Presentation is loading. Please wait.

Presentation is loading. Please wait.

WEB TECHNOLOGY E-Business & E- Commerce

Similar presentations

Presentation on theme: "WEB TECHNOLOGY E-Business & E- Commerce"— Presentation transcript:

1 WEB TECHNOLOGY E-Business & E- Commerce
Multimedia: Audio, Video, Speech Synthesis and Recognition


3 Introduction E-commerce refers to aspects of online business involving exchanges among customers, business partners and vendors. E-business encompasses these elements, but also includes operations that are handled within the business itself Benefits of E-business: Personalization Effective customer service Streamlined supply-chain management.

4 Introduction E-business models are useful for:
Entrepreneurs starting e-businesses People interested in e-commerce E-business models are used by: eBay Yahoo! Other E-commerce sites

5 E-Business Models Storefront Model Shopping-Cart Technology
Auction Model Portal Model Name-Your-Price Model Comparison-Pricing Model Demand-Sensitive Pricing Model Bartering Model

6 Storefront model Basic form of e-business.
Buyers and sellers interact directly. Provides a combination of transaction processing, security, online payment and information storage. E-commerce allows companies to conduct business 24-by-7, all day everyday, worldwide It enables merchants to sell their products online.

7 Storefront model An E-commerce Storefront should include:
Online product catalogs Order processing through their Web sites Secure Payments Sending merchandise to customers Managing customer data.

8 Shopping-Cart Technology
It is an order-processing technology. Customers can accumulate items they wish to buy as they browse an e-business Web site. Support for the shopping cart is provided by: Product Catalog – resides on Merchant Server Merchant Server It is the data storage and management system employed by the merchant. Database Technology

9 Shopping-Cart Technology
Databases store customer information, including names, addresses, credit-card data and past purchases. Combine a number of purchasing methods to give customers a wide array of options. Examples: and

10 Shopping-Cart Technology –
The most widely recognized example of an e-business that uses shopping-cart technology is’s catalog is growing constantly, and the site facilitates convenient navigation among millions of products. uses a database on the server side that offers customers on the client side multiple ways to search for products. The database consists of product specifications, availability, shipping information, prices, sales histories, reviews and in-depth product descriptions.

11 Auction Model Auction sites act as forums through which Internet users can assume the role of either seller or bidder. Sellers can post items they wish to sell and deadlines to close the auctions. Some sites allow users to provide additional information, such as a photograph or a description of an item’s condition. Bidders may search the site for items they are seeking, view the current bidding activity and place bids.

12 Auction Model Some sites automate the bidding process by allowing bidders to submit the maximum prices they will pay for auction items. On such sites, an electronic system continues bidding for a bidder until the bidder wins the auction or until the auction surpasses the bidder’s maximum bid price. Reverse Auction Model: The reverse-auction model allows buyers to set prices that sellers compete to match, or even beat Example of a reverse-auction site is Popular site for purchasing airline tickets and making travel reservations.

13 Auction Model Auction sites usually receive a commission on each sale.
When an auction is complete, the seller and winning bidder are notified, and methods of payment and delivery are decided on by the relevant parties. Most auction sites do not involve themselves in payment or delivery. Auction model also is employed by business-to-business (B2B) Web sites. The buyers and the sellers in these auctions are companies. is a popular aution site.

14 Auction Model –
The auction process begins when the seller posts a description of the item for sale and fills in the appropriate registration information. The seller must specify a minimum opening bid. If potential buyers think this price is too high, the item might not receive any bids. Sellers often set an opening bid that is lower than the reserve price to generate bidding activity.

15 Auction Model –
If a successful bid is made, the seller and the buyer negotiate the shipping details, warranty and other particulars. eBay serves as a liaison between the parties, providing an interface through which sellers and buyers can conduct business. However, eBay does not maintain a costly physical inventory or deal with shipping, handling or other services that other e-retailers must provide.

16 Portal model Portal sites offer visitors the chance to find almost anything they are looking for in one place. Portals links consumers to online merchants, online shopping malls and auction sites. The two types of portal are: Horizontal Portals Vertical Portals Horizontal Portals: Portals that aggregate information on a broad range of topics. Eg: Search Engines.

17 Portal Model Vertical Portals:
They are more specific, offering a great deal of information pertaining to a single area of interest. Eg: Yahoo! Yahoo! permits users to browse a variety of sites while maintaining the convenience of paying through their Yahoo! Account. Online shopping is a popular feature of many major portals.

