate and requires minimal customization.. If you’re not as
experienced with WordP Press, the good news is that help is only a quic
ck Google away.
There are a lot of resourccesout there on how to tackle WordPress’s learnning curve.
• One of WooCommerce’s most popular features is its one-page checkout process, which
allows users to easily pay for the items you’re selling.
Today the security issues that threaten Electronic payment systems are changing constantly,
and often extremely quickly. The most common threats include viruses, worms and Trojan
horses. Viruses are spread via email or by downloading infected files. Viruses are a nuisance
threat that can be categorized as a Denial of Service (DoS) tool due to the fact that they only
disrupt electronic communications18 . Nowadays there are thousands of different types of
computer viruses and internet malicious programs. Malicious software can easily attack the
mobile banking payment system by taking up passwords on the web browser or any cached
information on operating system. For example the Zeus Trojan was used to target mobile bank
users by inflicting defect SMS banking19 . Worms can be categorized as special viruses that
spread using direct Internet connections. They are standalone programs that do not require a
host program for activation and spread themselves independently from computer to computer
by exploiting security vulnerabilities or configuration errors in operating systems or
applications20 . Trojan horse programs launched against client systems pose the greatest
threat to the e-Payment systems because they can bypass or subvert most of the authentication
and authorization mechanisms used in an electronic transaction. The Trojan horses aim to spy
on sensitive data (e.g. passwords, confidential data, etc.) and send it back to their owners to
gain access to third-party computers and thus take control of them remotely21. Trojans are
normally disguised as applications that are useful to users of the computers they infect. These
programs can be installed on a remote computer by the simplest of means, for example an
email attachment or when users visit certain websites and download a so called "harmless"
program22. As they do this, a key logger program that has bound to the downloaded program is
also installed on their computer without their knowledge. When the users log into their bank’s
website, the information keyed during the session will be captured and sent to the attacker. This
is one of the most effective ways of stealing information because it captures everything the user
is doing on his device. The key loggers or spyware, as they are also known are particularly
dangerous because they can trace any kind of activity a user performs on his computer
system23 . Another common method that is used to disrupt the security of the e-payment
system is a denial-of-service attack (DoS) or a distributed denial-of-service attack (DDoS) that
involves hackers placing software agents onto a number of third-party systems and setting them
off to simultaneously send requests to an intended target. By doing this they attempt to make
computer resources unavailable to its intended users (for example "flooding" a network in order
to prevent access to a service or a particular device by disrupting the service and not allowing
access to a specific device). The DoS attacks typically target sites or services hosted on web
servers such as banks or credit card payment gateways. The illegitimate use involves the use of
information by unauthorized persons or for unauthorized purposes24 . Phishing and Pharming
are methods used to solicit personal information by posing as a trustworthy organization. In
recent years both pharming and phishing have been used for online identity theft information.
Phishing attacks use email or malicious websites to solicit personal information. Usually the
attacker sends an email seemingly from a reputable credit card company or financial institution
that requests account information, often suggesting that there is a problem. When users
respond with the requested information, attackers can use it to gain access to the accounts25.
Pharming is a type of fraud that involves diverting the client Internet connection to a counterfeit
website, so that even when he enters the correct address into his browser, he ends up on the
forged site. Pharming can be conducted either by changing the hosts file on a victim’s computer
or by exploitation of a vulnerability in DNS server software Recent developments in e-payment
has led to the creation of new kind of attacks. Intrusive methods that have a high degree of
aggression are more and more used. Man-In-The-Middle is one of those methods that involves
a type of attack where attackers intrude into an existing connection to intercept the exchanged
data and inject false information. It involves eavesdropping on a connection, intruding into a
connection, intercepting messages, and selectively modifying data27. Man-In-TheMiddle can be
combined with Spamming or E-mail bombing that is caused by a hacker targeting one computer
or network, and sending thousands of email messages to it. Sending unsolicited commercial
emails to individuals is also achieved placing software agents into a third-party system and
setting it off to send requests to an intended target28 . Drive-by downloads are malware
infections that represent a major threat to epayment. Users get infected with such malware
simply by visiting a particular website. These websites often contain legitimate content, but have
been contaminated by harmful programs that smuggle malicious codes into the site29 . A
Masquerading or a spoofing attack as it is also known is a situation in which one person or
program successfully masquerades as another by falsifying data and thereby gaining an
illegitimate advantage. A common method of Masquerading is consists in sending a message
that appears to be from someone else 30 . The impersonator is typically another user that has
changed the username or the IP levels by changing the source and/or destination IP of the
address of packets in the network.
Solutions
An effective authentication program should be implemented to ensure that controls and
authentication tools are appropriate for all e-payment based products and services. No single
control or security device can adequately protect a system connected to a public network. The
method and system can be augmented by requesting for different security credentials such as
PIN, cryptographic key, digital signature, biometrics, etc, to establish multiple layers of
authentication32 . The electronic payment system with a higher number of authentication factors
may have higher secure level. This means that an electronic payment system with higher
authentication factors will have a stronger security level which lowers or reduces the fraud
vulnerability of the electronic payment system, and this eventually boost users confidence33 . In
order to properly protect the e-payment system both technical and legal solutions must be
found. In Romania, specific legislation has been created by the development of Government
Ordinance no. 130/2000 on the regime of distance contracts 34 , Law no. 455/2001 on
Electronic Signatures 35 , the Government Emergency Ordinance no. 193/2002 concerning the
introduction of modern means of payment36 , Law no. 677/2001 on the protection of the
processing of personal data and free movement of such data, with subsequent amendments37 ,
Regulations of National Bank of Romania no. 4/2002 concerning transactions by electronic
payment instruments and the relationship between participants in these transactions38, the Law
no. 365/2002 on electronic commerce39 and the Order of the Ministry of Communications and
Information Technology no. 389/27.06.2007 regarding the approval procedure of payment
instruments with remote access applications such as Internet banking, home-banking or mobile
banking40 . Biometric based authentication and identification systems are the new solutions to
address the issues of security and privacy that are expected in the future years. Biometrics can
become a possible solution that allows the automatic identification of a person based on her
physiological or behavioral characteristics. It provides a better solution for the increased security
requirements of our information society.