Sei sulla pagina 1di 97



RF Home

Courses List | About ROCW | ROCW Home 

Welcome to Rai OpenCourseware, opening the treasure


trove of knowledge and related resources.

Available Courses . .

Subject Listing Computing > Under Graduate > B. Tech. Computer Science and Engineering (4

Syllabus yrs)

Lecture Notes
Lecture Notes > E-Commerce
Practicals
Assignments
Lecture 1 Introduction To E Commerce
Suggested Readings
Lecture 2 Benefits And Limitations Of E-Commerce
Lecture 3 Generic Framework Of E-Commerce
Lecture 4 Architectural Framework Of E-Commerce
Lecture 5 Web Based E Commerce Architecture
Lecture 6 Consumer Oriented E-Commerce
Lecture 7 E-Services

Lecture 8 Electronic Data Inter Change


Lecture 9 Electronic Data Inter Change (Cont.)
Lecture 10 Electronic Data Inter Change (Cont.)
Lecture 11 Electronic Data Inter Change (Cont.)
Lecture 12 Electronic Payment System
Lecture 13 Electronic Payment System (Cont.)
Lecture 14 Electronic Payment System (Cont.)
Lecture 15 Electronic Payment System (Cont.)
Lecture 16 Electronic Payment System (Cont.)

Lecture 17 Electronic Payment System (Cont.)


Lecture 18 Electronic Payment System (Cont.)
Lecture 19 Threats To Computer Systems

Lecture 20 Internet Security


Lecture 21 Internet Security (Cont.)
Lecture 22 Internet Security (Cont.)
Lecture 23 Issues In E-Commerce




Rai Foundation Colleges All individuals like faculty, students and self learners can use the content. All institutions should contact
Rai Foundation Colleges before using any of our course content.



 
 

 software resides on a commerce server and works in conjunction


 Introduction with online payment systems to process payments. Since these
 Electronic Data Interchange servers and data lines make up the backbone of the Internet, in a
broad sense, E-commerce means doing business over
 Advantages and Disadvantages of Electronic Markets
interconnected networks.
 Summary
Electronic commerce is an emerging model of new selling and
 Exercise merchandising tools in which buyers are able to participate in all
 phases of a purchase decision, while stepping through those
After this lecture the students will be able to: processes electronically rather than in a physical store or by phone
(with a physical catalog). The processes in electronic commerce
 Understand What is “E Commerce”
include enabling a customer to access product information, select
 Describe various application areas of E Commerce items to purchase, purchase items securely, and have the purchase
The availability of Internet has led to the development of settled financially.
Ecommerce which is becoming very popular these days. So let’s It is an emerging concept that describes the process of buying and
start our discussion on this very interesting field. Most of the selling or exchanging of products, services; and information via
people think that E Commerce is just purchasing something on computer networks including the Internet.
the Internet but this is a misconception; let’s see what the reality
 From a communications perspective, EC is the delivery of
is.
information, products/services, or payments over telephone
 lines, computer networks, or any other electronic means.
Electronic commerce applications started in the early 1970s, with  From a business process perspective, EC is the application
such innovations as electronic fund transfers (EFT). However, of technology to-ward the automation of business
the extent of the applications was limited to large corporations, transactions and work flow.
financial institutions, and a few daring small businesses. Then
came EDI, which expanded from financial transactions to other  From a service perspective, EC is a tool that addresses the
transaction processing and enlarged the participating companies desire of firms, consumers, and management to cut service
from financial institutions to manufacturers, costs while improving the quality of goods and increasing
the speed of service delivery.
retailers, services, and so on. Many other applications followed,
ranging from stock trading to travel reservation systems. Such  From an online perspective, EC provides the capability of
systems were described as telecommunication buying and selling products and information on the Internet
and other online services.
applications and their strategic value was widely recognized. With
the commercialization of the Internet in the early 1990s and its The term commerce is viewed by some as transactions conducted
rapid growth to millions of potential customers, the term electronic between business partners. Therefore, the term electronic commerce
commerce was coined, and EC applications expanded rapidly. One seems to be fairly narrow to some people. Thus, many use the
reason for the rapid expansion of the technology was the term e-business. It refers to a broader definition of EC, not just
development of networks, protocols, software, and specifications. buying and selling but also servicing customers and collaborating
The other reason was the increase in competition with business partners, and conducting electronic transactions
within an organization
and other business pressures. From 1995 to 1999 we have
witnessed many innovative applications ranging from 
advertisement to auctions and virtual reality experiences. Almost Electronic Commerce (e-Commerce) is a general concept covering
every medium- and large-sized organization in the United States any form of business transaction or information exchange
already has a Web site. Many are very extensive; for example, in executed using information and communication
1999 General Motors Corporation offered 18,000 pages of technologies (ICTs). E-Commerce takes place between companies,
information that included 98,000 links to its products, services, between companies and their customers, or between companies
and dealers. and public administrations. Electronic Commerce includes
electronic trading of goods, services and electronic material.

Conducting business online. Selling goods, in the traditional sense, E-Commerce systems include commercial transactions on the
is possible to do electronically because of certain software programs Internet but their scope is much wider than this; they can be
that run the main functions of an e-commerce Web site, including classified by application type:
product display, online ordering, and inventory management. The


 
 available in a market segment so that the purchaser can compare
The principle function of an electronic market is to facilitate the the prices (and other attributes) of the offerings and make a
search for the required product or service. Airline booking systems purchase decision. The usual example of an electronic market is an
are an example of an electronic market. airline booking system.
 
EDI provides for the efficient transaction of recurrent trade EDI provides a standardized system for coding trade transactions
exchanges between commercial organizations. EDI is widely used so that they can be communicated directly from one computer
by, for example, large retail groups and vehicle assemblers when system to another without the need for printed
trading with their suppliers. orders and invoices and the delays and errors implicit in paper
  handling. EDI is used by organizations that make a large number
The Internet (and similar network facilities) can be used for of regular transactions. One sector where EDI is
advertising goods and services and transacting one-off deals. extensively used is the large supermarket chains, which use EDI
Internet commerce has application for both business-to-business for transactions with their suppliers.
and business to consumer transactions.
 
Fig 1.1 : The three categories of E Commerce Information and communications technologies can also be used
to advertise and make once-off sales of a wide range of goods
and services. This type of e-Commerce is typified by the
commercial use of the Internet. The Internet can, for example, be
used for the purchase of books that are then delivered by post or
the booking of tickets that can be picked up by the clients when
they arrive at the event. It is to be noted that the Internet is not the
only technology used for this type of service and this is not the
only use of the Internet in e-Commerce.

Electronic markets are exampled by the airline booking systems.
Electronic markets are also used in the financial and commodity
markets and again the dealing is done via intermediaries; to buy
stocks and shares a member of the public uses the services of a
stockbroker. Arguably the use of electronic markets has served
the customer well. With the assistance of a good travel agent the
airline customer can be informed of all the flights available for an
intended journey and then select, on the basis of price,
convenience,loyalty scheme, etc. the flight that they wish to book.
Let’s discuss the advantages and disadvantages of each of
these areas.


The advantages of an electronic market to the customer are self-
 evident.Using an airline booking system, for example, there is a
Electronic Commerce (e-Commerce) is a term popularized by the screen that shows all the flights from (say) New York to Los
advent of commercial services on the Internet. Internet e- Angeles and the consumer can make an informed choice without
Commerce is however, only one part of the overall sphere of having to spend time and effort finding out which airlines fly that
e-Commerce. The commercial use of theInternet is perhaps typified route and then contacting each of the airlines to obtain flight
by once-off sales to consumers. Other types of transactions use times, price and availability details. Once a flight is selected the
other technologies. Electronic Markets (EMs) are in use in a number system facilitates the booking of that flight, paying the fare and
of trade segments with an emphasis on printing the ticket.
search facilities and Electronic Data Interchange (EDI) is used for For the seller the advantages are less evident. The seller that is the
regular and standardized transactions between organizations. The most competitive may do well, the electronic market makes available
mainstream of e-Commerce consists of these three areas; these information on their product and the advantage of that offering
are represented as a diagram in Figure 1.1 and outlined in a little should be apparent. Less competitive suppliers are likely to be
more detail below. forced into price. Reductions and the competitive effect may force
all suppliers to cut prices, possibly below the level at which it is
 possible to make a profit (as in the case on
An electronic market is the use of information and
some air transport routes).
communications technology to present a range of offerings


 
made by the customer – the customer will get what the customer
asked for.

With paper orders it would be several days before the customer
was informed of any supply difficulty, such as the product is out
of stock. With alternative product to be ordered or an alternative
supplier to be used.
 
Just like orders, invoices can be sent electronically. EDI invoices
have similar advantages to EDI orders in saved time and avoided
Fig 1.2: Basic transactions in EDI errors. However, the major advantage in EDI invoices is that they
can be automatically matched against the original order and cleared
The above figure shows the basic transactions which take place
for payment without the sort of queries that arise when paper
between two business organizations. Let’s see the benefits when
invoices are matched to orders.
these transactions are not taking manually but through computer
systems and that is known as EDI. 
Payment can also be made by EDI. The EDI payment system can

also generate an EDI payment advice that can be electronically
EDI can bring a number of advantages to the organizations that
matched against the relevant invoices, again avoiding query and
use it. It should save considerable time on the exchange of business
delay.
transactions and has the potential for considerable savings in costs.
EDI can be simply used to replace paper transactions with 
electronic transactions – this is the normal route taken in the initial 
installation of EDI. The full advantage of EDI is only realized 
when business practices are restructured to make full use of the The ability to order regularly and quickly reduces the amount of
potential of EDI; when EDI is used as an enabling technology to goods that need to be kept in a store room or warehouse at the
change the way the business operates–just-in-time (JIT) shop or the factory. For many JIT manufacture and quick response
manufacture and quick response supply being prime examples of supply systems stockholding is eliminated altogether with goods
where EDI is used as an enabling technology to gain competitive being delivered only as they are needed. Reduced stock holding
advantage. cuts the cost of warehousing, the double handling goods (into
 store and then out again onto the factory or shop) and the capital
requirement to pay for the goods that are just sitting in store.

Paper orders have to be printed, enveloped and sent out by the  
customer’s post room, passed through the postal service, received Speeding up the trade cycle by getting invoices out quickly, and
by the supplier’s post room, and input to the supplier’s order directly matched to the corresponding orders and deliveries, can
processing system. To achieve all this, reliably, in under three days and should speed up payments and hence improve cash flow.
would be to do very well. EDI orders are sent straight into the Elimination of most invoice queries can be particularly significant
network and the only delay is how often the supplier retrieves in reducing delays in payments.
messages from the system. Orders can be in the supplier’s system

within a day, or if there is urgency the messages can be retrieved
There is a steady increase in the number of customers, particularly
more frequency, for example every hour.
large, powerful customers, that will only trade with suppliers that
 do business via EDI. Supermarkets and vehicle assemblers are
The use of EDI can cut costs. These include the costs of stationery prime examples. Being ready and able to trade electronically can be
and postage but these will probably be fully matched by the costs an advantage when competing for new business.
of running the EDI service. The principle saving from the use of 
EDI is the potential to save staff costs. The obvious example of An established EDI system should be of considerable advantage
this is that if the orders are directly input to the system there is no to both customer and supplier. Switching to a new supplier
need for an order entry clerk. Note also that seasonal peak, staff requires that the electronic trading system and trading relationship
holidays, etc. no longer create a backlog in the order entry area. The be redeveloped, a problem to be avoided if a switch of supplier is
cost saving need to be offset against the system development and not essential.
network casts.
To gain these advantages EDI has to be seen as an investment
 there are costs upfront and the payback is longer term. The costs is
Keying any information into a computer system is a source of the set up of the EDI system (hardware, software and network)
errors and keying paper orders into the order processing system is and the time required to establish agreements with trading partners.
no exception. EDI eliminates this source of errors. On the down The savings only start when there is a significant volume of
side, there is no order entry clerk who might have spotted errors


 
business transacted using EDI, a point that is called the ‘critical
mass’ in the jargon of EDI.

 Electronic Commerce (e-Commerce) is a general concept
covering any form of business transaction or information
exchange executed using information and communication
technologies (ICTs).
 E-Commerce takes place between companies, between
companies and their customers, or between companies and
public administrations.
 Electronic Commerce includes electronic trading of goods,
services and electronic material.
 An electronic market is the use of information and
communications technology to present a range of offerings
available in a market segment so that the purchaser can
compare the prices (and other attributes) of the offerings
and make a purchase decision.
 EDI provides a standardized system for coding trade
transactions so that they can be communicated directly from
one computer system to another without the need for
printed orders and invoices and the delays and errors implicit
in paper handling.
 Information and communications technologies can also be
used to advertise and make once-off sales of a wide range of
goods and services. This type of e-Commerce is typified by
the commercial use of the Internet.

1. What is eCommerce?
2. What so you understand by EDI?
3. Explain electronic market.



 




 Introduction
 Integration of various infrastructure components in
framework
 Summary
 Exercise

After this lecture the students will be able to:
 Understand the integration of various infrastructure
components in our framework
In this lecture we will discuss the various resources required to
build an infrastructure to support E commerce applications.

From the business activity already taking place, it is clear that
ecommerce applications will be built on the existing technology
infrastructure-a myriad of computers, communications networks,
and communication software forming the nascent Information
Superhighway. Figure 3.1 shows a variety of possible e-commerce
applications; including both inter organizational and consumer-
oriented examples. None of these useswould be possible without
each of the building blocks in the infrastructure:
 Common business services, for facilitating the buying and
selling process
 Messaging and information distribution, as a means of Fig 3.1 Generic Framework of E Commerce
sending and retrieving information To better understand the integration of the various infrastructure
 Multimedia content and network publishing, for creating a components in our framework, let us use the analogy of a
product and a means to communicate about it traditional transportation business. Any successful e-commerce
 The Information Superhighway-the very foundation-for application will require the I-way infrastructure in the same way
providing the highway system along which all e-commerce that regular commerce needs the interstate highway network to
must travel the two pillars supporting all e-commerce- carry goods from point to point. You must travel across this
applications and infrastructure-are just as indispensable. highway, whether you are an organization purchasing supplies

 Public policy, to govern such issues as universal access, or a consumer ordering a movie on demand. Understand, however,
privacy, and information pricing that the I-way is not one monolithic data highway designed
according to long-standing, well defined rules and
 Technical standards, to dictate the nature of information
publishing, user interfaces, and transport in the interest of regulations based on well-known needs. Rather, still under
compatibility across the entire network construction, the I-way will be a mesh of interconnected data
highways of many forms: telephone wires, cable TV wires,
radio-based wireless-cellular and satellite. Far from complete, the
I-way is quickly acquiring new on-ramps and even small highway
systems. The numerous constructors
are either in com-petition with or in alliance with one another, all
in an effort to convince traffic to use their on-ramps or sections of
the highway because, like toll ways, revenues in ecommerce are
based on vehicular traffic, in our case, vehicles transporting
information or multimedia content. The myriad transactions
among businesses means that the ultimate winner must select the
technology for the I-way that best matches future business needs
by using today’s tools. Building an access road to a ghost town or


 
a highway too narrow to handle the traffic will yield equally little evolving and will become increasingly important as more and
return on investment for those who have been less successful at more people with variable intent enter the electronic marketplace.
matching needs with the infrastructure. Building the various The final pillar on which the e-commerce framework rests is
highways is not enough. Transport vehicles are need-ed, routing technical standings, without which the impact of this revolution
issues must be addressed, and of course the transportation costs would be minimized. For instance, returning to our
must be paid. On the I-way, the nature of vehicular traffic is
analogy with traditional transportation systems, railroads would
extremely important. The information and multimedia content
not have flourished had each state established a separate track
determines what type of vehicle is needed. A breakdown of
standard (meter gauge versus broad gauge, for example) and goods
potential everyday e-commerce vehicles into their technological
would have to be constantly moved from one train to
components shows that they vary widely in complexity and may
even need to travel different routes on the I-way, much the way an another every time the standard changed, as they do today at the
eighteen-wheeler may be restricted from traveling roads that cannot border between Russia and Western Europe.
accommodate it: Standards are crucial in the world of global e-commerce, to ensure
Movies = video + audio not only seamless and harmonious integration across the
transportation network but access of information on any type of
Digital games = music + video + software
device the consumer choose_-laser disc, PCs, portable hand-held
Electronic books = text + data + graphics + music + photographs devices or television + set-top boxes (cable converter boxes)-and
+ video. on all types of operating systems. For example, with-out the
Once these vehicles (multimedia content) are created, where are adoption of video standards, video conferencing will never become
they housed? What sort of distribution warehouses is needed to widespread, as each manufacturer will attempt to develop
store and de-liver their multimedia cargo? In the electronic equipment that maximizes their short-term profits rather than
“highway system” multimedia content is stored in the form of working toward customer goals such as
electronic documents. These documents are often digitized, interoperability. While we have strived to limit our initial discussion
compressed, and stored in computerized libraries or multimedia of the elements of a framework for electronic commerce to an
storage warehouses called servers that are linked by transport net- understanding of what part they play within this complex
works to each other and to the software/hardware clients that network, it is no accident that we have ended with a convergence
allow customers to access them. Exactly how do the vehicles of technical, policy, and business concerns. The concept of
move from one distribution warehouse to another? In a traditional “convergence” is essential to the operation of the Information
transportation business, diesel engines or gasoline powered motors Superhighway and to the way the business world is gearing up to
move the trucks along the roadways. On the I-way, messaging deal with it. It is only fit-ting that we preface our discussion of the
software fulfills this role, in any number of forms: e-mail, EDI, one element of our framework we have not yet discussed in detail-
or point-to-point file transfers. In adulation to the development e-commerce applications themselves with a clarification of the
of new vehicles and systems, other key components of commercial concept of convergence.
transactions need to be examined. How can businesses assure
customers of safe delivery? How can customers pay for using the 
I-way? The Common Business Services block of Fig. 3.1 addresses  The building blocks in the infrastructure of E Commerce are
these supporting issues. Encryption and authentication methods Common business services, Messaging and information
have been developed to ensure security of the contents while distribution, Multimedia content and network publishing
traveling the I-way and at their destination, and numerous and the Information Superhighway
electronic payment schemes are being developed to handle highly  The two pillars supporting all e-commerce-applications and
complex transactions with high reliability. These logistical issues infrastructure-which -are just as indispensable are Public
are difficult to address in long-established transportation systems. policy and Technical standards.
That complexity is compounded in the nascent world of electronic
commerce by the unique interplay among government, academia,

and private commercial endeavors as well as by the challenge of 1. Discuss the various requirements to built the framework of
integrating otherwise incompatible transportation systems while E-commerce.
maintaining an uninterrupted flow of traffic. And whereas
traditional businesses are governed by the Commercial Code and
detailed case histories, very basic policy and legal questions are
materializing in relation to e-commerce.
In the case of vehicular traffic over the interstate highway system,
public policy issues concern pollution, consumer protection from
fraud, environmental impact, and taxation. Similarly, in
information traffic, public policy issues deal with the cost of
accessing information, regulation to protect consumers from fraud
and to protect their right to privacy, and the policing of global
information traffic to detect information pirating or pornography.
Again the issues themselves, let alone the solutions, are just now


 


Question 1: What is eCommerce?


 Question 4:
Basically, doing business-as-usual, but across the How will customers access and use your catalogue?
Internet. You advertise your products or services on your Web 
site, as you would in any other media like newspapers, TV or Very easily - by entering your Web address in their Browser.All
brochures.Advertising on your Web site can be done in two ways. they have to do is type your Web address into their Browser
The first is by use of a relatively simple Web site consisting of a (www.YourName.com) and they will be taken straight to your
few pages whereby you tell potential customers who you are, what Web site. If your Web site is well designed (read about our website
you do, where you are and how they can contact you ( easiest done design service) then your customers will be able to access your On-
by giving them your email address). Line Catalogue with the click of a button and place their orders
The second way of enabling world-wide customers to buy from quickly and easily!
you is to provide them with an On-Line Catalogue of your 
products which they can browse at their leisure without having to How do you receive the orders - and what do you do with them?
go to your place of business.

Question 2:What is an on-line catalogue?
You download them from the Internet and then process them
 the same as you would any other orders.
A catalogue that people access via the Internet. As soon as a customer places an order via your On-Line Catalogue,
But it is also a lot more than that. It enables you to increase your it is stored in an orders file at your Web Site until you download
marketplace to a global scale ... without proportionately increasing and process it. (Alternatively, it can be forwarded directly to your
your overheads. Your On-Line Catalogue is an integral part of email address.) On downloading, it is stored in a local file on your
your website, enabling your customers to ... computer designated for ‘Outstanding Orders’. How you deal
 Browse through your stock list, read about an item or with it once you have it is up to you, but generally people print it
service; out and hand it to the member of staff who deals with filling out
orders. Once the order has been sent to the customer, you merely
 Look at photographs of the products.
mark it as ‘Shipped’ in your Outstanding Orders file.
 Select which items they want to purchase Question 6: How will you get paid?
 And drop them into a shopping cart as they go along.

 When they have completed their shopping, they go to the Much the same as you do normally. Customers will have an option
Check-Out. to submit their credit card number (securely!), in which case you
The next step is to request the order by filling in their details and process the order the same as you would normally, or follow it up
method of payment on a form which is waiting for them at the with a cheque. Again, you would wait for cheque clearance as per
Check-Out. The form is already partially completed with a your normal practice. Alternatively, you may choose to open an
breakdown of the items in their shopping cart, prices inclusive of account for them. So as you can see, there is very little difference in
tax, and shipping & handling charges, if any. If they choose to pay the actual sales process between your customary way of working
by credit card, the form includes a place for them to fill in their and selling on-line.
credit card number. And then, with one press of a button, they Question 7: What about shipping & handling?
send the order to you. It’s as simple as that.

Question 3: Why would i want to use an on-line catalogue?
Your shipping charges (if any) are stated clearly in your on-line
 catalogue and automatically added to the invoice for customers to
To boost your sales! There is no simpler way to enable more view and agree to before they submit their order.
people - from all over the world - to buy your products or Question 8: What are the benefits of E-Commerce?
services. With the new Millennium here and all fears of the

dreaded Millennium Bug now allayed, everyone is rushing to
exploit the vast new frontiers of the Internet. It is a proven The benefits below are some of the more obvious ones:
lucrative means of conducting business. If you don’t have your  A world-wide market instantly
business on the Net, you are giving your competitors a wonderful  No added sales staff
gift - an big advantage over you!
 A catalogue which is quickly and easily updateable. This
means that when prices or stocks are changed, you don’t


 
have to have hundreds or thousands of obsolete catalogues
lying around. You don’t have to wait for the printer to
deliver the catalogue before the new prices can come into
effect.
 The facility to advertise daily, weekly or monthly ‘specials’ and
sales, or any special discounts - and they can be changed
within minutes, when and if necessary.
 You can also add a marketing message which highlights your
strengths, such as the range and quality of your products or
services - or anything else you want to tell your customers.



 



 transports information. These were discussed extensively earlier


 Introduction and will not be addressed here. We begin our discussion with the
application level services.
 Various layers of electronic commerce application architecture
 Software framework necessary for building
 Summary
 Exercise

After this lecture the students will be able to:
 Understand the software framework necessary for building
Electronic Commerce applications
In the previous lecture we studied the conceptual framework of E
Commerce, today we will discuss in detail the six layers of
functionality or services in E Commerce application architecture.


The software framework necessary for building electronic
commerce applications is little understood in existing literature.
In general a framework is intended to define and create tools that
integrate the information found in today’s closed systems and Fig 4.1 Electronic Commerce: A conceptual framework
allow the development of e-commerce applications. It is important 
to understand that the aim of the architectural frame-work itself The application services layer of e-commerce will be comprised of
is not to build new database management systems, data repository, existing and future applications built on the innate
computer languages, software agent based transaction monitors, architecture.Three distinct classes of electronic commerce application
or communication protocols. can be distinguished: customer to business, business-to-business,
Rather, the architecture should focus on synthesizing the diverse and intra organization (Fig 4.2)
resources already in place in corporations to facilitate the integration 
of data and software for better applications. We call this category marketplace transaction. In a marketplace
The electronic commerce application architecture consists of six transaction, customers learn about products differently through
layers of functionality, or services: electronic publishing, buy them differently using electronic cash
(1) applications; and secure payment systems, and have them delivered differently.
Also, how customers allocate their loyalty may also be different. In
(2) brokerage services, data or transaction management;
light of this, the organization itself has to adapt to a world where
(3) interface, and; support layers” the traditional concepts of brand differentiation no longer hold-
(4) secure messaging, security and electronic document where “quality” has a new meaning, where “content” may not be
interchange; equated to “product,” Where “distribution” may not automatically
(5) middle ware and structured document interchange; and mean “physical transport.” In this new environment, brand equity
can rapidly evaporate forcing firms to develop new ways of doing
(6) network infrastructure and basic communications services business .
(see Fig. 4.1).
These layers cooperate to provide a seamless transition between
today’s computing resources and those of tomorrow by
transparently integrating information access and exchange within
the context of the chosen application. As seen in Fig. 4.1, electronic
commerce applications are based on several elegant technologies.
But only when they are integrated do they provide uniquely
powerful solutions.
In the ensuing discussion of each of these layers, we will not
elaborate on the various aspects of the network infrastructure that


 

The information brokerage and management layer provides service
integration through the notion of information brokerages, the
development of which is necessitated by the increasing
information resource fragmentation. We use the notion of
information brokerage to represent an intermediary who provides
service integration between customers and information providers,
given some constraint such as a low price, fast service, or profit
maximization for a client. Information brokers, for example, are
rapidly becoming necessary in dealing with the voluminous
amounts of information on the networks. As on-line databases
migrate to consumer information utilities, consumers and
information professionals will have to keep up with the knowledge,
and owner-ship/of all these systems. Who’s got what? How do
Figure 4.2 Different types of electronic commerce applications you use it? What do they charge? Most professionals have enough
trouble keeping track of files of 1 interest on one or two database
 services. With all the complexity associated with large numbers of
We call this category market-link transaction. Here, businesses, on-line databases and service bureaus, if it is impossible to expect
governments, and other organizations depend on computer -to- humans to do the searching. It will have to be software programs-
computer communication as a fast, an economical, and a information brokers or software agents, to use the more popular
dependable way to conduct business’ transactions. Small companies term-that act on the searcher’s behalf.
are also beginning to see the benefits of adopting the same
Information brokerage does more than just searching. It addresses
methods. Business-to-business transactions include the use of
the issue of adding value to the information that is retrieved. For
EDI and electronic mail for purchasing goods and services, buying
instance, in foreign exchange trading, information is retrieved
information and consulting services, submitting requests for
about the latest currency exchange rates in order to hedge currency
proposals, and receiving proposals.Examine this scenario. The
holdings to minimize risk and maximize profit. In other words,
current accounts payable process occurs through the exchange of
the act of retrieving the information is the input to other
paper documents. Each year the trading partners exchange millions
transactions. With multiple transactions
of invoices, checks, purchase orders, financial reports, and other
transactions. Most of the documents are in electronic form at being the norm in the real world, service integration becomes
their point of origin but are printed and key-entered at the point critical. Taking the same foreign exchange example further,service
of receipt. The current manual process of printing, mailing is integration allows one to link the hedging program (offered on a
costly, time consuming, and error-prone. Given this situation and time-sharing basis by a third party) with the search program (could
faced with the need to reduce costs, small businesses are looking be another vendor) that finds the currency rates from the cheapest
toward electronic commerce as a possible savior. on-line service to automatically send trades to the bank or financial
services company. In effect, a personalized automated trading
 system can be created without having to go to any financial
We call this category market-driven transactions. A company institution. This is just one example of how information
becomes market driven by dispersing throughout the firm brokerages can add value.
information about its customers and competitors; by spreading
Another aspect of the brokerage function is the support for data
strategic and tactical decision making so that all units can participate;
management and traditional transaction services. Brokerages may
and by continuously monitoring their customer commitment by
provide tools to accomplish more sophisticated, time-delayed
making improved customer satisfaction an ongoing objective. To
updates or future compensating transactions. These tools include
maintain the relationships that are critical to delivering superior
software agents, distributed query generator, the distributed
customer value, management must pay close attention to service,
transaction generator, and the declarative resource constraint
both before and after sales. In essence, a market-driven business
basewhich describes a business’s rules and-environment
develops a comprehensive understanding of its customers’
information. At the heart of this layer lies the work-flow scripting
business and how customers in the immediate and downstream
environment built on a software agent model that coordinates
markets perceive value.
work and data flow among support services.
Three major components of market-driven transactions are
As pointed out earlier, software agents are used to implement
 customer orientation through product and service information brokerages. Software agents are mobile programs
 customization; cross-functional coordination through that have been called “healthy viruses,” “digital butlers/” and
enterprise “intelligent agents.” Agents are encapsulations of users’ instruction
 integration; and advertising, marketing, and customer that perform all kinds of tasks in electronic marketplaces spread
service. across networks. Information brokerages dispatch agents capable
of information resource gathering, negotiating deals, and
performing transactions. The agents are intelligent because they


 
have contingency plans of action. They examine themselves and Secure Messaging and Structured Document Interchange Services
their environment and if necessary The importance of the fourth layer, secured messaging, is
change from their original course of action to an alternative plan. clear.Everyone in business knows that electronic messaging is a
For example, suppose you send an agent to an on-line store with critical business issue. Consider a familiar business scenario:
a request to order a bouquet of roses for $25 or less. If the shop You hand over an urgent fax Monday and find out Tuesday that
offers roses starting at $30, your agent can either choose a different it’s still sitting on your fax operator’s desk. What happened?
bouquet or find a different store by consulting an on-line “Yellow The line was busy and he thought he’d try again later.Or, the
Pages” directory, depending on prior instructions. number was wrong, but he forgot to let you know.
Although the notion of software agents sounds very seductive, it Or you’re in London and you need to send a spreadsheet that
will take a while to solve the problems of interregna details a marketing plan for a product introduction strategy to a
communication, interoperable agents, and other headaches that co-worker in New York. This must be done today, not tomorrow
come with distributed computing and net-working. To some when the courier service would deliver. There is a solution to
critics, the prospect of a single-agent language like Telescript as a these common and frustrating problems. It’s called Integrated
world standard is disturbing. They worry that agents sound a bit Messaging: a group of computer services that through the use of
too much like computer viruses, which instead of running errands a network send, receive, and combine messages, faxes, and large
may run amok. Vendors such as General Magic go to great lengths data files. Some better-known examples are electronic mail,
to explain the precautions it has taken to make this impossible: enhanced fax, and electronic data interchange.
the limits placed on the power of agents, the “selfdestruct”
Broadly defined, messaging is the software that sits between the
mechanism built into their codes. Yet until electronic commerce
network infrastructure and the clients or electronic commerce
services are up and running on a large scale, it is impossible to
applications, masking the peculiarities of the environment. Others
know how well software agents will work.
define messaging as a frame-work for the total implementation
 of portable applications, divorcing you from the architectural
The third layer, interface and support services, will provide primitives of your system. In general, messaging products are not
interfaces for electronic commerce applications such as interactive applications that solve problems; they are more enablers of the
catalogs and will sup-port directory services-functions necessary applications that solve problems.
for information search and access. These two concepts are very Messaging services offer solutions for communicating non
different. Interactive catalogs are the customized interface to formatted (unstructured) data-letters, memos, reports as weft as-
consumer applications such as home shopping. An interactive formatted (structured) data such as purchase orders,
catalog is an extension of the paper-based catalog andincorporates
shipping notices, and invoices. Unstructured messaging consists
additional features such as sophisticated graphics and video to
of fax, e-mail, and form-based systems like Lotus Notes.
make the advertising more attractive.
Structured documents messaging consist of the automated inter-
Directories, on the other hand, operate behind the scenes and change of standardized and approved messages between computer
attempt to organize the enormous amount of information and applications, via telecommunications lines.
transactions generated to facilitate electronic commerce. Directory
Examples of structured document messaging include EDI.
services databases make data from any server appear as a local
Messaging is gaining momentum in electronic commerce and
file. A classic example of a directory is the telephone White Pages, seems to have many advantages. It supports both synchronous
which allows us to locate people and telephone numbers. (immediate) and asynchronous (delayed) message delivery and
In the case of electronic commerce, directories would play an processing. With asynchronous messaging, when a message is
important role in information management functions. For sent, work continues (software doesn’t wait for a response).This
instance, take the case of buying an airline ticket with several allows the transfer of messages through store-and-forward
stopovers with the caveat that the time between layovers be methods.
minimized. This search would require several queries to various Another advantage of messaging is that it is not associated with
on-line directories to-find empty seats on various airlines and any particular communication protocol. No preprocessing is
then the avail-ability of seats would; be coordinated with the necessary, although there is an increasing need for programs to
amount of time spent in the air-port terminals. interpret the message. Messaging is well suited for both client
The primary difference between the two is that unlike interactive server and peer-to-peer computing models. In distributed systems,
catalogs, which deal with people, directory support services interact the messages are treated as “objects” that pass between systems.
directly with soft-ware applications. For this reason, they need not Messaging is central to work-group computing that is changing
have the multimedia glitter and jazz generally associated with the way businesses operate. The ability to access the right
interactive catalogs. From a computing perspective, we can expect information at the right time across diverse work groups is a
that there will be no one common user interface that will glaze the challenge. Today, with the messaging tools, people can
surface of all electronic commerce applications, but graphics and communicate and work together more effectively-no matter where
object manipulation will definitely predominated. Tool developers they are located. When an employee sends an electronic mail form,
and designers might incorporate common tools for interface the information travels along with the form. So one person can
building, but the shape of catalogs or directories will depend on start the form, mail it to the next person, fill it in/ sign it, mail it
the users’ desires and functional requirements.


 
to the next, and so on. This is known as message-enabled work- applications the exact locations of resources over the network.
flow solutions. The goal is for the applications to send a request to the middleware
The main disadvantages of messaging are the new types of layer, which then satisfies the request any way it can, using remote
applications it enables-which appear to be more complex, especially information.
to traditional pro-grammers-and the jungle of standards it 
involves. Because of the lack of standards, there is often no Support for transaction processing (TP) is fundamental to success
interoperability between different messaging vendors leading to in the electronic commerce market. Security and management are
islands of messaging. Also, security, privacy, and confidentiality essential to all layers in the electronic commerce model. At the
through data encryption and authentication techniques are transaction security level, two broad general categories of security
important issues that need to be resolved for ensuring the legality services exist: authentication and authorization.
of the message-based transactions themselves.
Transaction integrity must be a given for businesses that cannot
 afford any loss or inconsistency in data. Some commercial sites
Middleware is a relatively new concept that emerged only recently. have had gigantic centralized TP systems running for years. For
Like so many other innovations, it came into being out of necessity. electronic commerce, middleware provides the qualities expected
Users in the 1970s, when vendors, delivered homogeneous in a standard TP sys-tem: the so-called ACID properties (atomicity,
systems that worked, didn’t have a need for middleware3&heR consistency, isolation, and durability).
conditions changed-along with the hardware and the software the 
organizations couldn’t cope: The tools were inadequate, the 
backlog was enormous, and the pressure was overwhelming. And, Object orientation is proving fundamental to the proliferation of
the users were dissatisfied. Something was needed to solve all the network-based applications for the following reasons: It is too
interface, translation, transformation, and interpretation problems hard to write a net-work-based application without either extensive
that were driving application developers crazy.With the growth of developer retraining or a technology that camouflages the intricacies
networks, client-server technology, and all other forms of of the network. Objects are defined as the combination of data
communicating between/among unlike platforms, the problems and instructions acting on the data. Objects are an evolution of
of get-ting all the pieces to work together grew from formidable the more traditional programming concept of functions and
to horrendous. as the cry for distributed computing spread, users procedures. A natural instance of an object in electronic commerce
demanded interaction between dissimilar systems, networks that is a document. A document carries data and often carries
permitted shared resources, and applications that could be accessed instructions about the actions to be performed on the data. Today,
by multiple software programs. the term object is being used interchangeably with document
In simple terms, middleware is the ultimate mediator between resulting in a new form of computing called document oriented
diverse software pro-grams that enables them talk to one another. computing. Here, the trend is to move away from single data-type
Another reason for middleware is the computing shift from documents such as text, pictures, or video toward integrated
application centric to data centric. That is, remote data controls all documents known as com-pound document architectures.
of the applications in the network instead of applications The best example of this approach is an active document. If you
controlling data. To achieve data-centric computing, middleware create a new document that is an integration of the spreadsheet,
services focus on three elements: transparency, transaction security word processor, and presentation package, what you’ll see in the
and management, and distributed object management and next generation of operating systems is that as you scroll through
services. your document, the tool bar will automatically change from a
 spreadsheet too bar, to a word processing tool bar, to a
Transparency implies that users should be unaware that they are presentation package tool bar. These applications will also be able
accessing multiple systems. Transparency is essential for dealing to access and retrieve data from any file in the computing network.
with higher-level issues than physical media and interconnection The implications are clear: We’re going to see a gradual movement
that the underlying network infrastructure is in charge of. The toward active documents that will be designed out of linked
applications.
ideal picture is one of a “virtual” network: a collection of
workgroup, departmental, enterprise, and inter enterprise LANs 
that appears to the end user or client application to be a seamless  The architectural framework of E Commerce focuses on
and easily accessed whole. synthesizing the diverse resources already in place in
Transparency is accomplished using middleware that facilitates a corporations to facilitate the integration of data and software
distributed computing environment. This gives users and for better applications.
applications transparent access to data, computation, and other  The electronic commerce application architecture consists of
resources across collections of multi-vendor, heterogeneous six layers of functionality, or services:
systems. The strategic architectures of every major system vendor
(1) applications;
are now based on some form of middleware. The key to realizing
the theoretical benefit of such architecture is transparency. Users (2) brokerage services, data or transaction management;
need not spend their time trying to understand where something (3) interface, and; support layers”
is. Nor should application developers have to code into their


