E Commerce
E Commerce
Meaning of E-commerce
The term e-commerce stands for electronic commerce, which refers to any type of
commercial transaction that takes place using electronic systems. It involves the
exchange of products, services, and information via the internet or other computer
networks. From small businesses to large corporations, everyone today is using
e-commerce in some form.
The key feature of e-commerce is that physical presence is not required. Buyers and
sellers can be located anywhere in the world and still do business easily, making it a global
phenomenon.
Concept of E-commerce
The concept of e-commerce goes beyond just online shopping. It includes a wide range of
online activities such as:
1. A website or app where users can browse and place orders
Role of Technology
E-commerce is powered by digital technologies such as websites, databases, mobile apps,
secure payment systems, and analytics tools. It relies on technologies like the internet, web
servers, secure protocols (HTTPS), and digital marketing tools to function smoothly.
Governments also use e-commerce platforms to deliver services and collect payments, such
as online tax filing or electricity bill payments.
Conclusion
In conclusion, e-commerce is more than just online shopping. It is a complete system that
has changed the way business is done worldwide. With increasing digitalization,
e-commerce will continue to grow and evolve, offering more opportunities for businesses
and convenience for consumers. It has become an essential part of the modern economy
and is shaping the future of trade and services.
2. E-commerce vs E-business
In today’s digital era, technology has changed the way business is conducted. Two important
terms used in the digital business world are e-commerce and e-business. While they are
often used interchangeably, they have different meanings and scopes. Understanding the
difference between the two is important for grasping the full picture of online business
operations.
Meaning of E-commerce
E-commerce stands for electronic commerce, which refers specifically to the buying and
selling of goods and services through the internet. It focuses mainly on online
transactions and includes activities like:
● Online shopping
Meaning of E-business
E-business, or electronic business, is a broader term. It includes all business activities
that are conducted using the internet or other digital technologies—not just buying and
selling. It includes:
● Online marketing
E-business uses technology to improve internal processes and make business operations
more efficient.
Benefits of Both
E-commerce:
E-business:
Together, they allow businesses to operate more smoothly, connect better with customers,
and grow faster in the digital age.
Examples to Understand
● E-commerce: A person buys a phone from Flipkart.
● E-business: Flipkart uses digital software to manage their inventory, employees, and
supplier network in the backend.
Conclusion
To conclude, e-commerce is about online transactions, while e-business is about using
technology for all areas of business operations. E-business covers a wider field and
includes e-commerce as one part of it. In the modern world, most successful companies use
both e-commerce for sales and e-business tools for smooth management. Understanding
their difference helps in building better digital strategies for business growth.
Advantages of E-commerce
1. Global Reach:
Businesses can reach customers across the world without setting up physical stores.
This expands the market for even small businesses.
Disadvantages of E-commerce
1. Lack of Personal Touch:
Customers cannot physically examine products before buying. This may lead to
dissatisfaction.
Conclusion
E-commerce has made buying and selling easier, faster, and more efficient. It brings multiple
benefits to businesses and customers, but it also comes with some risks and challenges. If
these disadvantages are carefully managed with good security, customer service, and
reliability, then e-commerce can offer a successful and sustainable platform for business
growth.
2. Operations:
Refers to order processing, product customization, and digital management. For
example, when a customer places an order, the system confirms, processes, and
updates the stock.
4. Procurement:
E-commerce platforms also need to manage vendor selection and purchase of
digital tools, warehousing systems, and logistics services.
Conclusion
The value chain in e-commerce helps businesses create and deliver value more efficiently.
By optimizing both primary and support activities through technology, companies can reduce
costs, improve customer satisfaction, and gain competitive advantage. It is a critical
framework for understanding how e-commerce businesses succeed in the digital
marketplace.
Primary Activities
1. Inbound Logistics
Receiving, storing, and distributing inputs. Example: raw material handling, inventory
control.
2. Operations
Transforming inputs into finished products. Example: assembly, packaging,
manufacturing.
5. Service
Support given after the sale. Example: customer support, maintenance, installation.
Support Activities
1. Firm Infrastructure
Organizational structure, finance, planning, and legal services.
4. Procurement
Purchasing of raw materials, equipment, and services needed.
Application in E-commerce
● Inbound logistics: automated supplier portals
Conclusion
Porter’s Value Chain Model is a valuable tool for strategic planning. By analyzing and
optimizing each activity, a business can enhance efficiency, reduce costs, and deliver better
value to customers. It is especially relevant in the digital age where technology can improve
nearly every stage of the value chain.
