E BUSINESS
E BUSINESS
➢ E-business
E-business or Online business means business transactions that take
place online with the help of the internet. The term e-business came
into existence in the year 1996. E-business is an abbreviation for
electronic business. So the buyer and the seller don’t meet personally .
❖ Feature of E- business
➢ E- commerce
Types of E-commerce
Business - to - Business
A website following the B2B business model sells its
products to an intermediate buyer who then sells the
product to the final customer. As an example, a wholesaler
places an order from a company's website and after
receiving the consignment, sells the endproduct to the final
customer who comes to buy the product at one of its retail
outlets.
2
Business - to - Consumer
A website following the B2C business model sells its
products directly to a customer. A customer can view the
products shown on the website. The customer can choose
a product and order the same. The website will then send
a notification to the business organization via email and the
organization will dispatch the product/goods to the
customer.
Consumer - to - Consumer
A website following the C2C business model helps
consumers to sell their assets like residential property,
cars, motorcycles, etc., or rent a room by publishing their
information on the website. Website may or may not charge
the consumer for its services. Another consumer may opt
to buy the product of the first customer by viewing the
post/advertisement on the website.
3
Consumer - to - Business
In this model, a consumer approaches a website showing
multiple business organizations for a particular service. The
consumer places an estimate of ount he/she wants to spend
for a particular service. For example, the comparison of
interest rates of personal loan/car loan provided by various
banks via websites. A business organization who fulfills the
consumer's requirement within the specified budget,
approaches the customer and provides its services.
4
➢ Difference b/t E-commerce & E-
business.
APPLICATIONS OF E-COMMERCE :
4. Manufacturing
5. Online Auction
6. E-Banking
7. Online publishing
8. Online booking
3. Finance
6
Financial companies are using E-commerce to a large extent.
Customers can check the balances of their savings and loan
accounts, transfer money to their other account and pay their
bill through on-line banking or E-banking. Another application
of E-commerce is on-line stock trading. Many Websites provide
access to news, charts, information about company profile and
analyst rating on the stocks.
4. Manufacturing
5. Auctions
7
6. E-Banking
7. Online publishing
8. Online booking
8
9
➢ Framework of E-commerce
3) Multi-channel Functionality
10
The fact is that everyone is looking forward to have easy
browsing on mobile than to go for getting an efficacious
platform, which will surely help to grow user and
customer’s attraction.
6) Business Intelligence
11
literature. In general a framework is intended to define
and create tools that integrate the information found in
today’s closed systems and allow the development of
e-commerce applications. It is important to understand
that the aim of the architectural frame-work itself is not to
build new database management systems, data
repository, computer languages, software agent based
transaction monitors, or communication protocols Rather,
the architecture should focus on synthesizing the diverse
resources already in place incorporations to facilitate the
integration of data and software for better applications.
12
1. Application Services
▪ Consumer-to-Business Transactions
13
methods. Business-to-business transactions include the use of EDI
and electronic mail for purchasing goods and services, buying
information and consulting services, submitting requests for
proposals, and receiving proposals. The current accounts payable
process occurs through the exchange of paper documents. Each
year the trading partners exchange millions of invoices, checks,
purchase orders, financial reports, and other transactions. Most of
the documents are in electronic format their point of origin but are
printed and key-entered at the point of receipt. The current manual
process of printing, mailing is costly, time consuming, and error-
prone. Given this situation and faced with the need to reduce costs,
small businesses are looking toward electronic commerce as a
possible saviour.
▪ Intra-organizational Transactions
14
The information brokerage and management layer provides service
integration through the information brokerages, the development
of which is necessitated by the increasing information resource
fragmentation. The notion of information brokerage is used to
represent an intermediary who provides service integration
between customers and information providers, given some
constraint such as a low price, fast service, or profit maximization
for a client. Information brokers, for example, are rapidly becoming
necessary in dealing with the voluminous amounts of information
on the networks.
15
4. Secure Messaging and Document Interchange
Services
5. Middleware Services
17
18
UNIT – 2
➢ Network
A network is a collection of computers, servers mainframes, network
devices, peripherals, or other devices connected to one another to
allow the sharing of data. An example of a network is the Internet,
which connects millions of people all over the world. To the right is
an example image of a home network with multiple computers and
other network devices all connected.