18 Portal Model Sites such as,®, and® provide shopping pages that link users to thousands of sites carrying a variety of products. Portals that link consumers to online merchants, online shopping malls and auction sites provide several advantages: Help users collect information on products and services Facilitate comparison shopping Allow users to browse independently owned storefronts—a capability that some online shopping malls fail to provide.

19 Name-Your-Price Model
Customers can state the price they are willing to pay for products and services. The online business passes each customer’s price request to an appropriate industry partner, who decides whether to sell the product or service to the customer at the stated price. A customer whose price is rejected can offer another price. If a price is accepted, the customer is obligated to make the purchase.

20 Comparison-Pricing Model
Allows customers to poll various merchants in search of the lowest price for a desired product or service. Comparison-pricing sites often generate revenue from partnerships with particular merchants. Although such sites can be convenient, users should be careful when employing these services. Users might not be getting the best prices available on the Web. Some services promote the products of merchants with which they have partnerships.

21 Demand-Sensitive Pricing Model
The concept behind the demand-sensitive pricing business model is to sell products to groups of people in a single transaction, thus reducing the cost per person. The sale of individual products can be expensive, because the vendor must include retail and overhead costs in the price while still generating a profit. sells products for the home, electronics and computers using the demand-sensitive pricing model. customers should visit several such sites before making a purchase.

22 Bartering Model It is the offering of one item in exchange for another. Traders make initial offers with the intention of bartering until they reach final agreements with buyers. It allows individuals and companies to trade products through its site. Eg:


24 Introduction E-Marketing, is the marketing of products or services over the Internet. E-Marketing, has brought media to a global audience . Competition is intense in the e-business and e-commerce worlds. E-marketing strategy can give a company an advantage.

25 Marketing campaign Branding Marketing research E-mail marketing
Promotions Consumer Tracking Electronic advertising Search Engine Affiliate Programs public relations (PR) Customer Relationship Management (CRM)

26 Branding A brand is defined as a name, logo or symbol that identifies a company’s products or services. Brands should be unique, recognizable and easy to remember. Brand equity includes the value of tangible and intangible items. brand’s monetary value over time customer perceptions and customer loyalty to a company, its products or services

27 Branding Businesses that already have a solid brand may find it easier to transfer their brand to the Internet. Internet-only businesses must strive to develop a brand that customers trust and value. E-bay Amazon

28 Marketing Research Research can be performed over the Internet.
Giving marketers a new, faster channel through which to find and analyze industry, customer and competitor information. Traditionally, marketing research has consisted of focus groups, interviews, paper and telephone surveys, questionnaires and secondary research.

29 Marketing Research To target marketing campaigns effectively, it is useful to learn about the demographics of Internet, World Wide Web and wireless device users. Knowledge of customers, personal information reveal purchase preferences buying power Knowledge of customers, psychographics, reveal family lifestyles cultural backgrounds values

30 marketing Provides an inexpensive and effective method of targeting potential customers. Personalized direct targets consumers by using their names, offering them the right products at the right time. Opt-in is sent to people who explicitly choose to receive offers, information and promotions.

31 marketing Internet mailing lists target customers through personalized . Excessive correspondence can decrease the effectiveness of an campaign. Spamming—the distribution of mass s to people who have not expressed interest in receiving information from a company. Give a company a poor reputation.

32 Promotions Promotions can both attract visitors to a site and influence purchasing. Promotions can also be used to increase brand loyalty through reward programs. Example: frequent-flyer miles, Point-based rewards, Discounts, free trials and e-coupons. Vital to make sure that customers are becoming loyal to the company, rather than to its promotions or rewards program. Costs of the program must be monitored carefully.

33 Consumer Tracking By discovering the target market, the group of people toward whom it is most profitable to aim a marketing campaign. A company can focus its campaign, increasing the number of visits, responses and purchases. Marketers use log files log file analysis ID cards Cookies.

34 Consumer Tracking Log files, files that contain data generated by site visits, including each visitor’s location, IP address, time of visit and frequency of visits. log-file analysis is the organization and summarization of information contained in log files to monitor consumer information. ID cards are tracking devices that provide Web sites with the numerical addresses of and information regarding consumers’ operating systems. Cookies, another type of tracking device, are text files stored by Web sites on individuals’ personal computers.