Examples
● Amazon uses cost leadership and fast logistics to offer cheaper and quicker delivery.
● Nykaa focuses on beauty products for a specific customer base (focus strategy).
● Analyzing competitors
2. Differentiation
Relation to E-commerce
In e-commerce, competitive advantage can come from:
● Faster delivery (logistics advantage)
Conclusion
Competitive advantage and strategy are critical for the success of any business. Companies
that understand their strengths and build strategies to maximize them are more likely to
succeed in the long run. With the help of technology and innovation, businesses can
differentiate themselves and build a lasting presence in the market.
1. B2B (Business-to-Business)
● In this model, transactions occur between two businesses.
Examples:
● Long-term partnerships
2. B2C (Business-to-Consumer)
● This is the most common type of e-commerce.
Examples:
● Price competition
3. C2C (Consumer-to-Consumer)
● In this model, consumers sell directly to other consumers, usually through a
third-party platform.
Examples:
● Peer-to-peer transactions
4. C2B (Consumer-to-Business)
● A consumer offers products or services to a business.
Examples:
Examples:
Conclusion
The different types of e-commerce models serve different purposes and user groups. From
individual consumers to big organizations and even governments, e-commerce connects
them efficiently. Each model plays a key role in the digital economy, making commerce
faster, broader, and more convenient.
2. Speed:
High-speed internet ensures fast browsing, order processing, and customer support.
3. Availability:
The internet is available 24/7, enabling round-the-clock access to e-commerce
platforms.
4. Scalability:
The internet allows businesses to grow quickly by reaching a large audience without
physical expansion.
● APIs: Enabling different systems (like payment and shipping) to work together
Conclusion
The internet is the foundation of all e-commerce activities. Without it, digital transactions and
online business would not be possible. It connects customers to businesses, supports
secure communication, and enables fast, efficient service. As technology continues to
evolve, the role of the internet in e-commerce will grow even stronger.
○ Example: When you use Amazon, your browser (client) requests information
from Amazon’s server.
Conclusion
Basic network architecture and the OSI layered model are important concepts in
understanding how the internet and digital communication work. The layered approach
makes it easier to manage and improve network systems, ensuring smooth and secure data
transfer.
○ Switches connect devices inside a network and help in fast data transfer.
○ Companies that provide access to the internet, like Jio, Airtel, or BSNL.
○ High-speed, long-distance networks that form the main pathways for internet
traffic.
○ Huge facilities that store data and host servers of websites like Google or
Amazon.
○ The request reaches the Amazon server, which sends back data.
○ The data travels the same path back to your screen as a website.
○ Every device on the internet has a unique IP address (like a house number).
○ DNS (Domain Name System) changes website names into IP addresses.
For example: www.google.com → 142.250.182.206
● HTTP/HTTPS:
Used to access websites. HTTPS is the secure version.
● Tier 2 Networks:
Regional internet providers that buy access from Tier 1 and sell it to ISPs.
● Tier 3 Networks:
Local ISPs that deliver the internet to homes and businesses.
Conclusion
Internet architecture is the foundation of e-commerce and online communication. It connects
billions of devices, servers, and users using a structured network supported by routers, data
centers, and communication protocols. Understanding it helps us appreciate how the internet
works smoothly and quickly, supporting everything from social media to online shopping.
1. Routers
3. Modems
○ Ethernet cables (LAN cables) transmit data between devices and network
equipment.
○ Devices that protect the network from unauthorized access and cyber threats.
○ Software-based rules like TCP/IP, FTP, DNS, and DHCP handle addressing,
file transfers, and IP management.
● Cost vs. Performance: Invest wisely based on size and needs of your business or
organization.
Conclusion
A reliable network needs the right mix of hardware and software. Choosing the appropriate
devices, protocols, and security measures ensures smooth communication, fast data
transfer, and safety—especially important for platforms like e-commerce, banking, and
education.
What is an Intranet?
An intranet is a private network used within an organization. It is like a mini-internet that is
only accessible by employees or members of the organization.
Features of Intranet:
Examples:
● Employee portals
● Company policy document sharing
Benefits of Intranets:
● Centralized access to important data and forms
What is an Extranet?
An extranet is an extension of the intranet that allows access to external users such as
clients, vendors, or partners. It is a controlled network that shares limited data with
outsiders.
Features of Extranet:
Examples:
● Partner dashboards
Benefits of Extranets:
● Improves communication with business partners
Comparison Table:
Conclusion
Intranets and Extranets are essential for modern organizations. An intranet improves
internal efficiency, while an extranet builds external partnerships. Together, they help
organizations become more connected, secure, and productive in the digital world.
