You are on page 1of 32

electronic commerce strategy technologies and applications

e c o m m e r c e

Chapter 15: The elements of e-Commerce


Search Company Customer P e r f o r m a n c e E a s e o f U s e Product Negotiation Order Payment Delivery After-sales Community A e s t h e t I c E f f e c t

I n n o v a t i o n

E-Commerce David Whiteley/McGraw-Hill, 2000

electronic commerce strategy technologies and applications

e c o m m e r c e

Elements
 The basic eleme ts:  e-Sho o a Server  User (customer) with a web Browser  I ter et co ectio  dditio al issues:  Visibility  Ease of Use  rder rocessi  li e ayme ts  Security  Delivery Systems  fter-Sales
E-Commerce David Whiteley/McGraw-Hill, 2000

electronic commerce strategy technologies and applications


E-Commerce David Whiteley/McGraw-Hill, 2000

e c o m m e r c e

Elements
Customer Search Browser Delivery After Sales Internet Orders Payment Store Systems e-Shop

electronic commerce strategy technologies and applications

e c o m m e r c e

e-Visibility
 Getti visiti

the site oticed a d the o li e customers the store.

 Ways of advertisi a web rese ce a d etti customers i throu h the door i clude:  Site ame  Co ve tio al dvertisi  ortals  Malls  Search Engines  Links  ersonal Recommendations
E-Commerce David Whiteley/McGraw-Hill, 2000

electronic commerce strategy technologies and applications


E-Commerce David Whiteley/McGraw-Hill, 2000

e c o m m e r c e

e-Visibility site name


 The surest way of finding a site is the url.  If the url is memorable then the site is made:  amazon.com 

sensible sim le site name can be guessed by users:  britishairways.com

electronic commerce strategy technologies and applications

e c o m m e r c e

e-Visibility conventional advertising


 An irony of e-Commerce sites is the a arent urge to advertise them through conventional media.  Conventional advertising of Internet addresses has a threefold effect:  It boosts the image of the organisation it gives an air of modernity and high-tech;  It lets the customer know that the organisation has Internet facilities;  It can give users access via the url.

E-Commerce David Whiteley/McGraw-Hill, 2000

electronic commerce strategy technologies and applications

e c o m m e r c e

e-Visibility portals
 The first age a user sees is the ortal.  An advert on a o ular ortal is the web equivalent of a TV advert at half time in the cu final or in a break during the Su erbowl it is seen by millions.  An advert on a o ular web search engine is a similar iece of ro erty.  Adverts on the ortal can be:  Banners  Little boxes  Menu of services

E-Commerce David Whiteley/McGraw-Hill, 2000

electronic commerce strategy technologies and applications

e c o m m e r c e

e-Visibility malls
 An Internet sho ing mall models itself on the American sho ing mall, a lot of sho s, under one roof with a leasant sho ing atmos here.  The intention is to generate interest and thus trade for all the sho s.  An Internet mall can rovide common services. include:  Shared advertising.  Common facilities.  e-Cash.  Common customer files. ossibilities

 The drawback of joining a mall is that, as for any good retail location, the rents can be high.
E-Commerce David Whiteley/McGraw-Hill, 2000

electronic commerce strategy technologies and applications

e c o m m e r c e

e-Visibility search engines


 A search engine is a standard way to find any Internet site and that includes e-Sho s.  Finding a s ecific e-Commerce site may or may not be easy - a successful e-Sho could do with a earing in that to ten list of hits.  The search engines index the web by:  Manual indexing;  Automatic Indexing (web crawlers).  Crawlers look at:  The <TITLE> tag is a rime target.  The <META> is also checked and many other as ects of the site and its use,  Also one can ask the search engine to list the site.  ote, the best of the search engines list only about 15% of internet sites.
9

E-Commerce David Whiteley/McGraw-Hill, 2000

electronic commerce strategy technologies and applications


E-Commerce David Whiteley/McGraw-Hill, 2000

e c o m m e r c e

e-Visibility links
 Online adverts on the web are also links to the site hy ertext links.  Links are included on a variety of other sites with a variety of deals being done.

10

electronic commerce strategy technologies and applications


E-Commerce David Whiteley/McGraw-Hill, 2000

e c o m m e r c e

e-Visibility personal recommendations

 Satisfied customers will bookmark the site, come back to the site again and recommend it to their friends ossibly the best way of getting business.

