E-Commerce and
E-Business
1.
Abstract
Through the happening to present day
development, use of cutting edge mechanisms and tools has ended up being a
basic part of our life. Certainly, even minor typical activities like making
bills in a business sector have been able to be robotized. We have made in programming
to reduce the manual work in all the possible fields. E-Business or e-commerce
is a term for any kind of business or business trade that incorporates trade of
information over the net. It covers an extent of different sorts of
associations, from trading off stock,and also trading data of high security. In
this paper we endeavour to brief the distinctive issues stood up by ecommerce
site and attempt to give a response to rout the issues.
2. Introduction
Since the overall business segment is building
at a quick phase, the platform on which e-commerce applications can be develop
and the technologies that can be used are growing. It is difficult to pick
which platform to choose and which technology to skimfrom those that are open
in the market. Considering the extent of your ecommerce site
(small/medium/large) and the changes that you are going to apply to your site,
platform and technology can be picked.
There are two ways/methods open for
building an ecommerce site –
1 Hosted ecommerce platforms like Shopify
and BigCommerce
2 Open-source Content Organization
Structures (CMS) like Magento.
Hosted ecommerce platformdisplays that
your ecommerce site/application is hosted on a server that you won't have
permission to. Of course, CMS-based portals are encouraged on server space
which you should purchase likewise, will be under your control. Each of the
above platforms has its own good pros and cons.
Points of interest of using hosted
ecommerce platform are according to the accompanying
1. Negligibleadvancement and maintenance.
2. Better tech support.
3. Less complexity to work with.
Points of interest of using CMS platform
are
1. Better functionality.
2. Better customization.
3. Supports
big stores and refined websites.
A platform is picked considering the
necessities of specific ecommerce site. In this paper we have considered
picking our platform of technology to be CMS. The inspiration driving why we
have picked it is discussed in the later zones of the paper.
Ecommerce course of action requires fine
mix of business strategy and best development and platform to execute the site.
We picked Clarion Propels, an affiliation comprehended for making diverse
ecommerce site. A few affiliations worldwide have trusted Clarion gathering for
making their ecommerce portals which achieved high change rates in addition,
reduced shopping cartyields.
Those ecommerce development services
include:
1. Amazingly imaginative, amazing and
simple to utilize with the perfectfront-runner.
2. Optimized for desktop, convenient for
tablet view.
3. Easy to useproduct management system to
help you with managing your productnormal.
4. Significantly secured and safe
shopping cart.
5. Modules including transportation, gift
voucher, delivery, subsidiary/agent management.
6. Options for combine ecommerce site
with your present account software.
7. SEO redesigned site.
The association has agent nature of
24,000, working round the clock, to meet the client essentials. More quick
information about the organizations they give can be seen at
"http://www.clariontechnologies.co.in/". In this report we undertaken
to cover distinctive issues that are being stood up to in making and keeping up
ecommerce areas. We explored distinctive progressions and stages that are
delighted in building up an ecommerce platform. Then again, we have discussed
quite recently the specific case that is help to overcome the issues which are
cleared up in the coming sections of the paper. We proposed a cream method that
serves to overcome the present issues, additionallyreorganising and maintenance
of the ecommerce sites. We have kept detailed information about the venture in
the blog "www.capstoneblog.com". To get any additional information,
you may referthe blog.
3.
Issues
Accompanying are the constraints of ecommerce
To organizations
|
To customers
|
To society
|
Absence of
viablesecurity
|
Huge capital expense for equipment
registering gear
|
Less human communication since they communicate electronically.
|
Attempt to adapt up to quick advancing and creating innovation
|
Specialized
information for equipment and web direction
|
Social division
between specialized and nontechnical individuals who gotten to be not able to
get steady employments, which leads control the social steadiness.
|
Burden to pick
up new prospects
|
Cost ofInternet access
|
Reliance on
power IT abilities which are rare or immature particularly in the creating
nations.
