1. INTRODUCTION
Electronic Commerce is for the age of Information Technology what mercantilism, the pursue gold and the conquest of new lands were for the age of discovery. Like the prow of a large fishing boat, it draws towards itself all other interests and elements of society, and it will leave new discoveries and changes in its wake. The vast networking of world through optic fibers, satellites and wireless communication is creating a new global community and a new global market, in which most of the countries should participate. It is strengthening, about paradoxically, the identity of small groups, isolated communities and minority interests and driving them towards a less costly social and economic activity and widening their opportunities. And most importantly, it is empowering small businesses to vie with international corporations and facultative consumers to search the world for exactly what they requisite.
E-Commerce au fon means exploitation networks (Internet) to carry out all the activities involved in business direction and operation: buying and marketing of products and services, technology and partner search, dealing with counterparts, choosing the most convenient transportation and insurances, performin bank dealings, paying and charge, communication with company gross revenuemen, pick up orders, and any other activities necessary for trading.
Home Insurance Youi
A company will be able to post a complete catalog of it's products and services on the Internet, which can be endlessly updated to pbegrudge new or updated products, proving a large virtual showcase for potential clients, a means to communicate with clients and in that way, adjusts it's offer to their requirements; patc at the same time it will get access to virtual markets where it can purchase what it inevitably.
Through integral systems already under development, one company will connect to other companies settled anyplace in the world, to buy and sell, choosing the products and services which best meets its inevitably from a huge network. And it's true that this rotation involves us all.
2. BUSINESS-TO-BUSINESS (B2B)
B2B e-commerce means companies buying from and marketing to each other online. It automates and streamlines the process of buying and marketing the intermediate products. It provides more reliable updating of business data. B2B makes product information available globally and updates it in real time. Hence, procuring organization can take advantage of vast amount of product information. [3]
Now, we must know what are the entities of B2B e-commerce & their concerns:
- Selling company: with marketing direction perspective.
- Buying company: with procural direction perspective.
- Electronic intermediary: A third party intermediating service provider (the scope of service may be extended to let in the order fulfillment ).
- Deliverer: who should fulfill the JIT (Just in Time Delivery)
- Network platform: such as the Internet, Intranet, and Extranet.
- Protocols and communication: such as EDI (Electronic Data Interchange) and comparison shopping, possibly exploitation package agents.
- Back-end information system: possibly enforced exploitation the intranet and Enterprise Resource Planning (ERP) systems.
B2B e-commerce implies that both the dealingskers and buyers are business corporations. It covers a broad spectrum of applications that enable an enterprise or business to form electronic relationship with their distributors, re-dealingskers, providers, and other partners. B2B applications will offer enterprises access to the following sorts of information:
- Product: Specifications, prices, gross revenue story.
- Customer: Sales story and forecasts.
- Supplier: Product lines and lead times, gross revenue terms and conditions.
- Product process: Capacities, commitments, product plans.
- Transportation: Carries, lead-times, costs.
- Inventory: Inventory levels, carrying costs, locations.
- Supply chain alliance: Key contacts, partners roles and responsibilities, schedules.
- Competitor: Benchmarking, competitive product offering, market share.
- Sales and marketing: Point of gross revenue (POS), promotions.
- Supply chain process and performance: Process descriptions, performance measures, quality, delivery time and client satisfaction.
2.1 How to overcome
People always want to overcome shot in life. To deliver a sound return on your investment you must append time delivery and flavor of some strategies. This scheme should let in proper marketing, channel direction, solid technology, strategic partners and great products. Let us have a look on each of them.
2.1.1 Just in Time delivery (JIT)
In such a case (JIT), delivery materials and parts on time is a must. Using E-Commerce, it is extremely possible to assure JIT deliveries. Just in time delivery can be accomplished by the co-coordinated effort of delivery- service company and providers inventory insurance.
Quick delivery does not necessarily mean JIT delivery, but the system for quick delivery is the backbone of JIT delivery. For the B2B E-Commerce environment the advance confirmation of the delivery date at the contract stage is very important. [5][15]
2.1.2 Add strategies to your business
2.1.2.1 Direct Marketing
In a typical business organization, buying decisions, especially for products over few thousand dollars, are made by group of individuals. As a result, direct marketers need to extent the reach of their programs to different functional areas and mayha even different levels inside a functional area.