➢ Communication Network
1. Message
2. Sender
19
3. Receiver
4. Transmission Medium
5. Set of rules (Protocol)
1. Message :
2. Sender :
3. Receiver :
➢ Communication processor
A front end processor (FEP), or a communications processor, is a
small-sized computer which interfaces to the host computer a
number of networks, such as SNA, or a number of peripheral
devices, such as terminals, disk units, printers and tape units. Data is
transferred between the host computer and the front end processor
using a high-speed parallel interface. The front end processor
communicates with peripheral devices using slower serial interfaces,
usually also through communication networks. The purpose is to off-
load from the host computer the work of managing the peripheral
devices, transmitting and receiving messages, packet assembly and
disassembly, error detection, and error correction.
21
➢ Communication media
Communication media refer to the ways, means or channels of
transmitting message from sender to the receiver. Communication
media indicate the use of verbal or non-verbal language in the
process of communication. Without language, none
can communicate. Whenever communication takes place, media are
used there.
• Wire pairs
• Coaxial cable
• Microwave transmission
• Communication satellites
• Fiber optics
• Wi - fi
➢ Communication satellite
Satellite communication, in telecommunications, the use of
artificial satellites to provide communication links between various
points on Earth. Satellite communications play a vital role in the global
telecommunications system. Approximately 2,000 artificial satellites
orbiting Earth relay analog and digital signals carrying voice, video, and
data to and from one or many locations worldwide.
22
Satellite communication has two main components: the ground
segment, which consists of fixed or mobile transmission, reception,
and ancillary equipment, and the space segment, which primarily is the
satellite itself. A typical satellite link involves the transmission or
uplinking of a signal from an Earth station to a satellite. The satellite
then receives and amplifies the signal and retransmits it back to Earth,
where it is received and reamplified by Earth stations and terminals.
Satellite receivers on the ground include direct-to-home (DTH) satellite
equipment, mobile reception equipment in aircraft, satellite
telephones, and handheld devices.
➢ Types of network:
23
o It is less costly as it is built with inexpensive hardware such as hubs,
network adapters, and ethernet cables.
o The data is transferred at an extremely faster rate in Local Area
Network.
o Local Area Network provides higher security.
24
o Government agencies use MAN to connect to the citizens and
private industries.
o The most widely used protocols in MAN are RS-232, Frame Relay,
ATM, ISDN, OC-3, ADSL, etc.
25
▪ VPN
▪ GAN
➢ Wireless network
26
The basis of wireless systems are radio waves, an implementation that
takes place at the physical level of network structure.
27
➢ Wireless internet access
28
These digital lines could be copper lines. It was designed to move
outdated landline technology to digital.
ISDN Advantage
➢ Broadband
30
and at high speeds. Common mediums of transmission include coaxial
cable, fiber optic cable, and radio waves.
KEY TAKEAWAYS
➢ Wi-fi
Wi-Fi is the radio signal sent from a wireless router to a nearby device,
which translates the signal into data you can see and use. The device
transmits a radio signal back to the router, which connects to the
internet by wire or cable.
31
gives you flexibility to stay connected to the internet as long as you’re
within your network coverage area.
32
Unit – 3
➢ OSI Model
The OSI Model (Open Systems Interconnection Model) is a conceptual
framework used to describe the functions of a networking system. The
OSI model characterizes computing functions into a universal set of
rules and requirements in order to support interoperability between
different products and software. In the OSI reference model, the
communications between a computing system are split into seven
different abstraction layers: Physical, Data Link, Network, Transport,
Session, Presentation, and Application.
Created at a time when network computing was in its infancy, the OSI
was published in 1984 by the International Organization for
Standardization (ISO). Though it does not always map directly to
specific systems, the OSI Model is still used today as a means to
describe Network Architecture.