|
Experience
awesome rivalry from neighbourhood worldwide contenders.
|
Assurance individual information security and protection
|
Wasted assets
because of constantly evolving the technology
|
Similarity
issues in the middle of old and new innovation
|
Electronicprocessesreplacephysicalcontactand
links
|
Hard to secure the Web totally against unlawful acts. .
|
|
Absence of trust in virtual dealers
|
|
|
Item Quality assessment
|
|
|
Absence of pleasure in shopping
|
|
The difficulties that an association face while building
up an ecommerce site can be arranged into three sorts. They are
1. Mechanical issues which incorporate
i. Security,
ii. Site issues,
iii. Innovation issues including expenses, programming
and framework
2. Administrative difficulties which incorporate
i. Individuals and authoritative issues
ii. Administration support
3. Business challenges which incorporate
i. Client administration and
ii. Lawful issues.
The other disputable issues including in ecommerce are
1. Security issues
2. Confidence issues
3. Security issues
4. Authentic issues
5. Protected innovation Rights (IPR)
6. Tariff
7. Content regulations
8. Social issues and
9. Exchange related issues
4. Issues
of E-business Security
In the event that the E-trade to be make fruitful, it is
key that each e-business site must have the capacity to give complete
authorization, decency, non-renouncement and security to its customers. Many
issues are at present confronted by E-business security. These issues have been
portrayed in the accompanying segment:
1. Privacy
The security of the private information of the purchasers
is a noteworthy issue that is confronted by the present E-commerce plan of
action. There is no security ensured to customers and their private data might
effectively be assaulted by programmers. The information that is targeted
generally includes the credit card and debit card numbers. This information is
then used to make serious financial losses to the clients.It is, for that
reason, extremely important that the business owners take the required steps
and start investing in the execution of the policies that can help avoid any
cyber-attacks. It is essential for the E-commerce business owners to build
customers’ complete trust and loyalty. The success of the business is primarily
dependent on the level of trust and faith its customers have gained over the
past. When the customers feel that their information is safe, they are likely
to come back and repetitively opt for the services.
2. Integrity
and Authentication Issues
The procurement of Integrity, Authentication is critical
for maintaining the organizations effectively in an online world. Verification
is vital to guarantee that just the, confirmed information is being exchanged
to the client. Respectability guarantees that just the information that is
reliable and right is being transmitted. Non-renouncement is again essential to
guarantee that the information that is being transmitted gets effectively
received by the customer. In this way, the systems' usage and strategies that
guarantee the provisions of these components is essential if E-business must be
made mainstream. These elements are critical and the essential structure of
E-business security.
3. Technical
Issues
There could be numerous specialized issues like the event
of different sorts of specialized assaults that can do a great deal of mischief
to the web servers and inevitably the business operations that are brought out
through the utilization of E-commerce. The attacks may even influence payment
gateways, retailers furthermore social communication sites.
4. Denial
of Service Attack
When the normal tasks or the activities of the website or
server are paralyzed, this leads to the occurrence of Denial of Service Attack.
There are many problems that are caused by this type of attack. The symptoms of
occurrence of such an attack could be many. This attack seems to have occurred
when a user is unable to access a website or that particular website has become
unavailable. The comparatively slow performance of the network could be another
symptom. Also, when there is a sudden increase in the number of spam mails it
can be a symptom of Denial of Service Attack.
5. ICMP
Flood
At the point when the genuine parcel is kept from coming
to its destination, then it is known as ICMP surge. This is done when the
expansive IP bundles are sent with the locations that are false. The essential
target of this sort of attack is to keep the data from coming to the required
destination utilizing illegalprocedures.
6. Brute
Force Attack
At the point when vast number and all the possible
combinations of the keys are tried in order to decrypt a cryptographic
technique, it is known as brute force attack. The primary goal is decode the
encoded message and this type of attack could lead to serious losses of
information that is confidential and sensitive. There could be several
combinations and the time consumed in cracking the key may depend upon its
complexity.
