e-commerce and governance unit 1-5
DESCRIPTION
E-Commerce and Governance and data mining UNIT 1-5TRANSCRIPT
![Page 1: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/1.jpg)
http://earnrupees4you.com Page 1
UNIT-1
![Page 2: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/2.jpg)
http://earnrupees4you.com Page 2
E-COMMERCE
Electronic commerce (e-commerce) is a growing aspect of the business community. This
formally is the use of digital transactions between and among businesses and individuals. More
commonly e-commerce is the use of the Internet to conduct business. Initially emerging from
the Electronic Data Interchange (EDI) e-commerce has gone through several major steps to get
to its current point. Through these steps there has been an emergence of several subsets of e-
commerce and new technologies. As a result of these changes and the growth of electronic
commerce benefits and detriments have been brought to society that can be generalized to all the
subsets of e-commerce. Looking at economic, privacy and social aspects of society we can see
there are issues facing electronic commerce development. It is also possible to see there are
some industries that e-commerce has had a greater impact on, such as the culture and information
industry. Overall, electronic commerce can be a benefit to society especially if businesses adapt
to their customers worries such as privacy concerns. As these problems begin to be solved and
technology improves e-commerce will provide individuals with more choice and add further
depth to the economy.
2] Electronic commerce, commonly known as e-commerce or eCommerce, or e-business consists
of the buying and selling of products or services over electronic systems such as the Internet and
other computer networks. The amount of trade conducted electronically has grown
extraordinarily with widespread Internet usage.
3] ‗Electronic commerce is sharing business information ,maintaining business relationships and
conducting business transactions by means of telecommunications networks‘
4] E- Commerce is the division of electronic business and is the process of buying or selling over
internet, much like marketing but on the internet. Initially when Tim Berners-Lee programmed
the internet, e-commerce was mainly meant to do Electronic Fund Transfer (EFT) and Electronic
Data Interchange (EDI). Later as the internet developed the e-commerce also had developed.
And with the development of E-Commerce the Federal Trade Commission (FTC) started
regulating the activities of E-Commerce. E-Commerce includes anything from buying a virtual
content for instant implementation to buying goods for domestic purposes.
![Page 3: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/3.jpg)
http://earnrupees4you.com Page 3
EDI
Electronic commerce has existed for over 40 years, originating from the electronic transmission
of messages during the Berlin airlift in 1948.2 from this; electronic data interchange (EDI) was
the next stage of e-commerce development. In the 1960s a cooperative effort between industry
groups produced a first attempt at common electronic data formats. The formats, however, were
only for purchasing, transportation and finance data, and were used primarily for intra-industry
transactions. It was not until the late 1970s that work began for national
Electronic Data Interchange (EDI) standards, which developed well into the early 1990s.
EDI is the electronic transfer of a standardized business transaction between a sender and
receiver computer, over some kind of private network or value added network (VAN). Both sides
would have to have the same application software and the data would be exchanged in an
extremely rigorous format. In sectors such as retail, automotive, defence and heavy
manufacturing, EDI was developed to integrate information across larger parts of an
organisation‘s value chain from design to maintenance so that manufacturers could share
information with designers, maintenance and other partners and stakeholders.
From this, electronic data interchange (EDI) was the next stage of e-commerce development. In
the 1960s a cooperative effort between industry groups produced a first attempt at common
electronic data formats. The formats, however, were only for purchasing, transportation and
finance data, and were used primarily for intra-industry transactions. It was not until the late
1970s that work began for national Electronic Data Interchange (EDI) standards, which
developed well into the early 1990s. Before the widespread uptake and commercial use of the
Internet, the EDI system was very expensive to run mainly because of the high cost of the private
networks. Thus, uptake was limited largely to cash-rich multinational corporations using their
financial strength to pressure and persuade (with subsidies) smaller suppliers to implement EDI
systems, often at a very high cost. By 1996 no more than 50,000 companies in Europe
and 44,000 in the USA were using EDI, representing less than 1 per cent of the total
number of companies in each of the respective continents. According to Zwass,
electronic commerce has been re-defined by the dynamics of the Internet and traditional
e-commerce is rapidly moving to the Internet. With the advent of the Internet, the term
![Page 4: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/4.jpg)
http://earnrupees4you.com Page 4
e-commerce began to include:
1 Electronic trading of physical goods and of intangibles such as information.
2 All the steps involved in trade, such as on-line marketing, ordering payment and
support for delivery.
3 The electronic provision of services such as after sales support or on-line legal
advice.
4 Electronic support for collaboration between companies such as collaborative
Some of the definitions of e-commerce often heard and found in publications and the
media are:
1 Electronic Commerce (EC) is where business transactions take place via
telecommunications networks, especially the Internet.
2 Electronic commerce describes the buying and selling of products, services, and
information via computer networks including the Internet.
3 Electronic commerce is about doing business electronically.
4 E-commerce, ecommerce, or electronic commerce is defined as the conduct of a
financial transaction by electronic means
HISTORY
There have been several key steps in the history of e-commerce. The first step came from the
development of the Electronic Data Interchange (EDI). EDI is a set of standards developed in
the 1960‘s to exchange business information and do electronic transactions. At first there was
several different EDI formats that business could use, so companies still might not be able to
interact with each other. However, in 1984 the ASC X12 standard became stable and reliable in
transferring large amounts of transactions . The next major step occurred in 1992 when the
Mosaic web-browser was made available, it was the first ‗point and click‘ browser. The Mosaic
browser was quickly adapted into a downloadable browser, Netscape, which allowed easier
access to electronic commerce. The development of DSL was another key moment in the
development to of e-commerce. DSL allowed quicker access and a persistent connection to the
Internet. Christmas of 1998 was another major step in the development of e-commerce. AOL
![Page 5: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/5.jpg)
http://earnrupees4you.com Page 5
had sales of 1.2 billion over the 10 week holiday season from online sales. The development of
Red Hat Linux was also another major step in electronic commerce growth. Linux gave users
another choice in a platform other then Windows that was reliable and open-source. Microsoft
faced with this competition needed to invest more in many things including electronic
commerce.
Napster was an online application used to share music files for free. This application was yet
another major step in e-commerce. Many consumers used the site and were dictating what they
wanted from the industry. A major merger, in early 2000, between AOL and Time Warner was
another major push for electronic commerce. The merger, worth $350 million, brought together
a major online company with a traditional company. In February 2000 hackers attacked some
major players of e-commerce, including Yahoo, ebay and Amazon. In light of these attacks the
need for improved security came to the forefront in the development of electronic commerce.
It is predicted that that revenues, up until 2006, will grow 40% to 50% yearly. Expectations of
higher prices as well as larger profits for e-commerce business are also present. Also, we will
see a larger presence by experienced traditional companies, such as Wal-Mart, on the Internet. It
is believed companies in general will take this mixed strategy of having stores online and offline
in order to be successful. .
Emerging Technology
Original e-commerce applications were based on getting needed data to the consumer. In other
words the major concern was integrating current catalogues and data into an online format from
which consumers could shop. Recently though the major realization was ensuring customer
satisfaction and ease of use while using an e-commerce site is very important in success. A
simple and enjoyable experience is what customers are demanding and they do not want to be
concerned with the technology behind it. In order to provide this experience the latest
technology being developed is based on making e-commerce shopping into a more natural
interaction.
One area of research into making interactions more natural is by using virtual agents. The goal
of these agents is to actually converse with customers and be able to act proactively when
dealing with customers. These agents would appear to e-commerce clients at 2D or 3D
![Page 6: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/6.jpg)
http://earnrupees4you.com Page 6
animations that would be capable of expressing facial emotions to try to simulate a natural
environment .
Other researchers in the area of virtual agents are focusing on making them informative as
possible. Often consumers want to search e-commerce sites to gain further information, but this
can prove frustrating at times. The virtual agents role would be to eliminate this frustration.
Virtual agents would be given as much information regarding customers, products and sales
processes as possible. They would then become the focal point on an e-commerce site for
providing information accurately and effectively.
The INTELLECT system concept is being developed for use in electronic commerce. Under this
system e-commerce sites would have five modules. An e-shop would be the first module and is
what the customer would see. It would be similar to current e-commerce sites for example
having a catalogue and shopping baskets. The product could be viewed in 3D using the second
module; the virtual reality module. In this module customers could also configure their own
products choosing what components they wish to make up their product. The third module is
called the configurator and would be put in place to help the administration of components and
products. Customers could also use the help module that would include features such as page
mirroring and video conferencing. The final module would be used as a link between the front
end and the back-office system; this module is called the order-processing module. The main
duty of this part of INTELLECT is to handle orders.
Industries Impacted
One of the major industries, according to a Statistics Canada survey, taking part in electronic
commerce is the culture and information sector. Around 20% of businesses in this sector have
an online e-commerce component. Following up at 17% was private sector education institutes,
support services and administrations industries. Other industries that have been predicted to
grow include the banking industry. By 2004 this industry is expected to have sales in the 12.4
billion US. Also, another industry that is poised for growth due to the increased bandwidth is the
home entertainment sector .
Very recently the online pharmacy industry has been gaining attention. Prescription drugs are
generally cheaper in Canada then they are in the United States. The main reason for this is the
![Page 7: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/7.jpg)
http://earnrupees4you.com Page 7
exchange rate as well as the price is regulated in Canada. In order to take advantage of these
cheaper prices some US citizens are using Canadian online pharmacies. They attain price
information and order forms from these websites. Since electronic orders are not allowed the US
customers fax in the required information to the online pharmacies to get their prescriptions.
Economic Issues
From an economic aspect there have been several advantages to electronic commerce. In
particular consumers have more suppliers, sometimes including foreign suppliers. Searching the
Internet can also be done to find the lowest price. In general the market becomes larger and
makes for more competition. This increased competition can bring down prices for consumers
and other businesses. Further, the increase in information and choice available can help increase
the efficiency of a supply and demand equilibrium.
Also, with increased competition companies themselves will try to become more efficient. This
may be by new technologies or methods that reduce costs and increase productivity. In turn
from this lower prices may occur or the emergence of new technology .
Electronic commerce does have some negative effects on the economy. The availability of
goods online should increase competition and in turn lower prices, but this does not always
occur. A good reputation may allow a retailer to hold some control over their area of the market.
Further, companies can also find with ease the prices of their competitors allowing them to react
immediately to changes. In the worst-case scenario this monitoring may not involve any changes
to price. A price that is not advantageous to the consumer may be kept because no company is
willing to lower their price because it would not be profitable. That is, a company may be
willing to lower their price because the increase in sales would offset the lower price. However,
since other companies can quickly change their price the original company would not make any
extra revenue from increased sales .
Also the increased competition may cause product differentiation. This involves making similar
products that have the same general purpose, but are still unique. In this situation consumers will
have a difficult time comparing different products. As a result of the minimal information
competition will not be as high and prices may not be lower.
![Page 8: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/8.jpg)
http://earnrupees4you.com Page 8
Social Issues
As electronic commerce expands it has a greater social impact. In order for the expansion of e-
commerce to occur there will be a need to improve education about the business side of e-
commerce and the technical side. As rapidly as e-commerce is growing changes are inevitable
and in order to deal with these changes people will have to have education available. Traditional
educational institutes will have to adapt to try and provide experience for the e-commerce market
and information technology in general. Also, there already been expansion of learning about e-
commerce into other forms of education rather then through traditional institutes. Institutes
solely based on learning information technology, including e-commerce, have been opened and
in addition to this online training can also be found.
The health sector of society can also be affected by the development of e-commerce. Electronic
commerce applications can be developed for use by the health care systems. In some cases the
use of these e-commerce sites can be help the system work more efficiently in turn be more cost
effective. By reducing costs using these methods more money can be made available to other
areas of the health sector.
Another aspect of society that is affected by electronic commerce is the sense of community.
Consumers can now belong to a more global community by being able to buy goods from around
the world, however this has its own societal effects. There is a loss of direct physical interaction
between individuals. Also the sense of loyalty that can occur during traditional business can be
harder to develop due to the global aspect and the lack of physical interaction of e-commerce.
Companies have to deal with an entire global market and can face difficulties in maintaining a
focus on specific customers to gain loyalty. There are also concerns that traditional businesses
may begin to suffer significantly is electronic commerce continues to grow.
As well, e-commerce plays a part increasing use and improving computer technology that can be
used by society. Electronic commerce can help the expansion of computer technology to more
people. As more people begin to use e-commerce more companies will begin to take part. This
will lead to better infrastructure and easier access to the Internet in order to encourage an even
larger market. By expanding like this it will not only help companies make more profit, but it
should make the resources of the Internet easier to attain to more people in society. Again, as
![Page 9: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/9.jpg)
http://earnrupees4you.com Page 9
companies look better methods to expand their online-businesses new technologies may be
developed. These new technologies may not only help e-commerce, but may be useful in other
parts of society as well.
Overall Effects
Electronic commerce provides a different way of doing business that comes with its own set of
benefits. The market size increases greatly to encompass the whole globe. This provides
business with more customers and customers more choice. More mass customization can also be
achieved. It become easier through e-commerce for the customer to tell a business exactly what
they require and individualize products or services. Also, electronic commerce allows the
supply chain to be shortened; products can sometime be shipped directly from the manufacturer
to the customer. Other areas where businesses may benefit occur because transactions are
cheaper. This is the case where in a traditional business they would have to pay for labour to
complete the transaction, but by making the transaction electronic there is minimal labour cost.
These are a few examples of some general benefits of electronic commerce .
Even though there are benefits to both consumers and businesses there are still issues limiting
electronic commerce effectiveness. These issues have to deal with the problems related to
privacy. There is a general lack of trust in what is happening to customer‘s information and the
security of their data. Increasing consumer confidence in e-commerce is one of the biggest
challenges facing this form of business. Companies have to prove they can be loyal and
trustworthy to their customers. We can see the importance of these qualities by seeing that some
of the most profitable e-commerce companies are those that also have traditional stores. These
companies already have a strong customer base that is confident in them and helps make it easier
for consumers to trust their online stores.
Conclusion
Electronic commerce may be a new form of doing business, but it has developed rapidly. Even
though e-commerce has a short history there have been several important turning points in its
development. Further, as progress took place more markets opened up for the use of electronic
commerce. It became apparent it could be used more then just for Consumer-to-Consumer, but
also for other markets such as Business-to-Business. Current research in e-commerce is focusing
![Page 10: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/10.jpg)
http://earnrupees4you.com Page 10
on making the experience more natural and comfortable for the customer, through such
technology as virtual agents. As with other forms of business, e-commerce has impacted some
industries more then others, such as the culture and information sector. Other industries, like
banking, have the potential for large future growth via electronic commerce. As this growth
continues this type of business has to face social, economic and privacy issues. In each of these
aspects of society we can see areas that e-commerce is being successful, but there are also
areas for improvement. A major are of concern is the issue of privacy. Consumers are hesitant
to use online business because they often have limited guarantees about the privacy of their
information. If concerns like these can be reduced, electronic commerce can play a positive role
in helping improve the world of business.
E-commerce is can be further categorized into the following:
Business -to -Business (B2B)
Business- to- Customer (B2C)
Consumer-to-Business (C2B )
Consumer- to -consumer (C2C)
Business to business is one in which a company deals with another company for business and
exchanging of goods, products, services. Some of the examples of b2b e-commerce sites are a
company's official site, brokering sites etc.
Business to customer------ is one where the company sells its goods to the customer or trades
with the customers. This is electronic retailing and called as e-tailing in common. One of the best
example is amazon.com
Consumer to business is when a customer works for a certain company for business and the
company buys it, here the consumer has to price the trade. Example for such a site is
priceline.com
Consumer to consumer is more like auctioning, bartending, etc... where a consumer places bid
and other buys it. Here the websites acts an intermediate for the business Example for such sites
is eBay.
![Page 11: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/11.jpg)
http://earnrupees4you.com Page 11
B2B(Business-to-Business)
Companies doing business with each other such as manufacturers selling to distributors and
wholesalers selling to retailers. Pricing is based on quantity of order and is often negotiable.
B2C(Business-to-Consumer)
Businesses selling to the general public typically through catalogs utilizing shopping cart
software. By dollar volume, B2B takes the prize, however B2C is really what the average Joe has
in mind with regards to ecommerce as a whole.
C2B(Consumer-to-Business)
A consumer posts his project with a set budget online and within hours companies review the
consumer's requirements and bid on the project. The consumer reviews the bids and selects the
company that will complete the project. Elance empowers consumers around the world by
providing the meeting ground and platform for such transactions.
C2C(Consumer-to-Consumer)
There are many sites offering free classifieds, auctions, and forums where individuals can buy
and sell thanks to online payment systems like PayPal where people can send and receive money
online with ease. eBay's auction service is a great example of where person-to-person
transactions take place everyday since.
Companies using internal networks to offer their employees products and services online--not
necessarily online on the Web--are engaging in B2E (Business-to-Employee) ecommerce.