 
(4) secure messaging, security and electronic document
interchange;
(5) middle ware and structured document interchange; and
(6) network infrastructure and basic communications
services
 The application services layer of e-commerce categorizes three
distinct classes of electronic commerce application: customer
to business, business-to-business, and intra organization.
 The information brokerage and management layer provides
service integration through the notion of information
brokerage which represents an intermediary who provides
service integration between customers and information
providers, given some constraint such as a low price, fast
service, or profit maximization for a client.
 The third layer, interface and support services provide
interfaces for electronic commerce applications such as
interactive catalogs and will sup-port directory services-
functions necessary for information search and access
 Secure Messaging and Structured Document Interchange
Services the fourth layer deals with the issues of security,
privacy, and confidentiality through data encryption and
authentication techniques
 Middleware the fifth layer is the ultimate mediator between
diverse software pro-grams that enables them talk to one
another.
 Last but not the least is the Network Infrastructure

1. What is the functionality of middleware in E-commerce
2. How do middleware provide transparency?
3. Discuss the security issue in middleware.
4. What do understand by C2b and B2B transaction?
5. Explain various layers in electronic commerce architecture




 



 other over the internet. This protocol is called the Hypertext Transfer
 Introduction Protocol (HTTP).
 Web System Architecture 
 Generation Of Dynamic Web Pages To identify web pages, an addressing scheme is needed. Basically,
a Web page is given an address called a Uniform Resource Locator
 Cookies
(URL). At the application level, this URL
 Summary provides the unique address for a web page, which can be treated
 Exercise as an internet resource. The general format for a URL is as follows:
 protocol://domain_name:port/directory/resource
After this lecture the students will be able to: The protocol defines the protocol being used. Here are some
 Understand web based E Commerce architecture examples:
All of you might have understood that web system together with  http: hypertext transfer protocol
the internet forms the basic infrastructure for supporting E  https: secure hypertext transfer protocol
Commerce. In this lecture we will discuss in detail what are the
 ftp: file transfer protocol
components a web bases system is consist of assuming that you
have a knowledge of basic network architecture of the internet  telnet: telnet protocol for accessing a remote host
(i.e. Layered model of the Internet) The domain_name, port, directory and resource specify the domain
name of the destined computer, the port number of the

connection, the corresponding directory of the resource and the
Figure 5.1 gives the general architecture of a web-based ecommerce requested resource, respectively.
system.
For example, the URL of the welcome page (main.html) of our
Basically, it consists of the following components: VBS may be writ-ten as http://www.vbs.com/welcome/
 Web browser: It is the client interface. Essentially, it is used main.html. In this example, the protocol is http, the
for displaying information to the user as well as collecting domain_name is www.vbs.com, the directory is welcome (i.e., the
user’s input to the system. Serving as the client, the web file main.html is stored under the directory called welcome). Note
browser also interacts with the web server using the HTTP. that in this example, the port is omitted because the default port
 Web server: It is one of the main components of the for the protocol is used; that is, formally the URL should be
service system. It interacts with the web client as well as the specified as http://WWW.vbs.com:80/welcome/main.html
backend system. where 80 specifies the port for HTTP as explained later. In some
 Application server : It is the other main component of the protocols (e.g. TELNET) where the user name and password are
service system and it hosts the e-commerce application required, the URL can be specified as follows :
software. protocol://username:password@domain_name:port/ directory/
 Backend system: It supports the service system for resource where username and password specify the user name and
fulfilling the user’s request. In many cases, it is a database password, respectively.
management system. Let us consider a general overview of HTTP before discussing its
 Internet: It is the communication platform for the web details. This protocol is used for the web client and the web server
server and the web client to exchange information with each to communicate with each other.
other. 
Sup-pose that you access the URL of the VBS http://
www.vbs.com/welcome/main.html by clicking the corresponding
hyperlink. This is what happens in terms of the interactions
between the web browser and the web server according to. Utilizing
the URL of the hyperlink, the web browser (or web client) obtains
the IP address of the VBS through the DNS. After receiving the
reply, the web client establishes a TCP connection to port 80 of
Fig 5.1 Web System Architecture the web server. Note that port 80 is the default port for HTTP.
Then it issues a GET command (more specifically, GET/
As the web client and the web server are not connected directly, we
welcome/main.html) to retrieve the web page “main.html” from
need a protocol for them to “talk” or communicate with each
the web server. The web server then returns the corresponding


 
file to the browser. In HTTP/1.0, the TCP connection is then
closed. In ‘HTTP/ 1.1, the connection is kept open in order to Method name Description
support multiple requests. The browser then shows the text in GET 
the hypertext file. It also obtains the images in the hypertext file
HEAD 
from their respective URLs and displays them. This is why you see
the text first and the images enter, because the images take a longer 
time to download. In many companies, a proxy web server is set 
up for security and other administrative reasons. In this case, 
users need to access other web servers via the proxy web server.
POST 
Basically, a user’s browser issues a request to the proxy web server

first and then the proxy web server retrieves the specific web page
on behalf of the user. Having retrieved the web page, it is then 
returned to the user’s browser for display. Essentially, the proxy
web server acts as an application gateway for enhancing security. A Table 5.1 Request methods in HTTP/1.0
proxy web server can have both positive and negative effects on
web performance. On the positive side, it can be used to keep As described in Table 5.1, Request_method specifies the request
cache copies of web pages so that if subsequent users require method used. Resource_address is essentially the URL that specifies
these web pages, they can be returned to the users almost the location of the requested resource in the web server. HTTP/
immediately. In other words, the retrieval time can be greatly Version-number tells the web server what HTTP protocol the
reduced. However, the proxy web server can also become a web client is using. There are three types of headers for passing
bottleneck if the system is not well planned. additional information to the web server, namely, General_header,
Request_header, and Entity_header. They are described in Tables
 5.2, 5.3, and 5.4, respectively. Finally, the web client can post
HTTP is a simple application protocol working under a client/ additional data to the server after the Blank_line, This is used in
server computing environment. Basically, a client issues a request conjunction with the POST request method.
to a server and then the server returns the response. The request is
Let us look at the following example of an HTTP request message.
specified in text (ASCII) format, whereas the response is specified
in Multipurpose Internet Mail Extensions (MIME) format, which GET /vbs.html HTTP/l..0
defines different types of content types such as text, image, and 
audio. The common content types for a server’s response are This request message means that the client wants to get a document
 text/html - text file il1 html format called “vbs.html” from the server. The document IS located at the
 image/JPEG - image file in JPEG format root directory of the server. Version 1.0 of the HTTP is used. The
client can accept any content type as indicated by “*/*” but for the
 image/GIF - image file in GIF format
image content, GIF is preferred to JPEG .Note that no additional
JPEG and GIF are different encoding techniques that compress data can be enclosed in the HTTP request.
an image for transmitting and storing so as to reduce the number Header name
of bytes (size) for representing the image. Description
As discussed in the previous section, the basic operation of HTTP DateIt specifies when (i.e. date and time) the message was
is as follows. The web client (e.g. your web browser or even a. generated.
”robot” program) makes a TCP connection to a web server at
port 80. Subsequently, an HTTP request consisting of the specific Pragma This header is for specifying implementation-specific
request, required headers and additional data is forwarded to the directives. For example, if the client does not want to receive a
web server. After processing the request, the web server returns an cached copy of the requested resource, it will specify Pragma: No-
HTTP response consisting of the status, additional headers, and cache
the requested resource such as a web page. A new version of
HTTP called HTTP/1.1 is also becoming popular
HTTP request
The general format of the client request is as follows:
Request_method Resource_address HTTP!Version_number
General_header(s)
Request_header(s)
Entity_header(s)
Blank_line
Entity (Additional_data)


 

Header name Description
Having processed the web client’s request, the web server returns
Date It specifies when (i.e. date and time) the message was generated.
a response to the client. The general format of the response is as
Pragma This header is for specifying implementation-specific directives.
follows.
For example, if the client does not want to receive a cached
copy of the requested resource, it will specify Pragma: No-cache HTTP/Version_number status_code Result_message (Status
line)
Table 5.2 General headers in HTTP/1.0 General_header(s)
Response_header(s)
Entity_header(s)
Header Name Description
Blank_line
Authorization Used with the later WWW-Authenticate
response header, it provides authentication Entity_body (e.g., web page)
information to the web server. HTIP Again, the HTTP/ Version-number indicates the version of HTTP
provides a basic authentication scheme by that the server is using. The Status_code indicates the result of the
encoding the username and password in request. The common status codes are given in
Base64 format.
Table 7.1. The headers General_header(s), Response_header(s),
From This header provides the contact e-mail
and Entity_header(s) are used to pass additional information to
address. (e.g., the e-mail address of the the web client. Gen-eral_header and Entity_header have been
person who generates the request) described in Tables 5.2 and 5.4, respectively. Response_header is
described in Table 7.2. Following the headers, the response data is
If-Modified-Since It asks the web server to provide the enclosed as the Entity _body. Usually this is a hypertext file.
requested resource only if it has been
modified since the specified time in the
header.

Referer It indicates where (i.e. URL) did the


client obtain the current address. By using
this header, a web server can trace back the
previous link(s), e.g., for maintenance or
administrative purposes.

User-Agent It provides information on the user agent


(e.g. web browser) used by the web client

Table 5.3 Request heade rs in HTTP/1.0

Header Name Description


Allow It indicates the request methods (e.g. GET,
POST, and HEAD) allowed

Content-Encoding It specifies the encoding method (e.g.


compression method) applied to the
content.

Content-Length It indicates the length of the content in


number of octets.

Content-Type It indicates the content type or MIME type


of the content, e.g., text/html means
HTML document in text format.

Expires It specifies when (i.e. date and time) the


content becomes expired

Last-Modified It specifies when the content (web page) was last


modified

Table 5.4 Entity header in HTTP/1.0


 
Status Result Meaning
code message
200 OK This refers to the normal case in
which the request is OK or successful.
201 Created The request is processed and the r
resource is created as requested.

204 No content The request is processed but no


content is available for the client
301 Moved permanently The resource has been moved
permanently to the URL as given
in the “Location” header.
302 Moved temporarily The resource has been moved
temporarilyto the URL as given
in the “Location” header. As it is
only a temporary relocation,
future requests should still be
sent to the current URL
304 Not modified The requested web page is not
returned to the client as it has
not been modified since the
time as specified in the “If-
Modified-Since” header.
400 Bad request
401 Unauthorized Used in conjunction with
WWW- Authenticate header
files, it indicates that user
authentication is required
403 Forbidden Access is forbidden, e.g. the user
does not have the access rights
404 Not found The requested resource is not
found, possibly because it has been deleted from the
web server
Table 7.1 Commonly used status codes in-HTTP/1.0

Let us look at an example of a server response. Suppose that the


response message was as follows.
HTTP/1: 0 200. OK
Server: Microsoft-IIS/4.0
Date: Sat, 30 Sep. 2000 09:30:00 GMT
Last-Modified: Sat, 30 Sep. 2000 09:00:00 GMT
Content-Type: text/html
Content-Length: 600


 
This response message means that the web server is using version For example,
1.0 of HTTP. The request has been processed successfully. ?Input=%2F%7Ehenry%2Flecture2%2Dnotes.html is equivalent
The server is Microsoft-IIS/4.0. The current date and time are 30 to attaching a name called “Input” with value-
Sep. 2000 and 09:30:00, respectively. The response document is an /~henry/lecture2-notes.html to the URL because %2F is “1”,
HTML file in text format and the file size is 600 bytes. This file has
%7E is “~” and %2D is “-”.
not been modified since 09:00:00 on 30 Sep.,2000.
An alternative way to pass data to the web server is by using the
 POST command. In this case, data is appended after the headers
Location :Used with the status code 301 and 302 etc, it provides in the HTTP request message. For example, if we use the POST
the for redirection purpose. new URL command to pass data to the above “booksearch” program, you
Server It provides information about the server software. will find the following in the HTTP request message:
Server WWW-Authenticate Used with the unauthorized POST /servlet/booksearch HTTP/l.0
response message (i.e.-status code of 401), it provides the Accept * / *
authentication information required for successful authentication title=ecommerce&year=2000
Table 7.2 Commonly used response header in HTTP/1.0 Note that data is appended after a blank line following the header.
So far, we have talked about how to get a static web page from a In this example, there is only one header called” Accept * /* .”
web server by using the GET command. In many cases, the It specifies that the web client is willing to accept any content type.
returned web page is user-dependent, i.e., it is dynamic rather than
All of you might have heard about cookies. Let’s discuss what
static. For example, a user may _ant to use the search engine of
basically the cookies are.
our YES to search for books about e-commerce. In this case, the
returned web page will be dependent. on the user’s search criteria. 
Therefore, we need a method for the web client topass additional HTTP is a stateless protocol. That means, the web server will not
keep user’s state or user’s information. For example, when a web
data to the web-server
server receives an HTIP request, it does not know whether this
 request comes from a previous client or a new client. In other
One simple way to do this is to attach the data at the end of the words, there is no way to tell whether or not the current request is
URL by using the following format : related to a previous request. In many e-commerce applications,
?namel=valuel&name2=value2&...&nameK=valueN knowing the user’s state is an important requirement.
where namel, name2,..., nameN specify the names of the input For example, in a shopping cart application, the server needs to
elements and value1 value2,.. ., valueN specify the corresponding know the content of the user’s shopping cart in order to display
values. the items to the user correctly. To address this
For example, if a user wants to search for all books on e commerce important issue, Netscape proposed a method called “cookies”
published in the year 2000, he can append the search criteria after for a web server to save state data at the web client. The original
the URL as shown in the following: 1 specification is stored at http://www.netscape.com/newsref/
http://www.vbs.com/servlet/ stdlcookie_spec.html. and it has now been standardized.
booksearch?title=ecommerce&year=2000 A maximum of 20 cookies are allowed at each domain and each
where namel is “title” and the corresponding value is “e cookie is limited to 4 Kb to prevent overloading the memory of
the client’s computer. . If a web server wants a web client to save
commerce” and name2 is “year” and its value is “2000.”
“cookie,” it will send the Set-Cookie header in the HTTP response.
By entering these, the web browser will issue the following The Set-Cookie header is of the form
GET command: Set-Cookie: Name=Value
GET /servlet/booksearch?title=e commerce&year=2000 where Name and value are the name and value of the cookie,
HTTP/l.0 in the HTTP request message respectively.
In this case, the request is not just for a static web page. Instead, Whenever required, the client will include the cookie in .the HTIP
we invoke a program called “booksearch” in order to generate the request header using the following format:
search result and then return it to the user. The program Cookie: Name=Value
“booksearch” is a servlet program stored under the logical directory
This allows the user’s information to be passed to the server. Let
“servlet” of the host_.vbs.com. At the moment, our concern is
us look at how cookies can be used to implement a simple
how to pass the search criteria to the web server. In some cases, we
shopping cart for: our VBS. Suppose that there are already two
may need to pass some special characters to the web server as well.
items in the shopping cart. The firs: item (Iteml) has a product
The default encoding method is called “application/x-www-
code of 11111 and the second item (Item2) has a product –code
form-urlencoded.”
of 22222. When the client sends a HTTP request to put another
In this encoding method, the following rules are used: a space item (say an item with product code 33333) into the shopping
becomes a “+” . a no alphanumeric character becomes a hexadecimal cart, the server can set a cookie =-including the following cookie
code preceded by a % header:


 
Set-Cookie: Item3=33333 Furthermore, a web client can send the next request without
It means that the third item has a product code of 33333. In the waiting for the response to the previous request. In other words,
next HTTP request, the user needs to send to the server the HTTP/ 1.1 allows pipelining of requests and responses.
following cookie headers: If a web client wants to close a connection, it can specify a “Close”
Cookie: Item1=11111 Cookie: Item2=22222 Cookie: option in the Connection request header, i.e., Connection: close.
Item3=33333 
By reading the cookies, the server knows the content of the Currently many small organizations use a web hosting service
shopping cart so that it can be displayed in the returned web page from ISPs. For example, we may put the VBS in an ISP’s web
accordingly. server such that we do not need to set up and look after a web
server ourselves. In HT P/ 1.1, a Host header must be included in
Besides the Set-Cookie header, the following are extra information
the HTIP request message to specify the host name in the web
that can be provided for the cookie(s) They can be added on the
server. This enables different organizations to share the same IP
Set-Cookie header as shown in the later example* .
address of the web server thus allowing the efficient use of IP
 Comment-provides information on the cookie (e.g. its-use) addresses.
 Domain-specifies in which domain the cookie is effective 
 Expires-specifies when the cookie will expire HTIP/1.1 allows a web client to retrieve part of the file by using
 Max-age-specifies the cookie’s lifetime in seconds the Range header. For example, if the connection is broken while
 Path -specifies the URLs to which the web client should the web client is receiving a large file, it can request the web server
return the cookie(s) to send the file from the “break point.” Furthermore, the range
request function is useful when the web client wants only a portion
 Secure -specifies that the cookie is returned only if the of a large file.
connection is secure.

Here is a simple example !!!!!!!!!
The purpose of caching is to. shorten the retrieval time of web
Suppose that the VBS web server wants to create a cookie called pages. It is done by maintaining a cache copy of the previous
Credit= 111 in order to remember the user’s credit. responses in the web browser or the proxy server so that future
The Set- Cookie header is requests can be served by the cache copies rather than by the original
Set-Cookie: Credit=lll; servers: HTTP/1.0 only supports basic cache control. For example,
by using the Expires header, the original server can tell the proxy
secure;
server when a cache copy should be removed. Furthermore, the
expires=Thursday, 07-Dec-200010:00:00 GMT; web client can tell the proxy server that it does not want a cache
domain=.vbs.com; path=/ copy of the response by using the “Pragma: No-cache” header. In
The expiry date of the cookie is 07-Dec-2000, 10:00:00 GMT. HTIP/1.1, a “Cache-Control” header is included to provide better
cache control and cache functions.
The cookie is effective under the domain name vbs.com. Note
that “path=/” means that the cookie applies to any directory 
under the root directory of the server. In the discussions above HTTP/1.1 provides the Proxy-Authentication and Proxy-
we have used HTTP version 1.1 Authorization headers for enabling proxy authentication. In
Let’s see how this is different from HTTP. principle, they work in a similar manner to the WWW-
Authentication and Authorization headers in HTTP/1.0,
HITP/1. 1
respectively. However, the Proxy-Authentication and Proxy-
In HTTP/1.1, many enhancements are included to improve the Authorization headers are used on a hop-by-hop basis.
performance of HTTP, to enhance its functionality, and to eliminate
the limitations of HTTP/1.0. Generally speaking, HTTP/1.1 
works in a similar-manner to HTTP/1.0 except that many HTIP/1.1 provides better support for data compression. In,
additional headers are added so HTTP/1.1 is upwardly compatible particular, a web client can specify the encoding method such as
with HTTP/1.0. Some of the major enhancements are the compression scheme(s) that is/are supported and preferred
summarized as follows: by using the Accept-Encoding header.
Better support for language{s}:

In HTTP/1.0, a connection is released after a request is served. In HTTP/1.1, a web client can specify the language(s) that is/are
Obviously this is inefficient because a web client may want to acceptable and preferred.
retrieve other web pages from the same web server. In HTTP/ 
1.1, a connection is kept open such that the web client can send In HTIP/1.1, Content integrity can be supported by the Content-
multiple requests over the same connection. For example, after MD5 header.
accessing the home page of the VBS, the customer may want to
read the company. Information by getting the corresponding web
page from the web server. Instead of opening a hew connection
for this request, it can be sent along the same connection.


 
 3. How the web client and server communicate with each other.
Four additional request methods are added as described in Table 4. What do you understand by Caching
7.3. However, they are less commonly-used than the GET, POST,
5. Explain cookies?What all are the additional information
and HEAD request methods.
provide while setting a cookie?

Method name Description of the request


PUT Put the specified resource to the web server.
DELETE Delete the specified resource from the web
server.
OPTIONS Return the options available from the web
server.
TRACE “Loop back” a request, e.g., for diagnostic
purposes

Table 7.3 Additional request methods in HTTP/1.1

Table 7.3 Additional request methods in HTTP/1.1



 The general architecture of a web-based e-commerce system.
Basically, it consists of the following components: Web
browser, Web server, Application server, Backend system
and Internet
 A Web page is given an address called a Uniform Resource
Locator (URL)
 The web client and the web server communicate with each
other based on a request/response protocol called HTTP.
 The web client can also pass additional data to the web server
by appending it after the URL or embedding it inside the
HTTP request message. This can be used to generate
dynamic web pages.
 As the HTTP is stateless, a “Cookie” method can be used to
keep track of a user’s state. This is important for many
ecommerce applications such as building a shopping cart.
 Some of the major enhancements of HTTP 1.1 over HTTP
are:
 Persistent connections and pipelining,
 Efficient use of IP addresses,
 range request, Cache control,
 Support for proxy authentication,
 Better support for data compression,
 Better support for language{s},
 Support for content integrity and Additional request
methods

1. What are the various components in web system
architecture?
2. Explain the following terms:
 HTTP
 URL


 


typically go to the customers’ location rather than the customer


Question 1: How is e-commerce defined?
coming to them (e.g., door-to-door sales, home parties) and
Answer: E-commerce is defined as the value of goods and services includes businesses such as heating oil dealers making residential
sold online. The term “online” includes the use of the internet, deliveries and mobile food services.
intranet, extranet, as well as proprietary networks that run systems
Question 8: Can the e-commerce categories be separated into B2B
such as Electronic Data Interchange (EDI).
and B2C?
Question 2: Does E-Stats cover the entire economy?
Answer: Although the surveys did not collect separate data, one
Answer: No. E-Stats covers manufacturing, merchant wholesale can approximate relative shares by using some simplifying
trade, retail trade, and selected service industries. These sectors assumptions. If one assumes all manufacturing and wholesale is
and industries are the same as those covered by existing annual entirely B2B and all retail and service is B2C, then more than 94%
Census Bureau surveys. Sectors and industries not covered include of total e-commerce was B2B.
agriculture, mining, construction, and utilities as well as non-
Question 9: How do you account for firms that go out of
merchant wholesalers and parts of the service sector.
business?
Question 3: Is the value of e-commerce included in the estimates
Answer: Our surveys are updated each year to add new businesses
of total economic activity provided in your ongoing surveys?
and to delete ones no longer in business. Once we receive
Answer: Yes. notification that a firm has ceased operation we drop it from our
Question 4: Are e-commerce sales of retail businesses with both survey. Results are included up until the point the firm ceased
a physical and internet presence, commonly referred to as “brick operation.
and click” businesses, included in the Electronic Shopping and Question 10: How frequently will E-Stats be published?
Mail Order Houses industry estimates?
Answer: We plan to publish the E-Stats E-commerce Report
Answer: If the “brick and click” business has a separate business annually in March.
unit set up for internet sales and is not selling motor vehicles,
then its e-commerce sales are included in the Electronic Shopping
and Mail Order Houses industry estimates. Otherwise, the e-
commerce sales are included with the NAICS industry classification
for the brick part of the company.
Question 5: What is the difference between merchant wholesalers
and non-merchant wholesalers?
Answer: Merchant wholesalers take title to the goods they sell
and include wholesale merchants, distributors, jobbers, drop
shippers, and import/export merchants. These businesses typically
maintain their own warehouse, where they receive and handle
goods for their customers. Non-merchant wholesalers arrange for
the purchase or sale of goods owned by others and do not take
title to the goods they sell. Examples of non-merchant wholesalers
include manufacturers’ sales branches and offices, agents, brokers,
commission agents, and electronic marketplaces.
Question 6: Are the sales of online marketplaces (eMarketplaces)
included in the e-commerce estimates?
Answer: Only sales from eMarketplaces that take title to the goods
they sell are included. Generally, most eMarketplaces arrange for
the purchase or sale of goods owned by others and do not take
title to the goods they sell. This type of eMarketplace is considered
to be a non-merchant wholesaler and would be excluded from the
estimates in this report.
Question 7: What other types of “Nonstore Retailers” are there
in addition to Electronic Shopping and Mail Order Houses?
Answer: It also includes Direct Selling Establishments and
Vending Machine Operators. Direct Selling Establishments


 



 Let’s see the difference between Traditional Retailing And E-


 Introduction Retailing
 Difference between Traditional Retailing and E-Retailing 
 Benefits and disadvantages associated with E-Retailing Before we begin a discussion of e-retailing, it would be useful to
 Various models of E-Retailing look at some aspects of traditional retailing. This helps to identify
some essential characteristics of retailing.
 Summary
Traditional retailing essentially involves selling to a final customer
 Exercise
through a physical outlet or through direct physical
 communication. This normally involves a fairly extensive chain
After this lecture the students will be able to: starting from a manufacturer to a wholesaler and then to the
 Describe the difference between Traditional Retailing and E- retailer who through a physical outlet has direct contact with the
Retailing final customer.
 Describe the benefits and disadvantages associated with E- Examples of physical outlets that retailers currently use are:
retailing  malls
In this lecture we will discuss how the customer and business  generalized stores (e.g. department store)
organizations is benefited through E Commerce, how he can  specialized stores
purchase the things and how any business organization can sell
 franchise stores
the goods online.
It is useful to reflect that even in traditional retailing we have
 moved away from just using a static physical outlet within which
E-retailing essentially consists of the sale of goods and services. a customer can have direct contact with the retailer. Thus, more
Sometimes we refer to this as the sale of tangible and intangible recent forms of traditional retailing include
goods, as shown in Figure 6.1. We can divide tangible goods into
 direct mailing
two categories: physical goods and digital goods. Examples of
physical goods would be a book, a television set, a video recorder,  telemarketing
a washing machine, etc. Examples of digital goods are software  door-to-door sales
and music, which may be downloaded from the internet. The sale  vending machines
of intangible goods is sometimes called e-servicing. -Examples
Direct mailing to a customer normally involves sending a brochure
of services that may be sold are information such as the most
or catalog to a customer. The customer browses through this
recent stock prices, the most
catalog and then carries out mail ordering. In some respects, this
recent foreign exchange rate, or education. Entertainment such as notion of browsing through a catalog is a forerunner of e-retailing.
-games that would be played on the internet are also examples of Direct mailing, telemarketing, door-to-door sales, or the use of
e-services. So are the sales of services such as telecommunication vending machines includes other forms that have actually moved
services or banking services. The sale of tangible and intangible away from a physical fixed outlet and in a way are an intermediate
goods are all referred to as customer oriented e-commerce or e- form of the movement away from traditional physical retailing
retailing, if they are sold directly to the consumer who is the end outlet to the virtual retailing we see on the internet.
user. Here we discuss the sale of tangible goods.

The internet has allowed a new kind of specialization to emerge.
Instead of specializing just in a special product line, they allow
specialization in particular classes of customers and sellers. Thus,
we see lastminute.com, which allows last minute purchases of
travel tickets, gift, and entertainment to be matched against last
minute sellers of the same items. Here, we see specialization not
in a product line but in a class of purchasers and a class of sellers.
This kind of specialization would not have been possible before
we had the internet.
In addition to these specialized stores, we also get generalized e-
Fig 6.1 Selling of different type of goods stores where a store sells several product lines under a single


 
management. Examples of these generalized stores include JC allows-the customer to finesse his requirements before actually
penny and Walmart. making the purchase. It also gives different sources of information.
We also have the electronic counterpart of malls or e-malls. E- The third type of benefit that the customer gets is competitive
malls essentially provide a web-hosting service for your individual pricing. This is due to two factors.
store much in the way that mall provide a hosting  The first is lowered costs to the retailer because he does not
service in the sense of a physical location for your store. have to maintain a physicalshowroom, he does not have to
hire several shop assistants, and these savings can be passed
 on to customers in the form of reduced prices.
  Secondly, competitive pricing pressure that arises from the
In the future we may see the equivalent of franchise stores fact that the customer is now able to look at prices at several
developing. One new class of business that is developing very sites. Therefore, the pressure is always there on the retailer to
quickly on the internet is the e-broker. The e-broker does not sell maintain a competitive price for his products.
directly to a customer but brings the customer in touch with a
 The third benefit is customization. The customer can
particular supplier, so that a given set of criteria specified by the
actually specify the features of the products that he would
customer is satisfied. For example, the customer may want to buy
like and thus in some cases it is possible that the retailer may
goods at the cheapest price and so the e-broker would then do a
allow a customized product to be delivered.
search to find the supplier that would provide the cheapest goods.
Or, a customer may want to find a particular kind of goods and An example of this is on the Dell site. The computer site allows
the e-broker sets about determining which supplier would provide shoppers to custom specify their own computer software and
those goods. This area of e-broking is likely to grow very greatly hardware configurations. Thus, the customer is able to select exactly
what he wants. This ability to get the business to deliver a product
in the near future.
that the customer specifies he wants is the essence of C2B e-
In summary, we can, therefore, map traditional forms to e-retailing commerce.
as follows:
In summary, the benefits of e-retailing to the customer include
Specialized stores ® specialized e-stores  convenience
Generalized stores ® Generalized e-stores  better information
Malls ® E-malls  competitive price .
Franchise stores ® ?  customization
New form of business: e-broker  shopping anyWhere, anytime
 So with e-retailing, the customer can shop “anywhere around the
 globe without being restricted to his local vicinity. He could, for
Customers enjoy a number of benefits from e-retailing. The first example, purchase goods over_ and have them delivered to a
of these is convenience. It is convenient for the customer as he domestic address. He can also shop, as mentioned earlier at any
does not have to move from shop to shop physically in order to time. These are very considerable benefits of e-retailing to the
examine goods. He is able to sit in front of a terminal and search customer. These benefits could see larger and larger numbers of
the net and examine the information on goods. The second aspect customers move more and more of their shopping on to e-
of convenience he gets is in terms of time. retailing sites in the future.
Normally, the traditional shop has an opening time and a closing 
time and the customer can only visit the shop within these periods. There are a number of benefits of e-retailing to the business
On the net, the customer can choose at any time to visit a site to itself.
examine the goods that are available and actually carry out his  The first of these is global reach. The retailer now is no
purchasing at one’s own convenient time. The third type of longer restricted to customers who are able to reach the store
convenience that the customer gets is that he has access to a search physically. They can be from anywhere around the globe. The
engine, which will actually locate the products that he describes’ retailer must, of course, deliver the goods of a purchase to
and also the site where they may be available, or perhaps even the customer. We see later that has an impact on the types of
locate the sites where they may be available at the best price goods that are most easily handled through e-retailing.
The second type of benefit to customers is better information.  The second benefit is better customer service. The use of
The Internet and the World Wide web are essentially email and the use of electronic interchange of messages
communication media that allow retailers to put on quite extensive between the customer and the retailer allows better
information related to their products, which is available to the communication between the customer and the retailer. These
customers. Furthermore, since the customer can look at several allow one to easily inquiries and deal with complaints. These
sites, he will be able to obtain different pieces of information also allow a much more rapid response time than was
from each site to build a far better picture for himself about the possible in the days of faxes and postal mail.
products that he is interested in. In some sites, there are customer  The third benefit is the lowered capital cost to the retailer .
reviews of different products as well as reviews by the business The retailer does not have to maintain showrooms, he can
itself. An example of this can be found on Amazon.com. This


 
probably have lower inventories. Thus, while Amazon.com not necessarily the cheapest price, but the price which is consonant
lists over a few million titles, it keeps an inventory of a few with what the customer expects to pay for the goods.
thousand best selling titles only. Therefore, the retailer has The variety of goods in the case of a large store, particularly of a
lower warehousing costs. He does not have to have many department store, is also important because a customer would
shop assistants who are physically answering questions and. come in looking for one set of goods and then choose to purchase
Showing the customer goods. others. Profit margins are important in traditional retailing, and
 The fourth benefit to the retailer is mass customization. last but not least is the level of turnover.
Based on requests by the customers, the retailer is now able To summarize; the key success factors for traditional retailing are
to carry out mass customization with reduced time to
 size
market for the customized products.
 number of outlets .
 The next advantage is targeted marketing. The retailer is
now able to pick on a specific targeted group of customers  visibility
and direct marketing towards these customers. The retailer is  location
also able to provide more value-added services in the way  store atmosphere
of better information, add-on services to basic services, or
 store layout
add-on options to products that he is selling.
 price
 The last advantage to the retailer consists of different new
forms of specialized stores that he is now able to utilize.  variety of goods

As we have mentioned previously, now he does not have to  profit margins


specialize his store based just on a product line but could choose  turnover
to specialize his store based on a specialized targeted group of 
customers. It also creates new opportunities for niche marketing. In this section, we explore how these success factors of traditional
A summary of the benefits to the e-retailer are retailing translate top e retailing.
 global reach The first one considered is size. The important point to realize
 better customer service here is that no matter how large the company is your e-store
 low capital cost presentation is still-limited to the size of the computer screen,
 mass customization which may be, say, 15 in. It is not necessary to look at the number
of outlets in cyberspace because you probably need only one web
 targeted marketing set up. However, this web site is linked to other similar web sites
 more value-added services and portals. therefore, it is not the number of outlets that is
 new forms of specialized stores and niche marketing important but the number of links from other important sites to
your web site which is far more important. When one thinks of

visibility, it is all the more important in cyberspace. It is notes

enough to create a web site; you have to let the world know the
There are a number of key success factors which have been identified
existence of your ‘web site and that people can purchase from
for traditional retailing . Two of these are the size and the number
you’re-store. When looking at visibility, important point to realize
of outlets. The larger the retailer, the greater the buying muscle
here is that most people find information on the Internet: trough
and therefore the lower the price for procurement. The number
the use of search engines. Therefore, it is very important to register
of outlets also allows the retailer to spread the purchase costs over
the web or estore with the most common or the most widely
a larger inventory.
used search engines, such LS-Lycos, Alta Vista, and Yahoo. It is
In addition, the number of outlets provides for better visibility. also important to link your web site with other well-known web
The retailer is now visible to the customer at many geographical sites that have similar interests, or major portals such as Yahoo,
locations rather than just one. Location is, of course, an extremely
which link back to your e-store. This can greatly increase the visibility
important success factor in traditional retailing. The retailer may
of the web site.
choose to be sited in the central business district, in a regional area,
in a shopping complex, or in a street of shops. This may relate to When considering location, we note that the geographic
the category of customers and the costs associated with the site. boundaries no longer exist. A local e-store and a foreign e-store
are both just “one click” away.
Other factors that are very important in traditional retailing are
store atmosphere and store layout Store atmosphere evokes a Store atmosphere is particularly important on the web. The “look
particular look and feel about the retailer and is therefore important and feel” of web site should match with the company’s image as
to the positioning in the market. Store layout is important in well as the market position Look it seeks to address.
creating an atmosphere but is also important in ensuring that one Thus, if you are selling very up-market clothes such as Gucci and
groups different sets of products together, so that the purchase Armani, your web site for these stores should have a sophisticated
of one product will frequently lead to the purchase of another, look and feel rout it. On the other hand, if you
thus allowing for cross selling. Price is important and here it is are selling other kinds of goods, you could choose to have a
slightly jazzier image on your web site. The front page or the


 
homepage of your e-store is particularly important. It may be the non - brand names at a much lower price, or it could go into
only chance that you get of. Wring a potential customer into your discount selling. So, you. can have a specialization by product line,
e-store. In some ways it plays a similar role fur the e-store that the and then you could have specialization -positioning within that
window display plays for the traditional store. What is also product line to cater for a particular part of the marker. In contrast
important is in going through this store. The layout of the to this, a new kind of specialization is emerging on the internet, as
store has to be such that it facilitates the customer’s interests. The mentioned. earlier, namely specialization by function. A good
advantage of using store layouts in the e-store is that the layout example of this is lastminute.com In lastminute.com they sell
can actually be made dynamic and be determined by the customer’s gifts, travel tickets, and other items
interests. The customer’s interests could be obtained from data for last minute shoppers who want to purchase these items at a
mining his previous purchases at the e-store. This is the major very short notice. Generally, when one purchases an item at a very
difference between a traditional store and an e-store. short notice (e.g. travel), he often pays a premium, which is an
Price is very important in cyberspace because the customer can extra amount for the convenience of booking the travel at the last
easily carry out comparison pricing between your e-store and other minute. Now, this means that the air ticket is likely to cost much
e-stores not just in your immediate neighborhood but all around more than if he had purchased it some time before traveling and
the world. Also some e-brokers provide agents or services that made use of different discounts or promotions. The producers
carry out comparison pricing; therefore, the customer can easily of the web site lastminute.com realized that there are groups of
find me cheapest price. For this reason, it is important that in e- customers who make these purchases at the last minute and feel
retailing one sets up a competitive pricing some degree of angst at having to pay the premium for doing this
shopping at the last minute.
structure. Next, when one looks at the variety of goods, one here
needs to consider very carefully whether you are setting up a On the other hand, you will find that you may have sellers, e.g.
specialized e-store or an e-department store. If you are setting up airline companies, that have empty seats at the last minute which
a specialized e-store, then you need to gain access to the specific they are unable to fill. So, what lastminute.com does is bring
target group of customers you are interested in because they can together travelers who want to book at the last minute and an
travel so easily in cyberspace to reach you. When one looks at airline which has got spare capacity at the last minute, and allow
profit margin and turnover, generally profit margins per item the former to buy from the latter at the last minute. In this
tend to be lower with e-retailing, and so turnover must be higher. situation, the purchaser may get his airline ticket at a reduced price.
Lastly, if one examines profitability one finds that this is still So, there is a win-win situation for both the purchaser and the
important with the e-stores, but in recent times the share price of seller. This is a unique kind of specialization. It is very difficult to
the e-store appears. to have assumed more importance in the eyes do this unless one utilizes the internet to carry out this kind of
of investors. However, in the long run, profitability will assume specialization.
more importance. 
 The next category of e-retailing models that we intend to look at
There are several models for e-retailing and these include is generalized e-stores. Generalized e-stores sell a large number of
product lines rather than con-fining themselves to just one or a
 Specialized e-store
very few product lines.
 Generalized e-store