7. Phlashing
At the
point where there is a complete denial of the service, it is known as
Phlashing. It has the power of fully destroying a system and exploiting it
further. The remote system that is targeted by it exploits it so as to make it
unable to perform its original tasks and activities. The system that is
exploited as a result of this attack needs to be re-installed so as to be able
to perform normally.
8. Non
specialized assaults
The attacks that are not of specialized nature are
recorded under this class. They are described below
A. Phishing
assaults
At the point when the genuine element is masked with a
goal of hacking the private data of the people, it is known as Phishing. The primary
focuses of the Phishing attacks could be the online retailer and service
provider portals. The basic instance of this sort of attack are sending of
false messages to the clients.
B. Social
designing
Social Engineering is the procedure that is completed in
order to control individuals so as to get their own data exposed. This is an
intense E-business security challenge as there are no way to distinguish the
danger from it. The reality is further improved with the human's inclusion mechanisms.
The different strategies of Social Engineering are intelligent voice recording,
pre-messaging, telephone phishing and so
5.
Technology
In order to ensure the security of
E-commerce, the various technologies that may be implemented include:
1.
Application Firewalls
They can be implemented to improve the
security of E-commerce as they help in blocking all the attacks that are made
to websites.
2.
Encryption
It is a
technique that is used to encrypt a message using a public key and then sending
it to receiver. The receiver with his private key can decrypt the message. This
helps in increasing security to a greater level as the content of the message
can’t be decrypted by the attacker even if he succeeds in hacking the message
or information.
3.
Security holes
They can be
used in order the retrieve warning messages about the vulnerabilities in the
security system. This is of great help to the maintenance team who on the
detection of the vulnerabilities can take up speedy actions to patch them. They
can’t even be used by the maintenance team for carrying out checks at regular
intervals.
4.
Protocols
The various
protocols can be used for securing the payments that are made over the
internet. These protocols therefore provide electronic transaction that is
secure and convenient. It uses the
mechanism of encrypting the information that has to be passed through a
network. (Prakash and
Balachandra, 2015)
6.
Literature review
Security has been
a significantconsideration toward ecommerce sites. Confidentialdata is connected
with the transactions like mobile number, address, electronic card details and
so on. According to the reports "Forty-one percent of Web purchasers
studied a year ago by Forrester Exploration of Cambridge, Mass., said they have
reached a site to be removed their databases on the grounds that they felt that
the association utilized their data unwisely.
This outcomes in
loss to the ecommerce business as purchasers lose their trust in the
association's honesty. One more issue with the online shopping is that they
stay informed regarding all things that you see on the web. With the appearance
of ecommerce, huge information and individual preferences of the client also
madeready for view without the customer's knowledge. New computational methods
permit information mining for purchasing examples and other individual
patterns. These information can be utilized to customize a client's ecommerce
experience, or enhance a client's internet shopping knowledge. Some feel that
their protection has been abused on account of such acts, while a few others
fell this as an included advantage as their shopping has turned out to be much easier
Security is one
the reasons that limits the clients and associations from taking part in
utilization from ecommerce sites. As everything is done over the net, it is
hard to track the reason/pin point the source of the information rupture if
some data is lost. Remembering of the above reasons, security has given top
most need in ecommerce. E-business Security is a part of the information Security
system and is particularly connected to the segments that influence e-business
that incorporate PC Security, Information security and other more extensive
domains of the Data Security system.
One of the real
reasons for absence of security in ecommerce is poor configuration and support
of site. The majority of the online applications are only Web Administrations
outlined and created by designers from diverse associations. Web
Administrations can be found in larger part of the online applications that we
utilize every day. Some of which incorporate Online Transaction Handling and
processing (OLTP) applications, Banking applications, Database Administration
applications and so on. As the clients' necessities and clients become complex,
the configuration and maintenance of the ecommerce site has gotten to be
significantly more mind boggling. Engineers are more packed in adding to a code
to meet client prerequisites. Security has turned into a last worry in a number
of the creating ventures and it has been considered as extra in a large portion
of the cases.