There are denary buyers and influences in any organization who play a role in the buying decision. You may know with reasonable certainty who your primary target is, but secondary target can be even as important to reach. You may have to reach business buyers and influencers in three basic direction areas (functional direction, business direction and general direction) and roll in the hay at middle to upper managerial, besides as technical levels. To roll in the hay companies need accurate E-mail list, which they can develop by viewing companies Websites and reviewing annual reports and other public documents.
2.1.2.2 Relationship Marketing
Business buyers are not always ready to buy products or services when you are ready to sell them. Factors you cannot control, such as the companies' budgeting process, the need for extra approvals, or buying procedures, may have a direct impact on plans to purchase. There may be a casual interest in the product but not an immediate need.
The smart B2B direct marketer compensates for this uncertainty by making sure a program of regular, on-going communication possibility (often called a continuity program) is before of prospects periodically. This can be done by direct E-mail and by placing the information on the website.
2.1.2.3 Internet Marketing
Several potential marketing strategies can be used in B2B E-Commerce marketing. These strategies can be classified into the following five categories:
- Generating and qualifying leads with the Internet.
- Using Internet events to promote products and services.
- Executing instant fulfillment on the Internet.
- Generating orders through the Internet.
- Enhancing client relationship with the Internet.
2.1.2.4 Channel Management
The first element is coherent marketing or channel direction. The true test of a winnerful E-Commerce implementation is how well it exploits the Internet to reach, capture and retain the right clients. Choosing which products and services will be offered through which channel is also a crucial decision.
E-commerce runs crosswise denary gross revenue channels, including direct, indirect and E-marketplaces. The choice of which marketplaces to use as gross revenue channels is a crucial decision.
In addition to marketplaces, exploitation indirect gross revenue channels is also an area for explosive gross revenue opportunities. Enabling your marketing partners to host your catalog, inventory and fulfillment databases on their systems can create efficiency that grows their business and yours. You also can continue your direct one-to-one trading relationship with age strategic vendors by "E-facultative" the entire business process from the first repursue quote through order fulfillment to automatic charge and payment.
These channels create a situation where the E-Commerce sell side platform must transact crosswise multi-channel marketing strategies --which brings us to the next element of your scheme: technology.
2.1.2.5 Technology
Industry standard tools often allow a dealingsker to build and manage product catalogs and content once and use them throughout the entire multi-channel marketing conduits. Evolving tools and capabilities allow you to develop client friendly web sites and win repeat clients by building client loyalty. The forepart for e-commerce marketing is an important piece of B2B winner, copulative your new web systems with your existing systems. The 24*7 online marketplace means your E-business has to be continually available. IT infrastructure must provide more performance, relipower, security and process integration than a bricks-and-howitzer environment. In addition, mainframes hosting the databases and ERP (Enterprise Resource Planning) systems operative the direction systems must be seamlessly integrated with the e-commerce engine to provide the caliber of service clients expects and to realize the cost efficiencies B2B E-Commerce can provide. Choosing a flexible E-Commerce platforms and a system integrator tough with the entire business process is a must for winner.
2.1.2.6 Partners
Like choosing the Internet as a gross revenue channel, it's also important to select the right partners, including an integration partner who is tough in serving to move ahead quickly crosswise the entire E-business process. we have to accept that any move to E-Commerce is not about additive improvement, rather fundamental redesign of the key business processes.
2.1.2.7 Products
With the presence on the web, we can effectively and efficiently transact business with our clients 24*7. But so can our competitors. Survivals and winner in E-Commerce entails more than simply building a shopfront to sell online. [5]
3. BUSINESS-TO-CONSUMER (B2C)
While the term E-Commerce refers to all online dealings, B2C stands for "Business-to-Consumer" and applies to any business or organization that sells its products or services to consumers over the Internet for their own use.