 E-mall
The next e-retailing model we consider is the e-mall. In an e-mall,
 Direct selling by the manufacturer cyberspace is rented out to cyber e-stores that wish to sell their
 Supplementary distribution channel goods. This store could be a specialized or generalized e-store. So,
 E-broker several product lines can be present. in a single e-mall. However,
unlike the generalized e-store which is under a single unified
 E-services
management, in an e-mall, each store is under its own management.
 E-mall management is responsible only for creating the cyber sites
The first class of model what we mention in e-retailing was the that can be rented and can support services and marketing of the
specialized e-store and here you can distinguish between two mall. It, thus, provides a web hosting service. Several e-malls also
different kinds of specialization. The more traditional provide software tools,
specialization along product lines and specialization by function which can be utilized by a prospective e-store to create and maintain
(which we discuss later). When you have specialization by product it_ e-store. The advantage for an e-store is that it is grouped
line, essentially you have a store that decides to pick one particular together with other stores in a well-known e-mall site and,
product line, say books, flow-ers, CDs, clothes, and sells only this therefore, is likely to pick up visitors to the mall.
particular product line. It may also choose to position itself in a
particular part of the product line, e.g. clothes; it could choose to 
position itself at the very A number of manufacturers with well-known brand name
products have chosen to use the internet to carry out direct selling
expensive end of the market selling brand names _ Gucci and
via the internet. One. of the best known here is Ford,which utilizes
Armani. Alternatively it could do more mass marketing by selling
the internet to achieve direct selling but uses its dealer network to
facilitate distribution and delivery. The other well -known examples


 
are Cisco systems and Dell computers. Note that this approach 6. An on-line customer salesperson, “who” can help customers
permits mass customization to meet customer preferences. This to navigate through the site.
direct selling by the manufacturer has an important 7. An order status checking facility, which is a useful feature
disintermediation effect leading to reduced costs to the end before submission.
customer and increased profitability to the manufacturer.
8. The use of Forums (collaborative purchasing circles) to create
A note of caution is important here. By and large, this approach a customer community and thus increase “stickiness.”
can be used by manufacturers of well-known brands of products
because the customer already knows the pro-duct. 
When one examines e-retailing, one can distinguish between two
Secondly, the manufacturer must have a thorough understanding trends, namely Technologies that help you see and experience the
of customer preferences, otherwise he has to rely on the customer product better, e.g. virtual reality, Java 3D, etc. Technologies that
knowledge of a retailer. help you not to see at all but use an intelligent agent (or mobile
 agent) that does all the shopping tasks for you.
This class of e-retailers is essentially an extension of the notion of 
a broker from the physical to the cyber world. A broker is an E-retailing essentially consists of the sale of goods and services.
intermediary who Sometimes we refer to this as the sale of tangible and intangible
 may take an order from a customer and pass it on to a goods.
supplier The benefits of e-retailing to the customer include
 may put a customer with specific requirements in touch with
 convenience
a supplier who can meet those requirements
 better information
 may provide a service to a customer, such as a comparison
between goods, with respect to particular criteria such as  competitive price
price, quality, etc.  customization
Thus, brokers provide comparison shopping, order taking and  shopping anyWhere, anytime
fulfillment, and services to a customer. That is the reason why A summary of the benefits to the e-retailer are
they are sometimes referred to as electronic intermediaries.  global reach
 There are several different models for electronic brokers  better customer service
and these include:
 low capital cost
 Brokers that provide a registration service with directory,
search facilities, e-payment facilities, and security-related  mass customization
facilities. Any business can register with such an e-broker (e.g.  targeted marketing
anewshop.com).  more value-added services
 Brokers that meet a certain requirement such as a fixed price  new forms of specialized stores and niche marketing
(e.g.Priceline.com). The key success factors for traditional retailing are
 Brokers that provide comparison shopping between  size
products (e.g. mySimon.com or bestbooksbuy.com).The last
 number of outlets
model i.e. E-services is discussed in the next lecture.
 visibility

Now that we have reviewed different models for e-retailing and  location
examined several e-retailing web sites, we are in a position to  store atmosphere
distill some of the most important features, and these include  store layout
1. The provision of an on-line catalog, which allows one to  price
browse through different categories of goods. Thus, it is  variety of goods
dynamic and linked with order process.
 profit margins
2. The provision of a search engine, which is a very important
 turnover
feature that does not exist in traditional retailing.
3. The provision of a shopping cart, which allows convenient There are several models for e-retailing and these include
goods selection. An ability to provide an automatic price  Specialized e-store
update.  Generalized e-store
4. Personalization of store layouts, promotions, deals, and  E-mall
marketing.  Direct selling by the manufacturer
5. The ability to distribute digital goods directly. Thus, these  Supplementary distribution channel
goods can be downloaded instantly.
 E-broker
 E-services


 

1. How do you differentiate between traditional and E
retailing?
2. What are the benefits of E retailing for a customer?
3. Discuss various success factors for traditional retailing.
4. What is the difference between an electronic distributor and
e-broker?
5. Is Internet Commerce always global? When does it become
regional?
6. Which business model was more successful: generalized e-
brokers or specialized e-stores?




 



  Loans including mortgage loans


 Introduction  Real estate sales
 Various E-services  Brokers
 Various Web enabled services The advantage of this kind of matchmaking through the internet
 Summary is that the ability to search electronically over a wider area to satisfy
 Exercise the customer need and to more precisely meet the customer need
is greatly facilitated by both computerization and communication
 over the internet.
After this lecture the students will be able to:
3. Information-selling on the web. This group essentially sells
 Describe the e-services offered through the Internet information content of one sort or another and includes e-
In the previous lecture we discussed about e-retailing, its commerce sites that provide · on-line publishing such as
advantages and disadvantages and the various models of e-retailing web-based newspapers
one of which was e-services which we will discuss  consultancy advice
today. This delivery of services via the internet to consumers or  specialized financial or other information
other businesses can be referred to by the generic term of e-services.
4. Entertainment services. These provide internet-based access
There is a wide range of e-services currently offered through the
to videos, movies, electronic games, or theme sites. This e-
internet and these include banking, loans, stock trading, jobs and
entertainment sector is expected to grow rapidly in the next
career sites, travel, education, consultancy advice, insurance, real
few years, with a convergence of TV and internet-based
estate, broker services, on-line publishing, and on-line delivery of
technologies.
media content such as videos, computer games, etc.This list is by
no means exhaustive and it is growing all the time. In this lecture, 5. Specialized services such as auctions. Many different
we will give an overview of e-services. auction sites have appeared and these are discussed further in
this lecture. It is not possible to discuss all the different e-
In order to bring some order to the discussion of these wide
services in this lecture and so we will briefly sample only a
variety of e-services, we organize them into the following categories,
few examples for each category.
namely
1. Web-enabling services, which were previously provided by 
humans in office agencies and/or their branches. The As mentioned in the last section, web-enabled services include
primary purpose here is that these services help to save time personal banking, stock trading, and education. We discuss each
and effort for the user, bring convenience, and improve the of these in turn briefly in the next few subsections.
quality of life. In many cases, it can result in a reduced cost 
for the consumer. E-services that fall into this category Security First Network Bank (SFNB; www.sfnb.com/)was the first
include internet bank. It provides most of the banking services on the
 Banking web. Therefore, you can do your banking with your fingers instead
 Stock trading
of your feet. Looking at e-banking, we can distinguish between

 Education twp distinct models:

In some cases, this may bring a new dimension to the original 1. Pure cyberbanks
service, enhancing and altering it. E-education is an example of 2. Traditional banks that provide e-banking to complement
this. It may also bring into the catchments new groups of their retail banking
consumers of the service to whom it might not have been SFNB. is a pure cyberbank, while the homepage of Bank of
previously accessible. America (www.bankofamerica.com) illustrates the second model.
2. Matchmaking services. These take a need from an While not all banks offer the full range of services on the internet,
individual or business customer and provide mechanisms banks in both the aforementioned groups offer a varied range of
(from providers) for matching that need. E-services that fall services including
into this category include 1. personal banking
 Jobs and employment sites 2. commercial banking for both small businesses and large
 Travel corporations
 Insurance 3. financial services


 
4. loan application services has led to some traditional brokers also providing internet trading
5. international trade including settlement instruments, foreign of stocks.
exchange transactions, etc. 
There are significant advantages for both the individual or A number of e-universities are being spawned around the world.
corporation as well as the bank in using e-banking. An individual Again, three models can be seen:
doing personal banking on the internet can, amongst other things, 1. Pure cyber universities, such as Jones International University
pay bills, do account transfers, make queries on account balances, (http://www. jonesinternationa1.edu) .
obtain statements, in some cases view images of checks, etc., and 2. Traditional universities setting up new cyber vehicles for
import transactions directly into home account management providing university education perhaps. with other business
software. Furthermore, one can make such transactions 24 hours partners. An example of this the Hong Kong CyberU
a day from any place with internet access around the world. .(www.hkcyberu.com.hk;) which was set by the Hong Kong
In addition to these, a number of banks offer personal financial Polytechnic University and Pacific Century CyberWorks.
services including making personal loan applications on the 3. Traditional universities offering courses themselves on the
internet. All these represent a large increase in convenience and internet. There are a number of web-based technology tools
time saving for the bank customer, saving him trips to the bank for this purpose. An example is Web CT.
branch, queuing, etc.
A number of so called “open universities” that previously provided
The advantages to the banking institutions themselves include distance learning have moved into providing an internet-based
1. reduction in the number of retail banking branches, saving version of their courses. These traditional universities have a
rentals or ownership of the related properties. number of advantages. They can now reach a client base that is
2. reduction in staffing because of the reduction in paper outside their catchment. They also expect to be able to deliver
processing as well as face-to-face bank teller contact. these courses at a reduced cost; however, the jury is still out on
3. bringing about increase in the time the bank hangs on to the this. Another advantage a traditional university has on the internet
money before making the required transfers, leading to over a new pure cyber university is that it has an established brand
increase in interest received by the banks. name. There are a variety of issues that need to be explored carefully
when preparing to deliver educational material on the internet and
These advantages are so significant that some banks offer
these include the following:
customers a number of incentives to -switch to internet banking,
such as free checks, reduced fees, increased deposit rates, etc. 1. Does one use a distance learning model where the student
uses a PULL model to acquire the material?

2. Does one use a traditional lecture model using video
Several companies such as E-Trade (www.etrade.com). Datek.on-
streaming? This is a PUSH model whereby a teacher
line, American Express Financial Services, etc. allow you to trade
“pushes” the materials to the students.
stocks, bonds, mutual funds, etc. on the internet. These companies
offer you to trade at a very small cost compared to discount brokers The use of the ‘internet for education opens up many possibilities,
or full-service brokers. This has resulted in these on-line trading namely use of quizzes, tests to provide the student with instant
companies grabbing an increasing market share. In response to feedback on his/her mastery of the materials, use of graphics and
this, discount brokers including Charles Schwab and full-service animation to explain concepts, particularly those that have a
brokers have also moved to introduce internet trad-ing of stocks. dynamic character to them. It is anticipated that the internet will
The steps involved essentially are the following: not only lead to cyber universities of one kind or another but will
also have a marked. effect on teaching and learning in traditional
1. place a request to trade, say buy a stock
universities.
2. the system responds with current “on the web site” prices
One among some of the innovations that are being explored is
3. the internet trader has to confirm this trade or cancel it the joint teaching by two universities on different continents in
Several companies allow one to create a simulated portfolio, which order to enhance the learning experience.
one watches over time without actually buying or selling the stocks

in reality. An example of this can be found on the Smart Money
This has perhaps been the area in which there has been the greatest
site (www.smartmoney.com).
growth in e-services. Essentially, in most of these applications,
The major advantages to the person doing the trading are the customer who could be an individual or business specifies his
1. the reduced cost; requirements in relation to the service. The e-commerce site then
2. the convenience of being able to trade anywhere in the world does a search over its own databases or over the internet using
with internet access, e.g. while traveling; and mobile agents, or over other databases or web sites to look for
one or more matches to these requirements. The information is
3. access to a wide variety of information on a number of sites.
then returned to the e-service provider site to give the customer
In addition to actually allowing you to trade, these sites provide a the required service.
considerable amount of information. The reduction in margins
available to stockbrokers as a result of internet trading is beginning 
to have an effect on other more traditional forms of brokers. This


 
Before the internet, one might have gone along to a travel agent in This area of matchmaking and brokering services is expected to
order to book one’s travel requirements such as air tickets, train grow greatly in the near future with e-commerce sites exploiting
tickets, car hire, hotel, tours, etc. The travel new market niches. This is also an area with the greatest likelihood
agent would try his best to meet these requirements by providing of disinter mediation, and traditional agents or brokers will have
information regarding schedules, pricing, promotions, as well as to build new dimensions to their services in order to survive.
suggestions on changes to de itinerary. These bookings could be 
for individuals or corporations involving corporate rates, etc. A These e-commerce sites sell information of one kind or another.
large number of e-commerce sites have appeared, which address There are a number of distinct business models varying from
this precise market segment. These include trip.com travelweb.com, subscription only, mixed subscription/advertising, and fee for
and priceline.com. These web sites work in exactly the same way. service for each access. They also often provide some information
When a customer provides h..: requirements, these sites do a free. Sites also frequently provide free information to attract
search of their own databases or send agents our _ explore other customers to their web site, and then make their money on the
web sites and respond to the consumer. Amongst the requirement transactions the customer carries out on their web site.The kind
that the customer could specify is an acceptable price. A number of information that is provided on the web varies greatly with.
of sites, such as priceline.com, require that provided the price sites specializing in different areas such as
specified is met, the customer cannot refuse the offer found. These
1. investment information like
e-commerce sites are beginning to grab an increasing part of the
travel market. They are attractive to consumers because  stock evaluation (www.marketguide.com;)

of the convenience, the ability to meet requirements such as  investor information (www.investorguide.com)
specified prices, and in some cases like lastminute.com, a special  Mutual funds (www.morningstar.net)
customer need (i.e” booking at the last minute). These travel sites  General information (www.money.com)
often also have a lot of information on promotions, suggestions, 2. resume-writing for jobs (www.resumelink.com)
etc., which are useful for customers. These ecommerce sites are
having a strong “disintermediation” effect. Disintermediation 3. contracts for jobs (www.ba.jobs.contract)
refers to the removal of intermediaries such 4. financial advice, planning, and counselling
as travel agents from the process involved in the purchase of the 5. mortgage information (www.mortgagenet_com)
service. A recent increasing trend has also seen the primary provider The categories of information sold and the number of sites selling
of a service such as an airline introducing internet based booking it are too numerous to enumerate here. In order to view such
at reduced prices, further emphasizing the disintermediation effect. sites, go to a search engine and type in the category of advice you
 ate interested in and a number of sites will be listed, some of
There are several different kinds of services provided here, namely which offer free information and some of which will charge.
1. sites where you can get advice on developing your resumes 
and can post your resumes on the web This is expected to be a growing area of e-commerce in the future.
2. recruiters who use the web site to post available jobs, such as A number of companies are gaining access to or have purchased
Hot jobs (www.hotjobs.com) or Jobdirect large inventories of movies or other entertainment material with
the view of allowing people to download this on the web. Sites
3. employers who list available jobs on the web sites here vary from theme sites that use a small amount of interactive
4. matchmaking facilities that search the internet for jobs for entertainment to promote their products, such as Disney, to others
jobseekers based on a specification, such as that provide games either for a fee or are free coupled together
www.monster.com with advertising that pays for the site. An important issue here is
5. matchmaking facilities to search the internet for resumes that that the payments involved are relatively small for each transaction,
best fit a job description given by a prospective employer use and hence the use of micro payment techniques is likely to be of
of agents to do the search considerable importance here.
These approaches of using the internet for e-employment or e- 
jobs avoid many of the costs and difficulties associated with The use of auctions in the real world is used by sellers to achieve
traditional approaches to advertising, such as high cost, limited the best possible price for items that they wish to sell. The essential
duration, and minimal information. idea is that the seller puts up the items for sale but does not give
 a fixed price for it. The item is then subject to a series of bids until
In some areas, such as real estates e.g., (www.realestate.com). The a bid is established that is acceptable or the time duration for the
visualization ‘(3D’ facilities provided on the web allow one to auction expires, and the item is sold. The whole process is
either conducted by somebody called an auctioneer. There are several
different types of auctions, the most common ones being an
 show visualizations of buildings at the drawing board
increasing bid auction (English auction), a decreasing bid auction
stage,or (Dutch auction), and a price quantity pair auction.
 allow people distant from the physical site of building to
Auctions found their way onto the internet as early as 1995. In
actually visualize it
this section, we will briefly discuss these ‘web-based electronic


 
auctions’. Increasing bid auctions on the internet are sometimes will be increasingly used by businesses, particularly if they are
referred to as forward auctions. Essentially, here the seller puts dealing with perishable commodities.
up an item for sale and specifies an acceptable minimum price or
reserve price that he is willing to accept. The item is then posted
on the auction site together with the minimum price and the
bidding is kept open for a specified period. During this period, 
potential buyers bid for the item and the latest high bid is displayed  The e-commerce sites sell information of one kind or
(but not the identity of the bidder). When the specified period another like investment information, resume-writing for
lapses, the highest bidder is required to purchase the item at the jobs, contracts for jobs, financial advice, planning, and
bid price. There are clearly defined rules for the auction site that the counseling, mortgage information.
bidder and the seller of the item are required to adhere to. In the  A number of companies are gaining access to or have
decreasing price option, or reverse auction, the seller puts up an purchased large inventories of movies or other
item for sale at a high price. The price of this item is entertainment material with the view of allowing people to
progressively reduced until a potential buyer accepts the bid and download this on the web
the items are then deemed to have been sold to the buyer. The  Auction sites are basically of two types: C2C auction sites
third option has potential buyers making a bid for a certain quantity and B2B auction sites
of an item at a certain price and sellers offering to sell a given  C2C auction sites essentially involve a customer selling an
quantity at a specified price. The buyer’s bids are progressively item to another customer through an auction site. These
increased and seller’s “asking” price progressively decreased until auction sites can be Generalized auction sites, Specialized
matching bids are obtained and the requisite quantity is then auction sites and Agent-based auction supporting sites
deemed to have been sold to the buyer at the right bid price.
 There are basically three models for these B2B auction sites:
We will divide this brief discussion of auctions into two types Use of a liquidation broker to sell excess items, Use of your
1. C2C auction sites own web site to auction items, Use of the auction facility on
2. B2B auction sites a virtual market site that one is a participant in to auction
3. C2C auction sites excess inventory.

C2C auction sites essentially involve a customer selling an item to  The delivery of services via the internet to consumers or
another customer through an auction site. These auction sites can other businesses can be referred to by the generic term of
be services
1. Generalized auction sites  We organize e-services into the following categories, namely
Web-enabling services, Matchmaking services, Entertainment
2. Specialized auction sites
services, Specialized services such as auctions
3. Agent-based auction supporting sites
 Web-enabled services include personal banking, stock
Generalized auction sites like eBay (www.ebay.com). Auction trading, and education
Universe, etc. will allow a customer to put up many different  Matchmaking Services include Travel services, E-
kinds of items for sale on the auction site. eBay has a forward employment and e-jobs
auction facility.
An example of a decreasing bid auction site is Klik klok, which

auctions gold and jewellery. In contrast to the general auction 1. How do you find E-education to be better than the
sites, one can have some sites specializing in the auction of a traditional one?
particular class of items. Thus, Bid.com only deals with refurbished 2. What are the advantages of E banking?
computers while Coin Universe (www.coinuniverse.com;) only 3. How reliable is the E trading?
deals with coin auctions.
4. Explain B2B and C2B auction.
The third class of auction related services are agent-based services
or search engines that will allow a buyer to specify an item, and the
mobile agent or search engine would then visit relevant new sites
returning information on where the item can be found. An
example of this is www.usaweb.com.

There are basically three models for these B2B auction sites.
1. Use of a liquidation broker to sell excess items. In this case,
the liquidation broker is essentially a third party auction site
that does the auctioning for you;
2. Use of your own web site to auction items.
3. Use of the auction facility on a virtual market site that one is
a participant in to auction excess inventory. These approaches


 


 (www.sf.net)
1.1 The standard port assigned to the https service (HTTP over 1.7The development of an online Supply Chain Integration
SSL) is: system would be best classified as:
a. Port 80 a. A B2C e-Commerce initiative
b. Port 25 b. A B2B e-Commerce initiative
c. Port 443 c. A B2E e-Commerce initiative
d. Port 8080 d. A B2C, B2B and B2E e-Commerce initiative
1.2 A domain name server (DNS) performs the following 1.8 An example of a B2E system is:
function(s): a. A Content Management System
a. Resolves IP Addresses into Domain Names b. A Supply Chain Integration System
b. Resolves Domain Names into IP Addresses c. A Web Search Engine
c. Both a. and b. d. A Knowledge Management System
d. Neither a. nor b. Answers:
1.3 The following digital internet links (or bearers) are listed in 1.1 C
order of increasing maximum capacity (or “bandwidth”) – 1.2 C
(smallest to largest):
1.3 A
a. PSTN (56k Dial-up), ISDN, ADSL, HDSL
1.4 A
b. ADSL, OC-3, HDSL, PAPL
1.5 B
e. ISDN, PSTN (56k Dial-up), ADSL, OC-3
1.6 A
f. PAPL, OC-3, HDSL, OC-12
1.7 B
1.4 The four phases of the Rational Unified Process (RUP) are:
1.8 D
a. Inception, Elaboration, Construction, Transition
b. Proposal, Planning, Construction, Transition
c. Inception, Elaboration, Transition, Release
d. Proposal, Construction, Transition, Inception
1.5Which of the following are all elements of a typical Project
Specification Document (PSD) produced in Phase 2 of the
simplified process (SP) ?
a. Project Description, Proposed Site Map, UML Diagrams,
Interface Definitions
b. Project Description, Actor Definition, Use Case Definition,
Proposed Site Map
c. Actor Definition, Use Case Definition, Detailed Test Cases,
UML Diagrams
d. Version Control, Project Description, Code Snippets,
Detailed Test Cases 1.6 From your knowledge of B2C
business models, a good example of a B2C Web

a. A search engine, such as Google (www.google.com)
b. An online newspaper, such as The Sydney Morning Herald
(www.smh.com.au)
c. An online community, such as Slashdot (www.slashdot.org)
d. A collaborative software development site, such as
SourceForge


 



 organizations that exchange data can, with relative ease, agree a
 Introduction format that meets their mutual needs. As the network of exchanges
 Technical elements of an EDI develops then the number of organizations needing to be party
to the agreement grows.
 EDI Standards
To illustrate this, assume a network of three customers (say
 Summary
supermarkets) ordering goods from four suppliers (food
 Exercise manufacturers), see Figure 8.1.

After this lecture the students will be able to:
 Understand details of the technical elements of an EDI
system:
 EDI Standards
EDI as discussed before stands for Electronic Data Interchange.
This is one of the applications of E Commerce which makes
Business to Business transactions possible over a network.
Electronic data interchange (EDI) is a technology poised for
explosive growth in use as the Internet provides an affordable
way for businesses to connect and exchange documents with
customers and suppliers of any size. EDI is the electronic exchange
of business documents, data, and other information in a public-
standard format. It cuts the cost of managing
business-to-business transactions by eliminating the need for
labor-intensive manual generation and processing of documents.
In this lecture we will discuss the EDI standards, the EDI networks
and the EDI software that interfaces these two elements and the
business applications. These elements together with the EDI
Agreement are covered in detail in this lecture.
Let’s start with EDI Standards.
 Fig. 8.1 Interchanges between Customers and Suppliers.
At the heart of any EDI application is the EDI standard. The The network in Figure 8.1 has 12 separate interchanges. It is unlikely
essence of EDI is the coding and structuring of the data into a that each of these exchanges would have its own format but it is
common and generally accepted format -anything less is perfectly possible that each customer would have developed its
nothing more than a system of file-transfers. Coding and own standards (giving each supplier three separate standards to
structuring the documents for business transactions is no easy cope with). It is also possible that new exchanges added to the
matter. There have been a number of EDI standards developed system will have requirements not envisaged when the data
in various industry sectors or within a specific country and there formats were originally agreed; this would require a change to the
are complex committee structures and procedures to support them. existing standard or the introduction of an additional standard.
The overall picture is one of unnecessary complexity and
Following on from the various sectorial and national EDI
incompatibility.
standards is the United Nations (UN) EDI Standard:
EDI standards overcome these difficulties. The EDI standard
EDIFACT. This is the standard that should be adopted for any
provides, or attempts to provide, a standard for data interchange
new EDI application.
that is:
Now the question arises why we require EDI standards? EDI
 Ready formulated and available for use;
provides an electronic linkage between two trading partners.
Business transactions are output from the sending  Comprehensive in its coverage of the data requirements for
any given transaction;
computer system, transmitted or transported in electronic format
and input into the second, receiving computer system. The  Independent of hardware and software;
computer systems that exchange data need a common format;  Independent of the special interest of any party in the
without a common format the data is meaningless. Two trading network.


 
EDI Standards provide a common language for the interchange EDI formats for use in their sector. Some of the more notable
of standard transactions. examples are:
Most of the work on EDI standards has been concerned with the 
interchange of trade documentation and financial transactions An EDI format developed for, and widely used in, the European
but the principle applies to any interchange where the data can be motor industry. ODETTE stands for the Organisation for Data
systematized and codified. EDI standards are used for the Exchange by Teletransmission in Europe. ODETTE was predated
interchange of information as diverse as weather station readings by VGA, a standard developed, and still used, by the German
and school exam results. motor industry. The motor industry is planning to move from
Now let’s see how the various standards evolve. VGA and ODETTE to EDIFACT when the standards are stable
and their requirements are fully met.

One problem they have is that the EDIFACT standard, with its
 Evolution of EDI Standards
wider application and more bureaucratic procedures, is slower to
The first EDI standards evolved from the formats used for react to evolving needs than is the case with the sector based
file transfer of data between computer applications. The ODETTE standard.
evolution of EDI standards can be seen as having three
stages (although in practice it was and is somewhat more 
complex than that): A UK EDI standard for general trade developed by the ANA
(Article Numbering Association) in 1982. TRADACOMS evolved
1. The first formats that might properly be called EDI were
to become the predominate UK EDI standard with widespread
developed by organizations that had to process data from a
application in the retail and catering trades (this was in the late
large number of customer organizations. The data recipients
1980’s / early 1990’s when Britain accounted for half the European
set the standard and the customers conformed to it.
EDI activity). Other European countries also developed their own
2. The concept of EDI as an application independent standards for retail / general trade; examples of such standards
interchange standard evolved and several industry sector and are SEDAS in Germany and GENCOD in France. TRADACOMS
/ or national standards bodies developed EDI standards to and the other national standards mentioned here are looking to
meet the needs of a specific user community. evolve to, or convert to EDIFACT - a slow process given the
3. The requirements of international and cross sector trade investment in the existing standards.
meant that the sector and national standards were becoming (The ANA is the body responsible for the allocation and
an impediment to the further development of electronic administration of the product codes used for the bar codes on
trading. EDIFACT was developed, under the auspices of the grocery and other items -product coding has an important role to
United Nations (UN), as a universal standard for commercial play in EDI systems).
EDI.

 EDI in North America developed with differing standards in the
An example of an early EDI application in the UK was the BAGS various business sectors. Examples of such standards are UCS
system: for the grocery industry and ORDERNET for the
BACS was and is a consortium of the major banks that provides pharmaceutical trade (Sokol, 1989). Electronic trade had developed
an automated clearing service for the transfer of money between rapidly in North America and the problems of cross sector trade
bank accounts. Many organisations that made a were becoming apparent. The problem was taken up by the
significant number of payments (including the pay-roll) use this American National Standards Institute (ANSI) and X12 was
service. developed as a national standard with the aim of replacing the
various sector standards.
Users of the BAGS system recorded the information they would
have printed as cheques on a computer file in accordance with the 
format required by BAGS. The data was then sent to BAGS where As already outlined, EDI developed in closed user communities
the payments were processed without the delay, expense and risk within trade sectors and / or national boundaries. The use of
of paper documents and manual data input. sector and national standards for this type of trade was
The use of the system was made much easier by the availability, satisfactory. However, as electronic trade developed to cover wider
for most types of computer, of standard software that output trading relationships there is a growing problem of trade between
the payment data in the required format. organisations using different EDI standards.
In the early days the computer file would be recorded on a magnetic In addition to the problem of cross sector trade there is a desire to
tape and couriered to the BAGS headquarters. Subsequently an use EDI for international trade. This (sensibly) requires a common
online submission facility was added to the service. format for the exchange of the standard business forms (order,
invoice, etc.) between organisations in differing countries.

International trade also requires a great deal of additional
The use of EDI on systems such as BAGS and the more general
documentation for shipping, customs authorities, international
use of online systems demonstrated the potential of EDI for the
credit arrangements, etc. - all of this is potentially electronic and
exchange of general business documents. A number of trade
obviously a common format is very desirable. To facilitate this
sector organizations understood this potential and developed


 
cross sector and international development of EDI the EDIFACT instance the order date or the buyers name and address. Each
standard has been, and is being, developed. EDIFACT message specifies a great number of data segments
EDIFACT is the United Nations standard of Electronic Data and individual data segments may be .components of a number
Interchange for Administration, Commerce and of messages. The users of the message select the data segments
Transport.The EDIFACT standard was born, in the mid-1980s that are applicable to their particular needs.
out of a United Nations Economic Commission for Europe Data segments are, in turn/made up of tag and a number of data
(UNECE) committee and is supported by the Commission of items. The tag identifies the data segment and the data elements
the European Union. give the codes and / or values required in the document (message).
Underlying the EDIFACT initiative are various UN attempts to The data elements include the codes and values for items such as
standardize on trade documentation. These specify, for example, date and address code but they are frequently used in combination
standards for the layouts of invoices (a provision of some with type or qualifier data items to specify the format of the data
importance for organisations processing many hundreds, of and its use; for instance a date could be the order date and be in
invoices from numerous sources). Notable amongst the standards eight digit century format. The requirement to use data elements
documentation is the UN Trade Data Element Directory, a subset together forms a composite data element. This structure of the
of which forms the EDIFACT Data Element Directory. EDIFACT message is shown in Figure 8.2. The function groups
have been omitted; these are an intermediary level between the
EDIFACT effectively assumed a world role when the Americans
interchange and the message but they are not normally
accepted it as the world standard (while retaining their own ANSI
implemented.
X12 standard for domestic use in the short term):
The acceptance by the North Americans of EDIFACT as the
international standard was somewhat surprising. ANSI had done
a lot of development work on the X12 standard and
EDIFACT was, at that time, essentially a European standard.
Since 1988 the use of EDI has been vigorously promoted by the
European Union (EU) through its TEDIS programme. TEDIS
has promoted EDI through sectorial organisations but has also
emphasised intersectorial trade. EDIFACT is seen as the common
standard and as vital for electronic trade within the ‘single market’
- funds have been made available for industry sectors to change
from their existing EDI standard to EDIFACT.
EDIFACT has been adopted as the EDI standard of choice by
countries and sectors new to EDI. In Europe, countries such as
the Netherlands, Denmark and Norway have been noted for their
recent development of EDI with EDIFACT as the predominate Fig. 8.2 EDIFACT Structure Chart (Simplified).
standard. Electronic trade is also developing outside Europe and

North America; Australia and Singapore have been much written
The EDI standard provides the common format for the message
about with EDIFACT being the standard of choice. The
but just as important is the ability to correctly interpret the data
importance of a single international standard has been recognised
held within that format. Data in computer systems normally has
by many sectors currently using their own EDI standards. Many
a code as a key. Computer systems have codes for customers,
sector and national standards are been replaced or are ‘evolving’
suppliers, products and so on. For EDI it is preferable to send the
towards the EDIFACT standard -included in this process are
codes rather than the associated names, addresses and descriptions.
ODETTE, TRADACOMS and ANSI X12, a development already
The use of codes cuts down the size of the transmitted message
mentioned above.
and, provided the codes are mutually agreed, they can be used to
 match the appropriate records in the receiving computer system.
The EDIFACT standard, like all other EDI standards, is about

the exchange of (electronic) documents - for EDIFACT each
For the grocery and general retail trade there are standard systems
document type is referred to as a message. For trade purposes the
of coding. These are used for bar codes on merchandise and to
documents include order, dispatch advice, invoice, payment order
identify address points within the participating organisations; they
and remittance advice.For transmission purposes EDIFACT
are also used in EDI messages. The two main systems are:
messages are sent in an electronic envelope known as an
interchange. Note this is the data standard and is separately defined  EAN European Article Number
from any enveloping requirement of the transmission protocol.  UPC Universal Product Code (American)
Within that interchange there may well be a number of messages. The coding systems are administered by the national Article
Messages equate to the trade documents and order and invoice are Numbering Associations (ANA). These organizations have also
prime examples. been closely involved in the development of EDI; the British
The messages themselves are made up of a series of data segments. ANA developed the Tradacom EDI standard that was discussed
Data segments encode a single aspect of the trade document, for earlier in this chapter.


 
The EAN and the UPC systems are similar. The EAN is a 13 digit warehouse where the goods will be delivered; The Invoice Point -
code with a two digit country code whereas the UPC is a 12 digit the head office where the invoice is to be sent.
code with only a single digit for the country. The makeup of the The EDIFACT order message provides for up to 20 name and
EAN code is shown in Figure 8.3. address segments (NAD) to be sent in an order.

EAN codes are appropriate for ordering branded products. They
are not applicable where the requirement is for a generic product.
This circumstance may not arise when baked beans are ordered
(we all tend to have our preferences for a particular brand) but the
order might be for:
 A generic product, e.g. red biros (any old red biros), or
Fig. 8.3 EAN Coding System.  A commodity product, e.g. sheet steel or paper.

The check digit calculation, for the product code, uses a modulus Product coding in these circumstances is either agreed between
10 algorithm. This is calculated by multiplying alternative digits, customer and supplier or there is an agreement on an industry
of the code, by 1 and 3 respectively. The results of these sector basis. The paper and board trade is one such industry where
multiplications are summed and the check digit is the difference coding conventions have been agreed -to specify grams / sq. cm,
between that sum and the next highest multiple of 10, see Figure direction of fibre, size of sheet, etc. Coupled with such a convention
8.4. is the need for an understanding of the ‘pack quantity’. It is
unfortunate if an order for 1,000 sheets of paper is interpreted as
an order for 1,000 reams (and it has happened!).

 The essence of EDI is the coding and structuring of the data
into a common and generally accepted format -anything less
is nothing more than a system of file-transfers.
 The first EDI standards evolved from the formats used for
file transfer of data between computer applications.
 An example of an early EDI application in the UK was the
BAGS system
 To facilitate the cross sector and international development
of EDI the EDIFACT standard has been, and is being,
developed. EDIFACT is the United Nations standard of
Electronic Data Interchange for Administration, Commerce
and Transport

Fig. 8.4 EAN Checkdigit Calculation.
1. What do understand by EDI standards?
For very small items, eight digit (EAN-8) codes can be allocated.
2. What are the full forms of the following:
This is so that the smaller bar code can be printed on individual
items.  EDIFACT

The EAN code in the example above is a product code for a 420  ODETTE
gram tin of Heinz Baked Beans. Each Heinz product has the  ANA
same manufacturers’ prefix but a different item code allocated by  EAN
the company, for example:
 UPC
Baked Beans - 420 gram tin: 50 00157 00171 9
3. Explain EDIFACT standard.
Cream of Tomato Soup - 300 gram tin: 5000157 00207 5
Baked Beans - 205 gram tin: 50 00157 00023 1
In the EDI Order message these codes can be used in the order
line, e.g. the line: LIN+1++5000157001719:EN’ EAN address
point codes are used in EDI messages to identify the sender and
receiver of the message. Address point codes are similar to the
product code; the country and manufacturer’s prefix are the same
as for the companies products but the check digit calculation differs
for the two usages. The sender of the order may wish to specify a
number of locations, for instance an order, in addition to the
buyer and supplier, might identify: The Delivery Point - the


 



 Taking the trading network shown at Figure 12.1, the postbox
 Introduction and mailbox arrangement of the VADS would be as shown at
 EDI Network Figure 9.1.
 Summary
 Exercise

After this lecture the students will be able to:
 Understand details of the technical elements of an EDI
system:
 EDI Networks
After discussing about EDI standards and coding let’s see how
the transmission of electronic data takes place and what are the
requirements for this electronic transmission.