● His idea was to create a system where scientists around the world could share
documents using the internet.
○ Later browsers like Netscape, Internet Explorer, Chrome, and Firefox made
the web popular.
● E-commerce, social media, and cloud computing evolved from this foundation.
Conclusion
The World Wide Web transformed the internet from a technical system into a user-friendly
tool for global communication and e-commerce. From its humble beginnings in a research
lab to becoming the world’s digital backbone, the WWW has changed every part of our lives.
○ This is the user’s device, like a computer or phone, that sends requests for
web pages.
○ A powerful computer that hosts the website and sends data when a client
requests it.
○ Uses many services and servers (like load balancers, APIs, etc.) in cloud
platforms like AWS or Azure.
Conclusion
Web system architecture is the foundation of every website and web application. It ensures
that the site works smoothly, securely, and can grow over time. Understanding it helps
developers build better and faster digital systems.
What ISPs Do
● Provide internet access using technologies like fiber optic, broadband, 4G/5G, DSL,
etc.
● Offer services such as email hosting, domain registration, and web hosting.
Types of ISPs
1. Dial-up ISPs:
● Airtel Xstream
● BSNL
● ACT Fibernet
● Hathway
● Support and Services: Help users fix problems and upgrade plans.
Conclusion
ISPs play a key role in connecting people to the internet. Whether for education, business,
entertainment, or e-commerce, a reliable ISP is essential for smooth digital experiences.
● Example: https://www.youtube.com
Parts of a URL:
2. Browser uses HTTP or HTTPS to request the web page from the server.
3. Server sends back the web page using the same protocol.
Conclusion
URLs and HTTP are essential tools that help users and computers find and display
information on the web. Together, they make sure that data travels safely and reaches the
right place on the internet.
17. Cookies
Introduction
Cookies are small text files stored on your device by websites. They remember your
actions, preferences, and information to improve your experience when you revisit that site.
What Cookies Do
● Remember login details so you don’t log in again and again.
Types of Cookies
1. Session Cookies:
○ Created by other sites (usually advertisers) that track you across different
websites.
Advantages of Cookies
● Faster browsing experience
Privacy Concerns
● Some users feel tracked or spied on.
● Websites now ask permission to use cookies (as per privacy laws like GDPR).
Conclusion
Cookies are helpful for creating personalized and smooth web experiences. However, they
must be used responsibly with clear privacy practices to protect user data and trust.
Module2
1.Building and Hosting Your Website and Internet Marketing
Introduction
Creating a website is the first step to establishing an online presence for a business or
personal brand. To make a website accessible on the internet, you need to choose the right
services and use effective marketing techniques to attract visitors and customers.
For hosting a website, choose an ISP or hosting provider that offers good speed, reliability,
technical support, and security.
3. Web Hosting
Web hosting means storing your website files on servers so they are accessible online.
Hosting providers offer different plans based on your needs (shared, VPS, dedicated).
A good host ensures your website loads fast and is available 24/7.
Includes search engine optimization (SEO), social media marketing, email campaigns, and
content marketing.
Social Media Marketing: Using platforms like Facebook, Instagram, and Twitter to promote
your site.
Mobile Agents: Software or apps that help customers access services and content on their
mobile devices, improving convenience.
Tracking Customers
Use tools like Google Analytics to monitor how visitors interact with your website.
Customer Service
Offering prompt support via chat, email, or phone increases customer satisfaction.
Good customer service builds trust and loyalty, encouraging repeat business.
Conclusion
Building and hosting a website requires choosing a reliable ISP, registering a suitable
domain name, and using proper web hosting services. Promoting your website through
effective internet marketing techniques and providing excellent customer service are key to
attracting and retaining customers. Tracking user behavior and personalizing experiences
further enhances engagement, helping your online presence grow successfully.
CRM is a strategy and software system used by companies to manage interactions with
current and potential customers.
It helps businesses understand their customers’ needs, preferences, and buying behavior.
CRM stores customer data like contact details, purchase history, and communication records
in one place.
It allows companies to provide better customer service, personalized marketing, and build
long-term relationships.
Benefits of CRM
What is E-Value?
E-Value is a measurement used to evaluate the effectiveness and value of online marketing
and e-business activities.
It helps businesses understand how well their websites, online ads, and digital campaigns
perform.
E-Value includes factors like website traffic, customer engagement, conversion rates, and
return on investment (ROI).
It gives insights into what’s working and what needs improvement in online business
strategies.