G2G (Government-to-Government), G2E (Government-to-Employee), G2B (Government-to-
Business), B2G (Business-to-Government), G2C (Government-to-Citizen), C2G (Citizen-to-
Government) are other forms of ecommerce that involve transactions with the government--from
procurement to filing taxes to business registrations to renewing licenses. There are other
categories of ecommerce out there, but they tend to be superfluous.
Value chain
![Page 12: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/12.jpg)
http://earnrupees4you.com Page 12
A value chain is a chain of activities for a firm operating in a specific industry. The business unit
is the appropriate level for construction of a value chain, not the divisional level or corporate
level. Products pass through all activities of the chain in order, and at each activity the product
gains some value. The chain of activities gives the products more added value than the sum of
added values of all activities. It is important not to mix the concept of the value chain with the
costs occurring throughout the activities. A diamond cutter can be used as an example of the
difference. The cutting activity may have a low cost, but the activity adds much of the value to
the end product, since a rough diamond is significantly less valuable than a cut diamond.
Activities
The value chain categorizes the generic value-adding activities of an organization. The "primary
activities" include: inbound logistics, operations (production), outbound logistics, marketing and
sales (demand), and services (maintenance). The "support activities" include: administrative
infrastructure management, human resource management, technology (R&D), and procurement.
The costs and value drivers are identified for each value activity.
Significance
The value-chain concept has been extended beyond individual firms. It can apply to whole
supply chains and distribution networks. The delivery of a mix of products and services to the
end customer will mobilize different economic factors, each managing its own value chain. The
industry wide synchronized interactions of those local value chains create an extended value
chain, sometimes global in extent. Porter terms this larger interconnected system of value chains
the "value system." A value system includes the value chains of a firm's supplier (and their
suppliers all the way back), the firm itself, the firm distribution channels, and the firm's buyers
(and presumably extended to the buyers of their products, and so on).
Capturing the value generated along the chain is the new approach taken by many management
strategists. For example, a manufacturer might require its parts suppliers to be located nearby its
![Page 13: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/13.jpg)
http://earnrupees4you.com Page 13
assembly plant to minimize the cost of transportation.
Value chain analysis has also been successfully used in large Petrochemical Plant Maintenance
Organizations to show how Work Selection, Work Planning, Work Scheduling and finally Work
Execution can (when considered as elements of chains) help drive Lean approaches to
Maintenance. The Maintenance Value Chain approach is particularly successful when used as a
tool for helping Change Management as it is seen as more user friendly than other business
process tools.
Value chain analysis has also been employed in the development sector as a means of identifying
poverty reduction strategies by upgrading along the value chain [4]
.
Value Reference Model
A Value Reference Model (VRM) developed by the global not-for-profit Value Chain Group
offers an open source semantic dictionary for value chain management encompassing one unified
reference framework representing the process domains of product development, customer
relations and supply networks.
The integrated process framework guides the modeling, design, and measurement of business
performance by uniquely encompassing the plan, govern and execute requirements for the
design, product, and customer aspects of business.
The Value Chain Group claims VRM to be next generation Business Process Management that
enables value reference modeling of all business processes and provides product excellence,
operations excellence, and customer excellence.
Six business functions of the Value Chain:
Research and Development
Design of Products, Services, or Processes
Production
Marketing & Sales
![Page 14: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/14.jpg)
http://earnrupees4you.com Page 14
Distribution
Customer Service
Advantages and disadvantages of e commerce Like any conventional business, electronic commerce is also characterized by some advantages
and inherent drawbacks. Let's have a look at some of these important advantages and
disadvantages of electronic commerce.
The greatest and the most important advantage of e-commerce, is that it enables a business
concern or individual to reach the global market. It caters to the demands of both the national and
the international market, as your business activities are no longer restricted by geographical
boundaries. With the help of electronic commerce, even small enterprises can access the global
market for selling and purchasing products and services. Even time restrictions are nonexistent
while conducting businesses, as e-commerce empowers one to execute business transactions 24
hours a day and even on holidays and weekends. This in turn significantly increases sales and
profit.
Electronic commerce gives the customers the opportunity to look for cheaper and quality
products. With the help of e-commerce, consumers can easily research on a specific product and
sometimes even find out the original manufacturer to purchase a product at a much cheaper price
than that charged by the wholesaler. Shopping online is usually more convenient and time saving
than conventional shopping. Besides these, people also come across reviews posted by other
customers, about the products purchased from a particular e-commerce site, which can help
make purchasing decisions.
For business concerns, e-commerce significantly cuts down the cost associated with marketing,
customer care, processing, information storage and inventory management. It reduces the time
period involved with business process re-engineering, customization of products to meet the
demand of particular customers, increasing productivity and customer care services. Electronic
commerce reduces the burden of infrastructure to conduct businesses and thereby raises the
amount of funds available for profitable investment. It also enables efficient customer care
![Page 15: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/15.jpg)
http://earnrupees4you.com Page 15
services. On the other hand, It collects and manages information related to customer behavior,
which in turn helps develop and adopt an efficient marketing and promotional strategy.
Disadvantages
Electronic commerce is also characterized by some technological and inherent limitations which
has restricted the number of people using this revolutionary system. One important disadvantage
of e-commerce is that the Internet has still not touched the lives of a great number of people,
either due to the lack of knowledge or trust. A large number of people do not use the Internet for
any kind of financial transaction. Some people simply refuse to trust the authenticity of
completely impersonal business transactions, as in the case of e-commerce. Many people have
reservations regarding the requirement to disclose personal and private information for security
concerns. Many times, the legitimacy and authenticity of different e-commerce sites have also
been questioned.
Another limitation of e-commerce is that it is not suitable for perishable commodities like food
items. People prefer to shop in the conventional way than to use e-commerce for purchasing food
products. So e-commerce is not suitable for such business sectors. The time period required for
delivering physical products can also be quite significant in case of e-commerce. A lot of phone
calls and e-mails may be required till you get your desired products. However, returning the
product and getting a refund can be even more troublesome and time consuming than
purchasing, in case if you are not satisfied with a particular product.
Thus, on evaluating the various pros and cons of electronic commerce, we can say that the
advantages of e-commerce have the potential to outweigh the disadvantages. A proper strategy to
address the technical issues and to build up customers trust in the system, can change the present
scenario and help e-commerce adapt to the changing needs of the world.
Value Chain
To analyze the specific activities through which firms can create a competitive advantage, it is
![Page 16: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/16.jpg)
http://earnrupees4you.com Page 16
useful to model the firm as a chain of value-creating activities. Michael Porter identified a set of
interrelated generic activities common to a wide range of firms. The resulting model is known as
the value chain and is depicted below:
Primary Value Chain Activities
Inbound
Logistics > Operations >
Outbound
Logistics >
Marketing
& Sales > Service
The goal of these activities is to create value that exceeds the cost of providing the product or
service, thus generating a profit margin.
Inbound logistics include the receiving, warehousing, and inventory control of input
materials.
Operations are the value-creating activities that transform the inputs into the final
product.
Outbound logistics are the activities required to get the finished product to the customer,
including warehousing, order fulfillment, etc.
Marketing & Sales are those activities associated with getting buyers to purchase the
![Page 17: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/17.jpg)
http://earnrupees4you.com Page 17
product, including channel selection, advertising, pricing, etc.
Service activities are those that maintain and enhance the product's value including
customer support, repair services, etc.
Any or all of these primary activities may be vital in developing a competitive advantage. For
example, logistics activities are critical for a provider of distribution services, and service
activities may be the key focus for a firm offering on-site maintenance contracts for office
equipment.
These five categories are generic and portrayed here in a general manner. Each generic activity
includes specific activities that vary by industry.
Support Activities
The primary value chain activities described above are facilitated by support activities. Porter
identified four generic categories of support activities, the details of which are industry-specific.
Procurement - the function of purchasing the raw materials and other inputs used in the
value-creating activities.
Technology Development - includes research and development, process automation, and
other technology development used to support the value-chain activities.
Human Resource Management - the activities associated with recruiting, development,
and compensation of employees.
Firm Infrastructure - includes activities such as finance, legal, quality management, etc.
Support activities often are viewed as "overhead", but some firms successfully have used them
to develop a competitive advantage, for example, to develop a cost advantage through
innovative management of information systems.
![Page 18: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/18.jpg)
http://earnrupees4you.com Page 18
Value Chain Analysis
In order to better understand the activities leading to a competitive advantage, one can begin with
the generic value chain and then identify the relevant firm-specific activities. Process flows can
be mapped, and these flows used to isolate the individual value-creating activities.
Once the discrete activities are defined, linkages between activities should be identified. A
linkage exists if the performance or cost of one activity affects that of another. Competitive
advantage may be obtained by optimizing and coordinating linked activities.
The value chain also is useful in outsourcing decisions. Understanding the linkages between
activities can lead to more optimal make-or-buy decisions that can result in either a cost
advantage or a differentiation advantage.
The Value System
The firm's value chain links to the value chains of upstream suppliers and downstream buyers.
The result is a larger stream of activities known as the value system. The development of a
competitive advantage depends not only on the firm-specific value chain, but also on the value
system of which the firm is a part.
Supply chain
A supply chain is a system of organizations, people, technology, activities, information and
resources involved in moving a product or service from supplier to customer. Supply chain
activities transform natural resources, raw materials and components into a finished product that
is delivered to the end customer. In sophisticated supply chain systems, used products may re-
enter the supply chain at any point where residual value is recyclable. Supply chains link value
chains.
![Page 19: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/19.jpg)
http://earnrupees4you.com Page 19
Overview
The Council of Supply Chain Management Professionals (CSCMP) defines Supply Chain
Management as follows: ―Supply Chain Management encompasses the planning and
management of all activities involved in sourcing and procurement, conversion, and all logistics
management activities. Importantly, it also includes coordination and collaboration with channel
partners, which can be suppliers, intermediaries, third-party service providers, and customers.
In essence, supply chain management integrates supply and demand management within and
across companies.
Supply Chain Management is an integrating function with primary responsibility for linking
major business functions and business processes within and across companies into a cohesive
and high-performing business model.
A typical supply chain begins with ecological and biological regulation of natural resources,
followed by the human extraction of raw material, and includes several production links (e.g.,
component construction, assembly, and merging) before moving on to several layers of storage
facilities of ever-decreasing size and ever more remote geographical locations, and finally
reaching the consumer.
Many of the exchanges encountered in the supply chain will therefore be between different
companies that will seek to maximize their revenue within their sphere of interest, but may have
little or no knowledge or interest in the remaining players in the supply chain. More recently, the
loosely coupled, self-organizing network of businesses that cooperates to provide product and
service offerings has been called the Extended Enterprise]
Supply chain modeling
A diagram of a supply chain. The black arrow represents the flow of materials and information
![Page 20: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/20.jpg)
http://earnrupees4you.com Page 20
and the gray arrow represents the flow of information and backhauls. The elements are (a) the
initial supplier, (b) a supplier, (c) a manufacturer, (d) a customer, (e) the final customer.
There are a variety of supply chain models, which address both the upstream and downstream
sides. However the SCOR model is most common.
The SCOR Supply-Chain Operations Reference model, developed by the Supply Chain Council,
measures total supply chain performance. It includes delivery and order fulfillment performance,
production flexibility, warranty and returns processing costs, inventory and asset turns, and other
factors in evaluating the overall effective performance of a supply chain.
The Global Supply Chain Forum (GSCF) introduced another Supply Chain Model. This
framework is built on eight key business processes that are both cross-functional and cross-firm
in nature. Each process is managed by a cross-functional team, including representatives from
logistics, production, purchasing, finance, marketing and research and development. While each
process will interface with key customers and suppliers, the customer relationship management
and supplier relationship management processes form the critical linkages in the supply chain.
Supply chain management
In the 1980s, the term Supply Chain Management (SCM) was developed to express the need to
integrate the key business processes, from end user through original suppliers. Original suppliers
being those that provide products, services and information that add value for customers and
other stakeholders. The basic idea behind the SCM is that companies and corporations involve
themselves in a supply chain by exchanging information regarding market fluctuations and
production capabilities.
If all relevant information is accessible to any relevant company, every company in the supply
chain has the possibility to and can seek to help optimizing the entire supply chain rather than
sub optimize based on a local interest. This will lead to better planned overall production and
distribution which can cut costs and give a more attractive final product leading to better sales
and better overall results for the companies involved.
![Page 21: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/21.jpg)
http://earnrupees4you.com Page 21
Incorporating SCM successfully leads to a new kind of competition on the global market where
competition is no longer of the company versus company form but rather takes on a supply chain
versus supply chain form.
The primary objective of supply chain management is to fulfill customer demands through the
most efficient use of resources, including distribution capacity, inventory and labor.
In theory, a supply chain seeks to match demand with supply and do so with the minimal
inventory.
There is often confusion over the terms supply chain and logistics. It is now generally accepted
that the term Logistics applies to activities within one company/organization involving
distribution of product whereas the term supply chain also encompasses manufacturing and
procurement and therefore has a much broader focus as it involves multiple enterprises,
including suppliers, manufacturers and retailers, working together to meet a customer need for a
product or service.
There are actually four common Supply Chain Models. Besides the two mentioned above, there
are the American Productivity & Quality Center's (APQC) Process Classification Framework
and the Supply Chain Best Practices Framework.
An unusual food supply chain operated by illiterate Dabbawalas in Mumbai is noted for being
extremely reliable without using any computers or modern technology. It has been verified to be
a six sigma supply chain, meaning they make less than 3.4 mistakes per million deliveries.
.
![Page 22: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/22.jpg)
http://earnrupees4you.com Page 22
UNIT-2 Credit card
A credit card is a small plastic card issued to users as a system of payment. It allows its
holder to buy goods and services based on the holder's promise to pay for these goods and
services. The issuer of the card grants a line of credit to the consumer (or the user) from
which the user can borrow money for payment to a merchant or as a cash advance to the use.
A credit card is different from a charge card: a charge card requires the balance to be paid in
full each month. In contrast, credit cards allow the consumers a continuing balance of debt,
subject to interest being charged. Most credit cards are issued by banks or credit unions, and
are the shape and size specified by the ISO/IEC 7810 standard as ID-1. This is defined as
85.60 × 53.98 mm (3.370 × 2.125 in) (33/8 × 2
1/8 in) in size.
How credit cards work
Credit cards are issued after an account has been approved by the credit provider, after which
cardholders can use it to make purchases at merchants accepting that card. Merchants often
advertise which cards they accept by displaying acceptance marks – generally derived from
logos – or may communicate this orally, as in "Credit cards are fine" (implicitly meaning "major
brands"), "We take (brands X, Y, and Z)", or "We don't take credit cards".
When a purchase is made, the credit card user agrees to pay the card issuer. The cardholder
indicates consent to pay by signing a receipt with a record of the card details and indicating the
amount to be paid or by entering a personal identification number (PIN). Also, many merchants
now accept verbal authorizations via telephone and electronic authorization using the Internet,
known as a card not present transaction (CNP).
Electronic verification systems allow merchants to verify in a few seconds that the card is valid
and the credit card customer has sufficient credit to cover the purchase, allowing the verification
to happen at time of purchase. The verification is performed using a credit card payment terminal
or point-of-sale (POS) system with a communications link to the merchant's acquiring bank.
Data from the card is obtained from a magnetic stripe or chip on the card; the latter system is
called Chip and PIN in the United Kingdom and Ireland, and is implemented as an EMV card.
For card not present transactions where the card is not shown (e.g., e-commerce, mail order, and
telephone sales), merchants additionally verify that the customer is in physical possession of the
card and is the authorised user by asking for additional information such as the security code
printed on the back of the card, date of expiry, and billing address.
Each month, the credit card user is sent a statement indicating the purchases undertaken with the
card, any outstanding fees, and the total amount owed. After receiving the statement, the
cardholder may dispute any charges that he or she thinks are incorrect. Otherwise, the cardholder
must pay a defined minimum proportion of the bill by a due date, or may choose to pay a higher
amount up to the entire amount owed. The credit issuer charges interest on the amount owed if
the balance is not paid in full. Some financial institutions can arrange for automatic payments to
be deducted from the user's bank accounts, thus avoiding late payment altogether as long as the
![Page 23: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/23.jpg)
http://earnrupees4you.com Page 23
cardholder has sufficient funds.
Benefits to customers
The main benefit to each customer is convenience. Compared to debit cards and cheques, a credit
card allows small short-term loans to be quickly made to a customer who need not calculate a
balance remaining before every transaction, provided the total charges do not exceed the
maximum credit line for the card. Credit cards also provide more fraud protection than debit
cards. In the UK for example, the bank is jointly liable with the merchant for purchases of
defective products over £100.[2]
Many credit cards offer rewards and benefits packages, such as offering enhanced product
warranties at no cost, free loss/damage coverage on new purchases, and points which may be
redeemed for cash, products, or airline tickets. Additionally, carrying a credit card may be a
convenience to some customers as it eliminates the need to carry any cash for most purposes.