The EDI standard specifies the syntax for the coding of the
electronic document, it does not specify the method of
transmission. The transmission of the electronic document can
be: Fig. 9.1 VADS – Postbox and Mailbox Files.
 A magnetic tape or diskette that is posted or dispatched If Sava store, for example, needed to place orders for bread, meat
using a courier service. and vegetables then it formats an EDI interchange containing a
number of orders for those three suppliers. The sequence of
 A direct data communications link.
events would then be:
 A value added data service (VADS), also known as a value
 Sava Store establishes a com munication link to the VADS
added network (VAN).
system. Sava Store makes extensive use of the system and
The physical transfer of magnetic tape or diskette is one way of has a leased line communications link.
transmitting EDI messages. However, one of the advantages of
 The VADS computer system inspects postboxes, unpacks
EDI is speed of transmission and this is hardly facilitated by the
the interchanges, moves any available messages (orders in
physical transportation of the diskette or tape. For this, and other
this case) to the mailbox of the intended recipients and
reasons, this way of transmitting EDI is declining in popularity.
repackages them as new interchanges. The inspection of
The use of direct data communications links is the second postboxes is frequent and, to all intents and purposes, the
possibility. It can be appropriate for trading relationships where interchanges are immediately available to the recipient.
there are large data volumes or where there are only one or two
 The users of the system establishes a communication link
trading partners involved. It does, however, have a number of
to the VADS system at their convenience. Best Bread is the
complications. It presumes that the trading partners agree
first user of the system to come online, in this case the
transmission times, protocols and line speeds – requirements
communications link is a dial-up line.
that become complex when there are several trading partners, some
of them involved in a number of trading relationships. The final  Best Bread inspects its mailboxes for new interchanges. On
possibility is the use of a VADS. These can provide a number of finding the order from Sava Store (and possibly further
facilities but the essential is the use of postboxes and mailboxes interchanges from other customers) it causes them to be
to provide ‘time independence’ and ‘protocol independence’. The transmitted to its own order processing system.
facilities of a VADS are further discussed in the following sections. The EDI interchange is then available for processing in the user’s
application. See Figure 9.2 for a diagram of this interchange taking
 place.
The basic facility of a VADS is a post and forward network. This
network is centered on a computer system with communications
facilities. For each user of the system there are two files:
 The postbox - where outgoing messages are placed.
 The mailbox - where incoming messages can be picked up.


 
VADS have made inter-network agreements that provide for the
passing of interchanges between them.

Many VADS are nationally based with a single computer service
providing the switching service - a set-up that is appropriate for
domestic trade. A number of the VADS’s are part of international
organisations or have alliances with VADS’s in other countries
thus facilitating international trade.

A commonly expressed concern by EDI users is the privacy of the
system and the security of their messages (a concern that can seem
exaggerated given the relative insecurity of the postal system that
EDI might be replacing).Privacy provisions will normally include
user-id / password protection, of postboxes and mailboxes. The
setting up of a trading relationship can also be under user control
Fig. 9.2 VADS – Example Interchange. with both users required to enter the appropriate control message
The post-box / mailbox system is also referred to as a ‘store and before the exchange of message can take place. The EDI message
forward’ system. The two principle advantages of such a system can also be encrypted or can include an electronic signature
are: (provisions that are not dependant on the VADS).
Security will be built into the VADS system - it is important to the

users and to the reputation of the VADS that messages are not
The sending and receipt of the interchange are synchronous. The
lost. The service must also be reliable - the VADS should have an
two processes can be carried out at the convenience of the users
appropriate hardware and software configuration so that it can
involved. The first user may send all its EDI transmissions, to all
ensure the continuous availability of its service.
its trading partners, in a single batch, at the end of its overnight
processing run. The individual interchange can then be picked up 
by the trading partners, at their individual convenience. Users of the VADS would normally have control over the retrieval
and retention of messages in their mailbox. New messages can be

called off selectively or in total. Once a message has been called off
The type of communications link to be used is an option available
it will be marked as no longer new but it can still be retained in the
to each user of the VADS system. Low volume users will probably
mailbox (and it is worthwhile making use of this facility until the
opt for a dial-up modern link whereas high volume users may
message is secure in the users system).
well use a leased line or a packet switching network. The VADS
supplier makes available a wide variety of communications facilities As part of its service provision the VADS may well have a message
and has the ability to handle a range of protocols. The transmission logging facilities. This provides an audit trail of when the message
protocol envelope is stripped off incoming interchanges leaving arrived in the VADS, when the recipient retrieved it and when it
just the EDI interchange. Interchanges are then re-enveloped with was eventually deleted. A useful provision should messages be
the transmission protocol appropriate to the recipient when they lost - the result of an enquiry is normally to prove a fault in one of
are retrieved from the mailbox. the users systems / procedures rather than any fault in the operation
 of the VADS.
A number of organizations have set out to provide VADS. The 
basic and most important facility of the VADS is the postbox / A number of VADS will provide a service that validates EDI
mailbox provision. There are, however, a number of further messages for conformance with the chosen EDI standard and
facilities that can be made available; some or all of them may be returns an invalid interchange. This service is optional and normally
provided by any particular VADS provider. incurs an extra charge.
  
An established EDI VADS will have a large number of clients all VADS, despite their alternative name of Value Added Network
with an interest in electronic trade. There is a tendency for are message switching services, not network services. The cost of
organisations in a particular trade sector to concentrate on one the connection from the user to the VADS can be reduced by
particular VADS (there are instances of formal agreements between using a local access node or a packet switching service. The time
a trade sector organisation and a VADS). Joining the appropriate independence provided by the VADS gives the user the option
VADS can ease access to new electronic trading partners. of accessing the service when cheap rate telephone charges apply.
 
A VADS facilitates trade between partners that subscribe to the The VADS is a commercial organisation and charges for its services.
same VADS but not between partners that might be using different The charges tend to be a combination of :
VADS services - not infrequently organisations have joined more
Subscription A monthly or annual subscription.
than one VADS to overcome this problem. A number of the


 
Usage charge:A charge for the number of characters transmitted.
Differing VADS apply these charges in differing combinations - in
theory a user could select the VADS with the charging structure
that gave it most advantage - in practice users choose the VADS
already used by their trading partners. For the Pens and Things
example, the VADS that is most likely to be adopted is that already
used by Packaging Solutions.

Network providers tend to have considerable experience in EDI
and an interest in promoting its widespread adoption. Most
VADS providers supply (or sell) EDI software that provides for
easy access to their own network. These VADS providers will also
provide consultancy and training - the basic provision concerns
the use of the software and the network but there can also be
consultancy on the business use of EDI within the organisation.

 Electronic Data Interchange is one of the applications of E
Commerce which makes Business to Business transactions
possible over a network.
 EDI standards are required so that the computer systems
can exchange data in a common format.
 EDIFACT is the United Nations standard of Electronic
Data Interchange for Administration, Commerce and
Transport.
 VADS stands for Value Added Data Services. The basic
facility of a VADS is a post and forward network which is
Time and Protocol independent. VADS is also known as
VAN (Value Added Network).

1. What do you understand by the term VADS.
2. Discuss the security issues in EDI
3. What do you understand by the term EDI?
4. Write the full form of the following:
 EDI
 EDIFACT
 VADS
 VAN



 


Question 1 The choice of User Interface (UI) model is an b. Some suggested responses:
important element in defining the Human-Computer  Complex networks – not linear, not always uni-directional,
Interface between the user and the system. From materials quadratic linkages
presented in lectures and your own knowledge of the field;
 Variable Demand – forecasting not precise, build to order
a. Identify and describe three User Interface (UI) models. The (BTO) vs build to stock (BTS) approaches
models may be in widespread use, or may be emerging
technologies.  Production Processes Uncertain – labour market issues
 Supply Dependent on External Organisations – suppliers
b. Compare and contrast the three models you have identified.
as partners,preferential treatment issues
Focus upon the relative strengths and weaknesses of each
model. Describe whether any identified limitations can be  Organisation structure and its effects on Supply Chain
overcome. If so, how? Management (or SCM) – SCM cuts across the whole
organisation, but business often structured by departments
 (silo approach). Need to restructure to best support SCM.
User Interface (UI) Models
 Design for Manufacture – “postponing” or “deferring”
a. Look for:
customisation/product differentiation until last point in the
 Punch card interfaces (historical) manufacture cycle.
 Command Line Interfaces c. Integrated Supply Chain Management
 Menu-driven interfaces Key concept to look for is the idea of “addressing the efficiency of
 Graphical User Interfaces the whole supply chain, not just one component”, “improving
whole supply chain”.
 Object Oriented UI’s


“ISCM addresses the efficiency of the entire end-to-end supply
 Speech recognition systems chain, not just the efficiency of individual elements. By taking a
 Haptic interfaces “whole” rather than “sum of parts” approach (a systems level
 Immersive environments (or Virtual Reality, or Augmented approach) to the problem, ISCM can assist all organisations in the
Reality systems) supply chain with the issues of Strategic Planning, Demand
Planning, Supply Planning and Production Planning. ISCM brings
b Basic keywords to look for are:Quick, simple, low network
all organisations in the chain closer together and gives partner
bandwidth, low network latency, difficult for new/
organisations visibility to the manufacturing and timing horizons
inexperienced users, keystroke-intensive, emphasises/
of all elements in the supply chain, thereby allowing production
supports recognition over recall (Menu-driven and GUI
and throughput across the entire chain to be optimized to achieve
systems, not CLI), inefficient for repeated tasks, etc.
large efficiency gains”.
Question 2: Business to Business (B2B) e-Commerce systems
are now being adopted by businesses to reduce the cost of
procurement activities and to achieve more efficient supply
chain integration between suppliers and customers.
a. Define the term “supply chain” and explain the concept.
b. Identify and describe three challenges faced by businesses
attempting to manage their supply chains.
c. How does the “Integrated Supply Chain Management”
(ISCM) approach help businesses increase the efficiency of
the supply chain ?

Business to Business (B2B) Systems and SCM
a. A sample response:“A supply chain is a network of
companies that work together to design, produce,deliver and
service an end-product”.Look for “network” and “work
together” and words that indicate the whole cycle eg “design,
produce, deliver” etc


 



 the trading partner may supply the software or recommend a


 Introduction third party supplier.
 EDI Implementation  The VADS supplier.

 Summary  As part of application package, e.g. packaged software for


production control, order processing or accounting may
 Exercise
include EDI software as an integral feature or as an optional
 module.
After this lecture the students will be able to:  A third party. An example of this is that a number of banks
 Understand details of the technical elements of an EDI provide EDI solutions that include the collection of and
system: accounting for electronic payments. Obtaining EDI software
 EDI Implementation from an ‘interested’ party has both advantages and
disadvantages. If the software is, for example, bought from
Now we will discuss the physical implementation of VADS. EDI
the VADS supplier then, hopefully, there would not be any
in the Internet.
problem interfacing with the chosen network but using an
Recently a number of organisations have started using the Internet additional VADS or switching to a new network supplier
as an EDI VADS. Using the Internet provides the basic store and may be more problematic.
forward facilities but not necessarily the other features of a VADS
The basic functions of the EDI Software are the two already
service that are listed above. Security and reliability are two of the
outlined, namely:
major concerns, unlike the traditional VADS, the Internet does
not guarantee the safe delivery of any data you send into it. The  Coding business transactions into the chosen EDI Standard;
plus side of using the Internet is that it is cheaper than any of the  Interfacing with the VADS.
commercial networks that provide specific EDI VADS services. Many EDI software suppliers provide additional functions.These
 may include:
The final technical element of the EDI system is the EDI software.  A trading partner database integrated into the EDI
If a company is to send an order from its production control Software.This can provide for code translation (e.g. internal
system to Packaging Solutions it needs to code that order into the customer codes to a trade sector standard code) and / or for
agreed EDI standard and ‘squirt’ it into the chosen VADS. To the specification of the EDI requirements of each trading
pick up the order at the other end, Packaging Solutions has a partner;
similar need to extract the data from the network and to decode  Support of multiple EDI Standards. The selection of the
the data from the EDI message into its order processing system. appropriate standard may be determined by the trading
The coding / decoding of the EDI message and the interfacing partner database;
with the VADS is normally achieved using EDI Software. The
 Sophisticated facilities to ease the formatting of internal
overall picture is summarized in Figure 10.1.
application data to and from the EDI Standard. ‘Drag and
drop’ interfaces are available for this purpose. Various EDI
Software suppliers have associations with the large suppliers
of business applications (production planning, order
processing, etc.) and provide standardised interfaces to those
packages;
 Facilities for transactions to be sent by fax or e-Mail to
customers that do not use EDI. The identification of such
customers may be determined by the trading partner
database;
 Interfacing with a variety of EDI VADS (including the
Fig. 10.1 Sending an order using EDI Software. Internet). The selection of the appropriate VADS may be
determined by a trading partner database;

The EDI software is normally bought in from a specialist supplier.  The option to encrypt the EDI Message;
There are a number of software houses supplying EDI solutions  Facilities for the automatic acknowledgement of the EDI
or the EDI software may come from: · A major trading partner - message;


 
 Message tracking and an audit trail of messages sent and  The order print run is modified so that orders for EDI
received; capable suppliers are not printed;
 Direct input and printed output of EDI transactions  An additional run is included to take the orders from the
allowing free standing EDI Operation-in effect the EDI EDI capable suppliers and format the data onto the flat file;
system provides the service of a fax machine.  The flat file is accessed by the EDI software and, using user
EDI Software is available on a variety of platforms from the basic supplied parameters, the order data is formatted into the
PC up to a mainframe system. As with all classes of software the required EDI standard and posted into the VADS.
price varies: the basic PC packages starting at (say) 500 pounds The reverse process is used for incoming EDI messages. This will
sterling / 800 US dollars and the price then goes up from there for involve the creation of a batch input routine to run in parallel with
the larger machines, additional facilities and services such as the online facilities utilized by most business
consultancy. For some EDI software the support of each standard
applications. The additional worry with incoming EDI messages
and / or VADS is an additional plugin that is paid for separately.
is validation. For orders, invoices and any other data manually
Yearly maintenance charges, that include updates as the new
input into a business application there will be (or should be)
versions of the EDI Standards are released, tend to be quite hefty.
comprehensive primary and secondary validation built into the
At the top of the range is the concept of an EDI Corporate
system and there is a human operator there to deal with any
Interface. This software, often mounted on its own, mid range,
queries.
machine acts as a central clearing house for all the e-Commerce
transactions of a large organisation. The external interfaces can For EDI messages there will not be any input errors at the receiving
link to several EDI VADS’s and translate to a variety of EDI end but there is(normally) no guarantee that the data sent by the
trading partner is correct or acceptable. Arguably the EDI routines
Standards to meet the needs of a large number of trading partners.
taking input messages need all the same validation checks as the
The internal interfaces can link to a number of business systems
equivalent manual input routines and there needs to be procedures
such as order processing and accounts payable, possibly systems
for correcting the problems or informing the trading partner and
that are replicated across the various divisions of the organisation.
getting them to transmit a corrected message.
The system can also be used for intra organizational transactions
- if the interface for external customers and suppliers uses EDI, 
why not use the same interfaces for trades between divisions of Once the EDI system is set-up it, like any other data processing
the organisation. systems, needs careful and systematic operation. A big difference
between electronic transactions and their paper equivalents is that
 with electronic transactions there is no paperwork to fall back on
EDI software will do its job well at a relatively modest price. What
should anything go wrong. In these circumstances, therefore, it is
pre-packaged EDI software cannot do is automatically integrate
sensible to keep a security copy of all incoming transactions -
with the business application and a comprehensive solution to
preferably in their EDI format as soon as they enter the system.
this requirement can take a lot of time and cost a lot of money.
This then gives a fall-back position should any data be lost or
The simple way to implement EDI is not to link the EDI software corrupted and is an aid to the diagnosis of any problems.
and the applications - a set-up sometimes referred to as EDI-Fax
The second aspect to EDI operation is how often should the
or EDInterruptus. This is, a course, followed by
system be run. EDI has been implemented, in part at least, to cut
many organisations when they first start and persisted with by down transaction cycle time and there is no point in reintroducing
many small organisations who are only ‘doing EDI’ because a unnecessary delays. For many organisations a daily download from
large trading partner has told them to. In this mode of operation: the mailbox and processing run is sufficient - however, this is not
 Incoming EDI messages are printed out from the EDI entirely satisfactory if the daily run is timed for an hour before a
software and then manually keyed into the business major trading partner sends out their daily orders. In some
application that they are intended for; circumstances, such as just-in-time manufacture in the vehicle
 Outgoing EDI messages are extracted from the business assembly business, cycle times can be as short as one hour and
application and typed into the EDI software for formatting obviously order processing needs to be very frequent / real-time.
and onward transmission. 
The use of EDI in this way ensures that the transactions get WebLogic Integration provides an EDI sample application that
through quickly (hence the term EDI-Fax) but it rules out any of demonstrates how WebLogic Integration with the EDI Connect
the other advantages of using EDI. For full integration of the for WebLogic Integration add-on can be used to exchange EDI
business application and the EDI Software there needs to be an purchase-order information over a VAN. In the sample application,
interface to transfer data from the business application to the EDI a supplier trading partner uses the EDI integration functionality
software and vis a versa. To ease this process, most EDI software of WebLogic Integration to connect to a buyer over a VAN.
provides for a ‘flat file’ interface. If the data to be sent is (say) an The interactions between the buyer and supplier occur in the
order then the business application can be modified so that: following sequence:
 The supplier record in the order processing system has an 1. A buyer trading partner submits an EDI purchase order,
indicator to say that its orders are to be sent via EDI; over a VAN to the supplier.


 
2. The EDI-to-XML transformation engine bundled with
Power.Server! converts the purchase order to XML.
3. The XML document triggers a business process in the
supplier application. The business process generates an XML
purchase order acknowledgment.
4. The supplier forwards the acknowledgment to the
transformation engine which converts it to EDI, and then
forwards it over a VAN to the buyer.

 A number of organisations have started using the Internet
as an EDI VADS
 Unlike the traditional VADS, the Internet does not
guarantee the safe delivery of any data you send into it
 The plus side of using the Internet is that it is cheaper than
any of the commercial networks that provide specific EDI
VADS services.
 The coding / decoding of the EDI message and the
interfacing with the VADS is normally achieved using EDI
Software
 For full integration of the business application and the EDI
Software there needs to be an interface to transfer data from
the business application to the EDI software and vis a versa.
A big difference between electronic transactions and their paper
equivalents is that with electronic transactions there is no paperwork
to fall back on should anything go wrong. In these circumstances,
therefore, it is sensible to keep a security copy of all incoming
transactions

1. How do you achieve coding\decoding EDI messages in
VADS?
2. How secure is the EDI VADS in delivery of the data




 



 with missing wheels and there will be no cornflakes on the shelves
 Introduction in the supermarket. Hence to achieve a successful, electronically
 EDI Agreement controlled supply chain, businesses have to talk. They need to
agree the nature of the business that is to be done electronically,
 EDI security issues the technical details of how it is to be undertaken and the procedures
 Summary for resolving any disputes that arise.
 Exercise 
 The appropriate way to document the details of a trading
After this lecture the students will be able to: arrangement between electronic trading partners is an EDI
 Understand details of the technical elements of an EDI Interchange Agreement. The agreement makes clear the trading
system: intentions of both parties, the technical framework for the
transactions and the procedures to be followed in the event of a
 EDI Agreements
dispute. The EDI Agreement is a document, normally on paper,
 EDI Security and signed by both trading partners before electronic trading
After discussing how the EDI is being implemented it is clear that begins. The first requirement of the agreement is to establish the
a large organization that processes many electronic transactions is legal framework. This has a special significance as most business
going to need its own EDI set-up. There are, however, many law relates to paper based trading and how that law should apply
small companies that are dragged into EDI trade by a large trading to the less tangible form of an electronic message is not always
partner but for who the set-up and running costs of an EDI clear (although a number of countries are updating their legal
facility would outweigh the benefits. For these organizations there provisions to take account of electronic trade). This point is made
are a number of alternatives as discussed below: in the commentary that is included in the European
 
 The low cost, PC based, free-standing EDI facility. 
‘For EDI to be a successful alternative to paper trading, it is essential
 Making use of an EDI clearing house. To do this the that messages are accorded a comparable legal value as their paper
company contract for their EDI messages to be sent to a equivalent when the functions effected in an electronic environment
clearing house who decode them, print them out and then are similar to those effected in a paper environment, and where all
post or fax them on. The British Post Office is an example appropriate measures have been taken to secure and store the
of an organisation that provides this service. data.’
 Internet access via a clearing house. This is an update on the

EDI-Post service outlined above where a clearing house is
used but the inward and outward transactions are 
transmitted between the end user and the clearing house and The parties, intending to be legally bound by the Agreement,
accessed by the client using a standard web browser. expressly waive any right to contest the validity of a contract
As you know setting up an EDI system requires a lot of discussion effected by the use of EDI in accordance with the terms and
with trading partners. Manual systems rely a lot on the conditions of the Agreement on the sole grounds that it was
understanding of the people involved; when these interchanges effected by EDI.’And the agreement also specifies:
are automated there is no understanding between the machines -  The point in its transmission and processing at which a
they just do what they are told (well they do on a good day!). message will be deemed to be legally binding - the usually
The introduction of EDI may also be part of a wider process of accepted standard is that the ‘document’ achieves legal status
business processing re-engineering that makes the effective when it arrives at the receiving party, the ‘reception rule’.
operation of the supply chain much more crucial to successful  The timescale for processing EDI massages. One purpose
business operation. Traditional logistics had buffer stocks in the of EDI is to speed up the trade cycle and this is not achieved
factory’s parts warehouse or the retailer’s regional depot and stock if messages are not reliably processed within an agreed
room. In just-in-time manufacture and quick response supply timescale.
these buffer stocks are eliminated - this reduces the capital  The time that copies of the message will be retained (a
employed and avoids the need to double handle goods. Without default of three years is provided for by the EU-IA but
these buffer stocks the EDI systems become crucial -the orders many member states require longer periods, e.g. seven or ten
need to be delivered on time or cars will be made years).


 
 The procedure for settling any disputes. The EU-IA 
suggests a choice between arbitration by a named Where there-is concern that the transmission might be intercepted
organisation, e.g. a chamber of commerce appointed and modified it can be protected by a digital signature. This is
arbitration chamber, or by recourse to the judicial process. designed to ensure that the message received is exactly the same as
 The legal jurisdiction in which, any disputes should be the message sent and that the source of the message is an
settled. In addition to the legal (or legalistic) aspects of the authorized trading partner.
agreement it is important to specify the technical 
requirements. These requirements include: Where the contents of the message are considered sensitive the
 The coding systems that will be used for identifying entities privacy of the message can be protected, during transmission, by
such as organisations and products and attributes such as encrypting the data.
quantities. 
 The EDI standard that is to be employed and, within that, One potential problem is that the recipient of the message might
the messages and data segments that will be used. Updating deny having received it; the electronic equivalent of the idea that
of message standards as new versions are released is an issue the unpaid invoice must have got ‘lost in the post’.
that also needs to be covered. One way out of this is to use the receipt acknowledgement
 The network that is to be used - including details of messages (see below) but the other alternative is a ‘trusted third
scheduling and protocol where a post and forward network party’. The ‘trusted third party’ can be the VADS supplier or, if
is not to be employed. you don’t trust them, some other organisation. The role of the
Model agreements are available from various parties, including third party is to audit trail all transactions (a role the VADS provider
trade organisations, and references to example agreements can be is ideally positioned to fulfill) and to settle any dispute about
found on the web pages that accompany this book. what messages were sent and what messages were received.
Another major issue of concern is the privacy and security of the One aspect of security provided for by the EDI standard is the
messages and their exchange. Let’s discuss how to protect the data receipt acknowledgement message. This is a transaction specific
while it is being transferred from one place to another. message sent out by the receiving system to acknowledge each
message, order or whatever. Trading partners that use receipt
 acknowledgement messages need to be clear about the level of
The first point is to ensure that interchange of messages is reliable.
security (guarantee) implied by the receipt of the acknowledgement.
In the first instance this is a matter of procedures at both ends of
The EDI acknowledgement message can be:
the trading agreements. Procedures, rigid procedures, are required
to ensure that all the processes are run and that they reach their  Automatically generated by the EDI Software (Physical
successful conclusion - an old-fashioned requirement called ‘data Acknowledgement). It informs the sender that the message
processing standards’. Procedures are particularly important where has arrived but there is no guarantee that it is passed to the
operations are manual (as opposed to being controlled by job application for processing or that it is a valid transaction
control programs (JCP) run under the appropriate operating within the application.
system). Particular attention is needed if the EDI software is run  Coded into the application to confirm that it is in the system
on a separate machine (say a PC) and the application software for processing.
operates in a mainframe or similar environment; it is vital that all  Produced by the application once the message is processed to
the data received on the EDI machine is passed to and processed confirm that the message was valid and possibly to give
(once only!) on the mainframe and that outgoing data is reliably additional information such as stock allocation and expected
processed in the reverse direction. delivery date (Logical Acknowledgement).
 The need for security in an EDI system needs to be kept in
 proportion; after all EDI is very probably replacing a paper based
EDI Standards include controls designed to protect against errors system where computer output orders, without signatures, were
in, and corruption of, the message. The sort of thing that is bunged in the post and eventually manually keyed in by an order
provided is for segment counts in the message and message counts entry clerk. Transmission and EDI message controls are automatic.
in the interchange. Checks over and above that all come at a cost; encryption and
digital signatures both require extra software and procedures;
 message acknowledgements require additional software to generate
Transmission protocols include protection, such as longitudinal the message and to match it to the original transaction on the
control totals, to detect any data corruption that occurs during other side of the trading relationship. EDI orders and invoices
transmission. Where corruption is detected the network system for regular transaction of relatively low cost supplies do not justify
occasions a retransmission without the need for outside too heavy an investment in privacy and security – if an extra load
intervention. of cornflakes arrives at the supermarket distribution centre it ca be
sorted out on the phone and the error will probably be in the
warehouse, not the EDI system (whatever the supplier tells the
customer!).


 
EDI payments require more care; normally the payment transaction 5. What are the required features of a desirable B2B EC
is sent to a bank (with its own procedures) with the payment platform?
advice being sent to the trading partner. The overall facilities for 6. To what extent, do current B2B solutions meet the required
EDI privacy and security are summed up in Figure 11.1
features?



Fig. 11.1 EDI Privacy and Security


The overall EDI technical setup is summarized in fig 11.2

Fig 11.2 EDI summary


 There are number of alternatives instead of setting own
EDI setup like the low cost, PC based, free-standing EDI
facility, making use of an EDI clearing house, Internet access
via a clearing house.
 The appropriate way to document the details of a trading
arrangement between electronic trading partners is an EDI
Interchange Agreement
 The security aspects in EDI are Controls in the EDI
Standards, Controls in the Transmission Protocol,
Protection against Tampering, Privacy of Message,
Nonrepudiation

1. List four elements of an EDI system
2. List the transaction types that take place between trading
partners that seem suitable for EDI implementation.
Suggest some communications that would not be suitable
for this technology.
3. Describe the advantage of Internet-based EDI over
traditional EDI.
4. How do companies eliminate the potential limitations and
risks associated with Internet-based EDI


 



  Home banking (e.g., bill payment)


 Introduction 
 Types of Electronic Payment Systems
 Credit cards (e.g., VISA or MasterCard)
 Types of digital tokens
 Private label credit/debit cards (e.g., J.C. Penney Card)
 Discuss E-Cash
 Charge cards (e.g., American Express)
 Summary

 Exercise
 Token-based payment systems
 Electronic cash (e.g., DigiCash)
After this lecture the students will be able to:
Electronic checks (e.g., NetCheque)
 Understand what is an Electronic Payment System
Smart cards or debit cards (e.g., Mondex Electronic Currency Card)
 Describe e-cash as one of the Electronic Payment Systems
 Credit card-based payment systems
All of you might have heard the term “ Electronic Payment”. As
the name is suggesting it means making payments electronically Encrypted credit cards (e.g., World Wide Web formbased
i.e. through computer and telecommunication components. encryption) Third-party authorization numbers (e.g., First Virtual)

 
700BC Earliest coins produced in western Turkey to pay

mercenaries or taxes.
Electronic payment systems are proliferating in banking, retail,
health care, on-line markets, and even government-in fact, anywhere 1400 First banks open, in Italy and Catalonia, honoring
money needs to change hands. Organizations are motivated by checks against cash reserves.
the need to deliver products and services more cost effectively and 1694 The Bank of England opens, creating deposits on the
to provide a higher quality of service to customers. This section - principle that not all deposit receipts will be presented
will briefly describe the pertinent developments in various for redemption simultaneously. The bank
industries to provide an overall picture of electronic payment monopolizes the issuing of bank notes.
systems of the past and present. A timeline showing the evolution
1865 A sample of payments into British banks shows, that
of payment systems is presented in Table 12.1.
97 percent are made by check.
Research into electronic payment systems for consumers can be
1887 The phrase credit card is coined in Looking Backward, a
traced back to the 1940s, and the first applications-credit cards-
novel by Edward Bellamy.
appeared soon after. In the early 1970s, the emerging electronic
payment technology was labeled electronic funds transfer (EFT). 1880-1914 Heyday of the gold standard as major currencies are
EFT is defined as “any transfer of funds initiated through an pegged to gold at fixed rates.
electronic terminal, telephonic instrument, or computer or magnetic 1945 Bretton Woods agreement links currencies to gold via
tape so as to order, instruct, or authorize a financial institution to their fixed parities with the U.S. dollar.
debit or credit an account.” EFT utilizes computer and 1947 Flatbush National Bank issues first general purpose
telecommunication components both to supply and to transfer credit card, for use in select New York shops.
money or financial assets.
1950 Diners Club Charge Card introduced mid 1950s The
Transfer is information-based and intangible. Thus EFT stands development of magnetic ink character recognition
in marked contrast to conventional money and payment modes (MICR), facilitating more timely processing of checks,
that rely on physical delivery of cash or checks (or other paper sealed the check’s standing as the preferred noncash
orders to pay) by truck, train, or airplane. Work on EFT can be payment option.
segmented into three broad categories:
1958 BankAmerica, in Fresno, California, executes the first
 mass mailing of credit cards.
 Large-scale or wholesale payments (e.g., bank-to-bank 1967 Westminster Bank installs first automated teller
transfer) machine at Victoria, London, branch.
 Small-scale or retail payments (e.g., automated teller machines 1970 The New York Clearing House launches CHIPS the
and cash dispensers) Clearing House Interbank Payments System-which
provides U.S.-dollar funds-transfer and transaction
settlements on-line and in real time.


 
late 1970s Chemical Bank launches its Pronto system providing micro payments, that is, payments for small snippets of
3000 computer terminals to customers’ homes linked information. Others are designed for more traditional
to its central computers bv telephone. products. Some systems target specific niche transactions;
It offers a range of facilities: balance inquiries, money transfers others seek more general transactions. The key is-to identify
between Chemical Bank accounts, jind bill payments to selected the parties involved, the average amounts, and the purchase
local stores.The stumbling block for first-generation home interaction.
banking systems in general was who is to pay for the terminals at 2. The means of settlement used. Tokens must be backed by
home. cash, credit, elec-tronic bill payments (prearranged and
1985 Electronic data interchange (EDI) extensively used in spontaneous), cashier’s checks, lOUs, letters and lines of
bank-to-bank payment systems. credit, and wire transfers, to name a few. Each option incurs
trade-offs among transaction speed, risk, and cost. Most
1994 Digital cash trials by DigiCash of Holland conducted
transaction settlement methods use Credit cards, while
on-line.
others use other proxies for value, effectively creating
1995 Mondex electronic currency trials begin in Swindon, currencies of dubious liquidity and with interesting tax, risk,
England. and float implications.
Table 12.1 Timeline of Innovations in Payment Systems 3. Approach to security, anonymity, and authentication.
Let’s discuss various types of Electronic payment systems. Electronic tokens vary in the protection of privacy and
Firstly we will have a look on “Electronic Tokens”. confidentiality of the transactions. Some may be more open
to potentially prying eyes-or even to the participants
Digital Token-Based Electronic Payment Systems
themselves. Encryption can help with authentication, non
None of the banking or retailing payment methods are completely reputability, and asset management.
adequate in their present form for the consumer oriented e-
4. The question of risk. Who assumes what kind of risk at
commerce environment. Their deficiency is their assumption that
what time? The tokens might suddenly become worthless
the parties will at some time or other be in each other’s physical
and the customers might have the currency that nobody will
presence or that there will be a sufficient delay in the payment
accept. If the system stores value in a smart card, consumers
process for frauds, overdrafts, and other undesirables to be
may be exposed to risk as they hold static assets. Also
identified and corrected. These assumptions may not hold for e-
electronic tokens might be subject to discounting or
commerce and so many of these payment mechanisms are being
arbitrage. Risk also arises if the transaction has long lag times
modified and adapted for the conduct of business over networks.
between product delivery and payments to merchants. This
Entirely new forms of financial instruments are also being exposes merchants to the risk that buyers don’t pay-or vice
developed. One such new financial instrument is “electronic versa that the vendor doesn’t deliver.
tokens” in the form of electronic cash/money or checks.
Let’s discus Electronic cash (e-cash) which is a new concept in on-
Electronic tokens are designed as electronic analogs of various line payment systems because it combines computerized
forms of payment backed by a bank or financial institution. Simply convenience with security and privacy that improve on paper cash.
stated, electronic tokens are equivalent to cash that is backed by a Its versatility opens up a host of new markets and applications.
bank. E-cash
 presents some interesting characteristics that should make it an
1. Cash or real-time. Transactions are settled with the attractive alternative for payment over the Internet.
exchange of electronic currency. An example of on-line 
currency exchange is electronic cash (e-cash). E-cash focuses on replacing cash as the principal, payment vehicle
2. Debit or prepaid. Users pay in advance for the privilege of in consumer-oriented electronic payments. Although it may be
getting information. Examples of prepaid payment surprising to some, cash is still the most prevalent consumer
mechanisms are stored in smart cards and electronic purses payment instrument even after thirty years of continuous
that store electronic money. developments in electronic payment systems.
3. Credit or postpaid. The server authenticates the customers Cash remains the dominant form of payment for three
and verifies with the bank that funds are adequate before reasons:
purchase. Examples of postpaid mechanisms are credit/ (1) lack of trust in the banking system,
debit cards and electronic checks. (2) inefficient clearing and settlement of non-cash transactions,
The following sections examine these methods of on-line arid
payment. But we must first understand the different viewpoints (3) negative real interest rates paid on bank deposits.
that these payment instruments bring to electronic commerce.
These reasons seem like issues seen primarily in developing
Here are four dimensions that are useful for analyzing the different countries. Not true. Even in the most industrialized countries,
initiatives. the ratio of notes and coins in circulation per capita is quite large
1. The nature of the transaction for which the instrument is and is estimated to range from $446 to $2748. Consider the
designed, Some-tokens are-specifically designed to handle situation in two of the most industrialized nations in world: the