35 Electronic Advertising
Advertising gives e-businesses the opportunity to establish and strengthen branding. Online advertising can include the placement of links and banners on other companies Web sites. Businesses can charge other companies for placing their advertisements on its site, providing businesses with additional income.

36 Electronic Advertising
Banner advertisements are similar to billboards seen along the highway But banners offer the additional feature of interactivity. Examples of companies that offer banner-hosting services Advertisers pay only when a viewer clicks on the banner ad and goes to that Web site

37 Search Engine A search engine is a program that scans Web sites for desired content, listing relevant sites on the basis of keywords or other search-engine ranking criteria. Search-engine ranking is important to bringing new visitors to a site. The method used by a search engine to rank a Web site will determine how “high” a site appears on lists of search results.

38 Search Engine meta tag is an XHTML tag that contains information about a Web page. Search engines often use meta-tag information when ranking a site. Search engines rank sites by sending out a program, called a spider to inspects each site. The spider reads the meta tags, determines the relevance of the Web page’s information and keywords and then ranks the site according to that visit’s findings.

39 Affiliate Programs An affiliate program is a form of partnership in which a company pays affiliates on the basis of pre-specified actions by visitors who click-through from an affiliate site to a merchant site. Affiliate programs also can increase Web-site traffic. Affiliates post links on each other’s sites in exchange for referral fees. is a fee-based service that helps users set up affiliate programs.

40 Public Relations Provides customers and employees with the latest information about, products services company promotions and consumer reactions. A vital aspect of public relations is communication with customers and employees through press releases Speeches Special events presentations and .

41 Public Relations Press releases, which announce current events and other significant news to the press, can be delivered over the Web. Example, PR Web ( Crisis management, an aspect of PR, is conducted in response to problems a company is experiencing. When a company is doing poorly, its public-relations department offer issue information regarding the causes and Steps will be implemented to remedy the problem.

42 Customer Relationship Management (CRM)
Customer relationship management (CRM) focuses on the provision and maintenance of quality service for customers. Effective CRM involves communicating with customers Customer satisfaction is key to business success. Because it is far less expensive to keep current customers than it is to acquire new ones

43 Customer Relationship Management (CRM)
Aspects of CRM are call handling sales tracking transaction support. call handling- maintenance of outbound and inbound calls from customers and service representatives sales tracking- tracking and recording of all sales made. transaction support - support for technology and personnel involved in business transactions

44 Customer Relationship Management (CRM)
Unique functions of eCRM, the application of CRM to an e-business strategy, include personalization and customization of customers’ experiences interactions with a Web site call center or any other forum for customer contact

45 Online Payment and security

46 Online payment Secure electronic funds transfer (EFT) is crucial to e-commerce. Methods for conducting online transactions Credit-card payments Digital cash and e-wallets Smart cards Micropayments Monetary transactions on the Web

47 Credit card payment Security concerns - many people resist online credit-card transaction. Security issue – credit card fraud by merchants and third parties. Credit cards have features that enable secure online and offline payments are, Prodigy Internet® Mastercard® and American Express

48 Credit card payment To accept credit-card payments, a merchant must have a merchant account with a bank. Traditional approach, point-of-sale (POS) transactions - that occur when customers present credit cards at stores. Growth of e-commerce has resulted in Card-not-present (CNP) transaction - online credit-card transactions.

49 Digital cash Digital cash is digital currency Stored electronically
Used to make online electronic payments Digital-cash accounts are similar to traditional bank accounts Consumers deposit money into digital-cash accounts for use in digital transactions

50 Digital cash Overcome security concerns of online credit-card transactions. Allow people who do not have credit cards to shop online. Digital cash is used in conjunction with other payment technologies, digital wallets

51 E-Wallets To facilitate the credit-card order process, many companies are introducing electronic wallet services. E-wallets keep track of billing and shipping information. It can be entered with one click at participating merchants’ sites. E-wallets also store E-checks E-cash and credit-card information for multiple cards

52 Smart card Contain embedded computer chips.
Smart cards hold more information than ordinary credit cards with magnetic strips. Provide higher-level of security than credit cards. Smart cards can require users to enter passwords. Information maintained on smart cards can be designated as, “read only” or “no access.”

53 Smart card Enhanced with additional security features,
encryption and photo identification Two types of Smart cards, contact contactless Contact smart card – contain a computer chip. Smart card must be placed in a smart card reader. Slow transfer of data.