In the late 90s, dotcoms-- which were quickly gaining in size and market capitalisation -- posed a threat to traditional brick and howitzer businesses. In many ways, these dotcoms seemed to be revising the rules of business -- they had the clients without the expenses of maintaining physical stores, little inventory, unlimited access to capital and little concern about actual earnings. The idea was to get big fast and worry about profits later. And a popular thought automatically comes into our mind: " Learn to swim patc the tide is out. Learn from the kinds of clients that are out there now. It is a small market- play with it; learn to price business in that market, learn how to assess risk. If you can roll in the hay well, the bet will get higher and you will succeed where others may not."
3.1 What are the major challenges of B2C e-commerce
- Getting browsers to buy things -- Your E-Commerce site cannot survive dealings alone. Getting visitors to the site is only half the battle. Whether they buy something is what determines if you win.Some ways to boost the B2C conversion rate let in up navigation, simplifying checkout process (such as one-step checkout and easily replaced paroles), and sending out e-mails with special offers.
- Building client loyalty -- With so many sites out there, how can you build a strong relationship with clients? Here are some tips:
- Focus on mortalalization: A wide array of package packages are available to help e-commerce sites create unique boutiques that target specific clients.
- Create an easy-to-use client service application. Providing just an e-mail address can be frustrating to clients with questions. Live chat or, at the very least, a phone number will help.
- Focus on making your site easy to use.
- Fulfillment -- E-Commerce has increased the cente client satisfaction and delivery fulfillment. Companies should improve their supply systems in order to guarantee on-time delivery. Providing instant satisfaction for clients still isn't easy, but winnerful B2C E-Commerce operations are determination that fulfillment headaches can be eased with increased focus and investment in supply chain and supply technologies. [5]
3.2 Six Keys to B2C E-Commerce winner
So, what does it really fancy capture the E-consumer and generate online insurance gross revenue? Based on Insurance & Technology's interviews with both early adopters and industry analysts, there appear to be six key winner factors:
- Strategic Goals Assessment/Customer Needs Assessment What are your goals as a company? Who are your clients? What are their inevitably? These may sound like basic questions, but both insurers and analysts emphasize that a company's Web presence must reflect this information.
- Create a Usable, Targeted and Sticky Web Site Uspower and site performance are some of the key factors insurers need to keep in mind when developing their B2C E-Commerce strategies. Insurers also need to be aware of all of their various constituencies when developing B2C initiatives. The Web can reach denary audiences and none should be overlooked. A good Web site will communicate with consumers besides as business partners, agents, providers and vendors. Stickiness, or the winner of a Web site in attracting and keeping new and returning visitors, is other winner factor. Turning the site into more of an information portal with real-time news feeds with keeping content updated and contemporary will help keep clients coming back.
- Integration The Internet is not a stand-alone platform or medium. To be an effective service and distribution channel, it must be integrated with back-end bequest systems, agent systems, call centers, marketing initiatives and pricing and underwriting systems. The Internet is simply other client relationship channel and integration with other client service functions is definitely a number-one priority.
- Innovate with Web Applications and Real-Time Transactions B2C online applications range from the comparatively basic, such as updating insurance information, to the complex, such as comparative rate quoting and electronic claims submission. Regardless of the specific functions a company plans to add to its Web site, they must serve the inevitably of the E-consumer. This means that web sites should have interactivity and immediate satisfaction.
- Partnerships Although insurers need to be selective in initiating online partnerships, such agreements have the potential to extend market reach and add features in a comparatively low-cost manner. According to a recent Gartner Group study, 46 percentage of insurance firms active on the Web have partnerships with banks, 30 percentage have partnerships with other insurance companies and 22 percentage have partnerships with investment firms. Partnerships with insurance portals provide comparative quoting capabilities and may generate business.
- Put Tools in Place To Keep Learning E-consumer is a moving target. Investor should always say that they are still performin and always capturing information from all of their channels. They must cente groups, used third-party assessments and have hired interface specialists. "The process is iterative: You just keep learning." [5]
4. INFRASTRUCTURE INTEGRATION
In this web enabled world, clients rule. The power to offer mass customization has become a practical reality. To quickly meet these requirements, time to deployment of new or accumulated application is shrinkage dramatically. These applications must be built to be easy to use, nimble, open, extensible, and available crosswise all platforms and all these difficult characteristics must be achieved at stripped cost.