 
United States and the United Kingdom. In the United States, in smart cards, or in other easily transported standard or special-
there supposedly was about $300 billion of notes and coins in purpose devices. Because it might be easy to create counterfeit cash
circulation in 1992. Interestingly, this .number is not shrinking that is stored in a computer, it might be preferable to store cash on
but growing at approximately 8 percent per year. Deposits by a dedicated device that cannot be altered. This device should have
check are growing by only 6 percent per year. It has been reported a suitable interface to facilitate personal authentication using
that in the United Kingdom about a quarter of all “spontaneous” passwords or other means and a display so that the user can view
payments over 100 pounds sterling are still made with cash. For the card’s contents. One example of a device that can store e-cash
payments under five pounds sterling, the percentage is 98 percent is the Mondex card-a pocket-sized electronic wallet.
. The predominance of cash indicates an opportunity for innovative E-cash should not be easy to copy or tamper with while being
business practice that revamps the purchasing process where exchanged; this includes preventing or detecting duplication and
consumers are heavy users of cash. To really displace cash, the double-spending. Counterfeiting poses a particular problem, since
electronic payment systems need to have some qualities of cash a counterfeiter may, in the Internet environment, be anywhere in
that current credit and debit cards lack. For example, cash is the world and consequently be difficult to catch without
negotiable, meaning it can be given or traded to some-one else. appropriate international agreements.
Cash is legal tender, meaning the payee is obligated to take it. Cash
Detection is essential in order to audit whether prevention is
is a bearer instrument, meaning that possession is prima facie
working. Then there is the tricky issue of double spending. For
proof of ownership. Also, cash can be held and used by anyone
instance, you could use your e-cash simultaneously to buy
even those who don’t have a bank account, and cash places no risk
something in Japan, India, and England. Preventing double
on the part of the acceptor that the medium of exchange may not
spending from occurring is extremely difficult if multiple banks
be good.
are involved in the transaction. For this reason, most systems rely
Now compare cash to credit and debit cards. First, they can’t be on post-fact detection and punishment. Now we will see the
given away because, technically, they are identification cards owned concept of Electronic Cash actually works.
by the issuer and restricted to one user. Credit and debit cards are
not legal tender, given that merchants have the right to refuse to 
accept them. Nor are credit and debit cards bearer instruments; Electronic cash is based on cryptographic systems called “digital
their usage requires an account relationship and authorization signatures”. This method involves a pair of numeric keys (very
system. Similarly, checks require either personal large integers or numbers) that work in tandem: one for locking
(or encoding) and the other for unlocking (or decoding). Messages
knowledge of the payer or a check guarantee system. Hence, to
encoded with one numeric key can only be decoded with the other
really create a novel electronic payment method, we need to do
numeric key and none other. The encoding key is kept private and
more than recreate the convenience that is offered by credit and
the decoding key is made public. By supplying all customers (buyers
debit cards. We need to develop e-cash that has some of the
and sellers) with its public key, a bank enables customers to decode
properties of cash.
any message (or currency) encoded with the bank’s private key. If
 decoding by a customer yields a recognizable message;” the
Of the many ways that exist for implementing an e-cash system, customer can be fairly confident that only the bank could have
all must incorporate a few common features. Specifically, e-cash encoded it. These digital signatures are as secure as the mathematics
must have the following four properties: monetary value, involved and have proved over .the past two decades to be more
interoperability, irretrievability, and security. resistant to forgery than handwritten signatures. Before e-cash can
E-cash must have a monetary value, bank authorized credit, or be used to buy products or ser-vices, it must be procured from a
a bank-certified cashier’s check. When e-cash created by one bank is currency server.
accepted by others, reconciliation must occur without any problems. 
Stated, another way, e-cash without proper bank certification carries The purchase of e cash from an on-line currency server (or bank)
the risk that when deposited, it might be returned for insufficient involves two steps:
funds. (1) establishment of an account and
E-cash must be interoperable-that is, exchangeable as payment (2) maintaining enough money in the account to back the
for other e-cash, paper cash, goods or services, lines of credit, purchase.
deposits in banking accounts, bank notes or obligations, electronic
benefits transfers, and the like. Most e-cash proposals use a single Some customers might prefer to purchase e-cash with paper
bank. In practice, multiple banks are required with an international currency, either to maintain anonymity or because they don’t have
clearinghouse that handles the exchange-ability issues because all a bank account. Currently, in most e-cash trials all customers must
customers are not going to be using the same bank or even be in have an account with a central on-line bank. This is overly restrictive
the same country. for international use and multi-currency transactions, for customers
should be able to access and pay for foreign services as well as local
E-cash must be storable and retrievable. Remote storage and services. To support this access, e-cash must be available in multiple
retrieval (e.g., from a telephone or personal communications currencies backed by several banks. A service provider in one country
device) would allow users to exchange e-cash (e.g., withdraw from could then accept tokens of various currencies from users in many
and deposit into banking accounts) from home or office or while different countries, redeem them with their issuers, and have the
traveling. The cash could be stored on a remote computer’s memory, funds transferred back to banks in the local country. A possible


 
solution is to use an association of digital banks similar to 2. On receiving the currency, the customer divides out the
organizations like VISA to serve as a clearinghouse for many blinding factor: (RXD)/R = XD (mod PQ).
credit card issuing banks. 3. The customer stores XD, the signed note that is used to pay
And finally, consumers use the e-cash software on the computer for the purchase of products or services. Since R is random,
to generate a random number, which serves as the “note.” In the bank cannot deter-mine X and thus cannot connect the
exchange for money debited from the customer’s account, the signing with the subsequent payment. While blinding works
bank uses its private key to digitally sign the note for the amount in theory, it remains to be seen how it will be used in the real
requested and transmits the note back to the customer.The network business world.
currency server, in effect, is issuing a “bank note,” with a serial

number and a dollar amount. By digitally signing it, the bank is
committing itself to back that note with its face value in real  Electronic payment means making payments electronically i.e.
dollars.This method of note generation is very secure, as neither through computer and telecommunication components.
the customer (payer) nor the merchant (payee) can counterfeit the  Electronic tokens are designed as electronic analogs of
bank’s digital signature (analogous to the watermark in paper various forms of payment backed by a bank or financial
currency). Payer and payee can verify that the payment is valid, since institution.
each knows the bank’s public key. The bank is protected against  Electronic tokens are of three types: Cash or real-time,
forgery, the payee against the bank’s refusal to honor a legitimate Debit or prepaid and Credit or postpaid.
note, and the user against false accusations and invasion of privacy.  Electronic cash is based on cryptographic systems called
 “digital signatures”.
In the case of DigiCash, every person using e-cash has an e-cash 
account at a digital bank (First Digital Bank) on the Internet.
Using that account, people can withdraw and deposit e-cash. When 1. How debit card is different from credit card?
an e-cash withdrawal is made, the PC of the e-cash user calculates 2. Discuss the various Electronic Payment Systems.
how many digital coins of what denominations are needed to
withdraw the requested amount. Next, random serial numbers
for those coins will be generated and the blinding (random 
number) factor will be included. The ‘ “ result of these calculations
will be sent to the digital bank. The bank will encode the blinded
numbers with its secret key (digital signature) and at the same
time debit the account of the client for the same amount. The
authenticated coins are sent back to the user and finally the user
will take out the blinding factor that he or she introduced earlier.
The serial numbers-plus their signatures are now digital coins;
their value is guaranteed by the bank. Electronic cash can be
completely anonymous. Anonymity allows free-dom of usage—
to buy illegal products such as drugs or pornographic material or
to buy legal product and services. This is accomplished in the
following manner. When the e-cash software generates a note, it
masks the original number or “blinds” the note using a random
number and transmits it to a bank. The “blinding” carried out by
the customer’s software makes it impossible for anyone to link
payment to payer. Even the bank can’t connect the signing with
the payment, since the customer’s original note number was
blinded when it was signed. In other words, it is a way of creating
anonymous, untraceable currency. What makes it even more
interesting is that users can prove unequivocally that they did or
did not make a particular payment. This allows the bank to sign
the “note” without ever actually knowing how the issued currency
will be used. For those readers who are mathematically inclined,
the protocol behind blind signatures is presented.
The customer’s software chooses a blinding factor, R,
independently and uniformly at random and presents the bank
with (XR)E (mod PQ),where X is the note number to be signed
and £ is the bank’s public key.
1. The bank signs it: (XRE)D = RXD (mod PQ). D is the
bank’s private key.


 



 have to carry added overhead because of the constant checking


 Introduction and auditing logs. (fig 13.1) Double spending would not be a
 Digital currency major problem if the need for anonymity were relaxed. In such
situations, when the consumer is issued a bank note, it is issued
 Limitations of E-cash
to that person’s unique license. When he or she gives it to some-
 Summary body else, it is transferred specifically to that other person’s license.
 Exercise Each time the money changes hands, the old owner adds a tiny bit
of information to the bank note based on the bank note’s serial

number and his or her license. If somebody attempts to spend
After this lecture the students will be able to:
money twice, the bank will now be able to use the two bank notes
 Understand how to use e-cash to determine who the cheater is. Even if the bank notes pass
 Describe the various issues that may arise in the organization through many different people’s hands, whoever cheated will get
due to the use of e-cash caught, and none of the other people will ever have to know. The
Let’s purchase something on the Internet using Digital Currency. downside is that the bank can tell precisely what your buying
habits are since it can check the numbers on the e-cash and the
 various merchant accounts that are being credited. Many people
Once the tokens are purchased, the e-cash software on the customer’s would feel uncomfortable letting others know this personal
PC stores digital money undersigned by a bank. The user tan information.
spend the digital-money of any shop accepting e-cash, without
having to open an account there first or-having to transmit credit
card numbers. As soon as the customer wants to make a payment,
the software collects the necessary amount from the stored tokens.


Typically, transactions involving cash are bilateral or two-party
(buyer and seller) transactions, whereby the merchant checks the
veracity of the note’s digital signature by using the bank’s public
key. If satisfied with the payment, the merchant stores the digital
currency on his machine and deposits it later in the bank to redeem
the face value of the note. Transactions involving financial
instruments other than cash are usually trilateral or three-party
(buyer, seller, and bank) transactions, whereby the “notes” are
sent to the merchant, who immediately sends them directly to the
digital bank. The bank verifies the
validity of these “notes” and that they have not been spent before.
The account of the merchant is credited. In this case, every “note”
Figure 13.1 Detection of double spending
can be used only once. In many business situations, the bilateral
transaction is not feasible because of the potential for double 
spending, which is equivalent to bouncing a check. Double One drawback of e-cash is its inability to be easily divided into
spending becomes possible because it is very easy to make copies smaller amounts. It is often necessary to get small denomination
of the e-cash, forcing banks and merchants to take extra change in business transactions. A number of variations have
precautions. To uncover double spending, banks must compare been developed for dealing with the “change” problem. For the
the note passed to it by the merchant against a database of spent bank to issue users with enough separate electronic “coins” of
notes .Just as paper currency is identified with a unique serial various denominations would be cumbersome in communication
number, digital cash can also be protected. The ability to detect and storage. So would a method that required payees to return
double spending has to involve some form of registration so extra change. To sidestep such costs, customers are issued a single
that all “notes” issued globally can be uniquely identified. However, number called an “open check” that contains multiple
this method of matching notes with a central registry has problems denomination values sufficient for transactions up to a prescribed
in the on-line world. For most systems, which handle high volumes limit. At payment time, the e-cash software on the client’s computer
of micro payments, this method would simply be too expensive. would create a note of the transaction value from the “open check.”
In addition, the problem of double spending means that banks


 
Let’s see how the business organizations gain from e-cash and then governments might be provoked into trying to clamp down
how sometimes it can create problems. on it. Because of these obstacles, e-cash in its early forms may be
denominated in single currencies and exchanged at conventional

market rates.
Electronic cash fulfills two main functions: as a medium of
exchange and as a store of value. Digital money is a perfect medium Next we will see the risks involved while doing the transactions
of exchange. By moving monetary claims quickly and by effecting involving the use of e-cash.
instant settlement of transactions, e-cash may help simplify the 
complex interlocking credit and liabilities that characterize today’s Operational risk associated with e-cash can be mitigated by
commerce. For instance, small businesses that spend months imposing constraints, such as limits on
waiting for big customers to pay their bills would benefit hugely
(1) the time over which a given electronic money is valid,
from a digital system in which instant settlement is the norm.
Instant settlement of micro payments is also a tantalizing (2) how much can be stored on and transferred by electronic
proposition. money
The controversial aspects of e-cash are those that relate to the (3) the number of exchanges that can take place before a money
other role, as a store of value. Human needs tend to require that needs to be redeposit with a bank or financial institution,
money take a tangible form and be widely accepted, or “legal tender”. and
In most countries, a creditor by law cannot refuse cash as settlement (4) the number of such transactions that can be made during a
for a debt. With the acceptability of cash guaranteed by law, most given period of time.
people are willing to bank their money and settle many of their These constraints introduce a whole new set of
bills by checks and debits, confident that, barring a catastrophe, implementation issues For example, time limits could be set
they can obtain legal tender (cash) on demand. If e-cash had to be beyond which the electronic money, would expire and become
convertible into legal tender on demand, then for every unit there worthless. The customer would have to redeem or exchange the
would have to be a money prior to the expiration deadline. For this feature to work;
unit of cash reserved in the real economy: or, to look at it the electronic money would have to be time-stamped, and time would
other way round, there would be cash in the real world for which have to be synchronized across the network to some degree of
digital proxies were created and made available. This creates precision. The objective of imposing constraints is to limit the
problems, because in an efficient system, if each e-cash unit issuer’s liability. A maximum upper limit could be imposed on
represents a unit of real cash, then positive balances of e-cash will the value that could be assigned to any single transaction or that
earn no interest; for the interest they might earn would be offset could be transferred to the same vendor within a given period of
by the interest foregone on the real cash that is backing them. time. Since the user’s computer could be programmed to execute
The enormous currency fluctuations in international finance small transactions continuously at a high rate over the network, a
pose another problem. On the Internet, the buyer could be in strategy of reporting transactions over a certain amount would be
Mexico and the seller in the United States. How doyou check-that ineffective for law enforcement. However, a well-designed system
the party in Mexico is giving a valid electronic currency that has could enforce a policy involving both transaction size and value
suitable backing? Even if it were valid today, what would happen with time. For example, an “anonymous coin-purse” feature might
if a sudden devaluation occurs such as the one in December 1994 be capable of receiving or spending no more than $500 in any
where the peso was devalued 30 percent overnight. Who holds twenty-four hour period. Alternatively, the “rate ceiling” for the
the liability, the buyer or the seller? These are not technological next twenty-four hours could be made dependent on the rate of
issues but business issues that must be addressed for large-scale use or on the number of exchanges that could be permitted before
bilateral transactions to occur. Unless, we have one central bank any electronic money would have to be redeposit in a bank or
offering one type of electronic currency, it is very difficult to see e- financial institution and reissued.
cash being very prominent except in narrow application domains. Finally, exchanges could also be restricted to a class of services or
From a banker’s point of view, e-cash would be a mixed blessing. goods (e.g., electronic benefits could be used only for food,
Because they could not create new money via lending in the digital clothing, shelter, or educational purposes). The exchange process
world, banks would see electronic money as unproductive. They should allow payment to be withheld from the seller upon the
might charge for converting it, or take a transaction fee for issuing buyer’s instructions until the goods, or services are delivered within
it, but on-line competition would surely make this a low-profit a specified time in the future.
affair. In the short term, banks would probably make less from Conversely, it should allow delivery to be withheld upon the seller’s
this new business than they would lose from the drift of customers instructions until payment is received. The next section deals with
away from traditional services. It seems unlikely that e-cash would the legal aspects of e-cash and the impact of e-cash on taxation.
be allowed to realize its potential for bypassing the transaction 
costs of the foreign exchange market. If you pay yen for e-cash in Electronic cash will force bankers and regulators to make tough
Osaka and buy something from a merchant based in New York choices that will shape the form of lawful commercial activity
who cashes them for francs, a currency conversion has taken place. related to electronic commerce. As a result of the very features that
That, however, is an activity toward which most governments feel make it so attractive to many, cash occupied an unstable and
highly defensive; and if e-cash started to bypass regulated foreign uncomfortable place within the existing taxation and law
exchange markets by developing its own gray market for settlement,


 
enforcement systems. Anonymous and virtually untraceable, cash
transactions today occupy a place in a kind of underground
economy. This underground economy is generally confined to
relatively small scale transactions because paper money in large 
quantities is cumbersome to use and manipulate-organized crime  One drawback of e-cash is its inability to be easily divided
being the obvious exception. As long as the transactions fare into smaller amounts.
small in monetary value, they are tolerated by the government as  One of the business issues while using Electronic Cash is
an unfortunate but largely insignificant by-product of the modern that it can’t take tangible form.
commercial .state. As transactions get larger the government
 The enormous currency fluctuations in international finance
becomes more suspicious and enlists the aid of the banks, through
pose another problem in business while using e-cash
the various currency reporting laws, in reporting large
disbursements of cash so that additional oversight can be ordered.  Operational risk associated with e-cash can be mitigated by
imposing constraints, such as limits on

Transaction based taxes (e.g., sales taxes) account for a significant (1)the time over which a given electronic money is valid,
portion of state and local government revenue. But if e-cash really (2) how much can be stored on and transferred by
is made to function the way that paper money does, payments we electronic money
would never think of making in cash-to buy a new car, say, or as (3)the number of exchanges that can take place before a
the down payment on a house-could be made in this new form money needs to be redeposit with a bank or financial
of currency because there would be no problem of bulk and no institution, and
risk of robbery. The threat to the government’s revenue flow is a (4)the number of such transactions that can be made
very real one, and officials in government are starting to take during a given period of time.
cognizance of this development and to prepare their responses.
 The use of e-cash can cause threat to the government’s
To prevent an underground economy, the government through revenue flow.
law may prevent a truly anonymous and untraceable e-cash system
from developing. But that raises its own problems because the 
vision of “Big Brother” rears its ugly head. Just as powerful 1. What all are the risk factors associated with E-cash?
encryption schemes permit the design of untraceable e-cash 2. What are bilateral and trilateral transactions?
systems, so, too, do powerful electronic record-keeping tools permit
3. How e-cash effect the government revenues?
the design of traceable systems-systems in which
all financial transactions are duly recorded in some database,
allowing those with access to know more about an individual
than anyone could know today.Anything that makes cash
substantially easier to use in a broader range of transactions holds
the potential to expand this underground economy to pro-
portions posing ever more serious threats to the existing legal
order. Under the most ambitious visions of e-cash, we would see
a new form of currency that could be freely passed off from one
computer to another with no record, yet incapable of being forged.
A consumer could draw such e-cash electronically from his or her
bank. The bank would have a record of that transaction, just as a
withdrawal or check is recorded now. But after that, the encrypted
e-cash file could be handed off without the knowledge of anyone
but the par-ties to the transaction.
However, as the politics and business play out, the technology is
forcing legal, as issues to be reconsidered. The question e-cash
poses is not, “Should the law take notice of this development?”but
rather, “How can it not?”
By impacting revenue-raising capabilities, e-cash cannot escape
government scrutiny and regulation; but it is going to take some
serious thinking to design a regulatory scheme that balances
personal privacy, speed of execution, and ease of use. Without a
functioning system, what the government will do remains a mystery.
Moreover, it is not even clear yet that the market as a whole will
adopt an anonymous e-cash standard. For now, we are mainly
watching and trying to educate ourselves about the likely path of
the transition to electronic cash.


 



 A user’s digital “signature” is used to create one ticket-a check-


 Introduction which the seller’s digital “endorsement” transforms into
 Discuss Electronic cheque, smart card, Credit Cards another-an order to a bank computer for fund transfer. Subsequent
 Advantages of Electronics cheques endorsers add successive layers of information onto the tickets,
precisely as a large number of banks may wind up stamping the
 Electronic Purses and Debit Cards
back of a check along its journey through the system.
 Summary
 Exercise

After this lecture the students will be able to:
 Understand what is an “Electronic Check”
 Describe the use of Smart cards and Credit cards
Another type of Electronic Payment scheme that we are going to
discuss today is “Electronic Checks”. This scheme is basically for
those people who don’t prefer to pay by cash.

Electronic checks are another form of electronic tokens. They are
designed to accommodate the many individuals and entities that
Figure 14.1 Payment transaction sequence in an electronic check
might prefer to pay on credit or through some mechanism other
system
than cash. In the model shown in Fig. 14.1, buyers must
Let’s see the advantages of Electronic checks.
register with a third-party account server before they are able to
write electronic checks. The account server also acts as a billing Electronic checks have the following advantages:
service. The registration procedure can vary depending on the  They work in the same way as traditional checks, thus
particular account server and may require a credit card or a bank simplifying customer education.
account to back the checks. Once registered, a buyer can then contact  Electronic checks are well suited for clearing micro payments;
sellers of goods and their use of conventional cryptography makes it much faster
services. To complete a transaction, the buyer sends a check to the than systems based on public-key cryptography e-cash).
seller for a certain amount of money. These checks may be sent  Electronic checks create float and the availability of float is an
using e-mail or other transport methods. When deposited, the important requirement for commerce. The third-party
check authorizes the transfer of account balances from the account accounting server can make money by charging the buyer or
against which the check was drawn to the account to which the seller a transaction fee or a flat rate fee, or if can act as a bank
check was deposited. The e-check method was deliberately created and provide deposit accounts and make money on the
to work in much the same way as a conventional paper check. An deposit account pool.
account holder will issue an electronic document that contains the  Financial risk is assumed by the accounting server and may
name of the payer, the name of the financial institution, the result in easier acceptance. Reliability and scalability are
payer’s account number, the name of the payee and amount of provided by using multiple accounting servers. There can be
the check. Most of the information is in uncoded form. Like a an inter account server protocol to allow buyer and seller to
paper check, an e-check will bear the digital equivalent of a signature: “belong” to different domains, regions, or countries. You
a computed number that authenticates the check as coming from all must agree that the major issue of concern while doing
the owner of the account. And, again like a paper check, an e-check paying is security. In the next section we will discuss one of
will need to be endorsed by the payee, using another electronic the Electronic Payment Systems that is more secure as
signature, before the check can be paid. Properly signed and compared to the above discussed schemes.
endorsed checks can be electronically exchanged between financial
institutions through electronic clearinghouses, with the 
institutions using these endorsed checks as tender to settle accounts. 
The enormous potential of electronic tokens is currently stunted
The specifics of the technology work in the following manner:
by the lack of a widely accepted and secure means of transferring
On receiving the check, the seller presents it to the accounting
money on-line. In spite of the many prototypes developed, we
server for verification and payment. The accounting server verifies
are a long way from a universal payment system because merchants
the digital signature on the check using any authentication scheme.


 
and banks have to be signed up and a means has to be developed  Multiple access options at multiple locations using multiple
to transfer money. Such a system moreover must be robust and device types, such as an automated teller machine, a screen
capable of handling a large number of transactions and will require phone, a personal computer, a personal digital assistant
extensive testing and usage to iron out all the bugs. (PDA), or interactive TVs Companies are trying to
In the meantime, thousands of would-be sellers of electronic incorporate these services into a personalized banking
commerce services have to pay one another and are actively looking relationship for each customer. They can package financial
for payment substitutes. One such substitute is the smart card. and non financial services with value-added programs to
Smart cards have been in existence since the early 1980s and hold enhance convenience, build loyalty and retention, and attract
promise for secure transactions using existing infrastructure. Smart new customers. Banks are also attempting to customize
cards are credit and debit cards and other card products enhanced services on smart cards, offering a menu of services similar
with microprocessors capable of holding more information than to those that come up on ATM screens. As with credit
the traditional magnetic stripe. The chip, at its current state of cards/banks may link up with health care
development, can store significantly greater amounts of data, providers,telephone companies, retailers, and airlines to offer
estimated to be 80 times more than a magnetic stripe. Industry frequent shopping and flyer programs and other services.
observers have predicted that, by the year 2000, one-half of all 
payment cards issued in the world will have embedded Despite their increasing flexibility, relationship-based cards are credit
microprocessors rather than the simple magnetic stripe. based and settlement occurs at the end of the billing cycle. There
The smart card technology is widely used in countries such as remains a need for a financial instrument to replace cash. To meet
France, Germany, Japan, and Singapore to pay for public phone this need, banks, credit card companies, and even government
calls, transportation/ and shopper loyalty programs. The idea has institutions are racing to introduce “electronic purses,” wallet-
taken longer to catch on in the United States, since a highly reliable sized smart cards embedded with programmable microchips that
and fairly inexpensive telecommunications system has favored store sums of money for people to use instead of cash for
the use of credit and debit cards. Smart cards are basically of two everything from buying food, to making photocopies, to paying
types: subway fares.
 Relationship-based smart credit cards 
 Electronic purses. Electronic purses, which replace money, 
are also known as debit cards and electronic money. After the purse is loaded with money, at an ATM or through the
 use of an inexpensive special telephone, it can be used to pay for,
Financial institutions worldwide are developing new methods to say, candy in a vending machine equipped with a card reader. The
maintain and expand their services to meet the needs of increasingly vending machine need only verify that a card is authentic and there
sophisticated and technically smart customers, as well as to meet is enough money available for a chocolate bar. In one second, the
the emerging payment needs of electronic commerce. Traditional value of the purchase is deducted from the balance on the card
credit cards are fast evolving into smart cards as consumers demand and added to an e-cash box in the vending machine. The remaining
payment and financial services products that are user-friendly, balance on the card is displayed by the vending machine or can be
convenient, and reliable. checked at an ATM or with a balance-reading device. Electronic
A relationship-based smart card is an enhancement of existing purses would virtually eliminate fumbling for change or small
card ser-vices and/or the addition of new services that a financial bills in a busy store or rush-hour toll booth, and waiting for a
institution delivers to its customers via a chip-based card or other credit card purchase to be approved. This allows customers to pay
device. These new services may include access to multiple financial for rides and calls with a prepaid card that “remembers” each
accounts, value-added marketing programs, or other information transaction. And when the balance on an electronic purse is
cardholders may want to store on their card. The chip-based card depleted, the purse can be recharged with more money. As for the
is but one tool that will help alter mass marketing techniques to vendor, the receipts can be collected periodically in person—or,
address each individual’s specific financial and personal more likely, by telephone and transferred to a bank account. While
requirements. Enhanced credit cards store cardholder information the technology has been available for a decade, the cards have been
including name, birth date, personal shopping preferences, and relatively expensive, from $5 to $10. Today the cards cost $1, and
actual purchase records. special telephones that consumers could install at home to recharge
the cards are projected to cost as little as $50. A simple card reader
This information will enable merchants to accurately track consumer would cost a merchant less than $200.
behavior and develop promotional programs designed to increase
shopper loyalty.Relationship-based products are expected to offer 
consumers far greater options, including the following:  Electronic checks are another form of electronic tokens. They
 Access to multiple accounts, such as debit, credit, are designed to accommodate the many individuals and
investments or stored value for e-cash, on one card or an entities that might prefer to pay on credit or through some
electronic device mechanism other than cash.
 A variety of functions, such as cash access, bill payment,  Electronic checks are well suited for clearing micro payments;
balance inquiry, or funds transfer for selected accounts their use of conventional cryptography makes it much faster
than systems based on public-key cryptography


 
 Electronic checks create float and the availability of float is an
important requirement for commerce
 Smart cards are credit and debit cards and other card products
enhanced with microprocessors capable of holding more
information than the traditional magnetic stripe
 Smart cards are basically of two types:
Relationship-based smart credit cards and Electronic purses

1. What are electronic cheques ? How they are different from
traditional cheques?
2. How electronic purses work?



 



 First USA Merchant Services in Dallas for card processing


 Introduction services.
 Credit Card-Based Electronic Payment Systems Interactive Transactions Partners Joint venture of EDS,
 Encryption in Credit Cards France Telecom, USWest, and H&R Block for home banking and
 Summary electronic payment services.
 Exercise MasterBanking A home banking service started by MasterCard
and Checkfree Corp., an on-line payments processor.

VISA :Interactive VISA International acquired US Order, a
After this lecture the students will be able to:
screen phone manufacturer. VISA Interactive has signed up more
 Understand why payment by Credit card is more secure than
than 30 banks, including NationsBank.
other Electronic Payment Systems
Block Financial :This H&R Block unit owns Managing Your
To avoid the complexity associated with digital cash and electronic
checks, consumers and vendors are also looking at credit card Money personal-finance software and CompuServe. Provides
payments on the Internet as one possible time-tested alternative. electronic-banking services for VISA member banks.
Let’s discuss how the payment is made online using credit cards. Prodigy Teaming up with Meridian Bank and others to offer PC-
based home banking via its online service.

 Table 15.1 Players in On-Line Credit Card Transaction Processing
There is nothing new in the basic process. If consumers want to Let’s see how the payment by credit card is more secure as compared
purchase a product or service, they simply send their credit card to other schemes.
details to the service provider involved and the credit card

organization will handle this payment like any other.
Encryption is instantiated when credit card information is entered
We can break credit card payment on on-line networks into into a browser or other electronic commerce device and sent securely
three basic categories: over the net-work from buyer to seller as an encrypted message.
1. Payments using plain credit card details. The easiest This practice, however, does not meet important requirements
method of payment is the exchange of unencrypted credit for an adequate financial system, such as non refutability, speed,
cards over a public network such as telephone lines or the safety, privacy, and security. To make a credit card transaction truly
Internet. The low level of security inherent in the design of secure and nonrefutable, the following sequence of steps must
the Internet makes this method problematic (any snooper occur before actual goods, services, or funds flow:
can read a credit card number, and programs can be created to 1. A customer presents his or her credit card information (along
scan the Internet traffic for credit card numbers and send the with an authenticity signature or other information such as
numbers to its master). Authentication is also a significant mother’s maiden name) securely to the merchant.
problem, and the vendor is usually responsible to ensure
2. The merchant validates the customer’s identity as the owner
that the person using the credit card is its owner. Without
of the cred-it card account.
encryption there is no way to do this.
3. The merchant relays the credit card charge information and
2. Payments using encrypted credit card details. It would
signature to its bank or on-line credit card processors.
make sense to encrypt your credit card details before sending
them out, but even then there are certain factors to consider. 4. The bank or processing party relays the information tot the
One would be the cost of a credit card transaction itself. Such customer’s; bank for authorization approval.
cost would prohibit low-value payments (micro payments) 5. The customer’s bank returns the credit card data, charge
by adding costs to the transactions. authentication, and authorization to the merchant.
3. Payments using third-party verification. One solution to In this scheme, each consumer and each vendor generates a public
security and verification problems is the introduction of a key and a secret key. The public key is sent to the credit card company
third party: a company that collects and approves payments and put on its public key server. The secret key is reencrypted with
from one client to another. After a certain period of time, a password, and the unencrypted version is erased. To steal a credit
one credit card transaction for the total accumulated amount card, a thief would have to get access to both a consumer’s encrypted
is completed. secret key and password. The credit card company sends the
First Virtual Holdings:San Diego-based start-up offers an consumer a credit card number and a
Internet payment system to process credit card transactions credit limit. To buy something from vendor X, the consumer
on the Internet. It’s allied with ED& for data processing and sends vendor X the message, ‘It is now time T. I am paying Y


 
dollars to X for item Z,” then the consumer uses his or her believe will be a fast and efficient way to buy information on-
password to sign the message with the public key. The vendor will line:
then sign the message with its own secret key and send it to the 1. The consumer acquires an OTPP account
credit card company, which will bill the consumer for Y dollars number by filling out a registration form.
and give the same amount (less a fee) to X. (See Fig.15.1) This will give the OTPP a customer
Nobody can cheat this system. The consumer can’t claim that he information profile that is backed by a
didn’t agree to the transaction, because he signed it (as in everyday traditional financial instrument such as a
life). The vendor can’t invent fake charges, because he doesn’t have credit card.
access to the consumer’s key. He can’t submit the same charge 2. To purchase an article, software, or other
twice, because the consumer included the precise time in the information online, the consumer requests
message. To become useful, credit Card systems will have to the item from the merchant by quoting her
develop distributed key servers and card checkers. OTPP account number. The purchase can
Otherwise, a con-centrated attack on these sites could bring the take place in one of two ways: The consumer
system to a halt. can automatically authorize the “merchant”
Support for Privacy Enhanced Mail (PEM) and Pretty Good Privacy via browser settings to access her OTPP
(PGP) encryption has been built into several browsers. Both of account and bill her, or she can type in the
these schemes can be substantially bolstered with the addition of account information.
encryption to defeat snooping attacks. Now any vendor can create 3. The merchant contacts the OTPP payment
a secure system that accepts credit card numbers in about an hour. server with the customer’s account number.
4. The OTPP payment server verifies the
customer’s account number of; the vendor
and checks for sufficient funds.
5. The OTPP payment server sends an electronic
message to the buyer. This message could be
an automatic WWW form that is sent by the
OTPP server or could be a simple e-mail.
The buyer responds to the form or e-mail in
one of three ways: Yes, I agree to pay; No, I
will not pay; or Fraud, I never asked for this.
6. If the OTPP payment server gets a Yes from
the customer, the merchant is informed and
the customer is allowed to download the
material immediately.
7. The OTPP will not debit the buyer’s account
until it receives confirmation of purchase
completion. Abuse by buyers who receive
information or a product and decline to pay
can result in account suspension.To use this
Figure 15.1 Processing payments using encrypted credit cards
system, both customers and merchant must
 be registered with the OTPP. An on-line
In third-party processing, consumers register with a third party on environment suitable for micro transactions
the Internet to verify electronic micro transactions. Verification will require that many of the preceding steps
mechanisms can be designed with many of the be automated. World Wide Web browsers
attributes of electronic tokens, including anonymity. They differ capable of encryption can serve this purpose.
from electronic token systems in that Here the two key servers are merchant server
(1) they depend on existing financial instruments and and payment server (see Fig. 15.2). Users first
establish an account with the payment server.
(2) they require the on-line involve-ment of at least one
Then, using a client browser, a user makes a
additional party and, in some cases, multiple parties to
purchase from a merchant server by clicking
ensure extra security. However, requiring an on-line third-
on a payment URL (hyper-Links), which is
party connection for each transaction to different banks could
attached to the product on a WWW page.
lead to processing bottlenecks that could undermine the goal
Unknown to the customer, the payment
of reliable use. Companies that are already providing third-
URL encodes the following details of
party payment are referred to as on-line third-party processors
purchase: price of item, target URL (for hard
(OTPPs) since both methods are fairly similar in
goods, this URL is usually an order status
nature.OTPPs have created a six-step process that they
page; for information goods, this URL


 
points to the information customers are
purchasing), and duration (for information
goods, it specifies how long customers can
get access to the target URL).
Payment URLs send the encoded information to the payment
server. In other words, the payment URL directs the customer’s
browser to the payment server, which authenticates the user by
asking her for the account number and other identification
information. If the information entered by the customer is valid
and funds are available, the payment server processes the payment
transaction. The payment server then redirects the user’s browser
(using an HTTP redirect operation) to the purchased item with an
access URL, which encodes the details of the payment transaction
(the amount, what was purchased, and duration). The access URL
is effectively-a digital invoice that has been stamped “paid” by the
payment server. It provides evidence to the merchant that the user
has paid for the information and provides a receipt that grants the
user access. The access URL is the original target URL sent by the
merchant’s server, with additional fields that contain details of
the access: expiration time (optional), user’s address (to prevent
sharing). The merchant runs an HTTP server that is modified to
process access URLs (HTTP redirects). The server checks the
validity of the URL and grants access if the expiration time has
not passed. If access has expired, the server returns a page that
may give the user an opportunity to repurchase the item. The Figure 15.2 On-line payment process using a third-party processor
payment system can also generate access URLs in a format that can
be parsed by CGI scripts running on an unmodified HTTP server. 
Once a customer is authenticated, the payment is automatically  Electronic checks are another form of electronic tokens. They
processed. The payment server implements a modular payment are designed to accommodate the many individuals and
architecture where accounts can be backed by different types of entities that might prefer to pay on credit or through some
financial instruments, credit card accounts, prepaid accounts, billed mechanism other than cash.
accounts, debit cards, and other payment mechanisms. For credit  The enormous potential of electronic tokens is currently
card accounts, the payment system has a real-time connection to stunted by the lack of a widely accepted and secure means of
the credit card clearing network. The system can authorize payment transferring money on-line.
in real time based on the profile of the transaction and the user.  Smart cards are credit and debit cards and other card products
The system supports small transactions by accumulating them enhanced with microprocessors capable of holding more
and settling them in information than the traditional magnetic stripe.
aggregate. All transactions are recorded in a user’s on-line statement.  Smart cards are basically of two types: Relationship-based
The statement is a summary of recent purchases, and each smart credit cards and Electronic purses.
summary line is a hypertext link. For information
 Encryption is instantiated when credit card information is
goods, this is a link back to the purchased item. If access has entered into a browser or other electronic commerce device
expired, the merchant’s server will give the user the opportunity and sent securely over the net-work from buyer to seller as an
to repurchase the item. For non information goods, the link may encrypted message.
point to an order status or summary page.

1. What are smart cards?
2. How electronic checks are differ from credit card?
3. How On-line third-party processors (OTPPs) differ from
electronic token system?


 



 The complexity of credit card processing takes place in the


 Introduction verification phase, a potential bottleneck. If there is a lapse in
 Advantages and disadvantages of Credit Cards time between the charging and the delivery of goods or services
(for example, when an airline ticket is purchased well in advance
 Managing Credit Risk
of the date of travel), the customer verification process is simple
 Summary because it does not have to be done in real time. In fact, all the
 Exercise relaying and authorizations can occur after the customer-merchant
transaction is completed, unless the authorization request is denied.