1.Physical Layer
The lowest layer of the OSI Model is concerned with electrically or
optically transmitting raw unstructured data bits across the
network from the physical layer of the sending device to the
physical layer of the receiving device. It can include specifications
such as voltages, pin layout, cabling, and radio frequencies. At
33
the physical layer, one might find “physical” resources such as
network hubs, cabling, repeaters, network adapters or modems.
3.Network Layer
The network layer is responsible for receiving frames from the
data link layer, and delivering them to their intended destinations
among based on the addresses contained inside the frame. The
network layer finds the destination by using logical addresses,
such as IP (internet protocol). At this layer, routers are a crucial
component used to quite literally route information where it needs
to go between networks.
4.Transport Layer
The transport layer manages the delivery and error checking of
data packets. It regulates the size, sequencing, and ultimately the
transfer of data between systems and hosts. One of the most
common examples of the transport layer is TCP or the
Transmission Control Protocol.
5.Session Layer
34
The session layer controls the conversations between different
computers. A session or connection between machines is set up,
managed, and termined at layer 5. Session layer services also
include authentication and reconnections.
6.Presentation Layer
The presentation layer formats or translates data for the
application layer based on the syntax or semantics that the
application accepts. Because of this, it at times also called the
syntax layer. This layer can also handle the encryption and
decryption required by the application layer.
7.Application Layer
At this layer, both the end user and the application layer interact
directly with the software application. This layer sees network
services provided to end-user applications such as a web browser
or Office 365. The application layer identifies communication
partners, resource availability, and synchronizes communication .
➢ Protocols
Types of protocol
36
4. Post office Protocol (POP):
FTP allows users to transfer files from one machine to another. Types
of files may include program files, multimedia files, text files, and
documents, etc.
37
(request) and the web server (response) in the hypertext format, same
in case of HTTPS except that the transferring of data is done in an
encrypted format. So it can be said that https thwart hackers from
interpretation or modification of data throughout the transfer of
packets.
➢ Network security
Network security is a broad term that covers a multitude of
technologies, devices and processes. In its simplest term, it is a set of
rules and configurations designed to protect the integrity,
confidentiality and accessibility of computer networks and data using
both software and hardware technologies. Every organization,
regardless of size, industry or infrastructure, requires a degree of
network security solutions in place to protect it from the ever-growing
landscape of cyber threats in the wild today.
38
twofold; it needs to protect data and systems from unauthorized
personnel, and it also needs to protect against malicious activities from
employees.
39
➔ Network Based Firewall & Host Based
Firewall
Terminology Firewall filters traffic going from Internet A host firewall is a software
to secured LAN and vice versa. application or suite of
applications installed on a
singular computer
Placement At the Perimeter or border of the network Placed at end Host systems
like Internet handoff point to address the and will be in a way, 2nd line of
unauthorized access from the entry/exit defence if unauthorized traffic
point. has not been blocked by
Network based firewall.
Mobility Cannot be moved until all the assets of Since Host based Firewall is
LAN have been migrated to new location installed on end machine
(Laptop/desktop) , hence Host
based firewall is mobility
friendly
Internal Protection For end host to end host communication For end host to end host
(same VLAN/Zone) in same VLAN , Network Firewall does not communication in same VLAN,
provide security Host based Firewall provides
security control and
protection.
Network Protection Strong defence barrier compared with Limited defence barrier
host-based. Infact Network Firewalls are compared to Network firewalls
hardened enough leaving very less space
for attacker to play.
40
Scalability Easy to scale since increase in number of More effort required to scale
users in LAN triggers more bandwidth in terms of more installations
requirement and rightly sized Firewall & maintenance on each device
considering future growth does not when number of hosts
require much of effort to accommodate increase
high bandwidth.
Skill set Setup requires highly skilled resources Skill set of basic
with good understanding of Security Hardware/software
devices understanding and program
installation
❖ Advantages of Firewall
42
4. Proper Management: All the files are stored in the same place.
In this way, the management of files becomes easy. Also, it
becomes easier to find files.
5. As all the data is stored on the server it's easy to make a back-up
of it.
6. Reduces Data Replication- Data stored on the servers instead of
7. each client, so it reduces the amount of data replication for the
application.
➢ Data security
43
• Confidentiality. Ensures that data is accessed only by authorized
users with the proper credentials.