Detriments to customers
1]High interest and bankruptcy
Low introductory credit card rates are limited to a fixed term, usually between 6 and 12 months,
after which a higher rate is charged. As all credit cards charge fees and interest, some customers
become so indebted to their credit card provider that they are driven to bankruptcy. Some credit
cards often levy a rate of 20 to 30 percent after a payment is missed; in other cases a fixed charge
is levied without change to the interest rate.
2] Inflated pricing for all consumers
Merchants that accept credit cards must pay interchange fees and discount fees on all credit-card
transactions.[3][4]
In some cases merchants are barred by their credit agreements from passing
these fees directly to credit card customers, or from setting a minimum transaction amount.[5]
Grace period
A credit card's grace period is the time the customer has to pay the balance before interest is
assessed on the outstanding balance. Grace periods vary, but usually range from 20 to 50 days
depending on the type of credit card and the issuing bank. Usually, if a customer is late paying
the balance, finance charges will be calculated and the grace period does not apply. Finance
charges incurred depend on the grace period and balance; with most credit cards there is no grace
period if there is any outstanding balance from the previous billing cycle or statement (i.e.
interest is applied on both the previous balance and new transactions). However, there are some
credit cards that will only apply finance charge on the previous or old balance, excluding new
transactions
Benefits to merchants
An example of street markets accepting credit cards. Most simply display the acceptance marks
(stylized logos, shown in the upper-left corner of the sign) of all the cards they accept.
![Page 24: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/24.jpg)
http://earnrupees4you.com Page 24
For merchants, a credit card transaction is often more secure than other forms of payment, such
as checks, because the issuing bank commits to pay the merchant the moment the transaction is
authorized, regardless of whether the consumer defaults on the credit card payment. In most
cases, cards are even more secure than cash, because they discourage theft by the merchant's
employees and reduce the amount of cash on the premises.
Prior to credit cards, each merchant had to evaluate each customer's credit history before
extending credit. That task is now performed by the banks which assume the credit risk. Credit
cards can also aid in securing a sale, especially if the customer does not have enough cash on his
or her person or checking account. Extra turnover is generated by the fact that the customer can
purchase goods and/or services immediately and is less inhibited by the amount of cash in his or
her pocket and the immediate state of his or her bank balance.
For each purchase, the bank charges the merchant a commission (discount fee) for this service
and there may be a certain delay before the agreed payment is received by the merchant. The
commission is often a percentage of the transaction amount, plus a fixed fee (interchange rate).
In addition, a merchant may be penalized or have their ability to receive payment using that
credit card restricted if there are too many cancellations or reversals of charges as a result of
disputes.
In some countries, for example the Nordic countries, banks guarantee payment on stolen cards
only if an ID card is checked and the ID card number/civic registration number is written down
on the receipt together with the signature. In these countries merchants therefore usually ask for
ID. Non-Nordic citizens, who are unlikely to possess a Nordic ID card or driving license, will
instead have to show their passport, and the passport number will be written down on the receipt,
sometimes together with other information. Some shops use the card's PIN for identification, and
in that case showing an ID card is not necessary.
Costs to merchants
Merchants are charged several fees for the privilege of accepting credit cards. The merchant is
usually charged a commission of 1%-3%+ of the value of each transaction paid for by credit
card. The merchant may also pay a variable charge, called an interchange rate, for each
transaction.[3]
In some instances of very low-value transactions, use of credit cards will
significantly reduce the profit margin or cause the merchant to lose money on the transaction.
In certain countries, merchants are required to pay the acquiring banks a monthly terminal rental
fee, if the terminals are provided by the acquiring banks. Merchants can apply to the acquiring
banks for waivers of the fees, which the banks usually agree to for merchants with a high volume
of sales, but not for smaller ones.
Parties involved
Cardholder: The holder of the card used to make a purchase; the consumer.
Card-issuing bank: The financial institution or other organization that issued the credit
card to the cardholder.This bank bills the consumer for repayment and bears the risk that
the card is used fraudulently Cards issued by banks to cardholders in a different country
![Page 25: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/25.jpg)
http://earnrupees4you.com Page 25
are known as offshore credit cards.
Merchant: The individual or business accepting credit card payments for products or
services sold to the cardholder.
Acquiring bank: The financial institution accepting payment for the products or services
on behalf of the merchant.
Independent sales organization: Resellers (to merchants) of the services of the
acquiring bank.
Merchant account: This could refer to the acquiring bank or the independent sales
organization, but in general is the organization that the merchant deals with.
Credit Card association: An association of card-issuing banks such as Visa,
MasterCard, Discover, American Express, etc. that set transaction terms for
merchants, card-issuing banks, and acquiring banks.
Transaction network: The system that implements the mechanics of the electronic
transactions. May be operated by an independent company, and one company may
operate multiple networks.
Affinity partner: Some institutions lend their names to an issuer to attract customers that
have a strong relationship with that institution, and get paid a fee or a percentage of the
balance for each card issued using their name. Examples of typical affinity partners are
sports teams, universities, charities, professional organizations, and major retailers.
Transaction steps
Authorization: The cardholder pays for the purchase and the merchant submits the
transaction to the acquirer (acquiring bank). The acquirer verifies the credit card number,
the transaction type and the amount with the issuer (Card-issuing bank) and reserves that
amount of the cardholder's credit limit for the merchant. An authorization will generate
an approval code, which the merchant stores with the transaction.
Batching: Authorized transactions are stored in "batches", which are sent to the acquirer.
Batches are typically submitted once per day at the end of the business day. If a
transaction is not submitted in the batch, the authorization will stay valid for a period
determined by the issuer, after which the held amount will be returned back to the
cardholder's available credit.
Clearing and Settlement: The acquirer sends the batch transactions through the credit
card association, which debits the issuers for payment and credits the acquirer.
Essentially, the issuer pays the acquirer for the transaction.
Funding: Once the acquirer has been paid, the acquirer pays the merchant. The merchant
receives the amount totaling the funds in the batch minus either the "discount rate," "mid-
qualified rate", or "non-qualified rate" which are tiers of fees the merchant pays the
acquirer for processing the transactions.
![Page 26: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/26.jpg)
http://earnrupees4you.com Page 26
Chargebacks: A chargeback is an event in which money in a merchant account is held
due to a dispute relating to the transaction. Chargebacks are typically initiated by the
cardholder. In the event of a chargeback, the issuer returns the transaction to the acquirer
for resolution.
Types of Credit Card
Secured credit cards
A secured credit card is a type of credit card secured by a deposit account owned by the
cardholder. Typically, the cardholder must deposit between 100% and 200% of the total amount
of credit desired. Thus if the cardholder puts down $1000, they will be given credit in the range
of $500–$1000. In these cases, the deposit required may be significantly less than the required
credit limit, and can be as low as 10% of the desired credit limit. This deposit is held in a special
savings account.
The cardholder of a secured credit card is still expected to make regular payments, as with a
regular credit card, but should they default on a payment, the card issuer has the option of
recovering the cost of the purchases paid to the merchants out of the deposit.
The advantage of the secured card for an individual with negative or no credit history is that
most companies report regularly to the major credit bureaus. This allows for building of positive
credit history.
Although the deposit is in the hands of the credit card issuer as security in the event of default by
the consumer, the deposit will not be debited simply for missing one or two payments. Usually
the deposit is only used as an offset when the account is closed, either at the request of the
customer or due to severe delinquency (150 to 180 days). This means that an account which is
less than 150 days delinquent will continue to accrue interest and fees, and could result in a
balance which is much higher than the actual credit limit on the card. In these cases the total debt
may far exceed the original deposit and the cardholder not only forfeits their deposit but is left
with an additional debt.
Most of these conditions are usually described in a cardholder agreement which the cardholder
signs when their account is opened.
Secured credit cards are an option to allow a person with a poor credit history or no credit history
to have a credit card which might not otherwise be available. They are often offered as a means
of rebuilding one's credit. Fees and service charges for secured credit cards often exceed those
charged for ordinary non-secured credit cards., secured cards can often be less expensive in total
cost than unsecured credit cards, even including the security deposit.
Prepaid "credit" cards
A prepaid credit card is not a true credit card, since no credit is offered by the card issuer: the
card-holder spends money which has been "stored" via a prior deposit by the card-holder or
someone else, such as a parent or employer. However, it carries a credit-card brand (such as
Visa, MasterCard, American Express, Discover, or JCB) and can be used in similar ways just as
![Page 27: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/27.jpg)
http://earnrupees4you.com Page 27
though it were a regular credit card. Unlike debit cards, prepaid credit cards do not require a PIN.
After purchasing the card, the cardholder loads the account with any amount of money, up to the
predetermined card limit and then uses the card to make purchases the same way as a typical
credit card. Prepaid cards can be issued to minors (above 13) since there is no credit line
involved.
The main advantage over secured credit cards is that you are not required to come up with $500
or more to open an account. With prepaid credit cards purchasers not charged any interest but are
often charged a purchasing fee plus monthly fees after an arbitrary time period. Many other fees
also usually apply to a prepaid card.
Prepaid credit cards are sometimes marketed to teenagers for shopping online without having
their parents complete the transaction.
Because of the many fees that apply to obtaining and using credit-card-branded prepaid cards,
the Financial Consumer Agency of Canada describes them as "an expensive way to spend your
own money".
Costs
Credit card issuers (banks) have several types of costs:
Interest expenses
Banks generally borrow the money they then lend to their customers. As they receive very low-
interest loans from other firms, they may borrow as much as their customers require, while
lending their capital to other borrowers at higher rates. If the card issuer charges 15% on money
lent to users, and it costs 5% to borrow the money to lend, and the balance sits with the
cardholder for a year, the issuer earns 10% on the loan. This 10% difference is the "net interest
spread" and the 5% is the "interest expense".
Operating costs
This is the cost of running the credit card portfolio, including everything from paying the
executives who run the company to printing the plastics, to mailing the statements, to running the
computers that keep track of every cardholder's balance, to taking the many phone calls which
cardholders place to their issuer, to protecting the customers from fraud rings.
Charge offs
When a consumer becomes severely delinquent on a debt (often at the point of six months
without payment), the creditor may declare the debt to be a charge-off.
A charge-off is considered to be "written off as uncollectable." To banks, bad debts and even
fraud are simply part of the cost of doing business.
![Page 28: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/28.jpg)
http://earnrupees4you.com Page 28
Rewards
Many credit card customers receive rewards, such as frequent flyer points, gift certificates, or
cash back as an incentive to use the card. Rewards are generally tied to purchasing an item or
service on the card, which may or may not include balance transfers, cash advances, or other
special uses.
Fraud
When a card is stolen, or an unauthorized duplicate made, most card issuers will refund some or
all of the charges that the customer has received for things they did not buy. These refunds will,
in some cases, be at the expense of the merchant, especially in mail order cases where the
merchant cannot claim sight of the card. In several countries, merchants will lose the money if no
ID card was asked for, therefore merchants usually require ID card in these countries. Credit card
companies generally guarantee the merchant will be paid on legitimate transactions regardless of
whether the consumer pays their credit card bill. Most banking services have their own credit
card services that handle fraud cases and monitor for any possible attempt at fraud. Employees
that are specialized in doing fraud monitoring and investigation are often placed in Risk
Management, Fraud and Authorization, or Cards and Unsecured Business. Fraud monitoring
emphasizes minimizing fraud losses while making an attempt to track down those responsible
and contain the situation. Credit card fraud is a major white collar crime that has been around for
many decades, even with the advent of the chip based card (EMV) that was put into practice in
some countries to prevent cases such as these. Even with the implementation of such measures,
credit card fraud continues to be a problem.
Promotion
Promotional purchase is any purchase on which separate terms and conditions are set on each
individual transaction unlike a standard purchase where the terms are set on the cardholder‘s
account record and their pricing strategy. All promotional purchases that post to a particular
account will be carrying its own balance called as Promotional Balance.
2 Debit card
A debit card (also known as a bank card or check card) is a plastic card that provides an
alternative payment method to cash when making purchases. Functionally, it can be called an
electronic cheque, as the funds are withdrawn directly from either the bank account, or from the
remaining balance on the card. In some cases, the cards are designed exclusively for use on the
Internet, and so there is no physical card.
In many countries the use of debit cards has become so widespread that their volume of use has
overtaken the cheque and, in some instances, cash transactions. Like credit cards, debit cards are
used widely for telephone and Internet purchases and, unlike credit cards, the funds are
transferred immediately from the bearer's bank account instead of having the bearer pay back the
money at a later date.
Debit cards may also allow for instant withdrawal of cash, acting as the ATM card for
withdrawing cash and as a cheque guarantee card. Merchants may also offer cashback facilities
![Page 29: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/29.jpg)
http://earnrupees4you.com Page 29
to customers, where a customer can withdraw cash along with their purchase.
Types of debit card systems
There are currently three ways that debit card transactions are processed:
online debit (also known as PIN debit),
offline debit (also known as signature debit)
Electronic Purse Card System.
It should be noted that one physical card can include the functions of an online debit card, an
offline debit card and an electronic purse card.
Although many debit cards are of the Visa or MasterCard brand, there are many other types of
debit card, each accepted only within a particular country or region, for example Switch (now:
Maestro) and Solo in the United Kingdom, Interac in Canada, Carte Bleue in France, Laser in
Ireland, "EC electronic cash"in Germany and EFTPOS cards in Australia and New Zealand.
The need for cross-border compatibility and the advent of the euro recently led to many of these
card networks being re-branded with the internationally recognised Maestro logo, which is part
of the MasterCard brand.
Some debit cards are dual branded with the logo of the (former) national card as well as Maestro
(e.g. EC cards in Germany, Laser cards in Ireland, Switch and Solo in the UK, Pinpas cards in
the Netherlands, Bancontact cards in Belgium, etc.).
Online Debit System
Online debit cards require electronic authorization of every transaction and the debits are
reflected in the user‘s account immediately. The transaction may be additionally secured with the
personal identification number (PIN) authentication system and some online cards require such
authentication for every transaction, essentially becoming enhanced automatic teller machine
(ATM) cards.
One difficulty in using online debit cards is the necessity of an electronic authorization device at
the point of sale (POS) and sometimes also a separate PINpad to enter the PIN, although this is
becoming commonplace for all card transactions in many countries. Overall, the online debit
card is generally viewed as superior to the offline debit card because of its more secure
authentication system and live status, which alleviates problems with processing lag on
transactions that may only issue online debit cards. Some on-line debit systems are using the
normal authentication processes of Internet banking to provide real-time on-line debit
transactions. The most notable of these are Ideal and POLi.
![Page 30: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/30.jpg)
http://earnrupees4you.com Page 30
Offline Debit System
Offline debit cards have the logos of major credit cards (e.g. Visa or MasterCard) or major debit
cards (e.g. Maestro in the United Kingdom and other countries, but not the United States) and are
used at the point of sale like a credit card (with payer's signature). This type of debit card may be
subject to a daily limit, and/or a maximum limit equal to the current/checking account balance
from which it draws funds.
[edit] Electronic Purse Card System
Smart-card-based electronic purse systems (in which value is stored on the card chip, not in an
externally recorded account, so that machines accepting the card need no network connectivity)
are in use throughout Europe since the mid-1990s, most notably in Germany (Geldkarte), Austria
(Quick) Switzerland (CASH). In Austria and Germany, all current bank cards now include
electronic purses.
Prepaid Debit Card
Prepaid debit cards, also called reloadable debit cards or reloadable prepaid cards, are often used
for recurring payments. The payer loads funds to the cardholder's card account. Prepaid debit
cards use either the offline debit system or the online debit system to access these funds.
Particularly for companies with a large number of payment recipients abroad, prepaid debit cards
allow the delivery of international payments without the delays and fees associated with
international checks and bank transfers. Providers include Caxton FX prepaid cards, Escape
prepaid cards and Travelex prepaid cards.
Advantages and Disadvantages
Debit and check cards, as they have become widespread, have revealed numerous advantages
and disadvantages to the consumer and retailer alike.
Advantages are as follows:
A consumer who is not credit worthy and may find it difficult or impossible to obtain a
credit card can more easily obtain a debit card, allowing him/her to make plastic
transactions.
For most transactions, a check card can be used to avoid check writing altogether. Check
cards debit funds from the user's account on the spot, thereby finalizing the transaction at
the time of purchase
Like credit cards, debit cards are accepted by merchants with less identification and
scrutiny than personal checks, thereby making transactions quicker and less intrusive.
Unlike a credit card, which charges higher fees and interest rates when a cash advance is
obtained, a debit card may be used to obtain cash from an ATM or a PIN-based
transaction at no extra charge, other than a foreign ATM fee.
The Debit card has many disadvantages as opposed to cash or credit:
![Page 31: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/31.jpg)
http://earnrupees4you.com Page 31
Use of a debit card is not usually limited to the existing funds in the account to which it is
linked, most banks allow a certain threshold over the available bank balance which can
cause overdraft fees if the customer does not depend on their own records of spending.
