You are on page 1of 42

E-commerce Defined

E-Commerce Technology

E-commerce involves digitally enabled commercial transactions between and among organizations and individuals Digitally enabled transactions include all transactions mediated by digital technology Commercial transactions involve the exchange of value across organizational or individual boundaries in return for products or services

TEC2441

E-commerce vs. E-business

E-Commerce Technology

Debate among consultants and academics about meanings and limitations of terms e-commerce and ebusiness We use the term e-business to refer primarily to the digital enablement of transactions and processes within a firm, involving information systems under the control of the firm E-business does not include commercial transactions involving an exchange of value across organizational boundaries
2

TEC2441

E-Commerce Technology
TEC2441 3

E-Commerce Technology
TEC2441 4

Types of E-commerce
Classified by nature of market relationship Business-to-Consumer (B2C) Business-to-Business (B2B) Consumer-to-Consumer (C2C) Classified by type of technology used Peer-to-Peer (P2P) Mobile commerce (M-commerce)

E-Commerce Technology

TEC2441

E-Commerce Technology
TEC2441 6

E-Commerce Technology
TEC2441 7

Yahoo - An Advertising Revenue Model for Yahoo.com

E-Commerce Technology
TEC2441

Yahoo A Subscription Revenue Model for SBC Yahoo! DSL

E-Commerce Technology
TEC2441

Yahoo A Subscription Revenue Model for Yahoo! Plus

E-Commerce Technology
TEC2441

10

Ebay - A Transaction Fee Revenue Model

E-Commerce Technology
TEC2441

11

Amazon - A Sales Revenue Model

E-Commerce Technology
TEC2441

12

MyPoints - An Affiliate Revenue Model

E-Commerce Technology
TEC2441

13

B2C Business Models



E-Commerce Technology

Portal model E-trailer/Storefront model Content Provider Transaction Broker Market Creator Service Provider Community Provider

TEC2441

14

B2C Business Models

E-Commerce Technology
TEC2441

15

E-Commerce Technology
TEC2441 16

E-Commerce Technology
TEC2441 17

Encryption

E-Commerce Technology

Encryption is the process of transforming plain text or data into cipher text(random text) that cannot be read by anyone outside of the sender and the receiver. The purpose of encryption is :1)to secure stored information and 2)to secure information during transmission Encryption can provide four of the six key dimensions of ecommerce security. i.e integrity, non-repudiation , authentication and confidentiality.

TEC2441

18

E-Commerce Technology

In this plain text is transformed into random text (unintelligible to hackers) called the cipher text. A key(cipher) is any method for transforming plain text to cipher text. Encryption can be either using substitution or transposition .In substitution cipher, every occurrence of a given letter is replaced systematically by another letter. Eg: If we use the key(cipher)- letter + 3 Then the word A T T ACK will be transformed to D W W D F N In transposition cipher, the ordering of the letters in each word is changed in some systematic way.

TEC2441

19

Symmetric key encryption

E-Commerce Technology

Also called as Secret key encryption .In this types of encryption both the sender and the receiver use the same key to encrypt and decrypt the message. The secret key is send over some communication media or exchange the key in person..Symmetric key encryption requires that both parties share the same key. If the key is lost or stolen the entire encryption system fails. The cipher or keys used to transform plain text in to cipher text are digital strings. Computers store text or other data as binary strings composed of 0s and 1s. The strength of modern security protection is measured in terms of the length of binary key used to encrypt the data. It may use keys with 56,128 or 512 binary digits is 2512 . The most widely used symmetric key encryption on the internet today is the Data Encryption Standard(DES) developed by the National Security Agency (NSA) and IBM it uses a 56 bit encryption key.

TEC2441

20

Public key encryption

In this method, two mathematically related digital keys are used : a public key and a private key. The private key is key secret by the owners and the public key is widely disseminated(circulated). Both keys can be used to encrypt and decrypt a message. However, once the keys are used to encrypt a message, that same key cannot be used to decrypt the message. The mathematical algorithms used to produce the keys are one way functions. A one-way irreversible mathematical function is one in which, once the algorithm is applied, the input cannot be subsequently derived from the output. The key is sufficiently long (128,256 and 512 bit keys) that it would take enormous computing power to derive one key from he other using the largest and faster computer available. Message confidentiality is achieved but message repudiation i.e sender deny of sending the message is not achieved.

E-Commerce Technology

TEC2441

21

Public Key Cryptography A Simple Case

E-Commerce Technology
TEC2441

22

Steps in simple Public key encryption

1) The sender creates a digital message(document, spreadsheet etc) 2)The sender obtains the recipients public key and applies it to the message. 3)This produce an encrypted cipher text message. 4)The encrypted message is sent over the internet. 5)The recipient uses his/her private key to decrypt the message.
23

E-Commerce Technology

TEC2441

Digital Signature

In general use, a certificate is a document issued by some authority to attest to a truth or to offer certain evidence. A digital certificate is commonly used to offer evidence in electronic form about the holder of the certificate. In PKI(Public key infrastruture) it comes from a trusted third party, called a certification authority (CA) and it bears the digital signature of that authority. A common use for a digital certificate is to associate or bind a person to a public key, which is contained in the certificate. The CA is asserting that this unique public key belongs to one individual; that individual is the person who holds the linked private key. Only the person who holds the private key can decrypt something thats encrypted with the public key. Digital certificates are also commonly used in electronic commerce, where the owner of a secure site will obtain a digital certificate thats checked by a browser for a secure session. In this case, the CA is asserting that the public key belongs to the business; its bound to the domain.