• Integrity. Ensure that all data stored is reliable, accurate, and not
subject to unwarranted changes.
2) Shoulder Surfing
One aspect of data theft that may seem all too obvious, yet is also quite
common is the act of ‘shoulder surfing’. This of course refers to an
attacker peering over your shoulder to obtain information from your
44
device or your keyboard movements. With camera phones especially,
this data can easily and overtly be recorded by attackers if we do not
take steps to protect our information. The types of information that can
be stolen can be so personal as to include credit card numbers, bank
accounts, and important passwords that can grant access to an endless
amount of important details and can be dangerous in the wrong hands.
3) Malware
4) Email Spam
Fourth on this list of invasive data threats is simply known as good old
Spam. Every time you log into your email account, it is likely that you
notice some unwanted messages in your inbox – or junk mail folder.
While the multitude of these messages can not only clog up your email
account, they also have the potential to take up residence on your
mail’s server.
While for the most part these spam-filled messages can be no more
than an annoyance, it is the links that are contained within these
45
messages that can present a higher threat. If you accidentally click on
these links this can automatically direct you to another site that is
poised and ready to install malicious software onto your computer.
5) Phishing Scams
While this danger associated with this last threat can also include spam
messages, the act of Phishing, however actually refers specifically to
the fraudulent email messages that are designed and personalized to
appear as if they are authentic messages. Moreover, these messages
may give the allusion that they are from real sources – even individuals
you are very familiar with – and as a result it is not likely that you would
not question their legitimacy.
➢ Messaging security
➢ Encrypted document
47
➔ Advantage of encryption
1. Encryption protects your privacy
2. Encryption prevents Identity Theft and Ransomeware Blackmail
3. Encryption allows you to securly share your files
4. Encryption protects Lost document
These are some tools of security which we have studied above like,
firewall, clint server security, data & messaging security, encrypted
document and etc.
➢ Digital signature
48
➔ Benefits of digital signature
1. Document Security:
Nobody wants to have to go into crisis management mode when
important paper documents are stolen, misplaced or destroyed due
to a fire, flood or other unforeseen disaster. The fact is, these things
happen – and prevention is always better than cure. Digital
document management and storage eliminates the chances of
physical records going missing or being destroyed.
2. Company image:
Using digital signatures and finalising contracts and agreements so
much faster than expectations have always dictated shows clients
your business has the latest technology in place, and is serious about
efficiency. For one of our clients, the fact that they used a digital
signature and workflow solution turned out to be a differentiator
when it came to them getting a deal.
49
4. Time management:
There is nothing more time consuming – not to mention frustrating
than having to spend hours searching for physical documents that
went through a lengthy manual signing, managing & storing process
and straight into a proverbial black hole. Digital Signatures turn
hours – sometimes days or even weeks – into mere minutes by
allowing you to quickly find the required documents, on a secure
server, and then action them.
5. Simplification of processes:
One of our recently acquired customers were pleasantly surprised
to see how simple going digital and paperless was, and how quickly
our solution was able to save them time and money by simplifying
day-to-day business processes. “We initially thought the change to
digital processes would complicate things and take so much time to
implement, but it turns out it was simpler than any single manual
process we’ve done in the past, and our employees were happy and
quick to get on board and move away from old manual contract
signing and filing systems.”
6. Customer satisfaction:
We love to hear feedback from our customers about their
customers, because we understand how much value a customer
holds for a company. While organisations stand to benefit hugely
from going paperless – in both monetary and time-saving terms –
the customers they serve reap just as many rewards, including
convenience, speed and efficiency. At the end of the day, a happy
customer means a happy bottom line.
7. Eradication of fraud:
50
It’s no secret that any semi-skilled con artist can forge a physical
signature. Digital signatures completely eliminate the risk of forgery,
because they are backed by a unique digital identity, based on
globally accepted Public Key Infrastructure standards. There is no
higher level of security when it comes to signing a document.