Many banks are now charging over-limit fees or non-sufficient funds fees based upon
pre-authorizations, and even attempted but refused transactions by the merchant (some of
which may not even be known by the client).
Many merchants mistakenly believe that amounts owed can be "taken" from a customer's
account after a debit card (or number) has been presented, without agreement as to date,
payee name, amount and currency, thus causing penalty fees for overdrafts, over-the-
limit, amounts not available causing further rejections or overdrafts, and rejected
transactions by some banks.
In some countries debit cards offer lower levels of security protection than credit cards.
Theft of the users PIN using skimming devices can be accomplished much easier with a
PIN input than with a signature-based credit transaction
In many places, laws protect the consumer from fraud much less than with a credit card.
While the holder of a credit card is legally responsible for only a minimal amount of a
fraudulent transaction made with a credit card, which is often waived by the bank, the
consumer may be held liable for hundreds of dollars, or even the entire value of
fraudulent debit transactions. The consumer also has a shorter time (usually just two
days) to report such fraud to the bank in order to be eligible for such a waiver with a debit
card[8]
, whereas with a credit card, this time may be up to 60 days. A thief who obtains or
clones a debit card along with its PIN may be able to clean out the consumer's bank
account, and the consumer will have no recourse.
3 Smart card
A smart card, chip card, or integrated circuit card (ICC), is any pocket-sized card with
embedded integrated circuits. There are two broad categories of ICCs. Memory cards contain
only non-volatile memory storage components, and perhaps dedicated security logic.
Microprocessor cards contain volatile memory and microprocessor components. The card is
made of plastic, generally polyvinyl chloride, but sometimes acrylonitrile butadiene styrene or
polycarbonate .
Smart cards may also provide strong security authentication for single sign-on within large
organizations.
A smart card may have the following generic characteristics:
Dimensions similar to those of a credit card. ID-1 of the ISO/IEC 7810 standard defines
cards as nominally 85.60 by 53.98 millimetres (3.370 × 2.125 in). Another popular size is
ID-000 which is nominally 25 by 15 millimetres (0.984 × 0.591 in) (commonly used in
SIM cards). Both are 0.76 millimetres (0.030 in) thick.
Contains a tamper-resistant security system (for example a secure cryptoprocessor and a
secure file system) and provides security services (e.g. protects in-memory information).
![Page 32: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/32.jpg)
http://earnrupees4you.com Page 32
Managed by an administration system which securely interchanges information and
configuration settings with the card, controlling card blacklisting and application-data
updates.
Communicates with external services via card-reading devices, such as ticket readers,
ATMs, etc.
Benefits
Smart cards can provide identification, authentication, data storage and application processing
Types of debit cards
Contact smart card
Contact smart cards have a contact area of approximately 1 square centimetre (0.16 sq in),
comprising several gold-plated contact pads. These pad provide electrical connectivity when
inserted into a reader.
The ISO/IEC 7810 and ISO/IEC 7816 series of standards define:
physical shape and characteristics
electrical connector positions and shapes
electrical characteristics
communications protocols, including commands sent to and responses from the card
basic functionality
Cards do not contain batteries; energy is supplied by the card reader.
Signals
Reader
Contact smart card readers are used as a communications medium between the smart card and a
host, e.g. a computer, a point of sale terminal, or a mobile telephone.
Because the chips in financial cards are the same Subscriber Identity Module (SIM) as in mobile
phones, programmed differently and embedded in a different piece of PVC, chip manufacturers
are building to the more demanding GSM/3G standards.
Contactless smart card
A second card type is the contactless smart card, in which the card communicates with and is
powered by the reader through RF induction technology (at data rates of 106 to 848
kilobits/second). These cards require only proximity to an antenna to communicate. They are
![Page 33: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/33.jpg)
http://earnrupees4you.com Page 33
often used for quick or hands-free transactions such as paying for public transportation without
removing the card from a wallet.
ISO/IEC 14443 is the standard for contactless smart card communications. It defines two types
of contactless cards ("A" and "B"). Proposals for ISO/IEC 14443 types C, D, E, F and G have
been rejected by the International Organization for Standardization
Examples of widely used contactless smart cards are Hong Kong's Octopus card, Shanghai's
Public Transportation Card, Moscow's Transport/Social Card, South Korea's T-money (bus,
subway, taxi).
Hybrids
Dual-interface cards implement contactless and contact interfaces on a single card with some
shared storage and processing. An example is Porto's multi-application transport card, called
Andante, that uses a chip with both contact and contactless interfaces.
Applications
Computer security
The Mozilla Firefox web browser can use smart cards to store certificates for use in secure web
browsing.
Smart cards are also used for single sign-on to log on to computers.
Financial
Smart cards serve as credit or ATM cards, fuel cards, mobile phone SIMs, authorization cards for
pay television, household utility pre-payment cards, high-security identification and access-
control cards, and public transport and public phone payment cards.
Smart cards may also be used as electronic wallets. The smart card chip can be "loaded" with
funds to pay parking meters and vending machines or at various merchants.
Health care (medical)
Smart health cards can improve the security and privacy of patient information, provide a secure
carrier for portable medical records, reduce health care fraud, support new processes for portable
medical records, provide secure access to emergency medical information, enable compliance
with government initiatives and mandates, and provide the platform to implement other
applications as needed by the health care organization.
Identification
A quickly growing application is in digital identification. In this application, the cards
authenticate identity. The most common example employs PKI. The card stores an encrypted
digital certificate issued from the PKI provider along with other relevant information.
The first smart card driver's license system in the world was issued in 1995 in Mendoza province
![Page 34: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/34.jpg)
http://earnrupees4you.com Page 34
of Argentina
Other
Smart cards are widely used to protect digital television streams. VideoGuard is a specific
example of how smart card security worked (and was cracked).
Security
Smart cards have been advertised as suitable for personal identification tasks, because they are
engineered to be tamper resistant. The chip usually implements some cryptographic algorithm.
There are, however, several methods for recovering some of the algorithm's internal state.
Differential power analysis
Differential power analysis[17]
involves measuring the precise time and electrical current required
for certain encryption or decryption operations. This can deduce the on-chip private key used by
public key algorithms such as RSA. Some implementations of symmetric ciphers can be
vulnerable to timing or power attacks as well.
Physical disassembly
Smart cards can be physically disassembled by using acid, abrasives, or some other technique to
obtain unrestricted access to the on-board microprocessor.
Problems
The plastic card in which the chip is embedded is fairly flexible, and the larger the chip, the
higher the probability that normal use could damage it.
Cards are often carried in wallets or pockets—a harsh environment for a chip. However, for
large banking systems, failure-management costs can be more than offset by fraud reduction.
Using a smart card for mass transit presents a privacy risk, because it allows the mass transit
operator (and the government) to track an individual's movement.
Another problem is the lack of standards for functionality and security. To address this problem,
The Berlin Group launched the Project to propose "a new functional and security framework for
smart-card based Point of Interaction (POI) equipment".
4 Definition of E-Money
Electronic money (also known as e-currency, e-money, electronic cash, electronic currency,
digital money, digital cash or digital currency) refers to money or scrip which is only
exchanged electronically. Typically, this involves the use of computer networks, the internet and
digital stored value systems.
Electronic Funds Transfer (EFT) and direct deposit are all examples of electronic money. Also, it
![Page 35: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/35.jpg)
http://earnrupees4you.com Page 35
is a collective term for financial cryptography and technologies enabling it.
While electronic money has been an interesting problem for cryptography, to date, the use of e-
money has been relatively low-scale. One rare success has been Hong Kong's Octopus card
system, which started as a transit payment system and has grown into a widely used electronic
money system. Two other cities have implemented functioning electronic money systems. Very
similar to Hong Kong's Octopus card, Singapore has an electronic money program for its public
transportation system (commuter trains, bus, etc.). The Netherlands has also implemented an
electronic money system known as Chipknip, which is based upon the same system in Hong
Kong.
A number of electronic money systems use Contactless payment transfer in order to facilitate
easy payment and give the payee more confidence in not letting go of their electronic wallet
during the transaction.
2]E-money refers to any money that is only transferred electronically. Digital currency providers
may make their money selling the e-currency to consumers or by charging transaction fees to
change e-money into actual currency. Several e-money scripts are eCash, eCache, WebMoney,
Google Checkout and Gogopay. Digital currency can offer more privacy than debit and credit
card transactions.
Electronic money systems
In technical terms, electronic money is an online representation, or a system of debits and credits,
used to exchange value within another system, or within itself as a stand alone system.
Occasionally, the term electronic money is also used to refer to the provider itself. A private
currency may use gold to provide extra security, such as digital gold currency.
Centralised systems
Many systems—such as Paypal, WebMoney, cashU, and Hub Culture's Ven—will sell their
electronic currency directly to the end user, but other systems only sell through third party digital
currency exchangers.
In the case of Octopus card in Hong Kong, electronic money deposits work similarly to regular
bank deposits. After Octopus Card Limited receives money for deposit from users, the money is
deposited into a bank. This is similar to debit-card-issuing banks redepositing money at central
banks.
Decentralised systems
Decentralised electronic money systems include:
Bitcoin, an anonymous distributed electronic money system
Ripple monetary system, a project to develop a distributed system of electronic money
independent of local currency.
PKTP, a pseudonymous distributed electronic money system
![Page 36: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/36.jpg)
http://earnrupees4you.com Page 36
Offline 'anonymous' systems
In the use of offline electronic money, the merchant does not need to interact with the bank
before accepting money from the user. Instead merchants can collect monies spent by users and
deposit them later with the bank. In principle this could be done offline, i.e. the merchant could
go to the bank with his storage media to exchange e-money for cash. Nevertheless the merchant
is guaranteed that the user's e-money will either be accepted by the bank, or the bank will be able
to identify and punish the cheating user. In this way a user is prevented from spending the same
funds twice (double-spending). Offline e-money schemes also need to protect against cheating
merchants, i.e. merchants that want to deposit money twice (and then blame the user).
Issues
Although electronic money can provide many benefits—such as convenience and privacy,
increased efficiency of transactions, lower transaction fees, and new business opportunities with
the expansion of economic activities on the Internet—there are many potential issues with the
use of e-money.
The transfer of digital currencies raises local issues such as how to levy taxes or the possible ease
of money laundering,total amount of electronic money versus the total amount of real money
available, basically the possibility that digital cash could exceed the real cash available.
Another issue is related to computer crime, in which computer criminals may actually alter
computer databases to steal electronic money or by reducing an account's amount of electronic
money.
Similarities Between E-Money and Credit Cards
Both e-money and credit cards are frequently used in online purchases.
Both online transactions using credit cards and e-money require the Internet to send money.
Both forms of currency can be used anywhere in the world if the vendor accepts that means of
payment.
Both credit card transactions and e-money via digital currencies require trust between sender and
receiver.
Both e-money and credit cards rely on the same advances in encryption to transfer information
digitally.
Differences Between E-Money and Credit Cards
E-money when used to transfer legal tender between vendors or individuals can be exchanged
for cash.
Digital currencies are not legal tender, though that currency may be traded with the local
currency.
E-money transactions typically have fewer fraud protections if any.
E-money does not charge interest because it is not a loan.
If someone does not pay a debt owed for a transaction with e-money, they may not be able to sue
the other party; they may only be able to report the problem to the e-money provider.
5 Marketing on the web, marketing strategies, advertising on the web
Internet marketing, also referred to as i-marketing, web-marketing, online-marketing or e-
![Page 37: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/37.jpg)
http://earnrupees4you.com Page 37
Marketing, is the marketing of products or services over the Internet.
The Internet has brought media to a global audience. The interactive nature of Internet marketing
in terms of providing instant responses and eliciting responses are the unique qualities of the
medium. Internet marketing is sometimes considered to be broad in scope because it not only
refers to marketing on the Internet, but also includes marketing done via e-mail and wireless
media. Management of digital customer data and electronic customer relationship management
(ECRM) systems are also often grouped together under internet marketing.
Internet marketing ties together creative and technical aspects of the Internet, including: design,
development, advertising, and sales.
Internet marketing also refers to the placement of media along many different stages of the
customer engagement cycle through search engine marketing (SEM), search engine optimization
(SEO), banner ads on specific websites, e-mail marketing, and Web 2.0 strategies.
Business models
Internet marketing is associated with several business models:
e-commerce – this is where goods are sold directly to consumers (B2C) or businesses
(B2B)
lead-based websites – an organization that generates value by acquiring sales leads from
its website
affiliate marketing – the process in which a product or service developed by one entity (e-
commerce business, single person, or a combination) is sold by other active sellers for a
share of profits. The entity of the product may provide some marketing material (sales
letter, affiliate link, tracking facility)
local internet marketing – through which a small company utilizes the Internet to find and
nurture relationships, which are to be used for real-world advantage.
blackhat marketing – this is a form of internet marketing which employs deceptive,
abusive, or less than truthful methods to drive web traffic to a website or affiliate
marketing offer. This method sometimes includes spam, cloaking within search engine
result pages, or routing users to pages they didn't initially request.
One-to-one approach
The targeted user is typically browsing the Internet alone therefore the marketing messages can
reach them personally. This approach is used in search marketing, where the advertisements are
based on search engine keywords entered by the users.
Appeal to specific interests
Internet marketing and geo marketing places an emphasis on marketing that appeals to a specific
![Page 38: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/38.jpg)
http://earnrupees4you.com Page 38
behaviour or interest, rather than reaching out to a broadly defined demographic. "On- and Off-
line" marketers typically segment their markets according to age group, gender, geography, and
other general factors. Marketers have the luxury of targeting by activity and geolocation. For
example, a kayak company can post advertisements on kayaking and canoeing websites with the
full knowledge that the audience has a related interest.
Geo-targeting
Geo targeting (in internet marketing) and geo marketing are the methods of determining the
geolocation (the physical location) of a website visitor with geolocation software, and delivering
different content to that visitor based on his or her location, such as country, region/state, city,
metro code/zip code, organization, Internet Protocol (IP) address, ISP or other criteria.
Advantages
Internet marketing is relatively inexpensive when compared to the ratio of cost against the reach
of the target audience. Therefore, businesses have the advantage of appealing to consumers in a
medium that can bring results quickly. The strategy and overall effectiveness of marketing
campaigns depend on business goals and cost-volume-profit (CVP) analysis.
Internet marketers also have the advantage of measuring statistics easily and inexpensively.
Nearly all aspects of an Internet marketing campaign can be traced, measured, and tested. The
advertisers can use a variety of methods: pay per impression, pay per click, pay per play, or pay
per action. Therefore, marketers can determine which messages or offerings are more appealing
to the audience.
Because exposure, response, and overall efficiency of Internet media are easier to track than
traditional off-line media—through the use of web analytics for instance—Internet marketing
can offer a greater sense of accountability for advertisers.
Limitations
From the buyer's perspective, the inability of shoppers to touch, smell, taste or "try on" tangible
goods before making an online purchase can be limiting. However, there is an industry standard
for e-commerce vendors to reassure customers by having liberal return policies as well as
providing in-store pick-up services.
Security concerns
Information security is important both to companies and consumers that participate in online
business. Many consumers are hesitant to purchase items over the Internet because they do not
trust that their personal information will remain private.
Some companies that purchase customer information offer the option for individuals to have
their information removed from the database, also known as opting out. However, many
customers are unaware if and when their information is being shared, and are unable to stop the
transfer of their information between companies if such activity occurs.
Another major security concern that consumers have with e-commerce merchants is whether or
![Page 39: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/39.jpg)
http://earnrupees4you.com Page 39
not they will receive exactly what they purchase. Online merchants have attempted to address
this concern by investing in and building strong consumer brands (e.g., Amazon.com, eBay,
Overstock.com), and by leveraging merchant/feedback rating systems and e-commerce bonding
solutions. All of these solutions attempt to assure consumers that their transactions will be free of
problems because the merchants can be trusted to provide reliable products and services.
Additionally, the major online payment mechanisms (credit cards, PayPal, Google Checkout,
etc.) have also provided back-end buyer protection systems to address problems if they actually
do occur.
Effects on industries
The number of banks offering the ability to perform banking tasks over the internet has also
increased. Online banking appeals to customers because it is often faster and considered more
convenient than visiting bank branches.]
Internet auctions have become a multi-billion dollar business. Unique items that could only
previously be found at flea markets are now being sold on Internet auction websites such as
eBay. Specialized e-stores sell an almost endless amount of items ranging from antiques, movie
props, clothing, gadgets and much more. As the premier online reselling platform, eBay is often
used as a price-basis for specialized items. Buyers and sellers often look at prices on the website
before going to flea markets; the price shown on eBay often becomes the item's selling price.
In addition to the major effect internet marketing has had on the technology industry, the effect
on the advertising industry itself has been profound.