Importance of E-Value
CRM collects valuable customer data which can be analyzed to improve E-Value by
targeting the right audience.
E-Value measures the impact of CRM-driven strategies in terms of revenue and customer
retention.
Conclusion
CRM and E-Value are essential tools for modern businesses. CRM focuses on managing
and improving customer relationships, while E-Value helps measure the success of online
marketing efforts. Together, they help businesses grow by understanding customers better
and making smarter online marketing decisions.
3. Overview of HTML
Introduction
HTML stands for HyperText Markup Language. It is the standard language used to create
and design web pages on the internet. HTML provides the structure and content of a
webpage by using various elements called tags.
<!DOCTYPE html>
<html>
<head>
<title>Page Title</title>
</head>
<body>
</body>
</html>
<html>: The root element that contains the entire webpage content.
<head>: Contains meta-information like the page title, character set, styles, and scripts.
<title>: Sets the title of the webpage shown in the browser tab.
<body>: Contains all the visible content like text, images, and links that appear on the page.
1. Headings:
<h1> to <h6> tags define headings with <h1> being the largest and most important, and
<h6> the smallest.
2. Paragraphs:
3. Bold Text:
4. Italic Text:
5. Underline Text:
6. Line Break
7. Horizontal Line:
Conclusion
HTML is the foundational language for building web pages. Its simple structure starts with
the <!DOCTYPE html> declaration, followed by <html>, <head>, and <body> sections. Basic
text formatting tags like headings, paragraphs, bold, and italics help organize and style the
content. Understanding these basics is essential for creating effective and well-structured
websites.
Introduction
Webpages are not just plain text; they include many elements like links, images, tables,
forms, and more to make them interactive and useful. CSS (Cascading Style Sheets) is used
to style and design these elements to improve the look of the webpage.
1. Links (Hyperlinks)
Links connect one webpage to another or to different parts of the same page.
Created using the <a> tag with the href attribute that specifies the destination URL.
2. Images
3. Tables
Created with <table>, rows with <tr>, headers with <th>, and data cells with <td>.
Example:
<table>
<tr>
<th>Name</th><th>Age</th>
</tr>
<tr>
<td>Alice</td><td>25</td>
</tr>
</table>
4. Frames
Frames allow dividing the browser window into multiple sections, each showing a different
webpage.
Created using <frameset> and <frame> tags (older method, less used now due to modern
alternatives).
Example:
<frameset cols="50%,50%">
<frame src="page1.html">
<frame src="page2.html">
</frameset>
5. Forms
Forms collect user input like text, selections, and buttons.
Created using the <form> tag, with input elements such as <input>, <textarea>, <select>,
and <button>.
Example:
<form action="/submit" method="post">
Name: <input type="text" name="username"><br>
<input type="submit" value="Submit">
</form>
6. Introduction to CSS (Cascading Style Sheets)
CSS is a language used to style HTML elements, controlling colors, fonts, layouts, and
more.
CSS rules target HTML elements and apply styles like color, size, and spacing.
Example of inline CSS:
CSS helps separate content (HTML) from design, making websites easier to maintain.
Conclusion
Links, images, tables, frames, and forms are essential elements that make web pages
interactive and structured. Frames, though less common today, once helped divide
webpages into sections. CSS is a powerful tool used alongside HTML to design and beautify
websites, improving user experience by controlling the visual presentation of all these
elements.
Module 3
1. Security in Cyberspace
Introduction
Cyberspace refers to the global online environment where digital communication and data
exchange happen. With growing internet usage, security in cyberspace has become a
serious concern. It involves protecting systems, data, and users from cyber threats and
crimes.
● Firewalls
● Antivirus software
● Encryption
● Two-factor authentication
● Secure passwords
Conclusion
As our world becomes more digital, cybersecurity in cyberspace is essential. Protecting data,
users, and digital services ensures the safe use of technology for business, education, and
personal life.
Cyber threats are harmful actions carried out using computers, networks, or the internet.
These threats can damage data, steal money, harm users, or disrupt services. Cybercrimes
can be committed by hackers, scammers, or even insiders.
1. Malware:
2. Phishing:
3. Hacking:
6. Cyberbullying:
Conclusion
Cyber threats are a growing danger in the digital age. Understanding the types and causes
of these crimes is the first step to staying protected online.
3. Client Threats
Introduction
A client refers to the user’s side in a computer system—like a laptop or mobile device. Client
threats are dangers that attack or target the user's device or personal data.
○ A virus inside the browser changes how web pages work to steal data
Ways to Prevent Client Threats
Conclusion
Client threats are very common and dangerous because they target end-users directly.