Replacement of bequest system application is costly so it is seen that people started to aggregate information from disparate sources and integrate them for seamless information flow, the demand to communicate with a wide variety of mobile devices, and the shortage of skills and cognition that are further combined by shrinkage time-to-deployment requirements.
These package integration technologies lower development and deployment costs by doing the following:
- Supplying the communication and integration code so application developers can revolve around the value-added business logic;
- Providing a standard platform on which to build, deploy, and manage encyclical applications;
- Reducing the IT skills required to deliver difficult enterprise requirements;
- Providing rapid application development tools to eliminate custom cryptography and simplify integration; and
- Enabling the reprocess of integration components over many projects.
4.1 What is requisite for Integration
- Requirements Traditional requirements definition supported the functionality desired is yielding to a definition Based on time-to-deployment and the power to integrate future technologies. New infrastructure requirements are emerging which places more grandness on the task of provision the migration path to newer technologies.
- Technology selection For the best result the right technology should always be picked up. Technology should be such that the integrated solution fulfill the following criteria's: Extensibility and reuspower, Flexibility, Efficiency, Interoperpower and breadth, Cost effectiveness, Ease of maintenance, Deployment ease and efficiency, Ease of administration, Industry acceptpower, Enterprise integration, Technological innovation. [1]
4.2 Benefits of Integration
It has been surveyed that the end users are benefited in various ways after the completion of
Integration project. Benefits thus obtained are:
- Simple and complete development platform,
- Platform independence,
- Network-aware development and run-time platform,
- Technologically unified intranet, extranet and Internet,
- Central administration of new package versions,
- Easy access to enterprise IT resources,
- Rich and extremely functional interface component,
- Simple and robust security model. [1]
5. SECURITY ISSUES
Security is a major issue in developing E-Commerce because this is probably the most important reason people hesitates to buy things on the Net. Buying on the Net requires your charge plate number and other mortalal information. But broadcast medium your charge plate number through the ether? It sounds pretty dicey. So, it's a challenge for companies to make their site secure and safe so that people can fully depend on them.
5.1 What does security imply
Whatever the environment, paper or electronic, securing it necessarily implies the bar of
- Destruction of information and
- Unauthorized availpower of information.
5.2 Security issues
The issues that confront us in relation to securing electronic dealing are therefore:
- Confidentiality
- Integrity
- Availpower
- Authenticity/Non-reputpower
- Auditpower
Information should be protected from prying eyes of unauthorized internal users, external hackers and from being intercepted during transmission on communication networks by making it unintelligible to the attacker. The content should be changed in such a way that it is not clear by anyone who does not know the transformation information.
Integrity:
On recovery or receipt at the other end of a communication network the information should appear exactly as was stored are sent. It should be possible to generate an alert on any modification, addition or deletion to the original content. Integrity also precludes information "replay" i.e., a fresh copy of the data is generated or begrudge exploitation the authorization features of the earlier authentic content. Suitable mechanisms are required to ensure end-to end content content and copy authentication.
Availpower:
The information that is being stored or transmitted crosswise communication networks should be available whenever required and to some extent as desired inside pre-established time constraints. Network errors, power outages, operational errors, application package errors, hardware problems and viruses are some of the causes of unavailpower of information. The mechanisms for implementation of counter measures to these threats are available but are beyond the scope of end-to-end content security for implementing Electronic Commerce.
Authenticity:
It should be possible any mortal or object from masquerading as other mortal or object. When a content is received it should therefore be possible to verify it has so been sent by the mortal or object claiming to be the mastermind. Similarly, it should also be possible to ensure that the content is sent to the mortal or object for whom it is meant. This implies the need for reliable identification of the mastermind and recipient of data.
Non-reputpower:
After sending / authorizing a content, the sender should not be able to, at a later date, deny having done so. Similarly the recipient of a content should not be able to deny receipt at a later date. It should, therefore be possible to bind content accognitionments with their originations.
Auditpower;
Audit data must be recorded in such a way that all nominative confidentiality and unity requirements are met.[2]
5.3 Security solutions
- Cryptography is the most wide used proficiency for implementing technology solution for the above mentioned security problems. It comprises encipherion -- the process of making information unintelligible to the unauthorized reader and decipherion - reserving encipherion to make the information clear once again. Conventional cryptography uses a cipher or key to encipher information. The same secret key is used by the receiver to decipher the information.[14]
- Password is the most common mechanism used for authenticate people. Passwords are expected to be proverbial only by the owner. The onus is on the owner to keep the parole secret.