One other concern
emerges while picking the language or innovation on which the site to be build.
Now and again it happens that one piece of the application is produced in one
platform and another is created in some other platform. The issue while
creating is that no software tells the designer if the code that is being
composed is secure. It just checks for the linguistic structure blunders. Despite
the fact that a few platforms like java give intelligence, they recommend just
the capacities that can be utilized. In this manner it is totally designer's
obligation to build up a configuration which is secure from all dangers and hacks.
In spite of the
issues that are being challenged in ecommerce, development has been superior in
both developed and developing nations in the past. E-business joins
organizations, clients, suppliers, representatives, and merchants. E-trade changes
the way business is done. The principle purpose behind the development of the
ecommerce is that individuals can do shopping sitting in their seat at home and
purchase the results of their decision. They are given with a few pictures of
the item. And feedbacks and reviews of the products. Individuals don't get such
experience regardless of the fact that they purchase items directly from the
shops. Ecommerce additionally decreases different foundation costs which are grateful
on the off chance that you need to keep up a retail outlet/store. The main
expense that is needed is in keeping up the server and web application.
The following are themajor advantages of e-commerce[20]
|
|||
To organizations
|
To consumers
|
To society
|
|
Internationalmarketplace
|
24 hours access
|
Enables more workingpractices
|
|
Operational cost savings
|
More choices forpurchasing
|
Connectspeople
|
|
Digitization of productsandprocesses
|
New markets andPricecomparisons
|
Facilitatesdelivery ofpublic services
|
|
New businessrelationships
|
Improved deliveryprocesses
|
|
|
Mass customization
|
Anenvironment
of competition
|
|
|
Inventories
reduction
|
Convenientshopping
|
|
|
Lowertelecommunications cost
|
Access to extensiveinformation
|
|
|
More
consumers
|
Time
saving
|
|
|
Businessavailability 24hours
|
|
|
|
Businessefficiency
|
|
|
|
Considering the above
advantages many countries have been adopting ecommerce as their alternative for
shopping. Here are the statics of ecommerce index in various countries By J.P
Morgan’s 2013 survey.
The basic architecture of ecommerce application is as
shown below
The above Diagram shows real
segments included in electronic catalogue merchant server system. As demonstrated
over a single layer to handle the item presentation, order processing and payment
processing. Correspondingly in this construction model a single database is
utilized to store the data and orders. The pages of electronic inventory are
made powerfully from the item portrayals contained in the product database. In
spite of the different inconveniences of the ecommerce, its future is promising
because of the accompanying reasons:
1. The Internet is the
suitable and productive medium for studying Ecommerce, where it spares time,
costs and activities. Aside that, it offers distinctive choices of items,
services and rates.
2. The advancement of trade is
connected to the Internet's development, which is advancing quickly.
3. The quick increase of
Internet clients lead to fast spread of Ecommerce also, builds its size.
4. The worldwide shapes force
the act of E-business, where the majority of the organizations in developed
nations and developing nations are moving their business to E-trade as result
of its advantages.
5. E-commerce helps to create a competition
environment between small and medium companies and large enterprises.
6. The capability of E-business is to improve the
execution and procedures productivity of associations.
7. The worldwide outlines are
moving towards the improvement of laws and regulations to ensure E-trade forms,
the security and the protection of consumers‟ data.
Considering the above points
of interest, part of exploration work in done in creating new techniques and
executing them utilizing different innovation.
7.
Methodology
We have picked CMS platform
for executing the ecommerce site. One the primary reason is that it is an open
source. Here are couple of different reasons which drove us to pick CMS
platform. Considering the future extent of the venture, we have landed at a
surface of picking CMS, which is an open source platform. It equally has a huge
advantage in future if the innovation of the ecommerce site is being altered to
a next level. It is considerably lessconfusing,to change the innovation, if the
project ison CMS framework.