11

 The full service e-Store needs: an extensive range of facilities; these include:  Com any information  Customer registration electronic  Dynamic web ages commerce  Site indexes and search facilities strategy  Online order entry and ayment systems technologies  So histicated security rotection systems and  After sales service and su ort applications  Feedback systems
E-Commerce David Whiteley/McGraw-Hill, 2000

e c o m m e r c e

The e-Shop
 e-Sho s come in all sha es and sizes. They range from:  A few sim le web ages for a local craftsman  Com lex sites offering services that include online ordering and ayment

12

electronic commerce strategy technologies and applications

e c o m m e r c e

The e-Shop online information


 Trust is an issue on the Internet and it is not an issue that is likely to go away.  Trust can be engendered by:  Brand name and trading record.  A site that gives a rofessional image.  The inclusion of com any information.  All of this does not rove that a site is genuine but it can reassure otential customers.

E-Commerce David Whiteley/McGraw-Hill, 2000

13

electronic commerce strategy technologies and applications

e c o m m e r c e

The e-Shop customer registration


 e-Commerce customers have to give their su liers details about themselves. It is less information than would be required to o en a bank account but more than is normally needed to buy some cornflakes.  roviding this information raises rivacy issues:  Will the information be ut to other uses?  Will the e-Vendor com ile a customer rofile?  Is the information secure?  The context in which the e-Commerce vendor asks for this information is also im ortant:  Customer registration rior to using the site  Customer details only when an order is laced.
E-Commerce David Whiteley/McGraw-Hill, 2000

14

electronic commerce strategy technologies and applications

e c o m m e r c e

The e-Shop site navigation


if a site is not designed with usability in mind, people will be frustrated with the site. People that are frustrated with the site dont bookmark, dont buy, dont revisit, and wont tell other people about the site. (Rhodoes, 1999)
 Site navigation is aided by:  A site index;  A site search engine;  Logical sequencing of facilities with clear links to the next stage in any rocess.

E-Commerce David Whiteley/McGraw-Hill, 2000

15

electronic commerce strategy technologies and applications

e c o m m e r c e

The e-Shop product database


 The use of a roduct database facilitates:  U dating of roducts and their attributes  Common data for e-Sho and back office  and requires the construction of the web age on the fly.  Exam les are:  The Online Booksho  The Airline Website (integrated with the airline booking system)

E-Commerce David Whiteley/McGraw-Hill, 2000

16

electronic commerce strategy technologies and applications

e c o m m e r c e

The e-Shop online orders


 The most common analogy is a sho ing basket in the UK and a sho ing cart in the US.

 Tangible goods are (electronically) laced in the basket and checked-out when sho ing is com lete.  For services, such as an airline booking, the search rocess is also the sho ing rocess and the customer acce ts or rejects the resulting ro osal(s).
E-Commerce David Whiteley/McGraw-Hill, 2000

17

electronic commerce strategy technologies and applications

e c o m m e r c e

Online payments
 Options for online payment are:  Credit Cards  Debit Cards  Stored Value Cards  e-Cash  Delayed ayments  ote, in a shop there is an exchange of value online it is pay now and hope that the goods arrive later.

E-Commerce David Whiteley/McGraw-Hill, 2000

18

electronic commerce strategy technologies and applications

e c o m m e r c e

Online Payments credit cards


 Options for online payment:  The most common way of paying for an e-Commerce transaction is with a credit card.  The online use of credit cards is an extension of the customer not present (CNP) protocol which is intrinsically less secure than the conventional use.  Potential problems include:  Fraudulent Use of Credit Cards  Interception of Credit Card Details  Remote Storage of Credit Card Details

E-Commerce David Whiteley/McGraw-Hill, 2000

19

electronic commerce strategy technologies and applications

e c o m m e r c e

Online Payments
 Debit Cards  Similar to Credit Cards but less secure.  Stored Value Cards  Not widely used fraud limited to value on card requires a card reader.  e-Cash  Suitable for small payments as yet no generally accepted scheme.  Delayed Payments  Off-line payments - limited acceptance normally delays transaction.
E-Commerce David Whiteley/McGraw-Hill, 2000

20

electronic commerce strategy technologies and applications

e c o m m e r c e

Delivery of goods (e- fulfilment)


 Internet e-Commerce allows users to order what they want, when they want but then they have to wait until the postman arrives.  Delivery depends on the size, nature, urgency and value. Options include:  Post. (You can sell anything online provided it will fit through a letter box.)  Packet/parcel delivery service.  Local Delivery. (Perishable goods often require such a service.)  Collect your Own.  Electronic Delivery.  No delivery. (Intangibles such as an e-Ticket.)
E-Commerce David Whiteley/McGraw-Hill, 2000