Awareness and using good security practices can help users protect themselves.
A communication channel is the path through which data is transmitted over the internet.
These channels can be attacked during data transfer, leading to information theft or
manipulation.
1. Eavesdropping:
Security Solutions
Conclusion
Communication channels need to be secure to protect data as it travels across the internet.
Using encryption and secure connections can stop most of these threats.
5. Server Threats
Introduction
Servers store important data and host websites or services. Server threats aim to steal,
delete, or corrupt data, or make the server stop working. This can hurt businesses and users
badly.
○ Thousands of fake requests are sent to overload and crash the server.
Conclusion
Servers are valuable targets for hackers. Proper security, access control, and monitoring can
help keep server data and services safe.
6. Other Programming Threats
Introduction
Sometimes, threats occur due to poor programming practices or bugs in the code. These
are known as programming threats. They make software or websites vulnerable to attacks.
4. Backdoors:
Prevention
Conclusion
Programming threats are dangerous because they often go unnoticed until damage is done.
Writing clean, secure code and regularly testing applications is the best protection.
Online frauds and scams are deceptive activities that trick users into giving up money or
information. These crimes affect millions of users and businesses every year.
Types of Online Frauds
○ Victims are told they won a prize but must pay fees to claim it.
Conclusion
Frauds and scams can cause serious emotional and financial damage. Being alert,
educated, and cautious is the best way to stay safe online.
Decryption is the reverse process — turning ciphertext back into readable form using a
secret key.
● Online transactions
● Login systems
● Payment gateways
Types of Encryption
1. Symmetric Encryption (Private Key Encryption):
● The sender and receiver share the same key, so the key must be kept secret.
Example:
Drawbacks:
● Uses two keys: a public key to encrypt data and a private key to decrypt it.
● The public key is shared openly, while the private key is kept secret by the owner.
● Even if someone gets the public key, they cannot decrypt the message.
Example:
● RSA (Rivest-Shamir-Adleman) encryption
Uses in E-commerce:
● Digital signatures
● Secure payments
2. Builds Trust: Customers feel secure while making online transactions.
4. Maintains Data Integrity: Ensures data is not changed during transmission.
Conclusion
Cryptography is the backbone of e-commerce security. Encryption methods, especially
public and private key systems, help keep transactions safe, protect customer data, and
build trust in online shopping. As online business grows, strong encryption will continue to be
vital for a secure digital world.
In the digital world, where buyers and sellers cannot meet face-to-face, authentication and
trust are very important. Two powerful tools that help establish secure and trusted
communication are digital signatures and digital certificates.
● Trust ensures that the information received is from a verified source and hasn’t been
changed.
In e-commerce, we must confirm whether a website, seller, or customer is real, and that the
data shared is safe and genuine.
What is a Digital Signature?
How it works:
Benefits:
● Owner’s name
● Expiry date
Benefits:
Conclusion
Digital signatures and certificates play a crucial role in authentication and building trust in
e-commerce. They protect users from fraud and ensure secure communication, making
them vital tools for safe online transactions.
With more people shopping and working online, internet security has become essential.
One of the most powerful tools to ensure safe browsing and data protection is the VPN
(Virtual Private Network). A VPN creates a secure and private connection over the internet,
protecting users from hackers and tracking.
What is a VPN?
A Virtual Private Network (VPN) is a service that encrypts your internet traffic and routes it
through a remote server. It hides your IP address and protects your online activities from
being tracked.
3. The data goes through a VPN server before reaching the internet.
4. Websites see only the VPN server’s IP, not yours.
1. Data Encryption: Keeps your data private and unreadable to hackers.
2. Safe Public Wi-Fi Use: Prevents data theft on public hotspots.
4. Bypass Geo-blocking: Lets you access content blocked in your region.
5. Secure Business Communication: Companies use VPNs for employees working
remotely.
Limitations
Conclusion
A VPN is a powerful tool for internet security, especially in e-commerce. It provides privacy,
encrypts sensitive data, and builds a safe online environment. Whether for personal or
business use, VPNs are essential for protecting digital activity in today’s connected world.
11. Firewalls
Introduction
In the world of e-commerce and online communication, protecting data and systems from
unauthorized access is crucial. A firewall is a network security system that monitors and
controls incoming and outgoing traffic based on predetermined security rules. It acts as a
barrier between a trusted network (like a business network) and untrusted networks
(like the internet).
Types of Firewalls
1. Packet Filtering Firewall – Inspects individual data packets.
4. Next Generation Firewall (NGFW) – Includes additional features like antivirus,
intrusion prevention, and deep packet inspection.