- Digital signature can be used not only to verify the genuineness of the content and the claimed identity of the sender, but also to verify the content unity. The recipient, however, should not be able to use the received digital signature to incorrectly "sign" contents on behalf of the original sender. Here a content is enciphered with the sender's private key to generate the 'signature'. The content is then sent to the destination on with this signature. The recipient deciphers the signature exploitation the sender's public key, and if the result matches with the copy of the content received, the recipient can be sure that the content was sent by the claimed mastermind and that the content has not been modified during transmission, since only the mastermind is in possession of the corresponding encipherion key. It is a two key cryptosystems.
- A more effective solution can be obtained by exploitation a biometric authentication device, such as a fingermark scanner, in the e-wallet.
- Smart card are similar to charge plate game except that they have chips embedded in them. These card game can be accustomed store value and carry authentication information.
6. CONCLUSION
Changing market scenario puts pressure on business mortals to adapt new and smart strategies to reach the peak of winner. New inventions are quickly becoming part of IT infrastructure. But to get effective feedback we need a multi functional team approach consisting of business people who can right identify business requirements, technology requirements and winner criteria. People can reduce the risk and time-to-deployment by considering the factors pictured above.
7. REFERENCES
- Aberdeen Group, Inc. "e-Business Infrastructure Integration: Practical Approaches," An Executive White Paper, Boston, Massachusetts 02108, USA, November 2001
- Kamlesh K. Bajaj and Debjani Nag, "E-Commerce: The Cutting Edge of Business," Tata-McGrawHill, 1999
- Efraim Turban, Jae Lee, David King, H. Michael Chung, "Electronic Commerce-A Managerial Perspective," Pearson Education Asia, 2001
- Ravi Kalakota and Andrew B. Whinston, "Frontiers of Electronic Commerce," Addison Wesley, 2001
- Susmita Das, Malabika Dinda, Sudipa Batabyal, Sangeeta Mishra, "A Study on Various Aspects of E-Commerce Paradigms with One Design Implementation," B.Tech.(Honours) Thesis, Haldia Institute of Technology (Vidyasagar University), 2002
- Simon S. Y. Shim, Vishnu S. Pendyala, Meera Sundaram, and Jerry Z. Gao, "Business to Business E-Commerce Frameworks," Computer, IEEE Computer Society, Volume 33, Number 10, October 2000.
- Wenli Wang, Zoltan Hidvegi, Andrew D. Bailey Jr., and Andrew B. Whinston, "E-Process Design and Assurance Using Model Checking," Computer, IEEE Computer Society, Volume 33, Number 10, October 2000
- Tim Ebringer, Peter Thorne, and Yuliang Zheng, "Parasitic Authentication To Protect Your E-Wallet," Computer, IEEE Computer Scciety, Volume 33, Number 10, October 2000
- Abhijit Chaudhury, Debasish Mallick, and H. Raghav Rao, "Web Channels in E-Commerce," Communications of the ACM, Volume 44, Number 1, January 2001
- Ted Becker, "Rating the Impact of New Technologies on Democracy," Communications of the ACM, Volume 44, Number 1, January 2001
- Joe Mohen and Julia Glidden, "The Case for Internet Voting," Communications of the ACM, Volume 44, Number 1, January 2001
- Deborah M. philips and hans A. von Spakovsky, "Gauging the Risks of Internet Elections," Communications of the ACM, Volume 44, Number 1, January 2001
- Lance J. Hoffman and Lorrie Cranor, Guest Editors, " Internet Voting for Public Officials," Communications of the ACM, Volume 44, Number 1, January 2001
- Andrew S. Tanenbaum, "Computer Networks," Third Edition, Prentice-Hall
- Debajyoti Mukhopadhyay and Sangeeta Mishra, "How to Meet The Challenges Of Managing E-Commerce Successfully," Journal of the Calcutta Management Association, Volume VII, Number 2: August 2002
0 Comments