8. Legality:
One of the things we frequently get asked by customers, is whether
digital signatures are legally valid across all parts of the world. The
answer is yes. Sing Flow digital signatures were developed with both
security and compliance at their core, and are compliant with
European, US, South African and international regulations for
electronic transactions and trust services. Our solution uses state-of-
the-art digital cryptographic signature technology that allows
businesses and their customers to sign documents remotely and
securely, with the sound knowledge that they are signing with
signatures that are legally binding.
9. Money savings:
This is probably the most immediately raved about benefit see
when companies deploy digital signatures. Apart from the obvious
money-saving benefits that come with not having to print
documents out, such as no more paper, ink, printers and
maintenance, there are other associated cost savings enabled by
digital document management and storage, such as needing less
physical office space (which is often one of the biggest expenses a
company has), and document distribution.
51
compliance and protection of company information. Our digital
signature workflow system provides businesses with a full digital
audit trail, kept with documents in the Sing Flow workspace, stored
on secure servers.
➔ Digital Certificate
A Digital Certificate is an electronic "password" that allows a person,
organizaion to exchange data securely over the Internet using the
public key infrastructure (PKI). Digital Certificate is also known as
a public key certificate or identity certificate.
52
Unit – 4
The WWW is a browser or web browser that lets users’ access web
pages and web programs. The browsers include Internet Explorer,
Firefox, Opera, Safari, and Google Chrome.
53
The world wide web ('www' or 'web' for short) is a collection of
webpages found on this network of computers. Your web
browser uses the internet to access the web.
54
5. Customers can have a more personal connection with the
business through the Internet and on the other hand, businesses can
have continuous communication with the customer. With the internet,
making follow-ups on pending orders has become easier.
Moreover, even payment of orders has become simple,
secured and trouble-free through the use of the www.
1. Direct Selling
With the help of the World Wide Web, people from around the globe
can visit virtual shops and malls online, browse through various product
catalogues, get all the details of the products, and purchase them
directly from the website. All these functions of an ecommerce
store are possible only through the multimedia functions of the World
Wide Web. Also, any individual can now sell online to any part of the
world without the need for visiting the place through such virtual shops
using WWW.
2. Communication
Email or electronic mail is the most common mode of communication
from businesses to customers as well as from businesses to businesses.
It is a low-cost and effective way to communicate through the large
network of the World Wide Web. Ecommerce is a business that
requires active communication between the sellers and customers as
well as among multiple sellers. Using email, this communication can be
done easily without boundary limitations or lack of target audience.
55
3. Marketing
Many business documents can be exchanged using EDI, but the two
most common are purchase orders and invoices. At a minimum, EDI
replaces the mail preparation and handling associated with traditional
56
business communication. However, the real power of EDI is that it
standardizes the information communicated in business documents,
which makes possible a "paperless" exchange
57
• Improved turnaround times
Your business cycle is improved and stock levels are kept constantly up
to date and visible.
• Improved timelines
EDI reduces the time it takes your staff to manually create invoices and
process purchase orders
Faster transactions:
58
Reduced errors:
Improved accessibility:
Maximized efficiency:
With faster speeds, reduced errors and better accessibility, EDI offers
improved efficiency across the board for corporations. By eliminating
time-consuming manual processes and data processing tasks,
businesses can allocate their people and resources to tasks that more
directly impact customer relationships and add value to the company.
Increased security:
While manual processes may seem secure, the human error involved
actually increases security risks, allowing room for inaccuracies and loss
of data. With EDI, processes are automated, and documents are
transferred through a secure connection, eliminating costly errors.
Additionally, EDI makes it easier to track and store data for auditing
purposes, ensuring that your company is ready to meet industry
compliance standards.
Cost savings:
59
All the above-listed benefits result in a system that saves businesses
money. While non-EDI systems incur labor and materials costs and
allow for costly errors, EDI systems eliminate these problems.
Electronic-only documentation reduces material costs, while
automation reduces labor costs and expensive errors.
➢ Intranet
An intranet can be defined as a private network used by an
organization. Its primary purpose is to help employees securely
communicate with each other, to store information, and to help
collaborate. Modern intranets use social features that allow employees
to create profiles and to submit, like, comment, and share posts .