E-Commerce Technology

TEC2441

24

E-Commerce Technology
TEC2441 25

SSL: Secure Sockets layer


E-Commerce Technology

The most common form of Securing channels of communication is SSL of TCP/IP. When you receive a message form a server on the web that you will be communicating through a secure channel, this means you will be using SSL to establish a secure negotiated session(here URL changes from HTTP to HTTPS). A secure negotiated session is a client-server session in which the URL of the requested document, along with the contents , contents of forms and the cookies exchanged, are encrypted. For ex , your credit card number that you entered into a form would be encrypted. Through a series of handshakes and communications, the browser and the server establish one another s identity by exchanging digital certificates, decide on the strongest shared form of encryption, and then proceed to communicate using an agreed-upon session key. A SESSION KEY is a unique symmetric encryption key chosen just for this single secure session. The SSL protocol provides Data encryption, Server authentication and message integrity for TCP/IP connection.

TEC2441

26

Current Online Payment Systems

Credit cards are dominant form of online payment, accounting for around 80% of online payments in 2002 New forms of electronic payment include:
Digital cash Online stored value systems Digital accumulating balance payment systems Digital credit accounts Digital checking

E-Commerce Technology

TEC2441

27

PayPal: The Moneys in the E-mail

E-Commerce Technology
TEC2441

28

Digital Cash

E-Commerce Technology

One of the first forms of alternative payment systems Not really cash rather, are forms of value storage and value exchange that have limited convertibility into other forms of value, and require intermediaries to convert Many of early examples have disappear; concepts survive as part of P2P payment systems

TEC2441

29

Examples of Digital Cash

E-Commerce Technology
TEC2441

30

Online Stored Value Systems

E-Commerce Technology

Permit consumers to make instant, online payments to merchants and other individuals based on value stored in an online account Rely on value stored in a consumers bank, checking or credit card account

TEC2441

31

Online Stored Value Systems

E-Commerce Technology
TEC2441

32

Smart Cards as Stored Value Systems

E-Commerce Technology

Another kind of stored value system based on creditcard sized plastic cards that have embedded chips that store personal information Two types:
Contact Contactless

Examples: Mondex, American Express Blue

TEC2441

33

Digital Credit Card Payment Systems


E-Commerce Technology

Extend the functionality of existing credit cards for use as online shopping payment tools Focus specifically on making use of credit cards safer and more convenient for online merchants and consumers Example: eCharge

TEC2441

34

How an Online Credit Card Transaction Works

Processed in much the same way that in-store purchases are Major difference is that online merchants do not see or take impression of card, and no signature is available (CNP transactions) Participants include consumer, merchant, clearinghouse, merchant bank (acquiring bank) and consumers card issuing bank

E-Commerce Technology

TEC2441

35

How an Online Credit Transaction Works

E-Commerce Technology
TEC2441

36

The SET (Secure Electronic Transaction) Protocol

Authenticates cardholder and merchant identity through use of digital certificates An open standard developed by MasterCard and Visa Transaction process similar to standard online credit card transaction, with more identity verification Thus far, has not caught on much, due to costs involved in integrating SET into existing systems, and lack of interest among consumers

E-Commerce Technology

TEC2441

37

How SET Transactions Work

E-Commerce Technology
TEC2441

38

Digital Accumulating Balance Payment Systems

E-Commerce Technology

Allows users to make micropayments and purchases on the Web, accumulating a debit balance for which they are billed at the end of the month Examples: Qpass and iPin

TEC2441

39

Digital Checking Payment Systems


E-Commerce Technology

Extend the functionality of existing checking accounts for use as online shopping payment tools Examples: eCheck, Achex (MoneyZap)

TEC2441

40

Limitation of E-commerce

1) Expensive technology: This technology uses internet and for that PC and internet connectivity is required which makes it expensive. 2) Complex Software interface: Using web requires installation of complex software (operating system) and application programs are difficult to understand. 3) Sophisticated skill set: The skills required making effective use of internet and ecommerce capabilities are far more sophisticated then using television and newspaper. 4) Persistent cultural attraction of physical markets and traditional shopping experiences. 5) Persistent global inequality limiting access to telephones and 3epersonal computers.

E-Commerce Technology

TEC2441

41

M-Commerce Business Models


Takes traditional e-commerce business models and leverages emerging new wireless technologies Key technologies are telephone-based 3G; Wi-Fi; and Bluetooth To date, a disappointment in the U.S. However, technology platform continues to evolve

E-Commerce Technology

TEC2441

42

You might also like