This has had a growing impact on the electoral process. During the 2007 primaries candidates
added, on average, over 500 social network supporters per day to help spread their message.[10]
President Barack Obama raised over US$1 million in a single day during his extensive
Democratic candidacy campaign, largely due to online donors.[11]
What is a Web Marketing Strategy?
Web or Internet Marketing strategies form the cornerstones of your online business, and outline
in general terms what is required to make your business a success (for example, driving potential
customers to your website). Ideally you should consider and write out the different elements of
your overall marketing strategy before you do anything else.
Internet Marketing Tactics
Achieving the aims set out in your web marketing strategy means taking action and
implementing various marketing tactics. This is where it gets difficult. The problem is knowing
which web marketing tactics actually work, or just as importantly – which don't. There's so much
hype and misinformation about marketing online that it's often difficult to find the truth. Many
end up using incorrect or outdated Internet marketing strategies and tactics that have them
working hard but getting nowhere.
Advertising on the web
Online advertising is a form of promotion that uses the Internet and World Wide Web for the
expressed purpose of delivering marketing messages to attract customers. Examples of online
![Page 40: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/40.jpg)
http://earnrupees4you.com Page 40
advertising include contextual ads on search engine results pages, banner ads, Rich Media Ads,
Social network advertising, interstitial ads, online classified advertising, advertising networks
and e-mail marketing, including e-mail spam.
Competitive advantage over traditional advertising
One major benefit of online advertising is the immediate publishing of information and content
that is not limited by geography or time. To that end, the emerging area of interactive advertising
presents fresh challenges for advertisers who have hitherto adopted an interruptive strategy.
Another benefit is the efficiency of advertiser's investment. Online advertising allows for the
customization of advertisements, including content and posted websites. For example, AdWords,
Yahoo! Search Marketing and AdSense enable ads to be shown on relevant web pages or
alongside search results of related keywords.
Revenue models
The three most common ways in which online advertising is purchased are CPM, CPC, and
CPA.
CPM (Cost Per Mille), also called "Cost Per Thousand (CPT), is where advertisers pay
for exposure of their message to a specific audience. " Per mille" means per
thousand impressions, or loads of an advertisement. However, some impressions may not
be counted, such as a reload or internal user action.
CPV (Cost Per Visitor) is where advertisers pay for the delivery of a Targeted Visitor to
the advertisers website.
CPV (Cost Per View) is when an advertiser pays for each unique user view of an
advertisement or website (usually used with pop-ups, pop-unders and interstitial ads).
CPC (Cost Per Click) is also known as Pay per click (PPC). Advertisers pay each time a
user clicks on their listing and is redirected to their website. They do not actually pay for
the listing, but only when the listing is clicked on. This system allows advertising
specialists to refine searches and gain information about their market.
CPA (Cost Per Action) or (Cost Per Acquisition) advertising is performance based and
is common in the affiliate marketing sector of the business. In this payment scheme,
the publisher takes all the risk of running the ad, and the advertiser pays only for the
amount of users who complete a transaction, such as a purchase or sign-up. This is the
best type of rate to pay for banner advertisements and the worst type of rate to charge.
o Similarly, CPL (Cost Per Lead) advertising is identical to CPA advertising and
is based on the user completing a form, registering for a newsletter or some other
action that the merchant feels will lead to a sale.
o Also common, CPO (Cost Per Order) advertising is based on each time an order
is transacted.
o CPE ( Cost Per Engagement) is a form of Cost Per Action pricing first
![Page 41: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/41.jpg)
http://earnrupees4you.com Page 41
introduced in March 2008. Differing from cost-per-impression or cost-per-click
models, a CPE model means advertising impressions are free and advertisers pay
only when a user engages with their specific ad unit. Engagement is defined as a
user interacting with an ad in any number of ways.[3]
Cost per conversion Describes the cost of acquiring a customer, typically calculated by
dividing the total cost of an ad campaign by the number of conversions. The definition of
"Conversion" varies depending on the situation: it is sometimes considered to be a lead, a
sale, or a purchase.
Types
The large majority of online advertising has a cost that is brought about by usage or interaction
of an ad, there are a few other methods of advertising online that only require a one time
payment. The Million Dollar Homepage is a very successful example of this. Visitors were able
to pay $1 per pixel of advertising space and their advert would remain on the homepage for as
long as the website exists with no extra costs.
Floating ad: An ad which moves across the user's screen or floats above the content.
Expanding ad: An ad which changes size and which may alter the contents of the
webpage.
Polite ad: A method by which a large ad will be downloaded in smaller pieces to
minimize the disruption of the content being viewed
Wallpaper ad: An ad which changes the background of the page being viewed.
Trick banner: A banner ad that looks like a dialog box with buttons. It simulates an error
message or an alert.
Pop-up: A new window which opens in front of the current one, displaying an
advertisement, or entire webpage.
Pop-under: Similar to a Pop-Up except that the window is loaded or sent behind the
current window so that the user does not see it until they close one or more active
windows.
Video ad: similar to a banner ad, except that instead of a static or animated image, actual
moving video clips are displayed. This is the kind of advertising most prominent in
television, and many advertisers will use the same clips for both television and online
advertising.
Map ad: text or graphics linked from, and appearing in or over, a location on an
electronic map such as on Google Maps.
Mobile ad: an SMS text or multi-media message sent to a cell phone.
Interstitial ad: a full-page ad that appears before a user reaches their original destination.
![Page 42: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/42.jpg)
http://earnrupees4you.com Page 42
E-mail advertising
Legitimate Email advertising or E-mail marketing is often known as "opt-in e-mail advertising"
to distinguish it from spam.
Affiliate marketing
Affiliate marketing is a form of online advertising where advertisers place campaigns with a
potentially large number of small (and large) publishers, whom are only paid media fees when
traffic to the advertiser is garnered, and usually upon a specific measurable campaign result (a
form, a sale, a sign-up, etc).
Contextual advertising
Many advertising networks display graphical or text-only ads that correspond to the keywords of
an Internet search or to the content of the page on which the ad is shown. These ads are believed
to have a greater chance of attracting a user, because they tend to contain content relevant to the
user's search query. For example, a search query for "flowers" might return an advertisement for
a florist's website.
Behavioral targeting
In addition to contextual targeting, online advertising can be targeted based on a user's past
clickstream. For example, if a user is known to have recently visited a number of automotive
shopping / comparison sites based on clickstream analysis enabled by cookies stored on the
user's computer, that user can then be served auto-related ads when they visit other, non-
automotive sites.
Semantic advertising
Semantic advertising applies semantic analysis techniques to web pages. The process is meant to
accurately interpret and classify the meaning and/or main subject of the page and then populate it
with targeted advertising spots. By closely linking content to advertising, it is assumed that the
viewer will be more likely to show an interest (i.e., through engagement) in the advertised
product or service.
1 customer service and support
The significance of customer service eludes many senior executives, let alone the methods of
establishing and managing customer service standards and quality. Our own experiences as
customers demonstrate all the time that many large organizations fail particularly to empower
customer-facing and call-centre staff, and also fail to design policies and systems to empower
customer-facing staff and enable effective customer service. Often these are defensive strategies
because staff are not trusted, and because competition is feared, or because simply the policy-
makers and systems-designers are too far removed from customers and their customer service
expectations.
Benefits of effective customer service
![Page 43: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/43.jpg)
http://earnrupees4you.com Page 43
The central aim of effective customer service and call-centres is retaining customers, but when
an organization gets this right the acquisition of new customers - and so many other things -
automatically becomes much easier too.
Retaining customers - enabled by excellent customer service - produces many positive benefits
for the organization aside from the obvious revenue and profit results:
Retaining customers through effective customer service enables easier growth, indirectly
and directly, for example by sustaining healthier volumes and margins, and by business
expansion from word-of-mouth referrals.
High levels of customer retention via effective customer service also improves staff
morale and motivation. No-one enjoys working for an organization that feels like a
sinking ship, or where stressful arguments or pressures prevail. When customers are
happy, all the staff are happier too - and more productive.
Improved staff morale and motivation resulting from reducing customer attrition also
positively benefits staff retention and turnover, recruitment quality and costs, stress,
grievance, discipline and counselling pressures.
Reduced customer attrition and upset naturally reduces litigation and legal problems,
from customers or fair trading laws.
Retaining customers also enables the whole organization - especially middle-managers -
to focus more on proactive opportunities (growth, innovation, development, etc) rather
than reactive fire-fighting, crisis management, failure analysis, and the negative high
pressures to win replacement business.
Having a culture of delighting and retaining customers fuels positive publicity and
reputation in the media, and increasingly on the web in blogs and forums, etc. The
converse applies of course, when nowadays just one disgruntled customer and a
reasonable network of web friends can easily cause a significant public relations
headache.
Customer service code of practice (british standard BS 8477)
While other customer service standards exist in various forms around the world the British
Standards Institute offers a useful and authoritative interpretation which will transfer to most
situations.
The British Standard Code of Practice for Customer Service was published by the British
Standards Institute (BSI) and became effective on 16 April 2007, under the authority of the BSI
Technical Committee responsible for Relationship Management Systems.
As a Code of Practice, this standard is one of guidance and recommendation - it is not a formal
or mandatory specification and should not be offered, implemented or quoted as such.
The Introduction of the code of practice references the Harvard Business Review in summarizing
the main benefits of improving customer satisfaction via effective customer service as being (the
![Page 44: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/44.jpg)
http://earnrupees4you.com Page 44
'3Rs'):
retention
related sales
referrals
It also refers to the research by the (British) Institute of Customer Service (ICS) in identifying
the most important elements of service delivery according to customers:
1. timeliness
2. appearance
3. courtesy
4. quality and efficiency
5. ease of doing business
6. problem-solving
These are interpreted into an alternative set of '3Rs' for effective non-commercial, public sector
customer services and service delivery:
responsive
reliable
respectful
BSI suggests that the Customer Service Code of Practice will assist organisations to:
1. Establish effective customer service mechanisms
2. Improve competitiveness
3. Differentiate their offering via innovative customer services
4. Build customer loyalty through positive customer service experience
5. Increase customer retention
6. Attract new customers via word of mouth
7. Reduce marketing costs
8. Increase service efficiency
9. Reduce complaints and complaints handling resources and costs
10. Improve compliance with consumer trading laws
![Page 45: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/45.jpg)
http://earnrupees4you.com Page 45
11. Improve services and accountability (especially for public sector organizations)
12. Develop and sustain organization-wide focus on customers and quality
13. Improve ease of dealing with organization for customers
These Customer Service Principles are outlined and regarded as essential:
1. Commitment (at all levels)
2. Credibility (keep promises)
3. Culture (customer service ethos)
4. Competencies (of staff - in recruitment, training and assessment)
5. Responsibility (clear and supported with suitable authority - with at least one person
responsible for customer problems)
6. Resources (adequate for effectiveness)
7. Identification and management of all customer service issues
8. Quality (of customer service - relevant input and review)
9. Feedback (enabled for customers and employees)
10. Continual improvement (to meet or exceed customer expectations)
11. Internal customers (establish concept and communications)
The code of practice outlines the Implementation obligations for each main group of workers,
(critically within which is the appointment of a dedicated customer service manager):
1. Top management - establish resources, responsibilities, processes, reporting,
empowerment, culture, etc
2. Customer service management - detailed processes, financial management of customer
services, staffing and training, legal, complaints handling and escalation
3. Employees - awareness of customer services aims, responsibilities and benefits
4. Customer service employees - competent, aware, committed, etc
And outlines principles for the Maintenance of effective customer services, entailing:
1. Feedback - staff, customers, systems
2. Audits
3. Benchmarking
4. Complaints
![Page 46: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/46.jpg)
http://earnrupees4you.com Page 46
The code of practice also contains an annex covering the Recruitment, Competencies and
Training of Customer Services Employees, also covering motivational factors and
recommendations, conduct and behavioural development. The customer service staff
competencies are summarised as:
1. Interpersonal and empathy
2. Communication
3. Handling stress
4. Active listening
5. Team-working
6. Problem-solving and complaints-handling
7. Product and organization knowledge
8. Commitment to aims and values of organization
Customer service tips for organizations and leaders
For organizations needing to improve their customer service, gathering and reviewing customer
complaints is the quickest way to draft an action list. Consulting customer service staff is also
essential.
For all organizations, customer complaints and feedback from customer-facing staff will keep
you constantly aware of areas to improve to keep up with changing markets needs and
expectations.
Treat complaints about service failures like precious gems, because they are that valuable.
So welcome and encourage complaints, don't fear or hide from them, or pretend you are fantastic
because you (make sure that you) don't get any complaints.
Make it as easy for people to complain as to buy. There's a challenge for you..
Here are some common mistakes that organizations make about customer service and complaints
handling in particular:
don't..
Make it difficult for people to complain, e.g., long-winded contact method on your
website.
Make it difficult for customer service staff to give feedback and to influence customer
service systems and policies.
Treat the customer service function like a battery hen farm.
![Page 47: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/47.jpg)
http://earnrupees4you.com Page 47
Fail to have a complaints handling process which you have tested and had approved by
complaining customers.
Fail to appoint anyone responsible for managing complaints handling.
Fail to inform staff about the value of complaints and the need to encourage and respond
to them.
Refuse to escalate complaints and problems, or make escalation to a higher level difficult.
Refuse to give customers the names of senior managers and executives and their contact
details.
Fail to put free or local-rate customer services phone numbers on your invoices and
website.
Fail to show clearly and make available your head office contact details.
Fail to expose senior managers and executives to complaining customers.
Pretend to have a customer service department but merely outsource a basic message-
taking service.
Offer an automated telephone menu system which excludes appropriate and easy options
to complain.
Design punitive termination penalties for customers wishing to cancel their contracts and
instruct your customer service staff to use such threats freely and forcefully.
instead do..
Check your culture. This comes from the top and pervades everything. So this is ultimately for
the CEO or the shareholders to start changing if it's not right.
There is little point in implementing a wonderfully robust and logical customer service code of
practice if your culture can't support it.
So this section is really all about culture and particularly how you treat staff ans customers. All
the rest is relatively easy and mechanical for any decent modern management team, because
aside from culture, customer service relies on sensible service and pricing strategies and the
processes to sell and deliver then and to sort out problems. What makes the real difference is
how you involve and treat people within these processes. Which all comes back to culture.
The culture must be one of really honestly respecting and valuing staff and customers. When you
have this culture the human element gets to work: relationships and communications work,
problems are solved, internally and externally people focus on looking after colleagues and
customers, rather than merely working systems, executing processes and adhering to policies.
The organisation has life - becomes organic - rather than operating as an inflexible machine or a
set of instructions.
![Page 48: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/48.jpg)
http://earnrupees4you.com Page 48
In the context of customer service, a good indication of culture is how easy it is to complain. In
lots of big organizations it's actually very difficult to complain, and even more difficult to
complain and be taken seriously.
You must make it easy for people - customers and staff - to contact you and complain, by email,
post and especially by phone, and to every level in your organization - especially to the CEO.
Executives who never see complaints are deluding themselves. On the pretext of protecting their
precious executive time, countless senior managers and executives are oblivious of what is
happening in their business. Worse still this ostrich-like example teaches all managers that
avoiding complaints is the way to manage customers, which as a customer service strategy is
what might technically be referred to as a load of bollocks. Ask your customers what they think
about senior managers and executives hiding from complaints and most people will use far
stronger terms than that.
Executives who hide from complaints also tend to develop a culture among managers and all
staff that is scared of complaints, which naturally causes people to cover up complaints and to
distort complaints and failure statistics even when asked to report on them.
Megalomaniac, autocratic and egocentric leaders are particularly prone to this syndrome, in
which customer satisfaction information is obscured and massaged so that the entire senior
management moves from denial to blissful ignorance, while the customer service staff continue
to act as a super-absorbent firewall, until one day - when the customer churn is nudging 25% -
the board finally realises that they do indeed have a problem, and that the market and the
competition and the customers - and the customer service staff - are not to blame for it. The
problem is the leadership: the culture, the systems, the policies, the strategies - out of step with
what the customers need and expect.
Interestingly this stems from the insecurity which drives certain traditional leadership styles and
cultures, in which criticism is seen as a threat rather than a useful reflective and improvement
aid. If you are one of these leaders please go get some therapy before you do any more harm to
your staff and customers. Arrogance and bluster are not effective behaviours by which to run a
proper business in the 21st century, let alone to encourage and inspire employees and managers
to strive for customer service excellence.
Instead expose yourself to all the complaints you can find. Remember - you would normally pay
a researcher lots of money for this information. And each complaint gives you the chance to
solve a customer's problem, which often means that you then get to keep that customer for life.
To do this you will need to check that your complaint handling process works for your most
awkward customers and for your most passive customers. This will turn many of your most
awkward customers into your best customers, and some of your most passive customers into
awkward customers, but you will now be receiving complaints, which if you were not seeing any
before is a major advance.
With all these new complaints you will need some expert input and ideas about how to improve
things. Lucky for you, your employees are the world's best experts at improving your services to
your customers, so it makes sense to ask for their help.