54 Smart card Contactless smart card - contains
coiled antenna and computer chip. Contactless smart card transmit information Fast transmit of data. Ex: automatic toll payments.

55 Micropayment Fee for each credit-card transaction.
Becomes costly for inexpensive items. Sometimes, the cost of an item is actually lower than the standard transaction fee, causing the merchant to incur losses. Micropayment enables ways for nominally priced products and services to be sold profitably over the Web.

56 Micropayment For Example, a phone bill is essentially an aggregation of micropayments that are charged periodically at set intervals to justify the transaction fee. To offer micropayment processing, some companies have formed strategic partnerships with telephone carriers and utility companies.

57 Online security Secure transaction must meet four fundamental requirements, Privacy Integrity Authentication Nonrepudiation Availability authentication issue – verification sender and recipient identities.

58 Online security Privacy issue - ensuring that the information transmitted over the Internet has not been captured or passed on to a third party. Integrity issue - ensuring that the information sent or received has not been compromised. Non-repudiation issue - legally proving that a message was sent or received . Availability - ensuring that the network and the computer systems to which it connects will remain in operation continuously.

59 Cryptography Private information transmitted through network is protected by encryption techniques. Cryptography Cryptography transforms data by using a key. Unencrypted data is known as plain text Encrypted data is called ciphertext. Intended recipients possess the corresponding key to decrypt the ciphertext into plaintext

60 Secret-key cryptography
Known as Symmetric-key cryptography. One key used to encrypt and decrypt a message. Sender encrypts a message using the secret key. Encrypted message and the symmetric secret key is sent to the intended recipient. Provides integrity privacy to message.

61 Secret-key cryptography
Difficulty in exchange of secret key between sender and receiver. The privacy and integrity of the message could be compromised if the key is intercepted. Transmission of secret-key from sender to recipient over Secure channels or Physical method. Avoid compromising of key.

62 Public-key cryptography
Public-key cryptography is asymmetric. Uses two keys: public key private key Private key is kept secret by its owner. Public key is openly distributed. If the public key is used to encrypt a message, only the corresponding private key can decrypt it, and vice versa.

63 Public-key cryptography
Public key cryptography provides, Authentication Data integrity Secret-key exchange Digital signatures, electronic equivalent of written signatures. A digital signature authenticates the sender’s identity and it is difficult to forge. Used in public-key cryptography to solve authentication and integrity problems.

64 Public-key cryptography
One problem with public-key cryptography is that anyone with a set of keys could potentially assume another party’s identity. For example, imagine that a customer wants to place an order with an online merchant. customer does not know that the Web site indeed belongs to that merchant or to a third party who is masquerading as the merchant to steal credit-card information.

65 Public Key Infrastructure
Authentication problem is solved using Public Key Infrastructure (PKI). PKI integrates public-key cryptography with digital certificates and certificate authorities. PKI authenticate parties in a transaction. Digital certificates are digital documents issued by a certification authority (CA).

66 SSL SSL – secure socket layer.
Developed by Netscape Communications, is a non-proprietary protocol commonly used to secure communications between two computers on the Internet and the Web. SSL not designed specifically to secure online transactions. Does not protect private information, such as credit-card numbers.

67 SSL SSL is built into many Web browsers,
Netscape Communicator and Microsoft Internet Explorer Hardware devices, peripheral component interconnect (PCI) cards used in SSL transactions. PCI installed in web servers. Reduces the time and power that a server must devote to SSL transaction processing.

68 WTLS Wireless Transport Layer Security (WTLS) is the security protocol for the Wireless Application Protocol (WAP). WAP is a standard used for wireless communications on mobile phones and other wireless devices. WTLS encrypts data sent between a WAP-enabled wireless device and a WAP gateway.

69 WTLS At the gateway, data is decrypted from WTLS and subsequently, encrypted into SSL. For a few milliseconds, the data is not encrypted and,therefore, unsecure. The brief lapse in security is called the WAP gap. But it is extremely difficult to exploit the WAP gap in practice.

70 MULTIMEDIA Audio, Video, Speech Synthesis and Recognition

71 Introduction Multimedia consists of Video, audio and images.
Multimedia files can be quite large. Some multimedia technologies require that the complete multimedia file be downloaded to the client before the audio or video begins playing. With streaming technologies, audio and video can begin playing while the files are downloading Used for reducing delays.