➔ Uses of intranet
60
▪ Access to organizational data and files anytime, anywhere
▪ Increases internal communication
▪ Connects employees
▪ Increases employee productivity
▪ Drives employee engagement
▪ Enhances collaboration
▪ Integrates with third-party tools
▪ Stores securely document
▪ Boosts employee recognition and rewards
▪ Encourages knowledge sharing
Unit -5
61
The most common payment forms online are credit card and debit
card, others are e-wallet, bank transfer, bitcoin wallet and smart
cards.Online payments need to be done over secure encrypted
connection in order to decrease chances of having the personal and
billing information stolen.
➢ Payment cards
62
Payment cards are part of a payment system issued by financial
institutions, such as a bank, to a customer that enables its owner
(the cardholder) to access the funds in the customer's designated bank
accounts, or through a credit account and make payments by electronic
funds transfer and access automated teller machines (ATMs). Such
cards are known by a variety of names including bank cards, ATM
cards, MAC (money access cards), client cards, key cards or cash cards.
Credit card
Debit card
With a debit card (also known as a bank card, check card or some other
description) when a cardholder makes a purchase, funds are withdrawn
directly either from the cardholder's bank account, or from the
remaining balance on the card, instead of the holder repaying the
63
money at a later date. In some cases, the "cards" are designed
exclusively for use on the Internet, and so there is no physical card .
Charge card
With charge cards, the cardholder is required to pay the full balance
shown on the statement, which is usually issued monthly, by the
payment due date. It is a form of short-term loan to cover the
cardholder's purchases, from the date of the purchase and the payment
due date, which may typically be up to 55 days. Interest is usually not
charged on charge cards and there is usually no limit on the total
amount that may be charged. If payment is not made in full, this may
result in a late payment fee, the possible restriction of future
transactions, and perhaps the cancellation of the card.
ATM card
An ATM card (known under a number of names) is any card that can be
used in automated teller machines (ATMs) for transactions such as
deposits, cash withdrawals, obtaining account information, and other
types of transactions, often through interbank networks. Cards may be
issued solely to access ATMs, and most debit or credit cards may also
be used at ATMs, but charge and proprietary cards cannot .
Stored-value card
Fleet card
Smart card
A smart card, chip card, or integrated circuit card (ICC), is any pocket-
sized card with embedded integrated circuits which can process data.
This implies that it can receive input which is processed by way of the
ICC applications and delivered as an output. There are two broad
categories of ICCs. Memory cards contain only non-volatile memory
storage components, and perhaps some specific security
logic. Microprocessor cards contain volatile memory and
microprocessor components. The card is made of plastic, generally PVC,
but sometimes ABS. The card may embed a hologram to
avoid counterfeiting. Using smart cards is also a form of strong security
authentication for single sign-on within large companies and
organizations.
65
➢ Electronic cash/ E- cash
66
➔ Advantages of Electronic cash
2. Historical record
4. Instantaneous
67
be completed in split seconds with the click of a button from virtually
anywhere in the world. It eliminates problems of physical delivery of
payments, including long queues, wait times, etc.
5. Increased security
➢ Electronic Check
68
• An electronic check has more security features than standard paper checks.
➔ Benifits of e-check
.
2. Save Money
With traditional paper checks you’re paying for the paper check,
envelope, stamp, and time involved in preparing the check and getting
it ready to mail. An eCheck costs right around the cost of a stamp, but
does the work of a check, an envelope and a stamp at a fraction of the
cost. This saves you roughly $1 per check
.
3. Save Time
With paper checks, there are a lot of manual steps that need to take
place to prepare the check for mailing. You need to: put the check stock
into the printer, print the checks, sign the checks, tear off the
69
remittance stub for your records, fold the check and stuff it into the
envelope, seal the envelopes, and attach postage. All of these steps
take time. With eChecks, once the transaction is entered on our site, or
into your accounting software, you’re essentially done and can send
checks without all of that manual processing. We recently had a
customer send 6,000 checks in about 9 minutes. That type of efficiency
could never be achieved with paper checks.
3. No Sign-Up Required
You can receive a payment quickly without sharing any sensitive data.