There are numerous CMS
platforms accessible in the business, on which an ecommerce site can be expand
on. Each of them has its own favourites and disfavours. The CMS platform, which
we are going to utilize are
1. Magento
With about 21% of the world's
leading ecommerce sites based on the Magento platform, it is by a long shot the
most prominent and one of the best ecommerce CMS' being utilized today. Its
extreme favourable circumstances are the extensive number of module and
expansions accessible which permit the expansion of any new utility, the
simplicity of accessibility to any designer alsodrops general improvement and
support cost.
Professionals:
·
Strong platform with superior functionality and
adaptability
·
Decent Marketing options are available
·
Good supporting team for help with tutorials and examining
troubles.
·
More easy to understand when compared with other
platforms
·
It is extremely versatile – no need to move up to another platform, while updating
in future
Cons:
·
It requires suitable server space to work capably
at great speeds. Smaller servers may bring about pace and other related issues
·
Might be exceptionallypuzzling for organizations
that are too small
2. osCommerce
OsCommerce is a genuinely
prominent platformtoo, with around 11% of the top sites based on open source
advancements utilizing osCommerce. Being one of the best open-source platforms
accessible, it has an immense backend support and an extremely dynamic team,
however a few clients find that upgrades to the platform has not going
accordingly.
Pros:
·
Easy establishment and a simple to-utilize
interface
·
Active discussion forum with an expansive strengthen
team
·
Large number of modules and additional items
permitting the option of most functionalities
Cons:
·
Some clients find that the product updates and
outlines are delayed, and remain somewhat outdated
Technologyare platform can be picked
considering the necessities and financial plan of the venture.
8.
Proposed method
We suppose to utilize by
blending up these two techniques, Magento and osCommerce. With the assistance
of Magento, we can assemble a site which has rich functionalities. But the
issue is, it is too difficult and involves more space. It consumes more RAM and
slows down other running applications. On the other hand osCommerce stage gives
a platform, which conveys a result of less memory space yet with less
functionality. In the event that a configuration is brought up utilizing these
two systems, it has rich functionalities and involves less space. It will be easy to maintain and protect it from
security risks.
We also adding extra security
layers to our site to protect from hacking. The front end of protection will be
clearly by using firewalls andsecurity frameworks. Firewalls ensures the sites
by halting the hackers before they could break into the system. Intrusion detection framework keeps track of the
considerable number of procedures, log files and reports of the site. In the event
of any strangething in the framework, it alarms the client about it. In this
manner essential level of security is maintained. We also add extra efforts to
establish safety by setting One Time Passwords (OTPs) while signing in. so that
we can get the user information, who are getting to the site. This drops the
danger for site from being hacked, as we have all the data about the clients
who are accessing.
9. Conclusion
Number of people
are confident about future of E-Business. Ecommerce is a field in which there
is consistently space for development. With the innovation changing continually
part of alterations and upgrading must be done on ecommerce sites on frequently.
The best E-business accomplishments are those who take the right measures and
arrangements to guarantee the business security and the user's protection
exceptionally well.
The E-business
experience challenges as far as high security dangers because of open nature of
the Internet and expanding specialized information. Understanding the necessity
of business and monitoring of data security resources is expected to guarantee
ideal security. Shoppers, organizations and the administrations should
guarantee the security of customer's protection rights.
10.
References
[1]Ashwani Garg and Shekhar Singh, “A review on web
security vulnerabilities”, International Journal of Advanced Research in
Computer and Communication Engineering Vol. 3, Issue 1, January2013.
[2]Mr. Hemant Y. Kharbade and Mr. Avinash Wadhe,
“Review study on security threat on HTML5”,
International Journal of Advanced Research in
Computer and Communication Engineering Vol. 3, Issue 3, March2013.