Role in E-commerce
● Protects customer data (passwords, credit cards)
Advantages
● Enhances network security
Conclusion
Firewalls are essential in e-commerce for protecting both businesses and customers. They
prevent unauthorized access and ensure that transactions and communication remain safe
and reliable.
Features of SSL
● Data Encryption – Converts data into a secure format.
Importance in E-commerce
● Builds customer trust
Benefits
● Protects against eavesdropping
Conclusion
SSL is a powerful tool for securing online transactions in e-commerce. It ensures that
customer information is safe and builds the trust needed for successful digital business.
2. Convenience
3. Speed
5. Integration
6. Accessibility
7. Flexibility
Challenges
● Fraud risk without proper security
Conclusion
Internet payment methods offer speed, security, and ease of use, making them essential in
the modern digital marketplace. As more people shop online, having strong and reliable
payment systems is crucial for the success of any e-commerce platform.
Definition
Electronic money is a form of digital currency that represents real money and is used to
make electronic payments. It is stored on a smart card, mobile wallet, or online
account, and can be used just like physical cash—but in a digital form.
○ Cards loaded with a fixed amount of money (e.g., gift cards, travel cards).
○ Apps like Paytm, Google Pay, PhonePe store money for easy payments.
○ Digital currencies like Bitcoin (not always considered traditional e-money, but
still used digitally).
Advantages of E-Money
1. Convenience
2. Speed
3. Security
○ Encrypted and protected with security features like biometrics and OTP.
Disadvantages of E-Money
1. Dependence on Technology
Conclusion
Electronic money has revolutionized how people and businesses handle payments. With its
speed, convenience, and digital flexibility, e-money is now an essential part of
e-commerce and the modern economy. As technology continues to grow, e-money will
become even more important in building a cashless and connected future.
2. Consistency
○ A transaction must bring the database from one valid state to another.
Example: If a user orders an item, the product stock count should decrease
accordingly.
3. Isolation
○ Transactions happening at the same time should not interfere with each
other.
Example: Two customers buying the same product should not both be able to
buy the last item.
4. Durability
Importance in E-commerce
● Ensures accuracy in orders and payments
Conclusion
The ACID test ensures that e-commerce transactions are completed safely and reliably.
Without these properties, online systems would be unstable, leading to customer
dissatisfaction and financial loss.
Components of ICES
1. Information
2. Communication
4. Security
Conclusion
The ICES test is a valuable framework that ensures an e-commerce website is efficient,
user-friendly, and secure. It helps businesses maintain high standards in service and
technology for long-term success.
2. The payment gateway encrypts the information and sends it to the acquiring bank.
3. The bank contacts the customer’s issuing bank (like HDFC, SBI, etc.).
5. The gateway communicates the response to the website and finalizes the order.
● Multiple Payment Options – Accepts credit/debit cards, UPI, wallets, net banking.
● Speed – Processes transactions instantly or in a few seconds.
● PayU
● CCAvenue
● BillDesk
● Instamojo
Importance in E-commerce
● Facilitates online sales
Conclusion
A payment gateway is the digital cashier of an e-commerce platform. It handles the most
sensitive part of online shopping—payment—and ensures that the process is secure, fast,
and reliable. Without a proper gateway, no e-commerce business can survive in the
competitive digital market.
3. Authentication
○ The merchant and buyer verify each other’s digital certificates using
Certificate Authorities (CAs).
○ The bank authorizes the transaction and transfers the funds to the merchant.
Features of SET
● Encryption of Credit Card Details
● Dual Message System – Keeps payment info confidential from the merchant
● Certificate-based Identification
Advantages
● High security and trust
Limitations
● Complex setup
Conclusion
Though SET is now rarely used, it laid the foundation for modern secure payment
protocols. It played a key role in shaping the evolution of online credit card payments in
e-commerce.
E-Cash (Electronic Cash) is a form of digital money used for small and fast online
transactions. It is stored electronically and used just like physical cash but in the digital
world.
Features
Examples
Pros
Cons
● Often non-refundable
B. E-Wallet
Introduction
Examples
Functions
Pros
Cons
● Needs internet and smartphones
Conclusion
Both E-Cash and E-Wallets help promote cashless economies and fast, safe online
shopping. E-wallets are especially popular today due to their convenience and wide usage.
20. E-Check
Introduction
An e-check (electronic check) is a digital version of a paper check. It allows users to
make payments from their bank accounts over the internet, using the same details as a
traditional check.