![Page 49: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/49.jpg)
http://earnrupees4you.com Page 49
Obviously ensure your customers' complaints are resolved along the way, and equally
importantly, help the organization to develop the capability (and culture) to identify the causes of
problems and to rectify the root causes, to prevent the problems happening again.
It's a lot simple when you get the culture right. Open all the communications. Encourage
complaints. Fix the problems and the systems. Utilise your people to contribute to the whole
process.
2 Introduction to m-Commerce
Mobile Commerce, or m-Commerce, is about the explosion of applications and services that are
becoming accessible from Internet-enabled mobile devices. It involves new technologies,
services and business models. It is quite different from traditional e-Commerce.
Mobile phones impose very different constraints than desktop computers. But they also open the
door to a slew of new applications and services. They follow you wherever you go, making it
possible to look for a nearby restaurant, stay in touch with colleagues, or pay for items at a store.
As the Internet finds its way into our purses or shirt pockets, the devices we use to access it are
becoming more personal too. Already today, mobile phones know the phone numbers of our
friends and colleagues. They are starting to track our location. Tomorrow, they will replace our
wallets and credit cards. One day, they may very well turn into intelligent assistants capable of
anticipating many of our wishes and needs, such as automatically arranging for taxis to come and
pick us up after business meetings or providing us with summaries of relevant news and
messages left by colleagues. But, for all these changes to happen, key issues of interoperability,
usability, security, and privacy still need to be addressed.
Motivating Factors for M-Commerce
Internet use has grown to such a level on the strength of PC networks. Due to the huge base of
installed PCs, which is predicted to grow in a faster pace in the days to come, electronic
commerce and other communication applications are bound to thrive further. Also, these
computing systems will have greater power and storage capability, the best ever price-
performance ratios, more powerful and sophisticated applications will likely emerge for desktop
computing and the Internet. However, there are two major limitations on PCs. First , users have
to sit in front of them, PCs, even portable-notebook computers, have to load software, dial into
and connect with a network service provider and await for the initial process to be accomplished
before launching an Internet application.
It is predicted that by 2004, the installed base of mobile phones worldwide will exceed 1 billion -
more than twice the number of PCs at that time. In addition that, there will be a huge increase in
other wireless portable devices, such as wireless PDA. The advantage with these wireless
devices is they do not need no booting process and thus facilitating immediate usage of them.
This makes them attractive for quick-hit applications.
M-Commerce Applications
The general m-commerce applications are categorized as transaction management, digital
content delivery and telemetry services. The applications can be further subdivided into passive
and active m-commerce applications. Active application relates with the applications in which
![Page 50: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/50.jpg)
http://earnrupees4you.com Page 50
the user has to take the initiative on his wireless device. In contrast, the passive applications
themselves get activated towards accomplishing the assigned jobs or facilitate the users to carry
forward.
Active Applications
M-commerce transactions point to online shopping Web sites tailored to mobile phones and
PDAs which are being equipped with the capabilities of browsing, selection, purchase, payment
and delivery. These sites also include all the necessary shopping features, such as online
catalogs, shopping carts, and back office functions as currently available for desktop computers.
Leading online booksellers already started the commercial activities for wireless devices.
Another important m-commerce transaction is to initiate and pay for purchases and services in
real time. When individuals reach for their e-cash-equipped mobile phones or PDAs instead of
coins to settle micro transactions, such as subway fees, widespread use of digital cash will
become a reality.
The second important one is regarding digital content delivery. Wireless devices can retrieve
status information, such as weather, transit schedules, flash news, sports scores, ticket
availability and market prices, instantly from the providers of information and directory services.
Digital products, such as MP3 music, software, high-resolution images and full-motion
advertising messages, can be easily downloaded to and used in wireless devices when the 3G
transmission technology becomes usable..
The last major application of m-commerce is telemetry services, which include the monitoring of
space flights, meteorological data transmission, video-conference, the Global Positioning System
(Global Positioning System), wildlife tracking, camera control robotics, and oceanography. Thus
in the near future, wireless phones and appliances can be used by people to contact and
communicate with various devices from their homes, offices or any where at any time.
Passive Applications
This type of applications seems manifold and exciting. Instead of using dedicated cash cards for
automatic collection of toll charges, digital cash can be used by integrating cash cards with
mobile devices. Mobile users can easily pay and record payment of toll, mass-transit, fast-food,
and other other transactions
Nowadays mobile users can send and receive short text messages up to 160 characters that show
up on the user's display screen. As digital convergence becomes more commonplace, all kinds of
mail, such as e-mail, fax documents and digitized voice mail, can be received passively. Further
on, users may be tempted for some services free of cost for viewing audio or video advertisement
delivered to their wireless devices. Airline companies are testing this technology to alert
frequent air passengers regarding seat availability and upgradation, to notify the changes made in
the timings etc. through wireless devices.
![Page 51: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/51.jpg)
http://earnrupees4you.com Page 51
UNIT-3.
![Page 52: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/52.jpg)
http://earnrupees4you.com Page 52
e-Government (short for electronic government, also known as e-gov, digital government,
online government, or connected government) is creating a comfortable, transparent, and cheap
interaction between government and citizens (G2C – government to citizens), government and
business enterprises (G2B –government to business enterprises) and relationship between
governments (G2G – inter-agency relationship).
There are four domains of e-government namely, governance, information and communication
technology(ICT), business process re-engineering(BPR)and e-citizen.
Definitions of e-Government and e-Governance abound in literature. Definitions for e-
Government and e-Governance range from the working definitions like ―the ability for anyone
visiting the city website to communicate and/or interact with the city via the Internet in any way
more sophisticated than a simple email letter to the generic city email address provided at the
site‖ to ―the use of technology to enhance the access to and delivery of government services to
benefit citizens, business partners and employees‖.
Delivery models and activities of e-Government
The primary delivery models of e-Government can be divided into:
Government-to-Citizen or Government-to-Consumer (G2C)
Government-to-Business (G2B)
Government-to-Government (G2G)
Government-to-Employees (G2E)
Within each of these interaction domains, four kinds of activities take place
pushing information over the Internet, e.g.: regulatory services, general holidays, public
hearing schedules, issue briefs, notifications, etc.
two-way communications between the agency and the citizen, a business, or another
government agency. In this model, users can engage in dialogue with agencies and post
problems, comments, or requests to the agency.
conducting transactions, e.g.: lodging tax returns, applying for services and grants.
governance, e.g.: online polling, voting, and campaigning.
![Page 53: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/53.jpg)
http://earnrupees4you.com Page 53
Non-internet e-Government
While e-government is often thought of as "online government" or "Internet-based government,"
many non-Internet "electronic government" technologies can be used in this context. Some non-
Internet forms include telephone, fax, PDA, SMS text messaging, MMS, wireless networks and
services, Bluetooth, CCTV, tracking systems, RFID, biometric identification, road traffic
management and regulatory enforcement, identity cards, smart cards and other Near Field
Communication applications; polling station technology (where non-online e-voting is being
considered), TV and radio-based delivery of government services (e.g., CSMW), email, online
community facilities, newsgroups and electronic mailing lists, online chat, and instant messaging
technologies.
Potential benefits and risks of e-Government
I]Risks
There are many considerations and potential implications of implementing and designing e-
government, including disintermediation of the government and its citizens, impacts on
economic, social, and political factors, vulnerability to cyber attacks, and disturbances to the
status quo in these areas..
1]Hyper-surveillance
Increased contact between government and its citizens goes both ways. Once e-government
begins to develop and become more sophisticated, citizens will be forced to interact
electronically with the government on a larger scale. This could potentially lead to a lack of
privacy for civilians as their government obtains more and more information on them. In a worse
case scenario, with so much information being passed electronically between government and
civilians, a totalitarian-like system could develop. When the government has easy access to
countless information on its citizens, personal privacy is lost.
2]Cost
Although ―a prodigious amount of money has been spent‖ on the development and
implementation of e-government, some say it has yielded only a mediocre product. The
outcomes and effects of trial Internet-based governments are often difficult to gauge or
unsatisfactory.
3]Inaccessibility
An e-government site that provides web access and support often does not offer the ―potential to
reach many users including those who live in remote areas, are homebound, have low literacy
levels, exist on poverty line incomes, suffer from chronic illness, are single parents or older
adults.‖
![Page 54: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/54.jpg)
http://earnrupees4you.com Page 54
4]False sense of transparency and accountability
Opponents of e-government argue that online governmental transparency is dubious because it is
maintained by the governments themselves. Information can be added or removed from the
public eye (i.e. the Internet) with or without public notice. For example, after the World Trade
Center in New York City was attacked on September 11, 2001, United States federal officials
removed a large amount of government information from its websites in the name of national
security. This act went relatively unnoticed by United States citizens. To this day, very few
organizations monitor and provide accountability for these modifications.. Even the governments
themselves do not always keep track of the information they insert and delete.
II] Benefits
It is convenient and cost-effective for businesses, and the public benefits by getting easy access
to the most current information available without having to spend time, energy and money to get
it.
E-government helps simplify processes and makes access to government information more easily
accessible for public sector agencies and citizens. For example, the Indiana Bureau of Motor
Vehicles simplified the process of certifying driver records to be admitted in county court
proceedings. Indiana became the first state to allow government records to be digitally signed,
legally certified and delivered electronically by using Electronic Postmark technologyThe
anticipated benefits of e-government include efficiency, improved services, better accessibility of
public services, and more transparency and accountability.
Democratization
One goal of e-government will be greater citizen participation. Through the internet, people from
all over the country can interact with politicians or public servants and make their voices heard.
Blogging and interactive surveys will allow politicians or public servants to see the views of the
people they represent on any given issue. Chat rooms can place citizens in real-time contact with
elected officials, their offices or provide them with the means to replace them by interacting
directly with public servants, allowing voters to have a direct impact and influence in their
government. These technologies can create a more transparent government, allowing voters to
immediately see how and why their representation in the capital is voting the way they are. This
helps voters better decide who to vote for in the future or how to help the public servants become
more productive. A government could theoretically move more towards a true democracy with
the proper application of e-government. Government transparency will give insight to the public
on how decisions are made and hold elected officials or public servants accountable for their
actions.
Environmental bonuses
Proponents of e-government argue that online government services would lessen the need for
hard copy forms. Due to recent pressures from environmentalist groups, the media, and the
public, some governments and organizations have turned to the Internet to reduce this paper use.
The United States government utilizes the website http://www.forms.gov to provide ―internal
government forms for federal employees‖ and thus ―produce significant savings in paper.
![Page 55: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/55.jpg)
http://earnrupees4you.com Page 55
Speed, efficiency, and convenience
E-government allows citizens to interact with computers to achieve objectives at any time and
any location, and eliminates the necessity for physical travel to government agents sitting behind
desks and windows. Improved accounting and record keeping can be noted through
computerization, and information and forms can be easily accessed, equaling quicker processing
time. On the administrative side, access to help find or retrieve files and linked information can
now be stored in databases versus hardcopies stored in various locations.
Public approval
Recent trials of e-government have been met with acceptance and eagerness from the public.
Citizens participate in online discussions of political issues with increasing frequency, and young
people, who traditionally display minimal interest in government affairs, are drawn to e-voting
procedures.
Although internet-based governmental programs have been criticized for lack of reliable privacy
policies, studies have shown that people value prosecution of offenders over personal
confidentiality.
The Generic Models
Broadcasting / Wider-Dissemination Model
Critical Flow Model
Comparative Analysis Model
E-Advocacy/ Lobbying and Pressure Group Model
Interactive- Service Model
Broadcasting / Wider-Dissemination Model
Underlying Principle
The model is based on dissemination / broadcasting of useful governance information which is
in the public domain into the wider public domain through the use of ICT and convergent media.
The strength of the model rests upon the fact that a more informed citizenry is better able to
judge the functioning of existing governance mechanisms and make an informed opinion about
them. As a consequence, they become more empowered to exercise their Rights and
Responsibilities.
The widespread application of this model corrects "information failure situations" by providing
people with the relevant information relating to the governance sphere to make an informed
opinion and impact governance processes.
Further, the use of ICT opens up an alternative channel for people to access information as well
as validate existing information from different sources.
![Page 56: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/56.jpg)
http://earnrupees4you.com Page 56
Applications
This model could be applied in the following possible ways:
Putting Governmental Laws and Legislations online.
Making available the names, contact addresses, emails, fax numbers of local/ regional/
national government officials online.
Make available information pertaining to Governmental Plans, Budgets, Expenditures,
and Performances online.
Putting key Judicial decisions which are of value to general citizens and create a
precedence for future actions online. viz. key Environmental Decisions, State vs. Citizen
decisions etc.
Some Organisations / Projects based on such models
India: Directory of Official Websites of Government of India
National Informatics Centre (India) is the official website of the Government of India which
makes available Ministerial Information, Indian Laws and Legislations Online, Contact Details
etc. online for public access.
http://goidirectory.nic.in/exe.htm#min (Parent Website : http://www.nic.in)
Brazil: Official government website
The website provides comprehensive information on Brazilian government as well as
links to integrated citizen services.
http://www.brazil.gov.br
South Africa: The PIMS Monitor
Idasa's Political Information and Monitoring Service (PIMS) providing an easy-to-use
reference and record (with plain-language summaries) of all bills, acts and policy
documents that pass through parliament. The Monitor aims to help audience engage with
democracy, intervene in the legislative process and make submissions to parliament in
South Africa.
http://www.pims.org.za/monitor/
Global: Earth Negotiations Bulletin
A reporting service which keeps informed citizens worldwide about global environmental
negotiations, processes and decisions. It has a great value for citizens and even government
officials in developing countries to keep track of global negotiations taking place in the West and
be more informed about them.
http://www.iisd.ca/voltoc.html (Parent Website : http://www.iisd.ca)
Online Newspapers, Newsgroups and Portal Sites - these are instrumental in bringing key
political and other important information into the wider public domain.
Conclusion
The Broadcast Model is stepping stone to more complex Digital Governance models. And yet, it
![Page 57: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/57.jpg)
http://earnrupees4you.com Page 57
is also the most crucial one as it enhances 'access' and 'flow' of information in the society which
is the foundation for better governance. In several developing counties, even the most basic
information to impact governance is unavailable. The use of this model minimizes un-informed
decision-making through correction of information failures (un-availability of information) at all
levels.
National and Local Governments in developing countries need to aggressively adopt this model
if they want to enhance participation of citizens in the governance processes. Simultaneously,
the civil society should demand access to governance information to influence decisions which
affect them.
The model loses its effectiveness in cases where the free-flow of information is restricted (lack
of information sharing culture and in cases of Optimal Ignorance). Optimal Ignorance occurs
when injudicious decisions are taken not in the absence of information but because of disregard
of available information by citizens and decision-makers. Further, tight governmental controls to
censor information and use of ICT tools could prove to be the bane of this model.
CRITICAL FLOW MODEL
Underlying Principle
The model is based on broadcasting or dissemination information of 'critical' value (which by its
very nature will not be disclosed by those involved with bad governance practices) to targeted
audience using ICT and convergent media. . Targeted audience may include, media, opposition
parties, judicial bench, independent investigators or the wider public domain itself.
The use of this model requires a foresight of:
Understanding the "critcal and use value" of a particular information set
How or from where this information could be obtained
How could the information be used strategically
Who are the best target group for such information- the users for whom the availability of
this information will make a huge difference
The strength of this model is that the concept of 'distance' and 'time' becomes redundant when
information is hosted on a digital network. Once available on the digital network, the information
could be used advantageously- by instantly transferring the critical information to its user group
located anywhere or by making it freely available in the wider public domain.
Applications
This model could be applied in the following possible ways:
Making available Corruption related data about a particular Ministry / Division/ Officials
online to its electoral constituency or to the concerned regulatory body.
Making available Research studies, Enquiry reports, Impact studies commissioned by the
Government or Independent commissions to the affected parties.
Making Human Rights Violations cases violations freely available to Judiciary, NGOs
![Page 58: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/58.jpg)
http://earnrupees4you.com Page 58
and concerned citizens.
Making available information that is usually suppressed, for instance, Environmental
Information on radioactivity spills, effluents discharge, information on green ratings of
the company to concerned community.
Example of organisations / projects based on Broadcasting Model
Global: Transparency International -Daily Corruption News : A trial service is being run
by Transparency International called the "The Daily Corruption News" which reports on
corruption from around the world. The daily corruption news has been coming out since
May 2000.
Bangladesh : Human Rights Portal
http://www.banglarights.net
The portal will actively promote human rights reforms both within Bangladesh and across
geographical and political boundaries, and will support women, children, and
marginalized communities in resisting social oppression. It will look at attempts by
global forces (powerful governments, TNCs, international organizations) through
surveillance, covert mechanisms and military and economic superiority to exploit and
control smaller nations and communities.
India: Central Vigilance Committee
http://cvc.nic.in
The website provides free-access information to citizens about government officials who
have been indicted on judicial charges relating to corruption and have been advised
penalty. People can also file complaints against any public servant who fall within the
jurisdiction of the Commission.