72 Audio and Video Audio and Video files can be:
Embedded in a Web page. Placed on a Web Server. Downloaded “on-demand”. A file’s format is determined by: Encoding compression. An Encoding algorithm or CODEC compresses media files. Taking the raw audio or video as input Transforming it into a format that Web pages can read.

73 Audio and Video - Formats
Common video file formats include: MPEG (Moving Pictures Experts Group) Quick-Time RealPlayer AVI (Video for Windows) MJPEG (Motion JPEG). Audio formats include : MP3 (MPEG Layer 3) MIDI (Musical Instrument Digital Interface) WAV (Windows Waveform) AIFF (Audio Interchange File Format—Macintosh only).

74 Web based audio and video
HTML Tags are used to embed multimedia into web pages. The bgsound tag has four key properties src loop balance volume. Usage: <bgsound src=“” loop = "-1"> </bgsound>

75 Web based audio and video
The img element incorporates both images and videos Properties include: src – for images dynsrc – for videos Usage: <img dynsrc = "car_hi.wmv“ start = "mouseover" width = "180" height = "135" loop = "-1" />

76 Web based audio and video
The embed element, which embeds a media clip (audio or video). Properties include: src loop width height Usage: <embed src = "humming.wav" loop = "true">

77 Microsoft Agent Control
Microsoft Agent is an exciting technology for interactive animated characters in a Windows application or World Wide Web page. The Microsoft Agent control provides access to Agent characters such as: Peedy (a parrot) Genie Merlin (a wizard) Robby (a robot) These Agent characters allow users to interact with the application using more natural human communication techniques.

78 SMIL - Synchronized Multimedia Integration Language
Enables Web document authors to coordinate the presentation of a wide range of multimedia elements. XML-based description language that allows static and dynamic text, audio and video to occur simultaneously and sequentially. One way to render SMIL documents is with RealPlayer. Apple’s Quicktime plug-in also plays SMIL in both Windows and Mac OS environments.

79 Sample SMIL document <smil> <head> <layout> <root-layout height = "300" width = "280“ background-color = "#bbbbee" title = "Example" /> <region id = "image1" width = "177" height = "230“ top = "35" left = "50" background-color ="#ffffff“/> </layout> </head> <body> <seq> <par> <img src = "book1.jpg" region = "image1“ alt = "book 1" dur = "1s" fit = "fill" /> <audio src = "" dur = ".5s" /> </par> </seq> </body> </smil>

80 SMIL Syntax <head> <layout> <root-layout>
All information for setting up the document. <layout> Sets layout attributes for the document. <root-layout> Set document size, color and title <width>, <height> Size of the region

81 SMIL Syntax <top>, <left> <body> <seq>
Relative position <body> Encloses contents of the document <seq> Sets child elements to execute sequentially <par> Sets child elements to execute simultaneously.

82 SVG – Scalable Vector Graphics
Describes vector graphic data for JPEG, GIF and PNG formats. The GIF, JPEG and PNG file formats store images as bitmaps. Bitmaps describe the color of every pixel in an image and can take quite a bit of time to download. Due to the method in which bitmap information is stored, images of these file types cannot be enlarged or reduced without a loss of image quality. Vector graphics are produced by mathematical equations which describe graphical information in terms of lines, curves, etc.

83 Speech synthesis It is the Artificial production of human speech.
The speech capabilities that can be added to an application are Text-To-Speech (TTS) System. Speech Recognition (SR). TTS: This involves turning a string into spoken language The complexities of turning words into phonemes are catered for by a TTS engine installed on the machine. The end result is that the computer talks to the user to save the user having to read some text on the screen.

84 Speech Synthesis Synthesized speech can be created by - concatenating pieces of recorded speech that are stored in a database. Storage of entire words or sentences allows for high-quality output. The quality is measured based on: Similarity to the human voice Understandability. Uses: People with visual impairments or reading disabilities can listen.

85 Overview of text processing

86 Speech recognition Converts spoken words to text.
Voice recognition - trained to a particular speaker. Speech recognition - recognize anybody’s speech. It basically means two things: Command and Control (CnC) The application can understand and follow simple commands that it has been educated about in advance. 

87 Speech Recognition CnC is sometimes referred to as context-free recognition. Alternatively an application can support dictation. Applications: voice dialing call routing domestic appliance control word processors, s aircraft cockpits


Download ppt "WEB TECHNOLOGY E-Business & E- Commerce"

Similar presentations

Ads by Google