How It Works
● Customer enters bank account number and routing number online
Features
● Direct debit from bank account
Advantages
● Useful for recurring payments (like bills)
Disadvantages
● Takes 2–3 business days to process
Conclusion
E-checks offer a secure and cost-effective way to pay digitally, especially useful in B2B
transactions and large-value orders.
21. Credit Card
Introduction
A credit card is a plastic card issued by banks or financial institutions that allows users to
borrow money up to a limit for purchasing goods and services
Working
● Users swipe or enter details online
● The amount is deducted from the issuer’s account, and users repay it later
Features
● Offers EMI and credit
Advantages
● Instant buying power
● Secure transactions
Disadvantages
● High interest rates
Conclusion
Credit cards are one of the most used payment tools in e-commerce due to their flexibility
and global acceptance.
Features
● Linked directly to the user’s savings or current account
Pros
● No interest or debt
Cons
● No credit benefits
Conclusion
Debit cards offer a simple, secure, and interest-free way to shop online, making them ideal
for day-to-day e-commerce use.
Types
● Contact-based (insert into reader)
Features
● Stores multiple details like payment, ID, or health info
Uses in E-commerce
● Digital ID verification
Conclusion
Smart cards are useful for secure digital access and payments, especially in closed
systems like transport and loyalty programs.
Examples
● NEFT, IMPS, RTGS
Features
● Fast and secure money movement
Advantages
● Safe and direct
Conclusion
EFT has made money transfer instant and seamless, playing a crucial role in online
commerce and banking.
Features
● Processes large volumes of recurring or batch payments
Advantages
● Low-cost and secure
Limitations
● Slower than real-time transfers
Conclusion
ACH is vital for large-scale and recurring digital payments, particularly in developed
banking systems. It ensures reliable movement of funds across institutions.
26.Cybersecurity – Essay
Introduction
Cybersecurity means protecting computers, networks, and data from unauthorized
access, attacks, and damage. In today’s digital world, people use the internet for banking,
shopping, studying, and working. This makes it important to keep digital information safe
and secure from hackers and cybercriminals.
What is Cybersecurity?
Cybersecurity is the practice of using technologies, tools, and policies to protect online
systems and information. It involves defending against threats like viruses, data theft, and
cyber frauds. Cybersecurity is important for governments, companies, and individuals.
Types of Cybersecurity
1. Network Security – Protecting data as it travels across networks
3. Application Security – Securing software and apps from being hacked
4. Cloud Security – Protecting data stored in cloud services like Google Drive
5. Endpoint Security – Protecting devices like phones, laptops, and tablets
● Ransomware – Attackers lock your files and demand money to unlock them
● Data Breaches – Sensitive data is leaked or stolen
● Keep software and systems updated with the latest security patches
Importance of Cybersecurity
● Protects privacy of individuals and organizations
● Builds trust in online services like e-commerce, banking, and social media
Conclusion
Cybersecurity is essential in the digital age. As technology grows, so do cyber threats.
Everyone—from students to businesses—must understand and follow cybersecurity
practices to stay protected online. Investing in strong cybersecurity measures helps build a
safe, reliable, and trusted digital world.
Module 4
For example, a manufacturer buying raw materials from a supplier through an online portal is
a B2B transaction. It involves large quantities, long-term relationships, and often customized
contracts.
2. Benefits of B2B E-commerce
● Cost Reduction: Automating purchasing and sales processes reduces paperwork,
labor, and transaction costs.
● Increased Efficiency: Orders, invoices, and payments happen faster and with fewer
errors.
● Wider Market Reach: Businesses can find new suppliers and customers globally
through online marketplaces.
● Data Analytics: B2B platforms collect valuable data, enabling better business
decisions and personalized offers.
Conclusion
B2B e-commerce is a vital part of the modern business world. It transforms traditional trade
by making buying and selling more efficient, cost-effective, and scalable. The benefits and
opportunities it offers help businesses grow, innovate, and compete successfully in the
global marketplace. Adopting B2B e-commerce is essential for companies aiming to stay
ahead in today’s digital economy.
○ EDI enables the exchange of business documents like purchase orders and
invoices in a standardized digital format, speeding up communication and
reducing errors.
○ Platforms where buyers and sellers meet, compare products, negotiate, and
close deals, making sourcing easier and more transparent.
○ Software that links various parts of the supply chain such as suppliers,
manufacturers, warehouses, and distributors to coordinate activities and
share real-time data.
○ Secure digital payment gateways and financial systems facilitate smooth and
trustworthy transactions between businesses.