China: Human Rights in China
Human Rights in China (HRIC) is an international non-governmental organization
founded by Chinese scientists and scholars in March 1989. It strives to make information
on human rights issues accessible to the Chinese people through short-wave Chinese
radio broadcasts, overseas Chinese publications, and an evolving virtual media hub on
human rights.
Comparative Analysis Model
Underlying Principle
Comparative Knowledge Model is one of the least-used but a highly significant model for
developing country which is now gradually gaining acceptance. The model can be used for
empowering people by matching cases of bad governance with those of good governance, and
then analyzing the different aspects of bad governance and its impact on the people.
The model is based on using ICT to explore information available in the public or private domain
and comparing it with the known information sets. The outcome is strategic learnings and
arguments, for instance, if a given amount of money can build '5' schools in village 'A' then why
does the same amount of money build only '2' schools in village 'B'?
![Page 59: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/59.jpg)
http://earnrupees4you.com Page 59
The strength of this model lies in the infinite capacity of digital networks to store varied
information and retrieve and transmit it instantly across all geographical and hierarchal barriers.
Applications/ Possible Projects
This model could be applied in the following possible ways:
To learn from past policies and actions and derive learning lessons for future policy-
making.
To evaluate the effectiveness of the current policies and identify key learnings in terms of
strengths and flaws in the policies.
To effectively establish conditions of Precedence, especially in the case of Judicial or
legal decision-making (example for resolving patent-related disputes, public goods
ownership rights), and use it to influence/ advocate future decision-making.
To enable informed decision-making at all levels by enhancing the background
knowledge and also providing a rationale for action.
To evaluate the performance and track-record of a particular decision-maker/ decision-
making body.
Organisations / Projects based on such models
Global: Human Development Indicators - The Human Development Report of UNDP
makes use of archived Statistical information pertaining to literacy, health, national
income etc. as a benchmark to assess the progress made by different countries with
regards to their Human Development Index and suggests policy recommendations based
on that.
Many countries now also prepare national level indicators to compare progress made in different
states in a country.
http://hdr.undp.org/reports/view_reports.cfm?type=3
India: Comparative Learning from Disasters : In the wake of earthquake in Kutch in India
(January 2001), there was a lot of comparative learning relating to disaster management
drawn from a high intensity earthquake which shook Latur in India in 1993. The
extensive information available on internet on both these earthquakes open up vast scope
of comparison by all segments of the society.
http://www.cddc.vt.edu/digitalgov/Latur-Gujarat.htm
(a presentation by Mr.Praveen Singh Pardesi- Indian Administrative Service (IAS) officer of the
Maharashtra cadre and currently Joint Secretary to the Chief Minister of Maharashtra, India)
Comparison of different Disasters can make people realise that damages to life and property
incurred are not just a factor of intensity of the disaster but also dependent on the preparedness of
the Government machinery and conducive government policies to handle that disaster.
Also see: Comparative Damages from Disasters in 1999
http://www.guycarp.com/pdf/nathaz_99.pdf
![Page 60: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/60.jpg)
http://earnrupees4you.com Page 60
conclusion
Developing countries could very effectively use this comparative model as ICT opens their
access to the global and local knowledge products at a relatively low -cost. The model is very
much based on the existing sets of information but requires the ability to analyse and bring out
strong arguments which could then be used to catalyze existing efforts towards self governance.
There is a vast scope of application of this model for Judicial advocacy as Landmark/Key
Judgments of the past could be used as precedence for influencing future decision- making.
Further, watch-guard organizations and monitor-groups can use this model to continuously track
the governance past record and performance and compare with different information sets.
The model however becomes ineffective in absence of a strong civil society interest and public
memory which is essential to force decision-makers to improve existing governance practices.
E-Advocacy / Mobilization and Lobbying Model
Underlying Principle
E-Advocacy / Mobilization and Lobbying Model is one of the most frequently used Digital
Governance model and has often come to the aid of the global civil society to impact on global
decision-making processes.
The model is based on setting-up a planned, directed flow of information to build strong virtual
allies to complement actions in the real world. Virtual communities are formed which share
similar values and concerns, and these communities in turn link up with or support real-life
groups/ activities for concerted action. The model builds the momentum of real-world processes
by adding the opinions and concerns expressed by virtual communities.
The strength of this model is in its diversity of the virtual community, and the ideas, expertise
and resources accumulated through this virtual form of networking. The model is able to
mobilize and leverage human resources and information beyond geographical, institutional and
bureaucratic barriers, and use it for concerted action.
Applications
This model could be applied in the following possible ways:
Fostering public debates on issue of larger concerns, namely on the themes of upcoming
conferences, treaties etc.
Formation of pressure groups on key issues to force decision-makers to take their
concerns into cognisance.
Making available opinions of a suppressed groups who are not involved in the decision-
making process into wider public domain.
Catalysing wider participation in decision-making processes.
Building up global expertise on a particular theme in absence of localised information to
aid decision-making.
![Page 61: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/61.jpg)
http://earnrupees4you.com Page 61
Organisations / Projects based on such models
Global: Greenpeace Cyber-activist Community - an effort towards creation of virtual
communities to mobilise global support against some of the disputable environmental
policies/ actions of the Government. Since the cyberactivist system began in June 2000,
there are now 116794.0 registered cyberactivists, who participated in 357003 action alerts
and sent 160597 e-cards to individuals and organizations.
http://cybercentre.greenpeace.org/t/s/community_articles
Global: Drop the Debt Campaign - the campaign spreads awareness of their activities
through emails and mobilises support of concerned individuals, and encourages them to
directly express their concern to key decision-makers (by making available their email
and other contact addresses).
http://www.jubileeusa.org/
Global: Independent Media Centre - The Center was established by various independent
and alternative media organizations and activists for the purpose of providing grassroots
coverage of the World Trade Organization (WTO) protests in Seattle lin 1999. The
center acted as a clearinghouse of information for journalists, and provided up-to-the-
minute reports, photos, audio and video footage through its website.
http://www.indymedia.org/
conclusion
This model has grown manifold since the onset of debates on the Seattle round of World Trade
Organisation in 1999, which saw the formation of several virtual communities to express their
concerns in the WTO agreements. The display of a unified, informed civil society force at Seattle
was in some ways a result of the intensive interaction and exchange of opinion happening over
the virtual networks months prior to this WTO summit. There was a lot of concerted actions at
the
INTERACTIVE SERVICES MODEL
Underlying Principle
Interactive-Service model is a consolidation of the earlier presented digital governance models
and opens up avenues for direct participation of individuals in the governance processes.
Fundamentally, ICT have the potential to bring in every individual in a digital network and
enable interactive (two-way) flow of information amongt them. The potential of ICT for the
governance is fully leveraged in this model and leads and can bring lead to greater objectivity
and transparency in decision-making processes.
Under this model, the various services offered by the Government become directly available to
![Page 62: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/62.jpg)
http://earnrupees4you.com Page 62
its citizens in an interactive manner. It does so by opening up an interactive Government to
Consumer to Government (G2C2G) channel in various aspects of governance, such as election of
government officials (e-ballots); online grievance-redressal; sharing of concerns and providing
expertise; opinion polls on public issues etc.
Applications
This model could be applied in the following possible ways:
To establish an interactive communication channels with key policy-makers and
members of Planning Commissions.
To conduct electronic ballots for the election of government officials and other office
bearers.
To conduct public debates / opinion polls on issues of wider concern before formulation
of policies and legislative frameworks.
Filing of grievances, feedback and reports by citizens with the concerned governmental
body.
Establishing decentralised forms of governance.
Performing governance functions online such as revenue collection, filing of taxes,
governmental procurement, payment transfer etc.
Example of organisations / projects based on Broadcasting Model
India: Gyandoot Gyandoot is an intranet in Dhar district connecting rural cybercafes
catering to the everyday needs of the masses. The site has following services to offer in
addition to the hope that it has generated by networking, the first district in the state of
Madhya Pradesh in India
o Commodity/ Agricultural Marketing Information System
o Copies of land maps
o On-Line Registration of Applications
Conclusion
The model firmly relies on the interactive applications of ICT and therefore is a technology and
cost - intensive model which will require a transition period before being adopted on a wider
scale, especially in the Developing Countries. It would also require elemental familiarity of ICT
among the citizens to fully benefit from this model. Nevertheless, the diminishing costs of ICT
and the advantages offered by this technology would certainly catalyse the penetration of this
model. Intermediary organisations and Knowledge Networkers will have a tremendous role to
play in widespread replication of this model
Regional level as an end result of such discussions which built into the global movement.
![Page 63: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/63.jpg)
http://earnrupees4you.com Page 63
UNIT-3 & 4.
![Page 64: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/64.jpg)
http://earnrupees4you.com Page 64
![Page 65: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/65.jpg)
http://earnrupees4you.com Page 65
![Page 66: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/66.jpg)
http://earnrupees4you.com Page 66
![Page 67: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/67.jpg)
http://earnrupees4you.com Page 67
![Page 68: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/68.jpg)
http://earnrupees4you.com Page 68
![Page 69: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/69.jpg)
http://earnrupees4you.com Page 69
![Page 70: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/70.jpg)
http://earnrupees4you.com Page 70
![Page 71: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/71.jpg)
http://earnrupees4you.com Page 71
![Page 72: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/72.jpg)
http://earnrupees4you.com Page 72
![Page 73: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/73.jpg)
http://earnrupees4you.com Page 73
![Page 74: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/74.jpg)
http://earnrupees4you.com Page 74
application of data warehousing and data mining in e-government
![Page 75: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/75.jpg)
http://earnrupees4you.com Page 75
![Page 76: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/76.jpg)
http://earnrupees4you.com Page 76
![Page 77: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/77.jpg)
http://earnrupees4you.com Page 77
![Page 78: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/78.jpg)
http://earnrupees4you.com Page 78
Case studies: NICNET-role of nation wide networking
![Page 79: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/79.jpg)
http://earnrupees4you.com Page 79
![Page 80: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/80.jpg)
http://earnrupees4you.com Page 80
![Page 81: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/81.jpg)
http://earnrupees4you.com Page 81
![Page 82: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/82.jpg)
http://earnrupees4you.com Page 82
![Page 83: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/83.jpg)
http://earnrupees4you.com Page 83
UNIT-5.
![Page 84: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/84.jpg)
http://earnrupees4you.com Page 84
Challenges and approach to e-government security
Who pays for e-government?
Like any government infrastructure project, e-government can be done in phases and the costs of
implementation will depend on current infrastructure availability, supplier and user capabilities,
and mode of service delivery (whether through the Internet or through telephone hotlines and
one-stop shops). The more complicated and sophisticated the kind of services the government
wants to offer, the more expensive it is.
Governments should focus on small, self-financing or outsourced projects. Because e-
government projects must be financially sustainable, there must be a revenue/ cost-reduction
model in place from the beginning. Smaller projects with a clear revenue-generation strategy and
minimal initial investment are the most likely to be sustainable over the long term. For instance,
Web sites are one of the easiest and cheapest ways to achieve high impact e-government with a
minimum of investment.
e-Government projects are, more often than not, long-term endeavors, requiring large capital
infusion in software, hardware, infrastructure and training. A viable financing plan should not
only pay for the immediate needs to jumpstart e-government; it must also consider its long-term
financing options for the sustainability of the project.
There are various business models for funding e-government projects, and the private sector
plays a critical role in these. Under partnership arrangements, the private sector builds, finances
and operates public infrastructure such as roads and airports, recovering costs through user
charges. Various financing schemes exist—from soft and development assistance loans from
donor/multilateral aid agencies to partnerships and outsourcing deals with private third party
vendors under special financing schemes (e.g., the Build-Operate-Transfer or BOT scheme) that
can minimize the initial cost to government.
Cooperation, rather than competition, with the private sector can facilitate effective e-
government. Government can encourage private sector investment by complementing and
supporting private sector efforts rather than duplicating them. The key to e-government is to
improve citizen access to service delivery, not further expand the role of government.
Government should not attempt to create products and services where public-private partnerships
or private service providers can adequately provide these products and services more efficiently
and effectively.
How do you get the wider public to actually use e-government services?
Any sound e-government policy must consider a citizen-centered approach. This means that e-
government should be an end-user or demand-driven service.
However, many citizens do not use e-government for several reasons, among these unfamiliarity
with ICT, lack of access, lack of training, and concerns about privacy and security of
information.
While e-government may provide ease and convenience in the delivery of public services, and
offer innovative government services, none of these will prompt citizen use unless the concerns
mentioned above are first addressed.
![Page 85: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/85.jpg)
http://earnrupees4you.com Page 85
Security concern in e-commerce
Introduction
This article presents an overview of security and privacy concerns based on our experiences as
developers of WebSphere® Commerce. WebSphere Commerce is business middleware that
accelerates the development of any business transaction-oriented application, from the smallest
online retailer to B2B portals, to supply chain management applications. For many of our clients,
WebSphere Commerce provides an integrated platform that runs both their customer facing
online shopping sites, and their internal distributor or supplier portals as shown in Figure 1.
Figure 1. Common WebSphere Commerce business model
What is e-Commerce?
e-Commerce refers to the exchange of goods and services over the Internet. All major retail
brands have an online presence, and many brands have no associated bricks and mortar presence.
However, e-Commerce also applies to business to business transactions, for example, between
manufacturers and suppliers or distributors.
In the online retail space, there are a number of models that retailers can adopt. Traditionally, the
Web presence has been kept distinct from the bricks and mortar presence, so transactions were
limited to buying online and delivering the goods or services. The online presence is also
important for researching a product that a customer can purchase later in the store. Recently,
there has been a trend towards multi-channel retail, allowing new models such as purchasing
online and picking up in store.
e-Commerce systems are also relevant for the services industry. For example, online banking and
brokerage services allow customers to retrieve bank statements online, transfer funds, pay credit
card bills, apply for and receive approval for a new mortgage, buy and sell securities, and get
financial guidance and information.
Security overview
A secure system accomplishes its task with no unintended side effects. Using the analogy of a
house to represent the system, you decide to carve out a piece of your front door to give your
pets' easy access to the outdoors. However, the hole is too large, giving access to burglars. You
have created an unintended implication and therefore, an insecure system.
In the software industry, security has two different perspectives. In the software development
community, it describes the security features of a system. Common security features are ensuring
passwords that are at least six characters long and encryption of sensitive data. For software
consumers, it is protection against attacks rather than specific features of the system. Your house
may have the latest alarm system and windows with bars, but if you leave your doors unlocked,
despite the number of security features your system has, it is still insecure. Hence, security is not
a number of features, but a system process. The weakest link in the chain determines the security
![Page 86: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/86.jpg)
http://earnrupees4you.com Page 86
of the system. In this article, we focus on possible attack scenarios in an e-Commerce system and
provide preventive strategies, including security features, that you can implement.
Security has three main concepts: confidentiality, integrity, and availability. Confidentiality
allows only authorized parties to read protected information. For example, if the postman reads
your mail, this is a breach of your privacy. Integrity ensures data remains as is from the sender to
the receiver. If someone added an extra bill to the envelope, which contained your credit card
bill, he has violated the integrity of the mail. Availability ensures you have access and are
authorized to resources. If the post office destroys your mail or the postman takes one year to
deliver your mail, he has impacted the availability of your mail.
Security features
While security features do not guarantee a secure system, they are necessary to build a secure
system. Security features have four categories:
Authentication: Verifies who you say you are. It enforces that you are the only one
allowed to logon to your Internet banking account.
Authorization: Allows only you to manipulate your resources in specific ways. This
prevents you from increasing the balance of your account or deleting a bill.
Encryption: Deals with information hiding. It ensures you cannot spy on others during
Internet banking transactions.
Auditing: Keeps a record of operations. Merchants use auditing to prove that you bought
a specific merchandise.
The criminal incentive
Attacks against e-Commerce Web sites are so alarming, they follow right after violent crimes in
the news. Practically every month, there is an announcement of an attack on a major Web site
where sensitive information is obtained. Why is e-Commerce vulnerable? Is e-Commerce
software more insecure compared to other software? Did the number of criminals in the world
increase? The developers producing e-Commerce software are pulled from the same pool of
developers as those who work on other software. In fact, this relatively new field is an attraction
for top talent. Therefore, the quality of software being produced is relatively the same compared
to other products. The criminal population did not undergo a sudden explosion, but the incentives
of an e-Commerce exploit are a bargain compared to other illegal opportunities.
Compared to robbing a bank, the tools necessary to perform an attack on the Internet is fairly
cheap. The criminal only needs access to a computer and an Internet connection. On the other
hand, a bank robbery may require firearms, a getaway car, and tools to crack a safe, but these
may still not be enough. Hence, the low cost of entry to an e-Commerce site attracts the broader
criminal population.