21

electronic commerce strategy technologies and applications

e c o m m e r c e

Delivery of Goods (e- fulfilment)


 For the delivery stage of the trade cycle the task of delivery is transferred from the retail customer to the vendor and the vendor generally finds it necessary to recoup those costs as delivery charges.  Delivery issues:  cost picking, posting and packaging  trust will the right goods be sent?  security does someone have to be at home to accept delivery?  Online grocery deliveries work to booked delivery slots often a day or two later.
E-Commerce David Whiteley/McGraw-Hill, 2000

22

electronic commerce strategy technologies and applications


E-Commerce David Whiteley/McGraw-Hill, 2000

e c o m m e r c e

After Sales
 Advantages:  Online manuals and diagnostics  Online Support  Problem areas:  Return of goods

23

electronic commerce strategy technologies and applications


E-Commerce David Whiteley/McGraw-Hill, 2000

e c o m m e r c e

Internet e-Commerce Security


 Security breaches can occur on:  The customer side impersonation.  The Internet hacking, etc.  The vendor side inappropriate or dishonest trade.

24

electronic commerce strategy technologies and applications

e c o m m e r c e

Internet e-Commerce Security


The four pillars of secure e-Commerce:  Authentication:  The sender of a document must be identified precisely and without any possibility of fraud;  Confidentiality:  The contents of a message may not be scanned by unauthorised parties;  Integrity:  Changes made in messages without according remarks must be impossible;  Non-Repudiation:  The sender of a message is directly connected to the contents of the message (and the recipient cannot deny that the message was received).
E-Commerce David Whiteley/McGraw-Hill, 2000

25

electronic commerce strategy technologies and applications

e c o m m e r c e

Security - encryption
 Encryption is the conversion of data into a code so that it cannot be read by unauthorised users.  The data is converted into the code by the sender and then decoded by the receiver.  Modern encryption methods use an encryption algorithm and a binary number that is the key. The main options are:  Secret key system  Public key / private key system.  Encryption should be used for transmission but also for customer data on the e-Vendors server.
E-Commerce David Whiteley/McGraw-Hill, 2000

26

electronic commerce strategy technologies and applications

e c o m m e r c e

Security Secure Sockets Layer (SSL)


 The stages are:  The vendor transmits the public key (ka) to the intending customer's web browser.  The customers browser generates a secret key (kc) for the session.  The customers browser encrypts the secret key (kc), using the public key (ka) and transmits it to the vendor.  The vendor decodes the message using a private key (kb) and now has the secret key (kc).  Further interchanges between the customers browser and the vendors server can now be encoded and decoded using the secret key (kc).
E-Commerce David Whiteley/McGraw-Hill, 2000

27

electronic commerce strategy technologies and applications


E-Commerce David Whiteley/McGraw-Hill, 2000

e c o m m e r c e

Security digital signatures


 A digital signature is used to authenticate the sender of the message and to check the integrity of the message, i.e. that it has not been altered in transit.

28

electronic commerce strategy technologies and applications


E-Commerce David Whiteley/McGraw-Hill, 2000

e c o m m e r c e

Security trusted third parties


 This addresses non-repudiation a copy of the transaction is transmitted to a third party and the record of the transaction can be used to settle any disputes.

29

electronic commerce strategy technologies and applications

e c o m m e r c e

A Web Site Evaluation Model


S C Cust P r f r f n c U s P li E s Pr uct rc p n r A s t t I c E f f c t t i n I n n

N g ti ti n Or r nt r

Aft r-s l s C
E-Commerce David Whiteley/McGraw-Hill, 2000

unit
30

electronic commerce strategy technologies and applications


E-Commerce David Whiteley/McGraw-Hill, 2000

e c o m m e r c e

Chapter 15 Exercise 1
 Select two categories of goods, for example groceries and books, and list the advantages and disadvantages to you of ordering these products online. The lists can be compared across a group of students and the differences analysed.

31

electronic commerce strategy technologies and applications

e c o m m e r c e

Chapter 15 Exercise 2
 Use the Web Site Evaluation Model and the associated questions from Section 15.7 to evaluate a couple of web sites.

For this evaluation use two web sites from the same sector, possibly one of the sectors used in Exercise 1. Compare the results of the two evaluations and compute an overall score for each of the sites.

E-Commerce David Whiteley/McGraw-Hill, 2000

32

You might also like