With many other forms of payment, the recipient is required to share
their routing/account number and sign up for that service in order to be
paid. With DPX eChecks, you can retrieve the check as a guest without
either sharing any of your sensitive data or requiring you to sign up.
➢ Electronic wallet
When you’re carrying an electronic wallet, you get to limit the number
of cards you carry when you travel. You no longer have the
requirement to carry a lot of cash with you either. All you need to do is
tap your device to the payment receptacle, or have your mobile device
scanned, to pay for the items you are purchasing. That means you’re no
longer carrying a pocketful of items wherever you go.
Electronic wallets typically store credit cards and debit cards. They can
be used for a wide variety of cards, however, if the provider is
compatible with the wallet you are using. That means you can store
rewards cards, loyalty cards, and even coupons within your digital
wallet, allowing you to enjoy more of a paperless lifestyle.
72
If you have a wad of cash in your pocket that gets lost, you have zero
options available to you to recover your funds. Losing your credit cards
means you must contact each lender to cancel each card, then have a
new one issues. With an electronic wallet, the information is stored
through a third-party provider. It’s locked behind your password or
biometrics. Even if you lose your device, you’ll still have access to your
e-wallet once you get a new device.
Electronic wallets have become widely accepted within the past few
years. Most locations that accept cards as a payment option will allow
you to pay with your electronic wallet. Although there are still some
locations that are using older processing technologies, which does limit
some product or service access, the number of retailers who provide
payment access in this manner continues to increase each year.
➢ Debit card
1. Debit cards eliminate the need to carry cash or physical checks to make
purchases, and they can also be used at ATMs to withdraw cash.
2. Debit cards usually have daily purchase limits, meaning it may not be
possible to make an especially large purchase with a debit card.
4. You may be charged an ATM transaction fee if you use your debit card to
withdraw cash from an ATM that's not affiliated with the bank that issued
your card.
5. Some debit cards offer reward programs, similar to credit card reward
programs, such as 1% back on all purchases.
There are several advantages of a debit card. The key advantages are as
follows:
When you open a savings or current account, most banks issue a free debit
card. Make sure that you fill in the necessary documentation to receive your
debit card
.
✓ Very convenient to use:
74
One of the advantages of a debit card is that it can be swiped for
transactions as well as withdrawal of cash from ATMs.
✓ No more debts:
When you have a credit card, you are more likely to make impulsive
purchases. But a debit card keeps you in check as it is linked to your bank
account. You are only able to spend the amount that is in your account. You
don’t have to worry about the mounting credit card bills anymore.
✓ Easily accepted:
Debit cards are accepted widely all over India and at international
destinations. Make sure to authorise international transactions by simply
calling your bank. These debit cards can be used for cash withdrawal at
international ATMs too. So you don’t have to carry cash with you when you
are travelling.
✓ Earn rewards:
Offers are not restricted to credit cards alone. Using your debit card too can
help you gain rewards and cashbacindia offers. Several online and retail
outlets offer cashback offers for every purchase made on the debit card. The
points can be redeemed at any time to either purchase products from an
online catalogue of the bank or to earn shopping vouchers from various
brands.
75
There are certain disadvantages associated with using a debit card:
✓ No credit allowed:
It is easier to fraudulently use your debit card. In case someone steals the
details of your card, especially the PIN and CVV, the chances of a fraudulent
transaction are very high. It is difficult to dispute such transactions with the
bank.
Every bank offers you a limited number of free ATM transactions and other
non-financial transactions per month at the branches of other banks. Once
you exceed the limit of free withdrawals/ non-financial transactions, fees
are levied
➢ Credit card
76
➔ Advantages of using credit cards
There are many advantages when using a credit card as a method
for purchasing goods. It does not necessarily mean that you do not
have funds to cover those purchases.
The use of a credit card, instead of cash or personal funds, offers the
following advantages:
➢ Smart card
77
A smart card is a physical card that has an embedded integrated chip
that acts as a security token. Smart cards are typically the same size as
a driver's license or credit card and can be made out of metal or plastic.
They connect to a reader either by direct physical contact (also known
as chip and dip) or through a short-range wireless connectivity standard
such as radio-frequency identification (RFID) or near-field
communication (NFC).