The payoff of a successful attack is unimaginable. If you were to take a penny from every
account at any one of the major banks, it easily amounts to several million dollars. The local
bank robber optimistically expects a windfall in the tens of thousands of dollars. Bank branches
![Page 87: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/87.jpg)
http://earnrupees4you.com Page 87
do not keep a lot of cash on hand. The majority is represented in bits and bytes sitting on a hard
disk or zipping through a network.
While the local bank robber is restricted to the several branches in his region, his online
counterpart can choose from the thousands of banks with an online operation. The online bank
robber can rob a bank in another country, taking advantage of non-existent extradition rules
between the country where the attack originated, and the country where the attack is destined.
Back to top
Points the attacker can target
As mentioned, the vulnerability of a system exists at the entry and exit points within the system.
Figure 3 shows an e-Commerce system with several points that the attacker can target:
Shopper
Shopper' computer
Network connection between shopper and Web site's server
Web site's server
Software vendor
Sniffing the network
In this scheme, the attacker monitors the data between the shopper's computer and the server. He
collects data about the shopper or steals personal information, such as credit card numbers.
There are points in the network where this attack is more practical than others. If the attacker sits
in the middle of the network, then within the scope of the Internet, this attack becomes
impractical. A request from the client to the server computer is broken up into small pieces
known as packets as it leaves the client's computer and is reconstructed at the server. The packets
of a request is sent through different routes. The attacker cannot access all the packets of a
request and cannot decipher what message was sent.
Take the example of a shopper in Toronto purchasing goods from a store in Los Angeles. Some
packets for a request are routed through New York, where others are routed through Chicago. A
more practical location for this attack is near the shopper's computer or the server. Wireless hubs
make attacks on the shopper's computer network the better choice because most wireless hubs
are shipped with security features disabled. This allows an attacker to easily scan unencrypted
traffic from the user's computer.
Figure 4. Attacker sniffing the network between client and server
Guessing passwords
Another common attack is to guess a user's password. This style of attack is manual or
![Page 88: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/88.jpg)
http://earnrupees4you.com Page 88
automated. Manual attacks are laborious, and only successful if the attacker knows something
about the shopper. For example, if the shopper uses their child's name as the password.
Automated attacks have a higher likelihood of success, because the probability of guessing a user
ID/password becomes more significant as the number of tries increases. Tools exist that use all
the words in the dictionary to test user ID/password combinations, or that attack popular user
ID/password combinations. The attacker can automate to go against multiple sites at one time.
Using denial of service attacks
The denial of service attack is one of the best examples of impacting site availability. It involves
getting the server to perform a large number of mundane tasks, exceeding the capacity of the
server to cope with any other task. For example, if everyone in a large meeting asks you your
name all at once, and every time you answer, they ask you again. You have experienced a
personal denial of service attack. To ask a computer its name, you use ping. You can use ping to
build an effective DoS attack. The smart hacker gets the server to use more computational
resources in processing the request than the adversary does in generating the request.
Using server root exploits
Root exploits refer to techniques that gain super user access to the server. This is the most
coveted type of exploit because the possibilities are limitless. When you attack a shopper or his
computer, you can only affect one individual. With a root exploit, you gain control of the
merchants and all the shoppers' information on the site. There are two main types of root
exploits: buffer overflow attacks and executing scripts against a server.
In a buffer overflow attack, the hacker takes advantage of specific type of computer program bug
that involves the allocation of storage during program execution. The technique involves tricking
the server into execute code written by the attacker.
The other technique uses knowledge of scripts that are executed by the server. This is easily and
freely found in the programming guides for the server. The attacker tries to construct scripts in
the URL of his browser to retrieve information from his server. This technique is frequently used
when the attacker is trying to retrieve data from the server's database.
Defenses
Despite the existence of hackers and crackers, e-Commerce remains a safe and secure activity.
The resources available to large companies involved in e-Commerce are enormous. These
companies will pursue every legal route to protect their customers. Figure 6 shows a high-level
illustration of defenses available against attacks.
Figure 6. Attacks and their defenses
At the end of the day, your system is only as secure as the people who use it. Education is the
best way to ensure that your customers take appropriate precautions:
![Page 89: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/89.jpg)
http://earnrupees4you.com Page 89
Install personal firewalls for the client machines.
Store confidential information in encrypted form.
Encrypt the stream using the Secure Socket Layer (SSL) protocol to protect information
flowing between the client and the e-Commerce Web site.
Use appropriate password policies, firewalls, and routine external security audits.
Use threat model analysis, strict development policies, and external security audits to
protect ISV software running the Web site.
Education
Your system is only as secure as the people who use it. If a shopper chooses a weak password, or
does not keep their password confidential, then an attacker can pose as that user. This is
significant if the compromised password belongs to an administrator of the system. In this case,
there is likely physical security involved because the administrator client may not be exposed
outside the firewall. Users need to use good judgement when giving out information, and be
educated about possible phishing schemes and other social engineering attacks.
Personal firewalls
When connecting your computer to a network, it becomes vulnerable to attack. A personal
firewall helps protect your computer by limiting the types of traffic initiated by and directed to
your computer. The intruder can also scan the hard drive to detect any stored passwords.
Secure Socket Layer (SSL)
Secure Socket Layer (SSL) is a protocol that encrypts data between the shopper's computer and
the site's server. When an SSL-protected page is requested, the browser identifies the server as a
trusted entity and initiates a handshake to pass encryption key information back and forth. Now,
on subsequent requests to the server, the information flowing back and forth is encrypted so that
a hacker sniffing the network cannot read the contents.
Server firewalls
A firewall is like the moat surrounding a castle. It ensures that requests can only enter the system
from specified ports, and in some cases, ensures that all accesses are only from certain physical
machines.
A common technique is to setup a demilitarized zone (DMZ) using two firewalls. The outer
firewall has ports open that allow ingoing and outgoing HTTP requests. This allows the client
browser to communicate with the server. A second firewall sits behind the e-Commerce servers.
This firewall is heavily fortified, and only requests from trusted servers on specific ports are
allowed through. Both firewalls use intrusion detection software to detect any unauthorized
access attempts.
![Page 90: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/90.jpg)
http://earnrupees4you.com Page 90
Another common technique used in conjunction with a DMZ is a honey pot server. A honey pot
is a resource (for example, a fake payment server) placed in the DMZ to fool the hacker into
thinking he has penetrated the inner wall. These servers are closely monitored, and any access by
an attacker is detected.
Figure 10. Firewalls and honey pots
Password policies
Security best practices remain largely an art rather than a science, but there are some good
guidelines and standards that all developers of e-Commerce software should follow.
Using cookies
One of the issues faced by Web site designers is maintaining a secure session with a client over
subsequent requests. Because HTTP is stateless, unless some kind of session token is passed
back and forth on every request, the server has no way to link together requests made by the
same person. Cookies are a popular mechanism for this. An identifier for the user or session is
stored in a cookie and read on every request. You can The primary use of cookies is to store
authentication and session information, your information, and your preferences. A secondary and
controversial usage of cookies is to track the activities of users.
Different types of cookies are:
Temporary cookies: These cookies are valid only for the lifetime of your current session,
and are deleted when you close your browser. These are usually the good type. They are
mostly used to keep your session information.
Permanent cookies: These are for a time period, specified by the site, on the shopper's
computer. They recall your previous session information.
Server-only cookies: These cookies are usually harmless, and are only used by the server
that issued them.
Third-party cookies: These are usually used for tracking purposes by a site other than the
one you are visiting. Your browser or a P3P policy can filter these cookies.
If you do not want to store cookies, here are other alternatives:
Send user ID/password on every request: This was popular 5-10 years ago, but now
recognized as an insecure technique. The user ID/password flowing under non-SSL is
susceptible to attacks. This alternative is not practical for a high volume site. Pages that
run under SSL would slow down site performance.
SSL client side authentication: This is the most secure, but it is cumbersome for shoppers
to install on their browsers. You have to pay for a company to verify who you are and to
issue a certificate. The popularity of this technique for client-side authentication has
decreased in recent years. It remains very popular on server sites.
![Page 91: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/91.jpg)
http://earnrupees4you.com Page 91
URL rewriting: This is a popular alternative to cookies. Each HTTP link on the page is
specially encoded, but it is expensive for the site to implement. It interferes with the
performance of the site because the pages cannot be cached and reused for different
users. This alternative is susceptible to attack if it is not used under SSL.
Using threat models to prevent exploits
security for server computers
Protecting Your Network from Hackers, Viruses and Malicious Software
If you have a server-based network, it's critically important to protect your server from hackers,
viruses, and other malicious software. If your server is compromised, it can jeopardize the safety
and security of your company's entire network and all its data. Here are some ways you can
protect your network against attack:
Your server has built-in security features. Use them. If configuring your server's security
settings is beyond the scope of your technical expertise, hire an expert to do it. While this
will cost you a little more up front, the price you'll pay to secure your network is miniscule
when compared to the cost of responding to and recovering from a hacked server.
Firewalls are essential. Software firewalls are sufficient for small networks, but if your
network is large or spread out, you may want to run a hardware firewall in conjunction with
your server. A hardware firewall will control access to your network's computers from a
single point, making it easier to monitor, and theoretically, more secure. But at the bare
minimum, your server needs a software firewall.
Software patches are vital to server and network security. When a new threat emerges, be it
a virus, worm, or Trojan horse, antivirus software developers issue software patches, or
updates, that close up the security hole that the malicious program has exploited. If you're
running an old version of a server operating system, your server could be vulnerable to
attack. Not having the latest version of your server's software installed is akin to not getting
immunized against eradicated diseases; the cure is out there, but you just haven't bothered to
take your medicine.
Unrestricted server permissions and passwords should be given to as few people as possible.
Use strong passwords, and keep them strictly confidential. (For more information on
developing password protocol for your business, check out Five Rules for Developing Safe
and Sane Password Protocol for Your Small Business.)
![Page 92: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/92.jpg)
http://earnrupees4you.com Page 92
Physical security is just as important as password security, if not more so. Protecting your
servers from the elements — and criminals — is essential. A closet is usually perfect for one
or two servers; no windows and a single locking door reduce the chance of your servers
being damaged. Lock up the room or closet whenever it's not in use, and distribute keys only
to employees who absolutely need them. Also, store your server computers up off the floor,
either on special racks designed for that purpose, or in some other manner, to keep them
from being damaged by floods or leaks
communication channel security
Covert channel
In Computer Security, a covert channel is a type of computer security attack that creates a
capability to transfer information objects between processes that are not supposed to be allowed
to communicate by the computer security policy.
Characteristics
A covert channel is so called because it is hidden from the access control mechanisms of ultra
high assurance secure operating systems since it does not use the legitimate data transfer
mechanisms of the computer system such as read and write, and therefore cannot be detected or
controlled by the hardware based security mechanisms that underlie ultra high assurance secure
operating systems. Covert channels are exceedingly hard to install in real systems, and can often
be detected by monitoring system performance; in addition, they suffer from a low signal-to-
noise ratio and low data rates (on the order of a few bits per second). They can also be removed
manually with a high degree of assurance from secure systems by well established covert
channel analysis strategies.
Covert channels are distinct from, and often confused with legitimate channel exploitations that
attack low assurance pseudo-secure systems using schemes such as steganography or even less
sophisticated schemes to disguise prohibited objects inside of legitimate information objects.
This legitimate channel misuse by data hiding schemes is specifically not covert channels and
can be prevented by ultra high assurance secure OSs.
Covert channels can tunnel through secure operating systems and require special measures to
control. Covert channel analysis is the only proven way to control covert channels. By contrast,
secure operating systems can easily prevent misuse of legitimate channels. Distinguishing these
is important.
TCSEC criteria
The Trusted Computer Security Evaluation Criteria (TCSEC) is a set of criteria established by
the National Computer Security Center, an agency managed by the United States' National
![Page 93: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/93.jpg)
http://earnrupees4you.com Page 93
Security Agency.
Lampson's definition of a covert channel was paraphrased in the TCSEC [2]
specifically to refer
to ways of transferring information from a higher classification compartment to a lower
classification. In a shared processing environment, it is difficult to completely insulate one
process from the effects another process can have on the operating environment. A covert
channel is created by a sender process that modulates some condition (such as free space,
availability of some service, wait time to execute) that can be detected by a receiving process.
The TCSEC defines two kinds of covert channels:
Storage channels - Communicate by modifying a stored object
Timing channels - Perform operations that affect the relative timing of events
The TCSEC, also known as the Orange Book,[3]
requires analysis of covert storage channels to
be classified as a B2 system and analysis of covert timing channels is a requirement for class B3.
Eliminating covert channels
The possibility of covert channels cannot be completely eliminated, although it can be
significantly reduced by careful design and analysis.
The detection of a covert channel can be made more difficult by using characteristics of the
communications medium for the legitimate channel that are never controlled or examined by
legitimate users. For example, a file can be opened and closed by a program in a specific, timed
pattern that can be detected by another program, and the pattern can be interpreted as a string of
bits, forming a covert channel. Since it is unlikely that legitimate users will check for patterns of
file opening and closing operations, this type of covert channel can remain undetected for long
periods.
A similar case is port knocking. In usual communications the timing of requests is irrelevant and
unwatched. Port knocking makes it significant.
security for client computers.
A thin client (sometimes also called a lean or slim client) is a computer or a computer program
which depends heavily on some other computer (its server) to fulfill its traditional computational
roles. This stands in contrast to the traditional fat client, a computer designed to take on these
roles by itself. The exact roles assumed by the server may vary, from providing data persistence
(for example, for diskless nodes) to actual information processing on the client's behalf.
Thin clients occur as components of a broader computer infrastructure, where many clients share
their computations with the same server. As such, thin client infrastructures can be viewed as the
amortization of some computing service across several user-interfaces. This is desirable in
contexts where individual fat clients have much more functionality or power than the
infrastructure either requires or uses. This can be contrasted, for example, with grid computing.
The most common type of modern thin client is a low-end computer terminal which concentrates
![Page 94: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/94.jpg)
http://earnrupees4you.com Page 94
solely on providing a graphical user interface to the end-user. The remaining functionality, in
particular the operating system, is provided by the server.
Characteristics
Thin clients as programs
The notion of a thin client extends directly to any client–server architecture: in which case, a thin
client application is simply one which relies on its server to process most or all of its business
logic. This idiom is relatively common for computer security reasons: a client obviously cannot
be trusted with the logic that determines how trustworthy they are; an adversary would simply
skip the logic and say "I'm as trustworthy as possible!"
However, in web development in particular, client applications are becoming fatter. This is due
to the adoption of heavily client-side technologies like Ajax and Flash, which are themselves
strongly driven by the highly interactive nature of Web 2.0 applications.
Single point of failure
The server, in taking on the whole processing load of several clients, forms a single point of
failure for those clients. This has both positive and negative aspects. On the one hand, the
security threat model for the software becomes entirely confined to the servers: the clients simply
don't run the software. Thus, only a small number of computers need to be rigorously secured,
rather than securing every single client computer. On the other hand, any denial of service attack
against the server will harm many clients: so, if one user crashes the system, everyone else loses
their volatile data.
For small networks, this single-point of failure property might even be expanded: the server can
be integrated with file servers and print servers particular to its clients. This simplifies the
network and its maintenance, but might increase the risk against that server.
Cheap client hardware
While the server must be robust enough to handle several client sessions at once, the clients can
be made out of much cheaper hardware than a fat client can. This reduces the power
consumption of those clients, and makes the system marginally scalable: it is relatively cheap to
add on a couple more client terminals. The thin clients themselves in general have a very low
total cost of ownership, but some of that is offset by requiring a robust server infrastructure with
backups and so forth. This is also reflected in terms of power consumption: the thin clients are
generally very low-power and might not even require cooling fans, but the servers are higher-
power and require an air-conditioned server room.
Client simplicity
Since the clients are made from low-cost hardware with few moving parts, they can operate in
more hostile environments than conventional computers. However, they inevitably need a
![Page 95: E-Commerce and Governance UNIT 1-5](https://reader034.vdocument.in/reader034/viewer/2022051820/553caf7f4a79595c038b4a01/html5/thumbnails/95.jpg)
http://earnrupees4you.com Page 95
network connection to their server, which must be isolated from such hostile environments.
Since thin clients are cheap, they offer a low risk of theft in general, and are easy to replace when
they are stolen or broken. Since they don't have any complicated boot images, the problem of
boot image control is centralized to the central servers.
Recent Trends
Ultra-thin clients
A Sun Microsystems stateless S270 thin client, sometimes called an ultra thin client
Traditionally, a thin client ran a full operating system for the purposes of connecting to other
computers. A newer trend is sometimes called an ultra-thin client or a zero client, which no
longer runs a full operating system: the kernel instead merely initializes the network, begins the
networking protocol, and handles display of the server's output.
Web thin clients
Web thin clients (running a Web OS) rely on the web-based software for the application and data
storage, thus eliminating the single point of failure and the need for OS/application/data
aggregation and licensing required by traditional thin client.