If the customer wants a report (or even a digital airline ticket),
After this lecture the students will be able to:
which would be downloaded into a PC or other information
 Understand the advantages and disadvantages if using appliance immediately at the time of purchase, however, many
Credit cards message relays and authorizations take place in real time while the
 Describe the infrastructure required to support Credit Card customer waits. Such exchanges may require many sequence-specific
Processing operations such as staged encryption and decrying and exchanges
In the previous lectures we have learnt a lot about the use of of cryptographic keys.
Credit cards. Also we have seen the security aspect of using the Encryption and transaction speed must be balanced,however,
credit cards. Today we will take a look at what are the Business as research has show that on-line users get very impatient and
Pros and Cons of Credit Card-Based Payment. typically wait for 20 seconds before pursuing other actions. Hence,
Third-party processing for credit cards, entails a number of pros on-line credit card users must find the process to be accessible,
as well as cons These companies are chartered to give credit accounts simple, and fast. Speed will have design and cost implications, as
to individuals and act as bill collection agencies for businesses. it is a function of network capabilities, computing power, available
Consumers use credit cards by presenting them for payment and at every server, and the specific form of the transaction. The
then paying an aggregate bill once a month. Consumers pay either infrastructure supporting the exchange must be reliable. The user
by flat fee or individual transaction charges for this service. must feel confident that the supporting payment infrastructure
Merchants get paid for the credit card drafts that they submit to will be available on demand and that the system will operate
the credit card company. Businesses get charged a transaction charge reasonably well regardless of component failures or system load
ranging from 1 percent to 3 percent for each draft submitted. conditions. The builders and providers of this infrastructure are
aware of customer requirements and are in fierce competition to
Credit cards have advantages over checks in that the credit card
fulfill those needs.
company assumes a larger share of financial risk for both buyer
and seller in a transaction. Buyers can sometimes dispute a charge There is also no question that banks and other financial institutions
retroactively and have the credit card company act on their behalf. must resolve many key issues before offering on-line processing
Sellers are ensured that they will be paid for all their sales-they services in e-com-merce markets. Should they go it alone or form
needn’t worry about fraud. This translates into a convenience for a partnership- and with whom? What technology to use? What
the buyer, in that credit card transactions are usually quicker and services to offer?Which consumers are interested and who should
easier than check (and sometimes even cash) transactions. be targeted? A wide variety of organizations are jumping into the
fray. Regional electronic funds transfer (EFT) networks, credit card
One disadvantage to credit cards is that their transactions are not
associations, equipment vendors, data processors, software
anonymous, and credit card companies do in fact compile valuable
developers, bill payment companies, and telecommunications
data about spending habits.
providers are all wooing banks with the goal of building the
Record keeping with credit cards is one of the features transaction processing infra-structure on the Internet .
consumers value most because of disputes and mistakes in
billing. Disputes may arise because different services may have 
different policies. For example, an information provider might Competition among these players is based on service quality, price,
charge for partial delivery of a file (the user may have abandoned processing system speed, customer support, and reliability. Most
the session after reading part of the file), and a movie distributor third-party processors market their servicesdirectly to large regional
might charge depending on how much of the video or national merchants rather than through financial institutions
or independent sales organizations.
had been downloaded. The cause of interrupted delivery needs to
be considered in resolving disputes (e.g., intentional customer 
action versus a problem in the network or provider’s equipment). (1) large initial capital requirements,
In general, implementing payment policies will be simpler when
payment is made by credit rather than with cash.


 
(2) ongoing expenses related to establishing and maintaining an magnetic tape. Given the intangible nature of electronic transactions
electronic transaction processing network, and dispute resolution relying solely on records, a general law of
(3) the ability to obtain competitively priced access to an existing payment dynamics and banking technology might be: No data
network, and need ever be discarded. The record feature is an after-the-fact
(4) the reluctance of merchants to change processors. What transcription of what happened, created without any explicit effort
exactly is at stake here? A lot. In the emerging world of by the transaction parties. Features of these automatic records
ecommerce,, the companies that own the transaction include
infrastructure will be able to charge a fee, much as banks do (1) permanent storage;
today with ATMs. This could be extremely profitable. (2) accessibility and traceability;
Microsoft, VISA, and other companies understand that they
(3) a pay-ment system database; and
have to do something. If they wait for a clear path to emerge,
it will be “too little too late.” They know all too well that (4) data transfer to payment maker, bank, or monetary
ecommerce transaction architectures (similar to MS-DOS or authorities.
Windows) on which other e-commerce applications are The need for record keeping for purposes of risk management
developed will be very profitable. conflicts with the transaction anonymity of cash. One can say that
Many companies are developing advanced electronic services for anonymity exists today only because cash is a very old concept,
home-based financial transactions, and software companies are invented long before the computer and networks gave us the
increasingly allying with banks to sell home banking. Eventually, ability to track everything. Although a segment of the payment-
the goal would be to offer everything from mutual funds to making public will always desire transaction anonymity, many
brokerage services over the network. Many banks are concerned believe that anonymity runs counter to the public welfare because
about this prospect and view it as an encroachment on their turf. too many tax, smuggling, and/or money laundering possibilities
After years of dabbling, mostly unsuccessfully, with remote exist. The anonymity issue raises the question: Can electronic
banking, banking is receiving a jarring message: Get wired or lose payments hap-pen without an automatic record feature?
customers. Many recent payment systems seem to be ambivalent on this
The traditional roles are most definitely being reshuffled, and point. For instance, the Mondex electronic purse touts equivalence
electronic payment on the Internet can have a substantial effect on with cash, but its electronic wallets are designed to hold automatic
transaction processing in the “real” (non electronic) world. records of the card’s last twenty transactions with a statement
According to some estimates, trans-action processing services built in. Obviously, the card-reading terminals, machines, or
telephones could all maintain records of all transactions and they
account, for as much as 25 percent of non interest income for
probably ultimately will. With these records, the balance on any
banks, so banks clearly stand to lose business. Why banks are on
smart card could be reconstructed after the fact, thus allowing for
the defensive is obvious if we look at banking in the last ten years.
additional protection against loss or theft. This would certainly
A decade ago, banks processed 90 percent of all bank card
add some value versus cash. In sum, anonymity is an issue that
transactions, such as VISA and MasterCard. Today, 70 percent of
will have to be addressed through regulation covering consumer
those transactions are processed by nonbanks such as First Data
protection in electronic transactions. There is considerable debate
Resources. If software companies and other interlopers become
on this point. An anonymous payment system without automatic
electronic toll-takers, banks could become mere homes for deposits,
record keeping will be difficult for bankers and governments to
not the providers of lucrative value-added services.
accept. Were the regulation to apply, each transaction would have
Even more worrisome, banks could lose the all-important direct to be reported, meaning it would appear on an account statement
link to be the customer’s primary provider of financial services making mistakes and disputes easier to resolve. However,
that lets them hawk profitable services. The effect of electronic customers might feel that all this record keeping is an invasion of
commerce on the banking industry has been one of total privacy resulting in slower than expected adoption of electronic
confusion. To be fair, things are happening so fast in this area that payment systems. The next risk involved is the privacy of the
it’s hard to keep up with it all. Let’s see some of the risks involved customer making a purchase.
in the Electronic Payment System.

 The electronic payment system must ensure and maintain privacy.
 Every time one purchases goods using a credit card, subscribes to
Virtually all electronic payment systems need some ability to keep a magazine or accesses a server, that information goes into, a
automatic records, for obvious reasons. From a technical database somewhere. Furthermore, all these records can be linked
standpoint, this is no problem for electronic systems. Credit and so that they constitute in effect a single dossier.This dossier would
debit cards have them and even the paper-based check creates an reflect what items were bought and where and when. This violates
automatic record. Once information has been captured one the unspoken laws of doing business: that the privacy of
electronically, it is easy and inexpensive to keep (it might even cost customers should be protected as much as possible. All details of
more to throw it away than to keep it). For example, in many a consumer’s payments can be easily be aggregated: Where, when,
transaction processing systems, old or blocked accounts are never and sometimes what the consumer buys is stored. This collection
purged and old transaction histories can be kept forever on of data tells much about the person and as such can conflict with
the individual’s right to privacy. Users must be assured that


 
knowledge of transactions will be confidential, limited only to the  Brokers. A “network banker”-someone to broker goods and
parties involved and their designated agents (if any).Privacy must services, settle conflicts, and facilitate financial transactions
be maintained against eavesdroppers on the network and against electronically-must be in place.
unauthorized insiders. The users must be assured that they cannot  One fundamental issue is how to price payment system
be easily duped, swindled, or falsely implicated in a fraudulent service. For example, should subsidies be used to encourage
transaction. This protection must apply throughout the whole users to shift from one form of payment to another, from
transaction protocol by which a good or service is purchased and cash to bank payments, from paper-’based to e-cash. The
delivered. This implies that, for many types of transactions, trusted problem with subsidies is the potential waste of resources,
third-party agents will be needed to vouch for the authenticity and as money may be invested in systems that will not be used.
good faith of the involved parties..
Thus investment in systems not only might not be recovered but
 substantial ongoing operational subsidies will also be necessary.
Credit or systemic risk is a major concern in net settlement systems On the other hand, it must be recognized that
because a bank’s failure to settle its net position could lead to a without subsidies, it is difficult to price all services affordably. ·
chain reaction of bank failures. The digital central bank must Standards. Without standards, the welding of different payment
develop policies to deal with this possibility. Various alternatives users into different networks and different systems is impossible.
exist, each with advantages and disadvantages. A digital central Standards enable interoperability, giving users the ability to buy
bank guarantee on settlement removes the insolvency test from and receive information, regardless of which bank is managing
the system because banks will more readily assume credit risks their money. None of these hurdles are insurmountable. Most
from other banks. Without such guarantees the development of will be jumped within the next few years. These technical problems,
clearing and experts hope, will be solved as technology is improved and
settlement systems and money markets-may be impeded. A experience is gained. The biggest question concerns how customers
middle road is also possible, for example, setting controls on will take to a paperless and (if not cashless) less-cash world.
bank exposures (bilateral or multilateral) and requiring collateral.

If the central bank does not guarantee settlement, it must define,
at least internally, the conditions and terms for extending liquidity  Credit cards have advantages over checks in that the credit
to banks in connection with settlement. card company assumes a larger share of financial risk for
both buyer and seller in a transaction.
Despite cost and efficiency gains, many hurdles remain to the
spread of electronic payment systems. These include several factors,  One disadvantage to credit cards is that their transactions are
many non technical in nature, that must be addressed before any not anonymous, and credit card companies do in fact
new payment method can be successful. Let’s see what are the compile valuable data about spending habits.
hurdles we have to pass for successful implementation of  Record keeping with credit cards is one of the features
Electronic Payment Systems. consumers value most because of disputes and mistakes in
billing.

 The electronic payment system must ensure and maintain
 Privacy. A user expects to trust in a secure system; just as the
privacy, security, Intuitive interfaces, Brokers and Standards.
telephone is a safe and private medium free of wiretaps and
hackers, electronic communication must merit equal trust. 
 Security. A secure system verifies the identity of two-party 1. What are the pros and cons of using Credit Cards for
transactions through “user authentication” and reserves electronic payment?
flexibility to restrict information/services through access 2. How can you ensure and maintain privacy, security in
control. Tomorrow’s bank robbers will need no getaway cars electronic payment.
just a computer terminal, the price of a telephone call, and a
little ingenuity. Millions of dollars have been embezzled by
computer fraud. No systems are yet fool-proof, although
designers are concentrating closely on security.
 Intuitive interfaces. The payment interface must be as easy to
use as a telephone. Generally speaking, users value
convenience more than anything.
 Database integration. With home banking, for example, a
customer wants to play with all his accounts. To date,
separate accounts have been stored on separate databases.
The challenge before banks is to tie these databases together
and to allow customers access to any of them while keeping
the data up-to-date and error free.


 



 
 Introduction Security schemes are adopted in protocols like SSL and SET. This
section explains the general-purpose protocol SSL. SET, tailored
 SSL protocol
to credit card payment on the Internet, will be explained in the
 Summary next section. Since SET is established on top of SSL, under-
 Exercise standing SSL is the foundation for understanding SET. The
 protocol Secure-HTTP (S-HTTP) applies SSL between Web servers
After this lecture the students will be able to: and browsers, which communicate by HTTP protocol.
 Describe the SSL protocol used in Electronic Payment The SSL protocol performs message exchanges as shown in Fig
System 17.1. Assume that the sender is Sally, and the receiver is Richard .
Today we will discuss the protocols used by various Electronic The steps of the process correspond to the numbers in Figure
Payment systems. You all must agree that the most common 17.1.
Internet payment method for the B2C EC is credit cards.However, 1. At Sally’s site, the message to be sent is hashed to a
a concern for customers is security while sending over the Internet, previously fixed length for message digest.
credit card information, including name, card number, and 2. The message digest is encrypted with Sally’s private signature
expiration date. Buyers also are concerned with privacy. They do key using an RSA algorithm, and the output is a digital
not want others to know who they are, or what they buy. They signature.
also want to be sure that no one will change their order and that 3. The digital signature and Sally’s certificate are attached to the
they are connected to the real vendor and not to an imposter. original message. In the meantime, a secret key using the
At present most companies use SSL (Secure Socket Layer) protocol DES algorithm at Sally’s computer encrypts the bundle with
to provide, security and privacy. This protocol allows customers the key.
to encrypt their order at their PC. However, this protocol does not 4. The symmetric key is encrypted with Richard’s public key,
provide customers all the protection they could have. Visa and which resides in Richard’s certificate, received in advance. The
MasterCard have jointly developed a more secure protocol, called result is a digital envelope.
SET (Secure Electronic Transaction).
5. The encrypted message and digital envelope are transmitted
Theoretically, it is a perfect protocol. For example, a typical difference to Richard’s computer over the Internet.
between SET and the widely used SSL is that SSL does not include
6. The digital envelope is decrypted with Richard’s private
customer certificate requiring special software (called digital wallet)
exchange key.
at the client site. SSL is built into the browser, so no special software
is needed. The Visa and Master-Card plan was to accept messages 7. Using the restored secret key, the delivered message is
only if they conformed to SET protocol. However, SET did not decrypted to the message, digital signature, and Sally’s
propagate as fast as most people expected because of its certificate.
complexity, slow response time, and the need to install the digital 8. To confirm the integrity, the digital signature is decrypted by
wallet in the customer’s computer. Sally’s public key (that resides in Sally’s certificate), obtaining
Most cyber banks and e-stores stayed with SSL protocol, even the message digest.
though some e-stores, like Wal-Mart Online, support both SSL 9. The delivered message is hashed to generate a message digest.
and SET protocols. Moreover, according to a survey by Forrest 10. The message digests obtained by steps 8 and 9, respectively,
Research, only 1 percent of electronic businesses plans to migrate are compared to confirm whether there was any change
to SET by 1999. during the transmission. This step confirms the integrity.
MasterCard said that the digital wallet would be distributed as
embedded soft-ware in the next version of Windows. However,
Visa decided not to wait. Thus, Visa agreed to offer a credit card
processing gateway embedded in the barebones SSL encryption
protocol. Wells Fargo, one of the largest Web banking companies
uses a SET-free payment processing service that adds certificates
to SSL data encryption. The certificates are stored in smart cards
that can be slipped into a special keyboard with a built-in slot.Is
SET a failure? Or should we just wait a little longer until the
digital wallet in the smart card is more widely used and SET
becomes easier for us?


 
2. The cardholder shows the card to a merchant whenever he or
she needs to pay for a product or service.
3. The merchant then asks for approval from the brand
company, and the transaction is paid by credit. The merchant
keeps a sales slip.
4. The merchant sells the slip to the acquiring bank and pays a
fee for the service. This is called a capturing process.
5. The acquiring bank requests the brand to clear for the credit
amount and gets paid. Then the brand asks for clearance to
the issuer bank.
6. The amount is transferred from issuer to brand. The same
amount is de-ducted from the cardholder’s account in the
issuing bank.

Fig 17.1 Electronic Credit Card System on the Internet


Credit cards are the most popular payment method for cyberspace
consumer shopping today.

Before exploring the process of using credit cards online, let’s
identify the players in the credit card system. They are:
1. The cardholder: a consumer or a corporate purchaser who
uses credit cards to pay merchants.
2. The merchant: the entity that accepts credit cards and offers
goods or services in exchange for payments.
3. The card issuer: a financial institution (usually a bank) that Fig 17.2 Credit Card procedure
establishes ac-counts for cardholders and issues credit cards. . In the conventional credit card system, the process just described
4. The acquirer: a financial institution (usually a bank) that is only partially automated, in the sen se that the disqualified card
establishes an ac-count for merchants and acquires the information is transmitted to the merchants on printed paper
vouchers of authorized sales slips. and requests for authorization are sometimes made by telephone
(in many countries). Moreover, merchants have to mail the paper
5. The card brand: bank card associations of issuers and
sales slips to the acquirer bank for capturing. However, the entire
acquirers (like Visa and MasterCard), which are created to
process must be fully auto-mated on the Internet in a secure
protect and advertise the card brand, establish and enforce
manner. That is why SET protocol was devised.
rules for use and acceptance of their bank cards, and provide
networks to connect the involved financial institutions. The 
brand authorizes the credit-based transaction and guarantees  At present most companies use SSL (Secure Socket Layer)
the payment to merchants. Sometimes, the issuing bank protocol to provide, security and privacy.
performs the business of the brand.
 SSL is built into the browser, so no special software is
 needed.
A typical process of using credit cards is shown in Figure 17.2. The  SET (Secure Electronic Transaction) is established on
procedure varies depending upon the agreement among the brand, top of SSL, under-standing SSL is the foundation for
issuer, and acquirer. The major steps in the process are: y I understanding SET.
1. Issue a credit card to a potential cardholder  A typical difference between SET and the widely used SSL is
 A potential cardholder requests an issuing bank, from in that SSL does not include customer certificate requiring
which the cardholder may have an account, the issuance of a special software (called digital wallet) at the client site.
card brand (like Visa or MasterCard).

 The issuing bank approves (or denies) the application.
1. Differentiate between SET and SSL.
 If approved, a plastic card is physically delivered to the
2. How the SSL protocol is used in electronic payment system?
customer’s address by mail.
 The card is activated as soon as the cardholder calls the bank
or initiation and signs the back of the card.


 



  Travel Advisory Reports, indicating countries which are


unsafe for travel
 Net travel is the largest retail e-commerce category
 Weekly Travel Bulletins, highlighting particularly dangerous
 The online travel market is projected to grow from $7.8
situations
billion in 1999 to $32.1 billion by 2004
 What should you do, e.g. keep a photocopy of your
 Combined travel sales for the two companies – passport’s identification page with you
Travelocity.com & Preview Travel – in the first half of 1999
 What should you bring with you, e.g. passport
was over $467 million
So here are some Leaders in Travel Industry………….. 
 No.1- Travelocity.com  Cheaper
Sabre Holdings Corp.’s Travelocity site will merge with  Less physical entities => less cost
another online travel leader Preview Travel to form the largest  Less employees => less salary expense
online travel company.The new company, known as  A survey by E-Travel reveals that companies that
Travelocity.com, will have 17 million members and more adopt online-booking software can reduce travel costs
than $1 billion in projected 1999 travel sales. by as much as 20 percent
 No. 2 – Expedia of Microsoft Corp.  More Choices
 Others  By comparison, you can always have the lowest price
 Priceline : http://www.priceline.com  More Convenient
 Internet Travel Network : http://www.itn.com  Stay at home and get everything settled
 CheapTickets: http://www.cheaptickets.com  n Less Misleading !!!
Following are the Services Provided Online by
 Have your judgment objectively & independently
Travelocity.com :
 No misleading by the customer assistance of the travel
 Ticket Booking
agencies
 Airplane ticket, Train ticket, Cruise ticket…
 Choose the best one by comparison
 More choices

 Better deals
 31% of 5,300 Internet users surveyed this year made online
 Greater convenience
reservations at travel-related Web sites, according to NPD
 Car Rental Online Research
 Accommodation Reservation  Airline, hotel and car rental sites are seeing more bookings
 Coach Service online than ever before
 Provides transportation from airport/railroad station to  “Heavy bookers”, those who tend to travel more frequently
hotel, or hotel to airport/railroad station, or hotel to for business and pleasure and have over two years of online
meeting place experience, more prefer to travel online
 Destination Information Nevertheless
 Weather  Travel agents still have a lot more business than their online
 History & Culture counterparts in 1998
 Famous Scenes …  $128 billions vs. $2 billions
 Destination Activities  In addition, 80% of all airline bookings and 98% of all
 Ongoing activities information & ticket booking, cruise bookings are made through travel agents
including sports & entertainment 
 Scenes ticket booking (e.g. zoo entry ticket)  People will go to an expert’s opinion before making decision,
 Currency Exchange (International Travel) so 56% of the purchasers completed travel reservations with
 Law Consulting (International Travel) their agent after visiting a travel-related web site
 Country-specific Travel Information Reports  Meanwhile, the agents’ members use the Internet to provide
better advice for customers


 
 Travel agents are going away from having a storefront to
doing business via the Web, e-mail, fax and 800 numbers
– Holding tightly the customers by all means
 Security & Privacy concerning discourages some new
Internet users from booking travel online
 Need for human contact and ensuring travel information
is correct prevent some more experienced users from
reserving on the Web
 Some Web sites are hard to navigate
 Services are sometimes not reliable

 Travel suppliers are bypassing the online travel companies
to provide travel booking directly
 48% of the almost $1 billion in online travel purchases in
1997 were booked through travel suppliers, primarily the
airlines
 Airlines steadily cutting commissions to intermediaries
like Preview and Expedia

 The major online booking sites remain optimistic, seeing
hefty profits in keeping a sizable piece of a rapidly
growing pie
 1997’s $911 million online sales is projected to grow to
$11.7 billion by 2002 – a 12-fold increase

 To hang on to their market share, the key players are
making business with the most popular web sites
Popular Web Site Online Travel Player
Yahoo, Netscape Travelocity
AOL, Excite, Lycos Preview Travel
Microsoft, Inforseek, MSN.com Expedia
Alta Vista The Trip

 Web-based travel is the largest retail eCommerce category
 Have an encouraging predict
 But not increase as fast as hoped
 Now being slower to capture business from offline
agents than some observers had imagined
 But they’re making progress & still have encouraging
prospects


 



 
 Introduction Now the question is where to store the electronic wallet. To achieve
 SET protocol perfect security, the electronic wallet has to be downloaded into
the buyer’s personal computer. Since I the
 Difference between SSL & SET protocol
interoperability of the cardholder’s digital walle t with any
 Summary
merchant’s software is essential, a consortium of companies (Visa,
 Exercise MasterCard, JCB, and American Express) I has established a
 company called SETCo (Secure Electronic Transaction LLC 1999).
After this lecture the students will be able to: This company performs the interoperability test and issues a SET
 Describe SET protocol used in Electronic Payment System Mark as a confirmation of interoperability. IBM, Netscape,
Microsoft, VeriSign, Tandem, and MetaLand provide such
 Compare SSL and SET protocols for Electronic Payment
interoperable digital wallets.
 
SET protocol was initially designed by Visa and MasterCard in If the private key and corresponding public key in a certificate are
1997 and has evolved since then. SET protocol meets the four physically stored in I the customer’s personal computer, the
security requirements for EC as SSL does: authentication, customer can use the certificate only at the I computer. However,
encryption, integrity, and non repudiation. In addition, SET if the certificate is stored in an IC card, the wallet can work if the IC
defines the message format, certificate format, and procedure of card is inserted into a card reader attached to a computer. Therefore,
message exchange as depicted in Figure 18.1. In SET protocol, storing I the certificate in IC card seems to be the safest method.
there are four entities: cardholder, merchant, CA, and payment The initial SET 1.0 an- I nounced in May 1997 did not include
gateway, as depicted in Figure 18.2. The roles of issuer, acquirer, standards about integrating with IC cards.
and brand are beyond SET protocol specifications. The role of
payment gateway is to connect the Internet and proprietary SET 1.0 may include standards for integration with IC cards. C-
networks of banks. Each participating entity needs its own SET (Chip-SET) protocol attempts to integrate SET protocol
certificate. To keep the consumer’s certificate in his or her personal with the EMV (Europay, MasterCard, and Visa 1999) standard
computer or IC card, software called the electronic wallet, or digital developed for e-cash on the IC card (Europay International 1999).
wallet, is necessary. To connect the dig-ital wallet with various
merchants, interoperability is a very important characteristic to
meet.

Fig 18.1 Overview of main messages in SET


 
4. What are the primary difference between the SSL and SET
protocol?
5. Name the most important functions of a digital wallet?
What are the major advantages a digital wallet provides.
6. Compare and contrast smart card and traditional credit cards.
7. Name two of the conditions that must be present in order
for a payment system to become widely accepted.



Fig 18.2 Entities of SET protocol on cyber shopping


The International Center for Electronic Commerce (ICEC 1999)
has developed a system named Smart-SET, which integrates SET
protocol with an IC card that can store multiple certificates.
Secure socket layer protocol for electronic payment
Even though SET is a perfect solution for secure electronic
payments, a relatively simple version of SSL is currently widely
adopted. This is because SET protocol is complex and
certificates are not widely distributed in a stable manner.
Theoretically, the SSL protocol may use a certificate but it does not
include the concept of a payment gateway. Merchants need to
receive both ordering information and credit card information
because the capturing process initiated by the merchant.
The SET protocol, on the other hand, hides the customer’s credit
card information from merchants and also hides the order
information from banks to protect privacy. This scheme is called
dual signature. Until SET becomes popular, a simple version of
SSL is a very viable alternative.

 At present most companies use SSL (Secure Socket Layer)
protocol to provide, security and privacy. However, this
protocol does not provide customers all the protection they
could have.
 Visa and MasterCard have jointly developed a more secure
protocol, called SET (Secure Electronic Transaction).
Theoretically, it is a perfect protocol.
 Even though SET is a perfect solution for secure electronic
payments, a relatively simple version of SSL is currently
widely adopted. This is because SET protocol is complex
and certificates are not widely distributed in a stable manner.

1. List advantages and disadvantages of using cash as a form of
payment.
2. Briefly discuss the disadvantages of credit cards as the
standard for online payments. How does requiring a credit
card for payment discriminate against some consumers?
3. Describe the major steps involved in an online credit card
transaction.


 



 Among the various threats to Information System the most


 Introduction common threat is computer virus! I thing all of you will agree on
this.
 Various Threats to computer
 Various virus, Methods to detect and bug them 
Alarm has risen over hackers propagating computer viruses, rogue
 Summary
software programs that spread rampantly from system to system,
 Exercise clogging computer memory or destroying programs or data. Many
 thousands of viruses are known to exist, with 200 or more new
After this lecture the students will be able to: viruses created each month. Table 19.2 describes the characteristics
of the most common viruses. Many viruses today are spread
 Understand the various threats to the Computer Systems
through the Internet from files of downloaded software or from
used in Business organizations
files attached to e-mail transmissions. Viruses can also invade
Computer systems play such a critical role in business, government, computerized information systems from other computer networks
and daily life that organizations must take special steps to protect as well as from “infected” diskettes from an outside source or
their Computer systems and to ensure that they are accurate and infected machines.
reliable. Today we will discuss what are the various threats to
The potential for massive damage and loss from future computer
Computer Systems.
viruses remains. The Chernobyl, Melissa, and ILOVEYOU viruses
 caused extensive PC damage worldwide
When large amounts of data are stored in electronic form they are after spreading around the world through infected e-mail. Now
vulnerable to many more kinds of threats than when they exist in viruses are spreading to wireless computing devices. Mobile device
manual form. Table 19.1 list the most common threats to viruses could pose a serious threat to enterprise computing because
Computer System. They can stem from technical, organizational, so many wireless devices are now linked to corporate information
and environmental factors compounded by poor management systems. Organizations can use antivirus software and screening
decisions. Advances in telecommunications and computer procedure
software have magnified these vulnerabilities. Through
telecommunications networks, Computer systems in different to reduce the chances of infection. Antivirus software is special
locations can be interconnected. The potential for unauthorized software designed to check computer systems and disks for the
access, abuse, or fraud is not limited to a single location but can presence of various computer viruses. Often the software can
occur at any access point in the network. eliminate the virus from the infected area. However, most antivirus
software is only effective against viruses already known when the
Additionally, more complex and diverse hardware, software, software is written- to protect their systems, management must
organizational, and personnel arrangements are required for continually update their antivirus software.
telecommunications networks, creating new areas and
opportunities for penetration and manipulation. Wireless Virus Name Description oncept,Melissa
networks using radio-based technology are even more vulnerable Macro viruses that exist inside
to penetration, because radio frequency bands are easy to scan. executable programs called macros,
Wireless devices can form ad hoc networks that can be exploited which provide functions within
by malicious entities to disrupt service, collect confidential programs such as Microsoft Word.
information, and disseminate false information. Because wireless Can be spread when Word
devices roam in and out of wireless zones, such attacks can be documents are attached to e-mail.
difficult to trace. The Internet poses special problems, because it Can copy from one document to
was explicitly designed to be accessed easily by people on different another and delete files. Form Makes
computer systems. a clicking sound with each keystroke
 Hardware failure Fire but only on the eighteenth day of
the months. May corrupt data on the
 Software failure Electrical problems floppy disks it infects.
 Personnel actions User errors Explore.exe “Worm” type virus that arrives
 Terminal access penetration Programs changes attached to email.When launched tries
 Theft of data, services, Telecommunications to e-mail itself to other PCs and to
or equipments problems destroy certain Microsoft Office and
programmer files.
Table 19.1 Threats to Computer Systems


 
Monkey Makes the hard disk seem as if it has failed, 
because Windows will not run. A major problem with software is the presence of hiddenbugs or
program code defects. Studies have shown that it is virtually
Chernobyl Erases a computer’s had drive and ROM
impossible to eliminate all bugs from large programs. The main
BIOS (Basic Input/Output System). source of bugs is the complexity of decision-making code. Even
Junkie A “multipartie” virus that can infect files as a relatively small program of several hundred lines will contain
well as the boot sector of the hard drive (the tens of decisions leading to hundreds or even thousand of different
paths. Important programs within most corporations are usually
section of a PC hard drive that the PC first
much larger, containing tens of thousands or even millions of
reads when it boots up). May cause memory lines of code, each with many times the choices and paths of the
conflicts. smaller programs. Such complexity is difficult to document and
Table 19.2 Example Of Computer Viruses design-designers document some reactions wrongly or fail to
consider other possibilities. Studies show that about 60 percent
Another threat to Computer Systems is natural disaster, which
of errors discovered during testing are a result of specifications in
comes without informing. Let’s discuss what measures should
the design documentation that were missing, ambiguous, in error,
we take to make the loss as minimum as possible.
or in conflict. Zero defects, a goal of the total quality management
 movement,cannot be achieved in larger programs. Complete testing
Computer hardware, programs, data files, and other equipment simply is not possible. Fully testing programs that contain
can be destroyed by files, power failures, or other disasters. It may thousands of choices and millions of paths would require
take many years and millions of dollars to reconstruct destroyed thousands of years. Eliminating software bugs is an exercise in
data files and computer programs, and some may not be replaceable. diminishing returns, because it would take proportionately longer
If an organization needs them to function on a day-to-day basis, testing to detect and eliminate obscure residual bugs. Even with
it will no longer be able to operate. This why companies such as rigorous testing, one could not know for sure that a piece of
VISA USA Inc. and National Trust employ elaborate emergency software was dependable until the product proved itself after
backup facilities. VISA USA Inc. has duplicate mainframes, much operational use the message? We cannot eliminate all bugs,
duplicate network pathways, duplicate terminals, and duplicate and we cannot know with certainty the seriousness of the bugs
power supplies. VISA even uses a duplicate data center in McLean, that do remain.
Virginia, to handle half of its transactions and to serve as an
emergency backup to its primary data center in San Mateo, 
California. National Trust, a large bank in Ontario, Canada, uses Another reason that systems are unreliable is that computer
uninterruptible power supply technology provided by software traditionally has been a nightmare to maintain.
International Power Machines (IPM), because electrical power at Maintenance, the process of modifying a system in production
its Mississauga location fluctuates frequently. Rather than build use, is the most expensive phase of the systems development
their own backup facilities. Many firms contract with disaster process. In most organizations nearly half of information systems
recovery firms, such as Comdisco Disaster staff time is spent in the maintenance of existing systems.
Recovery Services in Rosemont, Illinois, and Sungard Recovery Why are maintenance costs so high? One major reason is
Services headquartered in Wayne, Pennsylvania. These disaster organizational change. The firm may experience large internal
recovery firms provide hot sites critical applications in an emergency. changes in structure or leadership, or change may come from its
Disaster recovery services offer backup for client/ serve systems as surrounding environment. These organizational changes affect
well as traditional mainframe applications. As firms become information requirements. Anther reason appears to be software
increasingly digital and depend on systems that must be constantly complexity, as measured by the number and size of interrelated
available, disaster recovery planning has taken on new importance. software programs and subprograms and the complexity of the
flow of program logic between them. A third common cause of
A disaster recovery plan includes establishing a chain of
long-term maintenance problems is faulty systems analysis and
command for running the business in the event of a computer
design, especially information requirement analysis.
outage as well as identification of critical computer processing
tasks and backup database, storage, and processing capabilities. In If errors are detected early, during analysis and design, the cost to
addition to disasters, viruses, and security breaches, defective the systems development effort is small. But if they are not
software and data pose a constant threat to information systems, discovered until after programming, testing, or conversion have
causing untold losses in productivity. An undiscovered error in a been completed, the costs can soar astronomically. A minor
company’s credit software or erroneous financial data can result in logic error, for example, that could take one hour to correct during
millions of dollars of looses. A hidden software problem in the analysis and design stage could take 10, 40, and 90 times as
AT&T’s long distance system brought down that system, bringing long to correct during programming, conversion, and post
the new York-based financial exchanges to a halt and interfering implementation, respectively.
with billions of dollars of business around the country for a Cyber crime is becoming one of the Net’s growth businesses.
number of hours. Modern passenger and commercial vehicles are Today, criminals are doing everything from stealing intellectual
increasingly dependent on computer programs for critical property and committing fraud to unleashing viruses and
functions. A hidden software defect in a braking system could committing acts of cyber terrorism.
result in the loss of lives.


 
Computer crime is a growing threat to society caused by the criminal files, but neither steals nor damages anything. This situation is
or irresponsible actions of individual who are taking advantage common in computer crime cases that are prosecuted. In several
of the widespread use and vulnerability of computers and the states, courts have found that the typical computer crime statute
Internet and other networks. It thus presents a major challenge to language prohibiting malicious access to a computer system did
the ethical use of information technologies. Computer crime poses apply to anyone gaining unauthorized access to another’s
serious threats to the integrity, safety, and survival of most E- computer networks. See table 19.3. Hackers can monitor E-mail,
business systems, and thus makes the development of effective Web server access, or file transfers to extract pass words of steal
security methods a top priority. network files, or to plant data that will cause a system to welcome
Computer crime is defined by the Association of Information intruders. A hacker may also use
Technology Professional (AITP) as including remote services that allow one computer on a network to execute
(1) the unauthorized use, access, modification, and destruction programs on another computer to gain privileged access within a
of hardware, software, data, or network resources; network. Telnet, an Internet tool for interactive use of remote
computers, can help hackers discover information to plan other
(2) the unauthorized release of information;
attacks. Hackers have used Tel net to access a computer’s E-mail
(3) the unauthorized copying of software; port, for example, to monitor E-mail messages for passwords
(4) denying an end user access to his or her own hardware, and other information about privileged user accounts and network
software, data, or network resources; and resources. These are just some of the typical types of computer
(5) Using or conspiring to use computer or network resources crimes that hackers commit on the Internet on a regular basis.
to illegally obtain information or tangible property. This That’s why Internet security measures like encryption and fire walls,
as discussed in the next section, are so vital to the success of
definition was promoted by the AITP in a Model Computer
electronic commerce and other E-business applications.
Crime Act, and is reflected in many computer crime laws.


First in was Yahoo! Inc. The portal giant was shut down for three
hours. Then retailer Buy.com Inc. was hit the next day, hours after
going public. By that evening, eBay, Amazon.com,and CNN had
gone dark. And in the morning, the mayhem continued with
online broker E*Trade and others having traffic to their sites
virtually choked off. Gridlock. For all the sophisticated work on
fire walls, intrusion detection systems, encryption and computer
security, E-businesses are at risk from denial of service (DOS)
attacks, a relatively simple technique that’s akin to dialing a telephone
number repeatedly so that everyone else trying to get through will
hear a busy signal. Cyber crime on the Internet is on the rise.
Consider just a quick smattering of recent events: In December,
1999, 300,000 credit card numbers were snatched from online
music retailer CD Universe. In March, the Melissa virus caused an
estimated $80 million in damage when it swept around the world,
paralyzing E-mail systems. That same month, hackers-for-hire
pleaded guilty to breaking into phone giants AT&T , GTE, and
Sprint, among others, for calling card numbers that eventually
made their way to organized crime gangs in Italy. According to the
FBI, the phone companies were hit for an estimated $2 million.
But one good thing: Such events are delivering a walk-up call to
business that they need to spend as much time protecting their
websites and networks as they do linking them with customers,
suppliers, contractors –and you.