[3]Mark S. Ackerman and Donald T. Davis, Jr.,
“Privacy and Security Issues in E-Commerce”, Review chapter for the New Economy
Handbook (Jones, ed.), in press.
[4]Zarana Padiya, Yesha Dev and Kethan Bhimani,
“Fault management of web services”, International Journal of Advanced Research
in Computer and Communication Engineering Vol. 3, Issue 3, March2013.
[5]Randy C. Marchany and Joseph G. Tront,
“E-Commerce Security Issues”, Proceedings of the 35th Hawaii International
Conference on System Sciences –2002.
[6]Niranjanamurthy M and DR. Dharmendra Chahar,
“The study of E-Commerce Security Issues and Solutions”, International Journal
of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 7,
July 2013.
[7]Yannis Bakos,Henry C. Lucas, Jr., Wonseok Oh,
Gary Simon, Siva Viswanathan and Bruce Weber, “
The Impact of E-Commerce on Competition in the
Retail Brokerage Industry”, Forthcoming in Information Systems Research, May
2005.
[8]Alev M. Efendioglu, Vincent F. Yip and William
L. Murray, “E-commerce in developing countries: issues and influences”
[9]Gatha Kumar and Durai Raj Vincet PM, “The
measurement and validation of trust in ecommerce relationships”, International
Journal of Advanced Research in Computer and Communication Engineering Vol. 3,
Issue 4, April2013.
[10]“Discussion paper on ecommerce in India”,
URL:http://dipp.nic.in/English/Discuss_paper/Discussion_paper_ecommerce_07012014.pdf
[11]Dr. Nada M. A. Al-Slamy, “E-Commerce security”,
IJCSNS International Journal of ComputerScience and Network Security, VOL.8
No.5, May 2008.
[12]Niranjanamurthy M, Kavyashree N, Mr S.Jagannath
and DR. Dharmendra Chahar, "Analysis of E-Commerce and M-Commerce:
Advantages, Limitations and Security issues". IJARCCE Vol. 2, Issue 6,
June 2013
[13]Abdulghader.A.Ahmed.Moftah, Siti Norul Huda
Sheikh Abdullah and Hadya.S.Hawedi, “Challenges of security, protection and
trust on e-commerce: a case of online purchasingin Libya”, International
Journal of Advanced Research in Computer and Communication Engineering Vol. 1,
Issue 3, May 2012.
[14]A Sengupta, C Mazumdar and M S Barik,
“e-Commerce security –A life cycle approach”, Sadhana Vol. 30, Parts 2 & 3,
April/June 2005.
[15] V.Srikanth and Dr.R.Dhanapal “Ecommerce online
security and trust marks”, International Journal of Computer Engineering and
Technology Volume 3, Issue 2, September 2012.
[16]Pradnya B. Rane and Dr. B.B.Meshram,
“Transaction Security for E-commerce Application”, International Journal of
Electronics and Computer Science Engineering.
[17]Mr.Amit N. Chaudhari and Prof. Priya V.
Shirbhate, “The study of E-Commerce Security Issues and Solutions”,
International Journal of Research in Science & Engineering, Volume 1,
Special Issue 1.
[18]Shazia Yasin, Khalid Haseeb and Rashid Jalal
Qureshi, “Cryptography Based E-Commerce Security: A Review”, IJCSI
International Journal of Computer Science Issues, Vol. 9, Issue 2, No 1, March
2012.
[19]Raju Barskar, Anjana Jayant Deen, Gulfishan
Firdose Ahmed and Jyoti Bharti, “The Algorithm Analysis of E-Commerce Security
Issues for Online Payment Transaction System in Banking Technology”,
International Journal of Computer Science and Information Security, Vol. 8, No.
1, April
2010.
[20]Yang Jing "On-line Payment and Security of
E-commerce",International Symposium on Web InformationSystems and
Applications, 2009.
No comments:
Post a Comment