● Improved Procurement
E-procurement systems simplify purchasing, making it easier to compare suppliers,
negotiate prices, and order just the right quantities, reducing inventory costs.
● Enhanced Collaboration
B2B platforms foster stronger partnerships among supply chain members by
improving communication and collaboration on forecasts, production planning, and
deliveries.
Conclusion
The building blocks of B2B e-commerce form the foundation for effective supply chain
management. By digitizing and automating key processes, they help businesses reduce
costs, increase speed, and improve coordination across the supply chain. This results in a
more responsive, flexible, and competitive supply chain, which is crucial in today’s
fast-paced global market.
Introduction
In B2B e-commerce, businesses interact with each other using different models depending
on their roles and objectives. These models define how transactions happen between buyers
and sellers and how value is exchanged. Each B2B model serves a unique function within
the supply chain or procurement process.
○ Main Function: Acts as a neutral ground where businesses can discover new
partners, compare prices, and make transactions.
○ These are companies or platforms that provide detailed market and product
information and charge a commission for deals.
○ Main Function: Tailored services and product listings suited for a particular
business sector.
Conclusion
Each B2B model supports business growth by improving procurement, increasing visibility,
and reducing costs. Companies choose a model depending on their industry, market power,
and transaction needs. Understanding these models helps in designing efficient e-commerce
strategies and supply chains.
Introduction
What is EDI?
EDI allows businesses to send documents such as purchase orders, invoices, shipping
notices, and payment confirmations through a secure, automated system. These
documents follow strict formats (e.g., ANSI X12, EDIFACT) so that both sender and receiver
systems understand them.
2. The document is translated into EDI format using translation software.
4. The receiving company’s system accepts and processes the document.
● Reduced Errors: Automation removes the risk of manual data entry mistakes.
● Retail: EDI is used for order placement and inventory updates between retailers and
suppliers.
● Logistics: Shipping companies use EDI for transport schedules, tracking, and billing.
Conclusion
EDI is a powerful B2B tool that increases efficiency, accuracy, and speed in business
communication. It plays a critical role in modern supply chains and e-commerce systems by
replacing outdated manual processes with automated digital exchanges.
Traditional Retailing
Comparison
Conclusion
Both methods have strengths. Traditional retail offers a physical experience, while
e-retailing provides convenience and wider access. Today, many businesses use a
combination of both (omnichannel retailing).
8. Benefits and Key Success Factors for E-Retailing – Essay (15 Marks)
Benefits of E-Retailing
1. User-Friendly Website – Simple design, easy navigation, and fast loading.
2. Reliable Delivery – Quick and safe shipping with tracking options.
4. Product Variety and Quality – Wide range and genuine items.
7. Marketing and SEO – Promotions, ads, and good ranking on search engines.
Conclusion
The success of e-retailing depends on technology, customer trust, and service quality.
Retailers who focus on these success factors can grow faster and build loyal customers.
9. Models of E-Retailing
1. Specialized E-Stores
2. Generalized E-Stores
● A brand uses online stores along with its traditional retail stores.
6. E-Broker
Conclusion
These models serve different purposes based on product type, target customers, and brand
strategy. Choosing the right model helps improve customer satisfaction and business
growth.
10. E-Services
E-services refer to online services offered through the internet that help customers meet
their needs without visiting a physical place.
Types of E-Services
1. Web-Enabling Services
4. Entertainment Services
5. Auction Services
Module 5
Introduction
In the digital world, businesses face many challenges beyond just making profits. E-core
values refer to important principles and concerns that businesses must consider when
operating online. These include ethical, legal, taxation, and international issues, which affect
how companies behave and follow rules in e-commerce.
1. Ethical Issues
In e-commerce, ethical issues include protecting customer privacy and data security.
2. Legal Issues
This includes consumer protection laws, intellectual property rights, and data protection
laws.
For example, companies must ensure their websites do not steal content or violate
copyrights.
They must also provide clear terms and conditions, and follow regulations on refunds and
returns.
3. Taxation Issues
Online businesses have to pay taxes on the goods and services they sell.
Tax rules vary by country and can be complicated in e-commerce due to cross-border sales.
Some governments require businesses to collect sales tax or VAT (Value Added Tax).
Understanding tax laws helps businesses avoid penalties and plan pricing correctly.
4. International Issues
Conclusion
E-core values guide online businesses to act responsibly and legally. Ethical behavior
ensures trust, legal compliance avoids penalties, proper taxation keeps operations smooth,
and awareness of international issues helps expand globally. Considering these values is
essential for long-term success in e-commerce.