Cyber thieves have at their fingertips a dozen dangerous tools,
from “scans” that ferret out weaknesses in website program to
“sniffers” that snatch passwords. Hacking, in computerese, is
the obsessive use of computers, or the unauthorized access and
use of networked computer systems. Illegal hackers (also called
crackers) frequently assault the Internet and other networks to
steal or damage data and programs. One of the issues in hacking
is what to do about a hacker who commits only electronic breaking
and entering; that is gets access to a computer system, reads some


 
Sniffer Programs that covertly search individual packers of data
as they pass through the Internet, capturing passwords or the
entire contents
Scan Widespread probes of the Internet to determine types of
computers, services and connections. That way the bad guys can
take advantage of weaknesses in a particular make of computer or
software program.
Spoofing Faking an E-mail address or Web page to trick users
into passing along critical information like passwords or credit
card numbers.
Back Doors In case the original entry point has been detected,
having a few hidden ways back makes reentry easy-and difficult to
detect.
Trojan Horse A program that, unknown to the user, contains
instructions that exploit a known vulnerability in some software.
Malicious Applets Tiny programs, sometimes written in the
popular Java computer language, that misuse your computer’s
resources, modify files on the hard disk, send fake Email, or steal
passwords.
Logic Bombs An instruction in a computer program that triggers
a malicious act
War Dialing Programs that automatically dial thousands of
telephone numbers in search of a way in through a modern
connection.
Buffer Overflow A technique for crashing or gaining control of
a computer by sending too much data to the buffer in a computer’s
memory.
Dumpster Diving Sifting through a company’s garbage to find
information to help break into their computers. Sometimes the
information is used to make a stab at social engineering more
credible.
Password Crackers Software that can guess passwords.
Social Engineering A tactic used to gain access to computer
Table 19.3 systems by talking unsuspecting company employees out of
 valuable information such as passwords.
 Advances in telecommunications and computer software 
have magnified the vulnerabilities to data. 1. What do understand by hacking? Explain Ethical & Non-
 Among the various threats to Information System the most ethical hacking.
common threat is computer virus. 2. What is virus? How it can effect your system?
 Computer hardware, programs, data files, and other 3. How can we recover if our system effect by any virus?
equipment can be destroyed by files, power failures, or other
disasters.
 A major problem with software is the presence of hidden
bugs or program code defects..
 Hacking, in computerese, is the obsessive use of computers,
or the unauthorized access and use of networked computer
systems.

Denial of Service This is becoming a common networking prank.
By hammering a website’s equipment with too many requests for
information, an attacker can effectively clog the system, slowing
performance or even crashing the site. This method of overloading
computers is sometimes used to cover up an attack.


 

 


 
 Introduction Secret-key cryptography the use of a shared key for both encryption
 Various preventive measures for computer by the transmitter and decryption by the receiver. Shared-key
techniques suffer from the problem of key distribution, since
 Cryptography
shared keys must be securely’ distributed to each pair of
 Data Encryption Standard (DES) communicating parties. Secure-key distribution becomes
 Summary cumbersome in large networks.
 Exercise To illustrate secret key cryptography, A encrypts a message with a
secret key and e-mails the encryption message to B. On receiving

the message, B checks the header to identify the sender, then
After this lecture the students will be able to:
unlocks his electronic key storage area and takes out the duplicate
 Describe some security measures to prevent the Computer of the secret key. B then uses the secret key to decrypt the message.
Systems from various threats in a network .
The Achilles heel of secret-key cryptography is getting the sender
The incredible growth of the Internet has excited businesses and and receiver to agree on the secret key without a third party finding
consumers alike with its promise of changing the way we live and out. This is difficult because if A and B are in separate sites, they
work. But a major concern has been just how secure the Internet must trust not being overheard during face-to-face meetings or
is, especially when you’re sending sensitive information through over a public messaging system (a phone system, a postal service)
it. when the secret key is being exchanged. Anyone who overhears or
Let’s face it, there’s a whole lot of information that we don’t want intercepts the key in transit can later read all encrypted messages
other people to see, such as: using that key. The generation, transmission, and storage of keys
 Credit-card information is called key management; all cryptosystems must deal with key
management issues. Although the secret-key method is quite
 Social Security numbers
feasible and protocol for one-on-one document interchange, it
 Private correspondence does not scale. In a business environment where a company deals
 Personal details with thousands of on-line customers, it is impractical to assume
 Sensitive company information that key management will be flawless. Hence, we can safely assume
that secret-key cryptography will not be a dominant player in E-
 Bank-account information
Commerce given its difficulty providing secure key management.
Information security is provided on computers and over the
Internet by a variety of methods. A simple but straightforward 
security method is to only keep sensitive information on removable A widely-adopted implementation of secret-key cryptography is
storage media like floppy disks. But the most popular forms of Data Encryption Standard (DES). The actual software to perform
security all rely on encryption , the process of encoding DES is readily available at no cost to anyone who has access to the
information in such a way that only the person (or computer) Internet. DES was introduced in 1975 by IBM, the National Security
with the key can decode it. Agency (NSA), and the National Bureau of Standards (NBS) (which
is now called NIST). DES has been extensively researched and
 studied over the last twenty years
Computer encryption is based on the science of cryptography,
which has been used throughout history. Before the digital age, and is definitely the most well-known and widely used
the biggest users of cryptography were governments, particularly cryptosystem in the world. DES is secret-key, symmetric
for military purposes. The existence of coded messages has been cryptosystem: When used for communication, both sender and
verified as far back as the Roman Empire. But most forms of receiver must know the same secret key, which is used both to
cryptography in use these days rely on computers, simply because encrypt and decrypt the message. DES can also be used for single
a human-based code is too easy for a computer to crack. user encryption, for example, to store files on a hard disk in
encrypted form. In a multiuser environment, however, secure-key
Most computer encryption systems belong in one of two distribution becomes difficult; public-key cryptography, discussed
categories. Broadly speaking, there are two types of encryption in the next subsection, was developed to solve this problem.
methods:
DES operates on 64-bit blocks with a 56-bit secret key. Designed
 Secret-key cryptography
for hardware implementation, it operation is relatively fast and
 Public-key cryptography works well for large bulk documents or encryption. Instead of
defining just one encryption algorithm, DES defines a whole
family of them. With a few exceptions, a different algorithm is


 
generated for each secret key. This means that everybody can be digitally sign a document, puts his private key and the document
told about the algorithm and your message will still be secure. together and performs a computation on the composite (key +
You just need to tell others your secret key a number less than 256. document) to generate a unique number called the digital signature.
The number 256 is also large enough to make it difficult to break For instance, when an electronic document, such as anorder form
the code using a brute force attack (trying to break the cipher by with a credit card number, is run through the method, the output
using all possible keys). is a unique “fingerprint” of the document. This “fingerprint” is
DES has withstood the test of time. Despite the fact that its attached to the original message and further encrypted with the
algorithm is well known, it is impossible to break the cipher without signer A’s private key. The result of the second encryption is then
using tremendous amounts of computing power. A new sent to B, who then first decrypts the document using Ks public
technique for improving the security of DES is triple encryption key. B checks whether the message has been tampered with or is
(Triple DES), that is, encrypting each message block using three coming from a third party C, posing as A.
different keys in succession. Triple DES, thought to be equivalent To verify the signature, B does some further computation
to doubling the key size of DES, to 112 bits, should prevent involving the original document, the purported signature, and
decryption by a third party capable of single-key exhaustive search. Ks public key. If the results of the computation generate a
Of course, using triple-encryption takes three times as long as matching “finger-print” of the document, the digital signature is
single-encryption DES. If you use DES three times on the same verified as genuine; otherwise, the signature may be fraudulent or
message with different secret keys, it is virtually impossible to the message altered, and they are discarded. This method is the
break it using existing algorithms.. Over the past few years several basis for secure e-Commerce, variations of which are being
new, faster symmetric algorithms have been developed, but DES explored by several companies.
remains the most frequently used. Several implementations of these popular encryption techniques
 are currently employed. In public-key encryption, the RSA
A more powerful form of cryptography involves the use of public implementation dominates and is considered very secure, but
keys. Public-key techniques involve a pair of keys; a private key and using it for overseas traffic conflicts With the US government’s
a public key associated with each user. Information encrypted by position on export of munitions technology of military
the private key can be decrypted only using the corresponding importance. Clearly, the government has not reckoned with the
public key. The private key, used to encrypt transmitted information Internet data flow.
by the user, is kept secret. The public key is used to decrypt 
information at the receiver and is not kept secret. Since only the
 The most popular forms of security all rely on encryption,
bona fide author of an encrypted message has knowledge of the
the process of encoding information in such a way that only
private key, a successful decryption using the corresponding public
the person (or computer) with the key can decode it.
key verifies the identity of the author and ensures message integrity.
Public keys can be maintained in some central repository and  There are two types of encryption methods:
retrieved to decode or encode information. Public key techniques Secret-key cryptography and Public-key cryptography
alleviate the problem of distribution of keys  Secret-key cryptography the use of a shared key for both
encryption by the transmitter and decryption by the receiver

Each party to a public-key pairing receives a pair of keys, the public  A widely-adopted implementation of secret-key
key and the private key. When A wishes to send a message to B, A cryptography is Data Encryption Standard (DES)
looks up B’s public key in a directory, A then uses the public key to  A more powerful form of cryptography involves the use of
encrypt the message and mail it to B. B uses the secret private key public keys. Public-key techniques involve a pair of keys; a
to decrypt the message and read it. Anyone can send an encrypted private key and a public key associated with each user.
message to B but only B can read it. Unless, a third party, say C, has Information encrypted by the private key can be decrypted
access to B’s private key, it is impossible to decrypt the message only using the corresponding public key
sent by A. This ensure confidentiality.

Clearly, one advantage of public key cryptography is that no one
1. How do you make your credits cards information secure.
can figure out the private key from the corresponding public key.
Hence, the key management problem is mostly confined to the 2. How do you differentiate Secret-key cryptography and Public-
management of private keys. The need for sender and receiver to key cryptography.
share secret information over’ public channels is completely 3. Why Data Encryption Standard (DES) is so popular?
eliminated: All transactions involve only public keys, and no private
key is ever transmitted or shared; The secret key never leaves the
user’s Pc. Thus a sender can send, a confidential message merely by
using public information and that message can be decrypted only
with a private key in the sole possession of the intended recipient.
Furthermore, public-key cryptography can be used for sender
authentication, known as digital signatures. Here’s how
authentication is achieved using public-key cryptography: A, to


 



 products, plat-forms, and industries around the world. It is being


 Introduction incorporated into the World Wide Web browsers such as NetScape,
giving it a wider audience. In hardware, RSA can be found in
 RSA
secure telephones, on Ethernet network cards, and on smart cards.
 Clipper Technology Adoption of RSA seems to be proceeding more quickly for
 Summary authentication (digital signatures) than for privacy (encryption),
 Exercise Perhaps in part because products for authentication are easier to
export than those for privacy.

After this lecture the students will be able to: 
 Describe some security measures to prevent the Computer  RSA allows two important functions not provided by DES:
Systems from various threats in a network In the previous  Secure key exchange without prior exchange of keys, and
lecture we discussed about the two types of encryption  Digital signatures.
schemes that we use to encrypt the data while sending the
 For encrypting messages, RSA and DES are usually
data from on place to another. In this lecture we will further
combined as follows:
discuss these two schemes.
 first the message is encrypted with a random DES key, then,
 before being sent over an insecure communications channel,
RSA is a public-key cryptosystem for both encryption and the DES key is encrypted with RSA.
authentication developed in 1977 by Ron Rivest, Adi Shamir, and
Leonard Adleman. RSA system uses a matched pair of encryption  Together, the DES-encrypted message and the RSA-
and decryption keys, each, per-forming a one way transformation encrypted DES key are sent. This protocol is known as an
of the data. RSA is also developing digital signatures, which are RSA digital envelope.
mathematical algorithms that encrypt an entire document. The Why not just use RSA to encrypt the whole message and not use
security of RSA is predicated on the fact that it is extremely difficult DES at all? Although RSA may be fine for small messages, DES
even for the-fastest computers-to factor large numbers that are (or another cipher) is preferable for larger messages due to its
the products of two prime numbers (keys), each greater than greater speed. In some situations, RSA is not necessary and DES-
2112. RSA is important because it enables digital Signatures, which key agreement can take place (the two-user environment; for
can be used to authenticate electronic documents the same way example, if you want to keep your personal files encrypted, just
handwritten signatures are used to authenticate paper documents. do so with DES using, say, a password as the DES key.
Here’s how. a digital signature works for an electronic document RSA, and public key cryptography in general, is best suited for a
to be sent from the sender X to the receiver Y: X runs a: program multiuser environment. Also, any system in which digital
that uses a hash algorithm to generate a digital fingerprint-a pattern signatures are desired needs RSA or some other public-key system.
of bits that uniquely identifies a much larger pattern of bits-for 
the document and encrypts the fingerprint with his private key. The most difficult aspect of creating an effective multiparty
This is X’s digital signature, which is transmitted along with the transaction sys-tem is the distribution of public keys. Because the
data. Y decrypts the signature with X’s public key and runs the keys are intended to. be public and widely distributed, secrecy is
same hash program on the document. If the digital fingerprint not a concern; anyone should be able to get a copy of a public key.
output by the hash program does not match the fingerprint sent Rather, the primary concern is authenticity. An impostor could
by X (after that has been decrypted), then the signature is invalid. easily create a private / public key pair and distribute the public key,
If the fingerprints do match, however, then Y can be quite sure claiming it belonged to someone else.
that the digital signature is authentic. If the document were altered For instance, if A in England is doing business with B in Canada
en route, the fingerprints will not match (the output from the and wants to encrypt information so that only B can read it, A
hash programs will be different) and the receiver will know that must first get the public key of B from a key directory.
data tampering occurred. If the sender’s
That’s where the problem lies. There is nothing that says that this
signature has been forged (encrypted with the wrong private key), public key information is valid and not a forgery put there by C
the fingerprints’ won’t match either. Therefore the digital signature impersonating B. One solution to this problem is a public-key
verifies both the identity of the sender and the authenticity of the certificate. A public-key certificate is a data structure, digitally signed
data in the document. by a certification authority (also known as the certificate issuer),
The use of RSA is undergoing a period of rapid expansion and that binds a public-key value to the identity of the entity holding
may bec0me ubiquitous. It is currently used in a wide variety of the corresponding private key. The latter entity is known as the


 
subject of the certificate. In essence, a certificate is a copy of a  A public-key certificate is a data structure, digitally signed by a
public key and an identifier (number), digitally signed by a trusted certification authority (also known as the certificate issuer),
party. The problem is then transformed into finding a trusted that binds a public-key value to the identity of the entity
third party to create these certificates. A public-key user needs to holding the corresponding private key
obtain and validate a certificate containing the required public key.  The idea behind the clipper is that communications would
This is where it gets complicated. If the public-key user does not be encrypted with a secure algorithm, but the keys would be
already have a copy of the public key of the trusted party that kept by one or more third parties (the “escrow agencies”) and
signed by one certificate, then the user may need an additional made available to law enforcement agencies when authorized
certificate to get that public key- In such cases, a chain of multiple by a court-issued warrant
certificates may be needed, comprising a certificate of the public-
key owner signed by one certification authority. and additional 
certificates of certification authorities signed by other certification 1. What are the various preventive measure for network threats.
authorities. 2. Discuss Clipper technology for encryption.
 3. How digital signatures are used for authentication.
Clipper is an encryption chip developed as part of the Capstone
project. Announced by the White House in April 1993, Clipper
was designed to balance the competing concerns of federal law 
enforcement agencies with those of private citizens and industry.
Law enforcement agencies wish to have access-for example, by
wire-tapping-to the communications of suspected criminals, and
these needs are threatened by secure cryptography. Clipper
technology attempts to balance these needs by using escrowed
keys. The idea is that communications would be encrypted with a
secure algorithm, but the keys would be kept by one or more third
parties (the “escrow agencies”) and made available to law
enforcement agencies when authorized by a court-issued warrant.
Thus, for example, personal communications would be
impervious to recreational eavesdroppers and commercial
communications would be impervious to industrial espionage,
and yet the FBI could listen in on suspected terrorists or gangsters.
Skipjack, designed by the NSA, is the encryption algorithm
contained in, the clipper chip. It uses One 80-bit key to encrypt and
decrypt 64-bit blocks of data. Skipjack can be used in the same way
as DES and may be more secure than , DES, since it uses 80-bit
keys and scrambles the data for 32 steps, or “rounds”; by contrast,
DES uses 56-bit keys and scrambles the data for only 16 rounds.
The details of Skipjack are classified .The decision not to make the
details of the algorithm publicly available has been widely criticized,
and many are suspicious that Skipjack is not secure, either due to
design oversight or to deliberate introduction of a secret trapdoor.
By contrast, the many failed attempts to find weaknesses in DES
over the years have made people confident in the security of DES.
Since Skipjack is not public, the same scrutiny cannot be applied,
and thus a corresponding level of confidence may not arise.
Aware of such criticism, the government invited a small group of
independent cryptographers to examine the Skiplack algorithm.
Their report stated that, although their study was too limited to
reach a definitive conclusion, they nevertheless believe that Skipjack
is secure. Another consequence of Skipjack’s classified status is
that it cannot be implemented in software, but only in hardware
by government-authorized chip manufacturers.

 RSA is a public-key cryptosystem for both encryption and
authentication developed in 1977 by Ron Rivest, Adi Shamir,
and Leonard Adleman.


 



 so on. If one employee makes a mistake and leaves a security hole,
 Introduction hackers can get to the machine and exploit the hole.
 Firewall With a firewall in place, the landscape is much different. A company
will place a firewall at every connection to the Internet (for example,
 Various Anti Viruses
at every T1 line coming into the company). The firewall can
 Summary implement security rules. For example, one of the security rules
 Exercise inside the company might be:
 Out of the 500 computers inside this company, only one of them
After this lecture the students will be able to: is permitted to receive public FTP traffic. Allow FTP connections
 Describe some security measures to prevent the Computer only to that one computer and prevent them on all others. A
Systems from various threats in a network company can set up rules like this for FTP servers, Web servers,
Telnet servers and so on. In addition, the company can control
In the previous lecture we discussed Cryptography technique to how employees connect to Web sites, whether files are allowed to
provide security of data in a network. Today we will take a look on leave the company over the network and so on. A firewall gives a
other techniques which can further enhance the security. company tremendous control over how people use the network.
 Firewalls use one or more of three methods to control traffic
If you have been using the Internet for any length of time, and flowing in and out of the network:
especially if you work at a larger company and browse the Web  Packet filtering - Packets (small chunks of data) are
while you are at work, you have probably heard the term firewall analyzed against a set of filters. Packets that make it through
used. For example, you often hear people in companies say things the filters are sent to the requesting system and all others are
like, “I can’t use that site because they won’t let it through the discarded.
firewall.”
 Proxy service - Information from the Internet is retrieved
If you have a fast Internet connection into your home (either a by the firewall and then sent to the requesting system and
DSL connection or a cable modem), you may have found yourself vice versa.
hearing about firewalls for your home network as well. It turns
 Stateful inspection - A newer method that doesn’t examine
out that a small home network has many of the same security
the contents of each packet but instead compares certain key
issues that a large corporate network does. You can use a firewall
parts of the packet to a database of trusted information.
to protect your home network and family from offensive Web
sites and potential hackers. Information traveling from inside the firewall to the outside is
monitored for specific defining characteristics, then incoming
Basically, a firewall is a barrier to keep destructive forces away from
information is compared to these characteristics. If the comparison
your property. In fact, that’s why its called a firewall. Its job is
yields a reasonable match, the information is allowed through.
similar to a physical firewall that keeps a fire from spreading from
Otherwise it is discarded
one area to the next. As you read through this article, you will learn
more about firewalls, how they work and what kinds of threats 
they can protect you from. There are many creative ways that unscrupulous people use to
access or abuse unprotected computers:

A firewall is simply a program or hardware device that filters the  Remote login - When someone is able to connect to your
information coming through the Internet connection into your computer and control it in some form. This can range from
private network or computer system. If an incoming packet of being able to view or access your files to actually running
information is flagged by the filters, it is not allowed through. programs on your computer.
Let’s say that you work at a company with 500 employees. The  Application backdoors - Some programs have special
company will therefore have hundreds of computers that all have features that allow for remote access. Others contain bugs
network cards connecting them together. that provide a backdoor, or hidden access, that provides
some level of control of the program.
In addition, the company will have one or more connections to
the Internet through something like T1 or T3 lines. Without a  SMTP session hijacking - SMTP is the most common
firewall in place, all of those hundreds of computers are directly method of sending e-mail over the Internet. By gaining
accessible to anyone on the Internet. A person who knows what access to a list of e-mail addresses, a person can send
he or she is doing can probe those computers, try to make FTP unsolicited junk e-mail (spam) to thousands of users. This
connections to them, try to make telnet connections to them and is done quite often by redirecting the e-mail through the


 
SMTP server of an unsuspecting host, making the actual rule of thumb is to block everything, then begin to select what
sender of the spam difficult to trace. types of traffic you will allow. You can also restrict traffic that
 Operating system bugs - Like applications, some operating travels through the firewall so that only certain types of
systems have backdoors. Others provide remote access with information, such as e-mail, can get through. This is a good rule
insufficient security controls or have bugs that an experienced for businesses that have an experienced network administrator
hacker can take advantage of. that understands what the needs are and knows exactly what traffic
to allow through. For most of us, it is probably better to work
 Denial of service - You have probably heard this phrase
with the defaults provided by the firewall developer unless there is
used in news reports on the attacks on major Web sites. This
a specific reason to change it. One of the best things about a
type of attack is nearly impossible to counter. What happens
firewall from a security standpoint is that it stops anyone on the
is that the hacker sends a request to the server to connect to
outside from logging onto a computer in your private network.
it. When the server responds with an acknowledgement and
While this is a big deal for businesses, most home networks will
tries to establish a session, it cannot find the system that
probably not be threatened in this manner. Still, putting a firewall
made the request. By inundating a server with these
in place provides some peace of mind.
unanswerable session requests, a hacker causes the server to
slow to a crawl or eventually crash. 
 E-mail bombs - An e-mail bomb is usually a personal A proxy application gateway is a special server that typically runs
attack. Someone sends you the same e-mail hundreds or on a firewall machine. Their primary use is access to applications
thousands of times until your e-mail system cannot accept such as the World. Wide Web from within a secure perimeter (Fig
any more messages. 22.1) Instead of talking directly to external WWW servers, each
request from the client would be routed Wed to a proxy on the
 Macros - To simplify complicated procedures, many
firewall that is defined by the user. The proxy knows how to get
applications allow you to create a script of commands that
through the firewall. An application level proxy makes a firewall
the application can run. This script is known as a macro.
safely permeable for users in an organization, without creating a
Hackers have taken advantage of this to create their own
potential security hole through which hackers can get into corporate
macros that, depending on the application, can destroy your
networks. The proxy waits for a request from inside the firewall,
data or crash your computer.
forwards the request to the remote server
 Viruses - Probably the most well-known threat is computer
outside the firewall, reads the response, and then returns it to the
viruses. A virus is a small program that can copy itself to
client. In the usual case, all clients within a given subnet use the
other computers. This way it can spread quickly from one
same proxy. This makes it possible for the proxy to execute efficient
system to the next. Viruses range from harmless messages to
caching of documents that are requested by a number of clients.
erasing all of your data.
Proxy gateways have several advantages. They allow browser
 Spam-Typically harmless but always annoying, spam is the
programmers to ignore the complex networking code necessary
electronic equivalent of junk mail. Spam can be dangerous
to support every firewall protocol and concentrate on important
though. Quite often it contains links to Web sites. Be careful
client issues. For instance, by using HTTP between the client and
of clicking on these because you may accidentally accept a
proxy, no protocol functionality is lost, since FTP, Gopher, and
cookie that provides a backdoor to your computer.
other Web Protocols map well into HTTP methods. This feature
 Redirect bombs - Hackers can use ICMP to change (redirect) is invaluable, for users needn’t have separate, specially modified
the path information takes by sending it to a different router. FTP, Gopher, and WAIS clients to get through a firewall-– a single
This is one of the ways that a denial of service attack is set Web client with a proxy server handles all of these cases.
up.
Proxies can manage network functions. Proxying allows for creating
 Source routing - In most cases, the path a packet travels audit trails of client transactions/including client IP address, date
over the Internet (or any other network) is determined by the and time, byte count, and success code. Any regular fields and
routers along that path. But the source providing the packet meta-information fields in a transaction are candidates for logging.
can arbitrarily specify the route that the packet should travel. The proxy also can control access to services for individual
Hackers sometimes take advantage of this to make methods, host and domain, and the like. Given this firewall design
information appear to come from a trusted source or even in which the proxy acts as an intermediary, it is natural to design
from inside the network! Most firewall products disable security-relevant mediation within the proxy. Proxy mediation
source routing by default. helps mitigate security concerns by
Some of the items in the list above are hard, if not impossible, to (1) limiting dangerous subsets of the HTTP protocol (a site’s
filter using a firewall. While some firewalls offer virus protection, security policy may prohibit the use of some of HTTP’s
it is worth the investment to install anti-virus software on each methods);
computer. And, even though it is annoying, some spam is going
(2) enforcing client and/or server access to designated hosts (an
to get through your firewall as long as you accept e-mail.
organization should have the capability to specify acceptable
The level of security you establish will determine how many of web sites);
these threats can be stopped by your firewall. The highest level of
security would be to simply block everything. Obviously that defeats
the purpose of having an Internet connection. But a common


 
(3) implementing access control for network services that is lost
when the proxy is installed (to restore the security policy
enforced by the firewall); and
(4) checking various protocols for well-formed commands. A
bug existed in a previous version of the Mosaic browser that
permitted servers to download a “Trojan horse” URL to the
client that would cause the client to run an arbitrary program.
The proxy must be in a position to filter dangerous URLs and
malformed commands.

 
This poster reminds each computer user of their responsibility to
make regular backups to protect their computer data. The task of
backing up the data found on your computer is often the most
overlooked and “hardly ever done until its too late” action within
the computer end-user community. With the software tools now
available, it no longer is the arduous task that is once was a few
Fig 22.1 Proxy servers on the World Wide Web years ago... There is no excuse not to backup your data - do it now,
don’t wait until its too late! Once your system is in use, your next
 consideration should be to back up the file systems, directories,
Antivirus software is a program that either comes installed on and files. Files and
your computer or that you purchase and install yourself. It helps
directories represent a significant investment of time and effort.
protect your computer against most viruses, worms, Trojans, and
At the same time, all computer files are potentially easy to change
other unwanted invaders that can make your computer “sick.”
or erase, either intentionally or by accident. If you take a careful
Viruses, worms, and the like often perform malicious acts, such as
and methodical approach to backing up your file systems, you
deleting files, accessing personal data, or using your computer to
attack other computers. should always be able to restore recent versions of files or file
systems with little difficulty.
 Note: When a hard disk crashes, the information contained on
You can help keep your computer healthy by using antivirus
that disk is destroyed. The only way to recover the destroyed data
software. Remember to update your antivirus software regularly.
is to retrieve the information from your backup copy.
These updates are generally available through a subscription from
your antivirus vendor. There are several different methods of backing up. The most
frequently used method is a regular backup, which is a copy of a
Q. How do I tell if I already have antivirus software on my
file system, directory, or file that is kept for file transfer or in case
computer?
the original data is unintentionally changed or destroyed. Another
A. Check the Programs list on the Start menu and look for an form of backing up is the archive backup; this method is used for
antivirus program. Many major computer manufacturers include a copy of one or more files, or an entire database that is saved for
at least a trial version of a popular antivirus software package, such future reference, historical purposes, or for recovery if the original
as McAfee, Symantec, or Norton. But just because the software is data is damaged or lost. Usually an archive is used when that
installed, doesn’t mean it’s “turned on,” or being updated regularly.
specific data is removed from the system.

A firewall is simply a program or hardware device that filters the
information coming through the Internet connection into your
private network or computer system. If an incoming packet of
information is flagged by the filters, it is not allowed through.
Firewalls use one or more of three methods to control traffic
flowing in and out of the network: Packet filtering, Proxy
service, Stateful inspection
 Firewall protects from Remote login, Application
backdoors, Operating system bugs, Denial of service,E-
mail bombs, Virus


 
 A proxy application gateway is a special server that typically
runs on a firewall machine. Instead of talking directly to
external WWW servers, each request from the client would
be routed Wed to a proxy on the firewall that is defined by
the user. The proxy knows how to get through the firewall.
 Antivirus software is a program that either comes installed
on your computer or that you purchase and install yourself.
It helps protect your computer against most viruses, worms,
Trojans, and other unwanted invaders that can make your
computer “sick.”

1. Explain how Internet security measures can actually create
opportunities for criminals to steal rather than preventing
them.
2. Discuss why new and improved are not enough to stop
online crime . What is the missing ingredient?
3. Name the major points of vulnerability in a typical online
transaction.
4. How does spoofing threaten a Web Site’s operations?
5. Briefly explain how public key cryptography works? Why is
encryption not as secure today as it was earlier in the century?
6. Compare and contrast firewalls and proxy servers and their
security functions.
7. Is a computer with anti-virus software protected from
viruses? Why or why not?
8. Imagine you are the owner of an e-commerce web site. What
are some of the signs that your site has been hacked?
Discuss the major types of attacks you could expect to
experience and the resulting damage to your site.



 



 crime and very little federal jurisdiction over crime. Likewise with
 Introduction the Internet: Before the Internet, there was very little “cyber crime.”
 Ethical, Social, and Political issues in ECommerce Many business firms and individuals are benefiting from the
commercial development of the Internet, but this development
 Summary
also exacts a price from individuals, organizations, and
 Exercise societies.These costs and benefits must be carefully considered by
 those seeking to make ethical and socially responsible decisions in
After this lecture the students will be able to: this new environment. The question is: how can you as a manager
make reasoned judgments above what your firm should do in a
 Understand Ethical, Social, and Political issues in
number of e-commerce areas- from securing the privacy of your
ECommerce
customer’s click stream to ensuring the integrity of your company
Defining the rights of people to express their ideas and the domain name?
property rights of copyright owners are just two of many ethical,
The major ethical, social, and political issues that have developed
social, and political issues raised by the rapid evolution of e-
around e-commerce over the past seven to eight years can be loosely
commerce. These questions are not just ethical questions that we
categorized into four major dimensions: information rights,
as individuals have to answer; they also involve social Institutions
property rights, governance, and public safety and welfare as shown
such as family, schools, and business firms. And these questions
in Fig 23.1Some of the ethical, social, and political issues raised in
have obvious political dimensions because they involve collective
each of these areas include the following:
choices about how we should live and what laws we would like to
live under.  Information rights: What rights to their own personal
information do individuals have in a public marketplace, or
In this lecture we discuss the ethical, social, and political issues
in their private homes, when Internet technology make
raised in e-commerce, provide a framework for organizing the
information collection so pervasive and efficient? What
issues, and make recommendations for managers who are given
rights do individuals have to access information about
the responsibility of operating e-commerce companies within
business firms and other organizations?
commonly accepted standards of appropriateness.
 Property rights: How can traditional intellectual property
Understanding Ethical, Social, And Political Issues In E-Commerce
rights be enforced in an internet world where perfect copies
Internet and its use in e-commerce have raised pervasive ethical, of protected works can be made and easily distributed
social and political issues on a scale unprecedented for computer worldwide in seconds?
technology. Entire sections of daily newspapers and weekly
 Governance: Should the Internet and e-commerce be
magazines are devoted to the social impact of the Internet. Why is
subject to public laws? And if so, what law-making bodies
this so? Why is the Internet at the root of so many contemporary
have jurisdiction - state, federal, and/or international?
controversies? Part of the answer lies in the underlying features of
Internet technology and the ways in which it has been exploited  Public safety and welfare: What efforts should be
by business firms. Internet technology and its use in e-commerce undertaken to ensure equitable access to the Internet and
disrupts existing social and business relationships and ecommerce channels? Should governments be responsible
understandings. for ensuring that schools and colleges have access to the
Internet? Is certain online content and activities - such as
Instead of considering the business consequences of each unique
pornography and gambling - a threat to public safety and
feature, here we examine the actual or potential ethical, social,
welfare? Should mobile commerce be allowed from moving
and/or political consequences of the technology (see Table 23.1).
vehicles?
We live in an “information society,” where power and wealth
To illustrate, imagine that at any given moment society and
increasingly depend on information and knowledge as central
individuals are more or less in an ethical equilibrium brought
assets. Controversies over information are often in fact
about by a delicate balancing of individuals, social organizations,
disagreements over power, wealth, influence, and other things
and political institutions. Individuals know what is expected of
thought to be valuable. Like other technologies such as steam,
them, social organizations such as business firms know their
electricity, telephones, and television, the Internet and e-commerce
limits, capabilities, and roles and political institutions provide a
can be used to achieve social progress, and for the most part, this
supportive framework of market regulation, banking and
has occurred. However, the same technologies can be used to
commercial law that provides sanctions against violators.Now,
commit crimes, despoil the environment, and threaten cherished
imagine we drop into the middle of this calm setting a powerful
social values. Before automobiles, there was very little interstate
new technology such as the Internet and e-commerce.


 
Suddenly individuals, business firms, and political institutions Ethics is at the heart of social and political debates about the
are confronted by new possibilities of behavior. For instance, Internet. Ethics is the study of principles that individuals and
individuals discover that they can download perfect digital copies organizations can use to determine right and wrong courses of
of music tracks, something which, under the old technology of action. It is assumed in ethics that individuals are free moral agents
CDs, would have been impossible. This can be done, despite the who are in
fact that these music tracks still “belong” as a legal matter to the a position to make choices. When faced with alternative courses
owners of the copyright - musicians and record label companies. of action, what is the correct moral choice?
The introduction of the Internet and e-commerce impacts Extending ethics from individuals to business firms and even
individuals, societies, and political institutions. These impacts can entire societies can be difficult, but it is not impossible. As long as
be classified into four moral dimensions: property rights, there is a decision-making body or individual (such as a Board of
information rights, governance, and public safety and welfare Then Directors or CEO in a business firm or a governmental body in a
business firms discover that they can make a business out of society), their decisions can be judged against a variety of ethical
aggregating these musical tracks - or creating a mechanism for principles. If you understand some basic ethical principles, your
sharing musical tracks- even though they do not “own” them in ability to reason about larger social and political debates will be
the traditional sense. The record companies, courts, and Congress improved. In western culture, there are ability and liability principles
were not prepared at first to cope with the onslaught of online that all ethical schools of thought share: responsibility, account-
digital copying. Courts and legislative bodies will have to make liability. Respons1nility means that as free moral agents, individuals,
new laws and reach new judgments about who owns digital organizations and societies are responsible for the actions they
copies of copyrighted works and under what conditions such take. Accountability means that individuals, organizations, and
works can be “shared.” It may take years to develop new societies should be held accountable to others for the consequences
understandings, laws, and acceptable behavior in just this one area of their actions. The third principle -liability - extends the concepts
of social impact. In the meantime, as an individual and a manager, of responsibility and accountability to the area of law. Liability is a
you will have to decide what you and your firm should do in legal feature of political systems in which a body of law is in place that
“grey”- areas, where there is conflict between ethical principles, but permits individuals to recover the damages done to them by other
no c1ear-cutural guidelines. How can you make good decisions in actors, systems, or organizations. Due process is a feature of law-
this type of situation? governed societies and refers to a process in which laws are known
Before reviewing the four moral dimensions of e-commerce in and understood and there is an ability to appeal to higher authorities
greater depth, we will briefly review some basic concepts of ethical to ensure that the laws have been applied correctly.
reasoning that you can use as a guide to ethical decision making,
and provide general reasoning principles about social political

issues of the Internet that you will face in the future. Ethical, social, and political controversies usually present themselves
as dilemmas. A dilemma is a situation in which there are at least
two diametrically opposed actions, each of which supports a
desirable outcome. When confronted with a situation that seems
to present ethical dilemmas, how can you analyze and reason
about the situation? The following is a fivestep process that should
help.
1. Identify and describe clearly the facts. Find out who did
what to whom, and where, when, and how. In many
instances, you will be surprised at the errors in the initially
reported facts, and often you will find that simply getting the
facts straight helps define the solution. It also helps to get
the opposing parties involved in an ethical dilemma to agree
on the facts.
2. Define the conflict or dilemma and identify the higher
order value involved. Ethical, social, and political issues
always reference higher values. Otherwise, there would be no
debate. The parties to a dispute all claim to be pursuing
Fig 23.1 The Moral Dimensions of an Internet Society higher values (e.g., freedom, privacy, protection of property,
and the -enterprise system). For example, DoubleClick and
its supporters argue that their tracking of consumer
Let’s take a look on what are Ethics, What is an Ethical dilemma movements on the Web increases market efficiency and the
and what are the Ethical principles which we can follow in order to wealth of the entire society. Opponents argue this claimed
come out of the ethical dilemma. efficiency comes at the expense of individual privacy, and
 DoubleClick should cease its or offer Web users the option
of not participating in such tracking.