78
2. The smart card was programmed to be read flexibly and easily by a
wide range of devices and readers or by multi-technology readers and in
various expandable locations by adding new control panels and readers.
3. These cards support digital signatures, which can be used to check the
guarantee and validity issues by the organization and that the data on
the card is correct and has not been changed fraudulently since the
issuance.
5. Smart cards can support a wide variety of functions and high capacity
to store information on the card and the flexibility for securely adding
information
79
They are an electronic development of token coins and are typically
used in low-value payment systems or where network access is difficult
or expensive to implement, such as parking machines, public transport
systems, closed payment systems in locations such as ships or within
companies.
➔ Advantage of SVC
1. Merchandise returns.
Going forward, you can use store value cards instead of actual cash
to reimburse customers for returned merchandise. That way, you
are guaranteeing that the money will be spent in your store. Store
value cards help to provide you with assurances that you will not be
losing out when customers bring your items back. Giving them store
credits will encourage them to come back to spend again.
2. Promotional marketing tools.
You can use your store value cards as excellent promotional
items. It’s always a good idea to launch advertising campaigns
in order to draw more customers into your store. Why not run a
contest where the winner receives a free store value card? You
may also want to offer up these cards and place $5 increments
on each of them to people who visit your store during a certain
promotion. Naturally, you can encourage them to “top up” once
they’ve used up the five bucks.
3. Repeat business.
Store value cards promote customer loyalty. When someone really
loves your place of business, he or she is bound to come back. So
having a store value card will help to provide that incentive to return
for some shopping. As well, such cards also make great gifts. After
all, they are still gift cards. And when people get to decide how much
80
they wish to place on their cards, they make for an even more
convenient purchases than normal.
4. Corporate gifts.
Speaking of making gifts out of store value cards, they are arguably
the best possible gifts that you can give your employees. Sure, they
may enjoy their employee discounts. But nothing beats free! Reward
your staff members with these cards that not only allow them to
shop in your store, but encourage them to continue to do so. Loyalty
from within is often the greatest way to further promote your brand.
5. Customer appreciation.
Speaking of loyalty, you never want to forget your favourite
customers. It is often said that it is easier to keep your current
customers than it is to attract new ones. So never forget the ones
who have already leant you their support. Show your regular
customers that you appreciate them by giving them store value
cards with denominations of your choice. Again, it will help to keep
bringing them back.
81
Internet banking, on the other hand, is also a form of online banking
that allows customers to perform any financial transaction using the
internet on any electronic device. Internet banking has contributed a
lot in evolving the banking system as with the internet form of banking,
you do not need to visit the exact branch of your bank for any small or
big transaction.
Parameters
of
Comparison Mobile Banking Internet Banking
It is also an online-based
It is an online-based system that allows
banking system that customers to make
allows customers to transactions through any
make transactions via electronic device using the
Meaning their cellular devices. internet.
82
Funds are transferred Funds are transferred
Transfer of through NEFT or through NEFT, TRGS, or
Funds RTGS. IMPS.
➢ Internet technologies
83
That group of technologies that allow users to access information and
communication over the World Wide Web (Web browsers, ftp, e-mail,
associated hardware, Internet service providers, and so forth).
84
The Internet provides a universally available set of technologies
for electronic commerce that can be used to create new channels
for marketing, sales, and customer support and to eliminate
intermediaries in buy-and-sell transactions.
The Internet is rapidly becoming the infrastructure of choice for
electronic commerce and electronic business because it provides
a universal and easy-to-use set of technologies and technology
standards that can be adopted by all organizations, no matter
which computer system or information technology platform they
use.
Internet technology provides a much lower cost and easier to use
alternative for coordination activities than proprietary networks.
Companies can use Internet technology to radically reduce their
transaction and agency costs.
Electronic commerce is the process of buying and selling goods
electronically with computerized business transactions using the
Internet or other digital network technology. It includes
marketing, customer support, delivery, and payment. The three
major types of electronic commerce are business-to-consumer
(B2C), business-to-business (B2B), and consumer-to-consumer
(C2C).
85