 
3. Identify the stakeholders. Every ethical, social, and political to you, it has value and you should assume the creator wants
issue has stakeholders: players in the game who have an compensation for this work.
interest in the outcome, who have its vested in the situation,  The New York Times Test (Perfect Information Rule):
and usually who have vocal opinions. Find out the identity Assume that the result of your decision on a matter will be
of these groups and what they want. This will be useful later the subject of the lead article in the New York Times the next
when designing a solution. day. Will the reaction of readers be positive or negative?
4. Identity the options that you can reasonably take. You Would your parents, friends, and children be proud of your
may find that none of the options satisfies all the interests decision? Most criminals and unethical actors assume
involved, but that some options do a better job than others. imperfect information, and therefore they assume the
Sometimes, arriving at a “good” or ethical solution may not, decisions and actions will never be revealed. When making
always be a balancing of consequences to stakeholders. decisions involving ethical dilemmas, it is wise to assume
5. Identify the potential consequences of your perfect information markets.
options.Some options may be ethically correct, but  The Social Contract Rule: Would you like to live in a
disastrous from other points of view. Other options may society where the principle you are supporting would become
work in this one instance, but not in other similar instances. an organizing principle of the entire society? For instance,
Always ask yourself, “what if I choose this option you might think it is wonderful to download illegal copies
consistently over time?” Once your analysis is complete, you of music tracks, but you might not want to live in a society
can refer to the following well established ethical principle to that did not respect proper:’ rights, such as your property
help decide the matter. rights to the car in your driveway, or your rights to a term
 paper or original art. None of these rules is an absolute
Although you are the only one who can decide which among guide, and there are exceptions and logical difficulties with all
many ethical principles you will follow and how you will prioritize these rules. Nevertheless, actions that do not easily pass these
them, it is helpful to consider some ethical principles with deep guide-lines deserve some very close attention and a great deal
roots in many cultures that have survived throughout recorded of caution because the appearance of unethical behavior may
history. do as much harm to you and your company as the actual
behavior.
 The Golden Rule: Do unto others as you would have them
do unto you. Putting yourself into the place of others and Now that you have an understanding of some basic ethical
thinking of yourself as the object of the decision can help reasoning concept, let’s take a closer look at each of the major
you think about fairness in decision making. types of ethical, social, and political debates that have arisen in e-
commerce.
 Universalism: If an action is not right for all situations,
then it is not right for any specific situation (Immanuel 
Kant’s categorical imperative). Ask yourself, “If we adopted The Internet and the Web provide an ideal environment for
this rule in every case, could the organization, or society, invading the personal pri-vacy of millions of users on a scale
survive?” unprecedented in history. Perhaps no other recent -issue has raised
as much widespread social and political concern as protecting the
 Slippery Slope: If an action cannot be taken repeatedly, then
privacy of over 160 million Web users in the United States alone.
it is not right to take at all (Descartes’ rule of change). An
The major ethical issues related to ecommerce and privacy includes
action may appear to work in one instance to solve a
the following: Under what conditions should we invade the privacy
problem, but if repeated, would result in a negative
of others? What legitimates intruding into others lives through
outcome. In plain English, this rule might be stated as “once
unobtrusive surveillance, market research, or other means? The
started down a slippery path, you may not be able to stop.”
major social issues related to e-commerce and privacy concern the
 Collective Utilitarian Principle: Take the action that development of “exception of privacy” or privacy norms, as well
achieves the greater value for all of society. This rule assumes as public attitudes. In what areas of should we as a society encourage
you can prioritize values in a rank order and understand the people to think they are in “private territory” as opposed to public
consequences of various courses of action. view? The major political issues related to ecommerce and privacy
 Risk Aversion: Take the action that produces the least harm, concern the development of statutes that govern the relations
or the least potential cost. Some actions have extremely high between record keepers and individuals.
failure costs of very low probability e.g., building a nuclear How should organizations - public and private –who are reluctant
generating facility in an urban area) or extremely high failure to remit the advantages that come from the unfettered flow of
costs of moderate probability (speeding and automobile information on individuals - be restrained, if at all? In the following
accidents). Avoid the high-failure cost actions and choose section, we will look first at the various practices of e-commerce
those actions whose consequences would not be companies that pose a threat to privacy.
catastrophic, even if there were a failure.
 No Free Lunch: Assume that virtually all tangible and
intangible objects are owned by someone else unless there is
a specific declaration otherwise. (This is the ethical “no free
lunch” rule.) If something someone else has created is useful


 
 Anonymous profiles identify people as belonging to highly
 specific and targeted groups, for example, 20-30-year-old males,
Almost all (97%) Web sites collect personally identifiable with college degrees and incomes greater than $30,000 a year, and
information and use cookies to track the click stream behavior of interested in high fashion clothing.
visitors on the site. Personal profiles add a personal e-mail address, postal address,
Personally identifiable information (PH) is any data that can and/or phone number to behavioral data. Increasingly, online
be used to identify, locate, or contact an individual. As describe firms are attempting to link their online profiles to offline
below, advertising networks track the behavior of consumers across consumer data collected by the established retail and catalog firms.
thousands of popular sites, not just at one site. In addition, In the past, individual stores collected data on customer movement
most sites collect anonymous information composed of through a single store in order to understand consumer behavior
demographic and behavioral information that does not include and alter the design of stores accordingly. Also, purchase and
any personal identifiers. For instance, sites collect Information expenditure data was gathered on consumers purchasing from
about age, occupation, income, zip code, ethnicity, and other data
multiple stores - usually long after the purchases were made - the
that place a cookie on your hard drive to identify you by number-
data was used to target direct mail
but not by name.
and in-store campaigns, and mass media advertising. The online
advertising networks have added several new dimensions to
established offline marketing techniques. First, they have the ability
to precisely track not just consumer purchases but all browsing
behavior on the Web at thousands of most popular member sites,
including browsing book lists, filling out preference forms, and
viewing content pages. Second, they create the ability to dynamically
-adjust what the shopper sees on screen - including prices. Third,
Table 23.1 lists many of the personal identifiers routinely they create the ability to build and continually refresh high-
collected by online e-commerce sites. Table 23.2 illustrates some resolution data images or behavioral profiles of consumers . What’s
of the major ways online firms gather information about different about advertising networks is the scope and- intensity
consumers. of the data dragnet, and the ability to manipulate the shopping
environment to the advantage of the merchant. Most of this
Table 23.1 Personal Information Collected by E Commerce activity occurs in the background without the knowledge of the
Sites shopper, and it occurs dynamically online in less than a second.
Online consumer Joe Smith goes to a Web site that sells sporting
goods. He clicks on the pages for golf bags. While there, he see a
banner ad, which he ignores as it does not interest him. The ad
was placed by USA and Network. He then goes to a travel site and
enters a search on “Hawaii” the USAad Networks serves ads on
this site, and Joe sees an ad for rental cars there. Joe then visits an
online bookstore and browses through books about he worlds
best golf courses. USAad Network serves ads there as well. A
week later, Joe visits his favorite online news site, and notices an
ad for golf vacation packages in Hawaii. Delighted, he clicks on the
ad, which was served by USAad Network. Later, Joe begins to
wonder whether it was a coincidence that this particular ad appeared
Fig 23.2 The Internet’s major Personally identifiable and, if not, how it happened. The sample online profile illustrates
 several features of such profiles.
First, the profile created for Joe Smith was completely anonymous

and did not require any per-sonal information such as a name, e-
A majority (57 %) of all Web sites, and 78 % of the most popular
mail address, or social security number. Obviously, this profile
100 sites allow third parties-including advertising networks such
would be more valuable if the system did have personal
as Adforce, Avenue A, DoubleClick, Engage, L90, MatchLogic,
information because men Joe could be sent e-mail marketing.
and 24/7 Media (these firms constitute about 90 % of the network
Second, ad networks do not know who is operating the browser.
advertising industry)- to place cookies on a visitor’s hard drive in
order to engage in profiling. If other members of Joe’s family used the same computer to
shop the Web, they would be exposed to golf vacation ads, and
Profiling is the creation of digital im ages that characterize online Joe could be exposed to ads more appropriate to his wife or
individual and group behavior. An advertising network such as children. Third, profiles are usually very imprecise, the result of
24/7 Media maintains over 60 million anonymous profiles and “best guesses” and just plain guesses. Profiles are built using a
more than 20 million personal profiles. DoubleClick maintains product/service scoring system that is not very detailed, and as a
over 100 million anonymous profiles. result the profiles are crude.


 
In the above example, Joe is obviously interested in golf and behavioral data is far more valuable if it can be linked with offline
travel because he intentionally expressed these interests. However, consumer behavior, e-mail addresses, and postal addresses. This
he may have wanted to scuba dive in Hawaii, or visit old friends, consumer data can also be combined with data on the consumers’
not play golf. The profiling system in the example took a leap of offline purchases, or information collected directly from consumers
faith that a golf vacation in Hawaii is what Joe really wants. through surveys and registration forms.
Sometimes these guesses work, but there is considerable evidence As the technology of connection to the Internet for consumers
to suggest that simply knowing Joe made an inquiry about Hawaii moves away from telephone modems where IP addresses are
would be sufficient to sell him a trip to Hawaii for any of several assigned dynamically, and toward static assigned IP addresses used
activities and the USAad Network provided little additional value. by DSL and cable modems, then connecting anonymous prof1les
As a result of the crudeness of the profiles, marketers have been to personal names and e-mail addresses will become easier and
unwilling to pay premium prices for highly targeted, profile-based more prevalent.
ads, preferring instead to use more obvious and less expensive
From a privacy protection perspective, the advertising network
techniques such as placing travel ads on travel sites and golf ads
raise issues about who will see and use the information held by
on golf sites.
private companies, the absence of consumer control over the use
Network advertising firms argue that Web profiling benefits both of the information, the lack of consumer choice, the notice, and
consumers and businesses. Profiling permits targeting of ads, the lack of review and amendment procedures. The pervasive and
ensuring that consumers see advertising mostly for products and largely unregulated collection of personal information online fears
services in which they are actually interested. Business benefit by and opposition among consumers. In recent surveys, 92%oeholds
not paying for wasted advertising sent to consumers who have no said they do not trust online companies to keep their personal
interest in their product or service. The industry argues that by information confidential, and 82 % agreed that the government
increasing the effectiveness of advertising, more advertising should regulate how online companies use personal information.
revenues go to the Internet, which in turn subsidizes free content One result of the lack of trust toward online firms specific fears
on the Internet. Last, product designers and entrepreneurs benefit of privacy invasion is a reduction in online purchases. An estimated
by sensing demand for new products and services by examining $3 billion was lost in 2000 sales, and $18 billion will be lost in
user searches and profiles. 2002 online sales if nothing is done to allay consumer fears.
Critics argue that profiling undermines the expectation of Concerns about online privacy have led to two types of regulatory
anonymity and privacy that most people have when using the efforts: governmental regulation by federal and state agencies and
Internet, and change what should be a private experience into one private self-regulation efforts led by industry groups. But before
where an individual’s every move is recorded. As people become considering these efforts to preserve and maintain privacy, we
aware that their every move is being watched, they will be far less should first take a more in-depth look at the concept of privacy.
likely to explore -sensitive topics, browse pages, or read about
controversial issues. In most cases, the profiling is invisible to 
users, and even hidden. Consumers are not notified that profiling Privacy is the moral right of individuals to be left alone, free from
is occurring. Prof1ling permits aggregating data on hundreds or surveillance or interference from other individuals or organizations,
even thousands of unrelated sites on the Web. including the state. Privacy is a girder supporting freedom: Without
the privacy required to think, write, plan, and associate
The cookies placed by ad networks are persistent. Their tracking
independently and without fear, social and political freedom is
occurs over an extended period of time and resumes each time the
weakened, and perhaps destroyed. Information privacy is a subset
individual on to the Internet. This click stream data is used to
of privacy. The right to information privacy includes both the
create profiles that can include hundreds of distinct data fields for
claim that certain information should not be collected at all by
each consumer. Associating so-called anonymous profiles with
governments or business firms, and the claim of individuals to
personal information is fairly easy, and companies can change
control over personal of whatever information that is collected
policies quickly without informing the consumer.
about them. Individual control over personal information is at
Some critics believe profiling permitsweblining – charging some the core of the privacy concept.
customers more money for products services based on their
Due process also plays an important role in defining privacy. The
prof1les.
best statement of due process in record keeping is given by the
Although the information gathered by network advertisers is often Fair Information Practices doctrine developed in the early 1970s
anonymous, in many cases, the profiles derived from tracking and extended to the online privacy debate in the late 1990s
consumers’ activities on the Web are linked or merged with (described below).
personally identifiable information. DoubleClick and other
Privacy claims-and thinking about privacy - mushroomed in,
advertising network firms have attempted to purchase offline
the United States at the end of the nineteenth century as the
marketing firms that collect offline consumer data for the purpose
technology of photography and tabloid claim of individuals to
of matching offline and online behavioral data at the individual
journalism enabled the invasion of the heretofore private lives of
level. However, public reaction was so negative that no network
wealthy industrialists. For most of the twentieth century, however,
advertising firms publicly admit to matching offline PH with online
privacy thinking and legislation focused on restraining the
profile data. Nevertheless, client Web sites encourage visitors to
government from collecting and using personal information.With
register for prizes, benefits, or content access in order to capture
the explosion in the collection of private personal information by
personal information such as e-mail addresses. Anonymous


 
Web-based marketing firms since 1995, privacy concerns are
increasingly directed toward restraining the activities of private
firms in the collection and use of in forma-tion on the

Millions of employees are subject to various forms of electronic
surveillance that in many cases is enhanced by firm Intranets and
Web technologies. For instance, 38% o f employers monitor
employee e-mail, and 30% monitor employee computer files.

In the United States, Canada, and Germany, rights to privacy are
explicitly granted in or can be derived from, founding documents
such as constitutions, as well as in specific statutes. In England
and the United States, there is also protection of privacy in the
common law, a body of court decisions involving torts or personal
injuries. For instance, in the United States, four privacy-related
torts have been defined in court decisions involving claims of
injury to individuals caused by other private parties intrusion on
solitude, public disclosure of private facts, publicity placing a
person in a false light, and appropriation of a person’s name or
likeness (mostly concerning celebrities) for a commercial purpose.
In the United States, the claim to privacy against government
intrusion is protected primarily by the First Amendment
guarantees of freedom of speech and association and the Fourth:
Amendment protections against unreasonable search and seizure
of one’s personal documents or home, and the Fourteenth
Amendment’s guarantee of due process.
In addition to common law and the Constitution, there are both
federal laws and state laws that protect individuals against
government intrusion and in some cases define privacy rights vis-
a-vis private organizations such as financial, education~, and media
institutions (cable television and video rentals) (see Table 23.3).


 
 A dilemma is a situation in which there are at least two
diametrically opposed actions, each of which supports a
desirable outcome. When confronted with a situation that
seems to present ethical dilemmas we can analyze and reason
Table 23.3 Federal Privacy Laws about the situation using a five-step process.
  There are certain ethical principles which we can follow while
 Internet and its use in e-commerce have raised pervasive taking a decision in an ethical dilemma
ethical, social and political issues on a scale unprecedented for 
computer technology. 1. What are the ethical principles which we has to be follow in
 The major ethical, social, and political issues that have an ethical dilemma?
developed around e-commerce over the past seven to eight 2. How do you categorize the various ethical issues for
years can be loosely categorized into four major dimensions: developing an E commerce?
information rights, property rights, governance, and public
safety and welfare.
 Ethics is at the heart of social and political debates about the
Internet. Ethics is the study of principles that individuals
and organizations can use to determine right and wrong
courses of action


 


1. Identify and discuss two new business models (be creative) b. Perform encryption using the RSA algorithm for the
conforming to the definition of the new enterprise following:
For the two new business models that you identified: p = 7; q = 11; e = 17; M = 8
a. Create business value propositions and link them to c. The following encrypted message was obtained by applying
information security strategy. two of the following four twisted ciphers in sequence. Please
find the original message (It should be meaningful!).
b. Create a strategic plan assuming a fictional enterprise
specifically identifying and focusing on those elements that #SNSEI*E-STN+AGAMYNA
are affected by the new business models. Please list the
people, processes, and information assets that are involved.
c. Discuss one security related project that might emanate from
the strategic plan and examine the advantages of a top-down
approach and a SDLC process for implementing that project.
2. Give an example of each of the following in the context of
CRM (Customer Relationship Management) and explain
clearly the potential dangers.
a. A violation of the confidentiality of the data
b. A violation of the integrity of data
c. A violation of the availability of data
d. Improper authentication of users
e. Improper protection of the privacy of users
3. ”Globalization is considered to be one of the great benefits
of E-Commerce. Computer hacking and cyber terrorism,
however, are real threats to Global E-Commerce.”
Discuss further with focus on the ‘global’ dimension.
Please address the following in addition to the answer to the
question above:
a. Three recent security incidents (which occurred in 2004) that
compromise Global E-Commerce
b. What are the possible counter measures to these recent
incidents?
c. What shortcomings are there in Government and
International efforts to enact legislation and pacts?
4.
a. Please discuss six critical success factors for PKI deployment
clearly providing examples of each.
b. What are the obstacles to Digital Signatures becoming
universally acceptable - List and discuss at least five.
c. Discuss the strengths and weaknesses of Elliptic Curve
Cryptography.
d. Do you think it is necessary for PKI standards to incorporate
multiple cryptosystems? Explain.
5. Please answer the following questions.
a. Perform decryption using the RSA algorithm for the
following:
p = 3; q = 11; d = 7; M = 5


 




This paper presents a case study highlighting the best practices for the Use-Cases obtained from the users.They are also used to
designing and developing a B2B ecommerce system. We developed describe interface and navigational aspects, especially in the redesign
a remote order-anddelivery web-based system for an auto-parts of an existing web site.
manufacturing company. The system requirements were This paper describes the development of a B2B ecommerce system
determined by interviewing employee stakeholders. An initial using Use-Case diagrams and Scenarios for requirements analysis
scenario of the system was prototyped and refined untill the users as well as,Digital Signatures and XML. Critical success factors
and developers were satisfied. A formalized specification of the including effective communication between users and developers,
requirements employing Use-Case Diagrams and based on event processing time, process cost, reusability,efficiency, security etc. for
flow was developed and coded using XML. This helped keep the successfully building an ecommerce system are considered .
documentation simple and clear. Testing was performed at the Section 2 provides background information on the areas of UML,
component level allowing for feedback to previous Digital Signatures, XML as well as the critical success factors,
steps when errors appeared. Digital signatures were employed for mentioned above, needed for building a successful web
implementing security. The end product enabled a reduction in application. The research methodology adopted for requirements
the processing time of transactions, reduced processing cost, analysis is described in Section 3. Section 4 details the client and
improved accuracy, efficiency, reliability, and security of transmitted server applications and other implementation details for the
data; and our strategy shortened the System Development Life application. Finally, the conclusions and scope of future work are
Cycle presented in Section 5.
 
The Internet has completely changed the way most businesses Developing a web application requires making decisions and
operate today. E-commerce uses internet worked computers to selecting technologies to support those decisions. We developed
create and transform business relationships. Web applications the B2B system described in this paper using UML and Use-Case
provide business solutions that improve the quality of goods diagrams for formalization of user requirements; XML for
and services, increase the speed of service delivery, and reduce the documenting and transmission of data; and digital signatures
cost of business operations. However, many ventures into web for security purposes; steered by the critical success factors along
application development fail because the systems are very complex the development process. Background information on each of
and the users’ requirements are continuously changing. Inefficient these topics and related research in these areas are presented in this
communication between the end user and the developer is another section.
contributing factor. To successfully accomplish the development 
of a web application, one needs to visually model the system’s Visual modeling is a way of thinking about problems using
architecture. A visual model helps in coherently grasping modeling organized around real-world ideas [11]. Models are
the changing user requirements and effectively communicates them useful for understanding problems, communicating with project
to the development team. Requirements analysis along with team members (customers, domain experts, analysts, designers,
abstraction (i.e., removing unnecessary details) are critical factors etc.), modeling enterprises, preparing documentation, and
in web application development. It is easier and more cost effective designing programs and databases. Models promote better
to correct an error at the requirement or design stage than at the understanding of the requirements by filtering out nonessential
implementation or maintenance stage. details and establishing the most suitable architectural basis for
Further, formal (rigorous) specification provides unambiguous, design. Software systems that have been thoroughly modeled
precise and correct understanding of the user’s requirements. tend to be more maintainable systems.
Traditional requirement analysis consists of identifying relevant Unified Modeling Language (UML) is a language used to specify,
data functions that a software system would support. The data to visualize, and document the artifacts of an object-oriented system
be handled by the system might be described in terms of entity under development. It represents the unification of the Booch,
relationship diagrams, while the functions might be described in OMT (Rumbaugh), OOSE (Jacobson), and Objectory notations,
terms of data flows. Indeed, object oriented analysis techniques as well as the best ideas from a number of other methodologists.
offer Class, Use-Case, State Chart, and Sequence diagrams along UML is an attempt to standardize the artifacts of analysis and
with other design: semantic models, syntactic notation, and diagrams. It
diagrammatic notations for modeling. They presents a method provides a very robust notation, which grows from analysis into
that performs requirements gathering for conceptual and design. Certain elements of the notation (e.g., classes, associations,
navigational design of Web applications based on Scenarios, Use- aggregations, inheritance) are introduced during analysis.Other
Case and User Interaction Diagrams (UIDs). Scenarios are used to elements of the notation (e.g., containment implementation
validate the requirements and are automatically generated from indicators and properties) are introduced during design.


 
The Rational Rose product family was developed to provide UML can be used within the context of a service-based architecture
developers with a complete set of visual modeling tools to ensure and component-based process. Use- Cases may be employed not
robust, efficient solutions to needs in the client/server, distributed only to create the architecture but also for testing and as a vehicle
enterprise, and real time systems environments. for solution delivery. UML notation can also be used to model
Rational Rose products share a common universal standard, making families of systems. UML supports architecture phase
modeling accessible to nonprogrammers wanting to model documentation through its development and component
business processes as well as to programmers modeling diagrams. Use-Case diagrams may be enhanced by providing
applications logic. Although it is one of the leading OOCASE contracts as a formal counterpart . There are two important
tools, Rational Rose requires considerable improvements in the relationships among Use-Cases, namely uses and extends which
support of OO characteristics, prototyping and support for provide an object-oriented specification technique specially designed
teamwork development . for formalization .
Use-Case Diagrams model the user requirements and their 
interactions with the system at a very high level of abstraction. In this paper, we focus on B2B e-commerce. The trend of e-
They are very useful for early requirements analysis because they commerce transactions shows that B2B transactions increased from
enforce the identification of the different users and uses of a 8 billion U.S dollars in 1997 to $183 billion U.S dollars in 2001 . In
system while at the same time being easily understood by Japan, it is predicted that the amount in B2B transactions will
customers . reach $680 billion U.S dollars in 2003, while in the USA, it should
In addition, Class, Instance, Sequence, Collaboration, Class State, reach $1650 billion U.S dollars . Accordingly, only companies that
Activity, and Implementation Diagrams are also present. UML can manage B2B e-commerce will survive in the global mega-
can overcome most problems and be used to model most aspects competition. Electronic Commerce (e -commerce) is the ability to
of a system. The activity flow model has been successfully adapted perform business transactions involving the exchange of goods
to industrial projects including a leading German organization in and services between two or more parties using electronic tools
the banking sector . The UML architectural framework consists of and techniques. Electronic commerce can be subdivided into four
five views: Use-Case, Design, Implementation, Process, and distinct categories: Business-to-Business (B2B), Business-to-
Deployment. The contents of each architecture view are shown in Consumer, Business-to- Administration, and
Table 1. Consumer-to-Administration.
B2B e-commerce has its roots in electronic data interchange (EDI)

networks established between large buyers and suppliers within a
Architecture Style specific industry. Ecommerce enables companies to conduct their
Contents business from prospecting to order processing and delivery on-
Use-Case View Explain System Behavior View for line.
End User, Analyst, Designer, and B2B e-commerce includes the use of exchanges – internet-based
Tester. Specify factors of concrete marketplaces in which companies can purchase or sell a variety of
system architecture. products, some generic across industries and others specific to a
Design View Present system service to End User. given industry. Exchange technologies are basically web sites that
use a standard language, XML, to facilitate application to-
Consists of Class, Interface,Collaboration that
application data exchange. XML allows information regarding
make problem and solution area.
orders, purchases, payments, and products to be easily understood
Process View Present system ability, flexibility, and by other computers and makes the benefits of EDI accessible to
capacity. Consists of Threads and organizations of all sizes.
Process that make system consistency Researchers have conducted several studies and validated the use
and synchronize mechanism. of the technology acceptance model (TAM) for building web
Implementation View Present shape management of applications. Security, audit ability, non-repudiation of transactions,
internet technology for the creation of digital receipt and improved
systemic placement. Consists of
articulation of digital signatures are important to B2B e-
Component and File that make commerce.They also suggested a method that supports them by
physical system. using XFDL (eXtensible Forms Description Language).They
Deployment View Present distribution, release, and presented a software engineering tool for developing process-
settlement view of system physical oriented Internet applications that implement e-business
connections.
part. Consists of Node that make H/
W shape. In Web application development, desirable technologies include
UML has been used in the development of business information (1) e-commerce as a domain for system development,
systems based on business object components, business process (2) PC-based server software as a platform,
modeling, and design service components of a (3) HTML as a document design vehicle,
telecommunications management system (including component
(4) the Common Gateway Interface (CGI),
generation in a financial enterprise framework ).


 
(5) Visual Basic to CGI and, 
(6) a DBMS as a live data source. the message digest is encoded instead of encoding all messages by
We considered several development tools for building web public key encoding methodology, the run time is reduced and the
integrity of the message can be confirmed and forgery and/or
applications.Client-side processing require Java Applets and
falsification of messages can be prevented.
ActiveX components. Server-side processing require CGI, ISAPI,
ODBC, Java, JavaScript, VBScript, ActiveX, and CGI-script (Perl, 
C, C++). Other challenges of web application development include  
security, content-rich maintenance, integration with legacy systems,
fast development, scalability and load balancing. This paper We address the CSF (Critical Success Factors) for building B2B e-
considers factors such as ease of use, speed, accuracy, security and commerce systems in this section. At a minimum, e-commerce
reliability; all essential for building a B2B e-commerce system systems should increase the processing speed, accuracy, and
successfully. efficiency of business and personal transactions. However, B2B e-
commerce faces problems like partial solutions, rigid requirements,
We used DTDs (Document Type Definitions) and XML elements limited interoperability, insufficient trust and security and a lack of
to denote the input and output of the service and values. integration with existing business models.
Therefore, we must consider factors like security, trust and
reputation, legal expertise, speed, reliability, accuracy, efficiency of
business and transactions when building such systems. A scalable
electronic brokerage architecture is required that can, not only handle
the diverse nature of existing and future goods and services, but
also the heterogeneity of the systems and networks deployed by
the various actors (customers, suppliers, brokers,
developers) involved in the supply chain . Adaptive business
objects and controlled interoperability among business alliances
are the key enabling technologies needed to meet the challenge of
integrated value chains.
There are two key security requirements: first, to provide users
with integrated tools that guarantee privacy,security and fair trade
in a framework that protects against criminal behavior and technical
failure. Second,to provide suppliers with an environment that
enables them to freely change the market model they use for trading
digital goods . A role-based access model for e-commerce has
been suggested that separates the organizational models from
applications. Such a model allows for flexible modeling of
organizational policies and dynamic authorization requirements
in a rapidly changing business world .
Collaborative reputation mechanisms can provide personalized
Figure 1. Basic Flow Chart of Digital Signature evaluations of ratings assigned to users to predict their reliability.
In this way, negotiation and trading between unrelated parties can
 be facilitated. They presented a legal expert system for ecommerce
Digital signatures utilize encryption technology and offer such
that provides on-line explanations and reasoning about the use
functions as signer certifications, forgery/falsification identification
of trading terms e.g., types of delivery for traded goods in contracts.
and transmission as well as repudiation. Figure 1 is a brief digital
signature algorithm. It first creates a message digest by applying We have established the following CSF for building successful
B2B e-commerce systems :
hash functions on a message that the sender will transmit. The
hashing function creates a code value of regular length (a value (1) harmonious communication between users and developers ,
that differentiates each message) by mapping a certain function for (2) reduced processing time of transactions,
a message. (3) reduced processing cost of transactions,
The code value is created using a single direction function (simplex) (4) accuracy of business and transactions data,
that cannot be used to unencrypted original messages. The sender
(5) efficiency of the systems that we are going to implement,
encrypts the message with its private key and the message digest
sends it to the receiver. The receiver, using the sender’s public key, (6) shortened systems development life cycle,
decodes the digital signature. A successful process is the signer’s (7) reliability of transactions data, and
certification and transmission repudiation blockade. A message (8) security of transmitted data.
digest is also created. The receiver creates the message digest in a
3. Empirical Study
separate way as hash function MD5 from the original message
that is received with digital signatures.


 
A detailed empirical study based on the above stated factors is is followed to ensure that all requirement prototypes and designs
presented. The methodology and process described here employs conform to the needs of the users.The order and delivery system
Use-Case diagrams for requirement analysis and forms the basis was implemented using UML, XML and digital signatures as
of our research on our best practices contribution. shown in Figure 4. The critical success factors were the controlling
criteria in the implementation scheme 1.


After developing our order/delivery scenario, we developed Use-
Case Diagrams based on the aforementioned scenario and the
user’s requirements with Rational Rose as shown in Figure 4.

When employees A and B of a business company request an
item, the order and delivery system is started. The Use-Case is
shown in Figure 4 and works as follows:
(1) Input ordering data in delivering data input flow is
processed,
(2) Input data is verified,
(3) XML data is sent to the server,
(4) Receiver M logs in at the server,
(5) Verifying employee verifies the received digital signature,
Figure 2. Process Methodology of Research
(6) Transaction results in XML documentation being processed,
For the purpose of establishing a best practice, and based on a and
research , we implemented a remote order and delivery web-based
(7) Close Use-1
system for an auto-parts manufacturing company. The process
methodology is shown in Figure 2. Myung Shin is a small auto We use Window 2000 Server, Microsoft Visual C++ 6.0 for
parts manufacturing company (supplier/vendor) that delivers its programming and Ms-SQL Server 7.0 as the Database. We
products to several large automobile companies. Myung Shin set document using XML (eXtensible Markup Language) and use
out to build a B2B system that is faster and more convenient. The ASP (Active Server Page) for receiving and ordering data. Also, we
main goal was to improve the order and delivery process between use using RSAEuro encode library, to encode/decode exchanged
its own company and other remote businesses (contractors). messages. To create a message digest, we use a single hash function
First, we drew up a scenario that captured the existing order and MD5. The message switching is created with socket
delivery system based on the study by Jean-Charles Pomerol as communication s using a Microsoft Visual C++ 6.0. Rational
shown in Figure 3. Rose tool is used to draw the Use Case diagrams . We use 550Mhz
CPU and 256MB memory system for the server and Intel Pentium
II 500Mhz CPU and 128MB Memory system for the client. Case.

Figure. 3 Scenario for building B2B ecommerce systems Figure 4. Research Model
 
The first step in the process is to obtain the user requirements. If an employee omits an essential item in the order then the input
Users are presented with a scenario that is refined until they (the ordering data will not be processed. If the server does not properly
users) are satisfied with the corresponding prototype. All verify the digital signature that was received, an exception is
requirements concerning business and transaction data are also generated and the employee responsible for verifying each order
developed in this step. The next step includes formalizing the terminates the order.
user requirements with Use-Case diagrams (based on event flow
using). These specifications provide easy readability and
understandability of the requirements. An iterative methodology


 

The DTD (Document Type Definition) must exist in a Global
Repository to verify XML data. Also, XSL (eXtensible Stylesheet
Language) must also exist in the repository to enable expression
of XML data.

First, the order and delivery system of employee A, B and Receiver
M go ahead of all. Second, Use-Case Diagram needs to maintain
Internet connection because of Internet based programs. Third,
the database server has to exist to manage transaction data.

Though the Use-Case is closed, the document ordered and
delivered off-Line has to be processed continuously. And, an order
and delivery business of physical goods must be processed
continuously.

Figure 5 is the context diagram of the system. The proposed B2B Figure 7. Delivery data input screen
system exchanges only server programsand encoded files while 
communicating with other business companies. Only certified employees can execute the client program for security
reasons. Figure 7 shows the screen to input the data that is to be
delivered. The data is stored in XML format on the client when
the Order button is clicked and is validated against the DTD. The
screen in Figure 8 confirms validation by web browsers on the
client application by referring to the DTD that was saved in the
global repository.

Figure 5. The B2B System Context Diagram.


The XML documentation is transmitted by using a socket on the
application. The DTD and XSL are saved in a global repository
and are used by the web browser’s parser for validation based on
the information in the XML documentation itself that is sent and
received as shown in Figure 5.

Figure 8. The screen that confirms input data in client


If the input data wasn’t in accord with the DTD, an error is
Figure 6. Information with which XML documentation is displayed.By clicking the Sign button in Figure 8, digital signature
preserved files are created that are translated to XML data for
The first row of Figure 6 shows that the Korean language is used transmission.Figure 9 is a dig ital signatures file that applies the
as the encoding language. The version number is also indicated. digital signatures algorithm (MD5 hash algorithm) of the
The second row specifies the name of the XML documentation RSAEuro encoded library and adopts a 1024-bit
and the location of the global repository where the DTD is saved. password key to a message digest file. Figure 9 shows a screen that
is opened as a text editor. It is formalized as a length of 64byte. If
we click the Send-Quit button (Figure 8), XML data and the digital
signature are transmitted to the server.


 
Figure 9. Digital signature of 64-byte length

On the server side, we receive an XML file and a digital signature
file simultaneously from the client through the course of Figure
9. Decoding the digital signature file with the public key of sender
(obtained from an earlier exchange) produces the message digest.
After decoding the message digest and the digital signatures that
were created from XML data, we compare these message digests
with each other. If the compared results are the same, the
transaction is certified.Figure 9 confirms the digital signature by
the algorithm that is in the RSAEuro library, and when the received
digital signature is inconsistent, an error message is displayed while
at the same time the operation is stopped. Figure 10 is the
employee’s certification screen that enables access to the global
repository which can then be used to identify the received XML
Figure 10. Employee’s certification screen
data at the server.
Figure 11 is the screen that displays the XML documentation that
was delivered, after the digital signature has been verified and the
data validated against the DTD and the XSL in the global
repository.

 First, communication between the developers and the users
was harmonious. That is, by producing conceptually and
physically visualized and specified output using Use-Case


 
Diagram and XML, the communications between developers and without input through keyboard when they worked on
and employees were improved. an order/delivery.
 Second, processing time of the business and employee’s  Eighth, we ensured security of transmitted data by using
transaction data was reduced. In the past, employees digital signatures while transmitting data. This enabled
managed order and delivery documents by writing directly on authentication of identity and repudiation of forgery/
paper. Moving the order and delivery system onto the falsification.
Internet reduced the time needed to process business/

employee’s transaction data.
In this paper, we have described the implementation of a B2B e-
 Third, the processing cost was reduced. This conclusion is commerce system for the order and delivery of auto parts.
based on the annual salary of an employee.Namely, we Requirements analysis was carried out using scenarios and
compared between the times when the B2B e-commerce formalized using Use-Case diagrams. Digital signatures were
system wasn’t and was implemented. There was a cost employed for implementing security. Order and delivery
savings of roughly $12,000 USD per month. documentation was made simple and clear through the use of
XML. Eight critical success factors were used as controlling
parameters while building the application.
The implementation approach preserved and promoted
harmonious communication between the users and developers.
The end product achieved a reduction in the processing time of
transactions, reduced processing cost including improved accuracy,
efficiency and security of transmitted data. Also, the strategy
seemingly shortened the System Development Life Cycle.
In general, the typical B2B e-commerce characteristic is
heterogeneity, especially in the types of product information that
is needed. Strategies for the successful implementation of such
systems depend on both the standardization and the
accommodation of such heterogeneity. For future work, the tools
that we are considering for accomplishing this include XML, DTD
(Document type definitions), ICE (Information and Context
Exchange), and CBL (Common Business Library). Further research
on the convergence of XML technologies and software engineering
will also be done. They claim that the strengths of middleware
and markup languages are complementary. They expect this
combination to be used in the future for distributed systems
where complex data structures need to be transmitted between
Figure 11. Delivered XML documentation
distributed off- the-shelf components and semantic
 Fourth, the accuracy of transaction data was improved transformations performed.They present a formal basis for syntactic
resulting in less rework . The system was more responsive structures and semantics of core UML class constructs, and also
(i.e., interactive) and therefore employees were less apt to provide a basis for reasoning about UML class diagrams in their
commit errors (the user interface provided a more intuitive paper. They translate UML class constructs to Object-Z constructs
environment). For these reasons, the accuracy of transaction as being based on this formal description. Also present RoZ, an
data input to the system (e.g., auto parts codes were automated tool for generating a Z formal specification An XML
tabulated) was greatly improved. web environment for projecting integrated formal models (TCOZ:
 Fifth, efficiency of the system was improved. Unit Integrated model of state-based Object-Z and event-based Timed
components were designed by separating concerns into CSP) to UML diagrams and several ways of using UML for
functions. In this way, the system designed was extensible designing effective software architectures have been suggested .In
and reusable. Perfective and corrective maintenance were the future, we plan on building a B2B e-commerce system using
greatly simplified by this component based object-oriented Advanced Visual Modeling Technique and Object-Z. Study of a
approach. Consequently our system evolved into a more natural language processing technique for semantic modeling of
usable and ultimately more efficient system. user’s requirements will also be undertaken.
 Sixth, the development life cycle for the system was
shortened by applying our development methodology, a
combination of SDLC (System Development Life Cycle) and
PDLC (Prototyping Development Life Cycle).
 Seventh, the reliability of the system was improved. Errors
were reduced because employees retrieved the relevant auto
parts (and other information) from tables stored in memory


 

Potrebbero piacerti anche