Design And Implementation Of An Online Store Management System
₦5,000.00

DESIGN AND IMPLEMENTATION OF AN ONLINE STORE MANAGEMENT SYSTEM

CHAPTER TWO

REVIEW OF RELATED LITERATURE

2.1 CORE CONCEPT OF ONLINE COMMERCE

Electronic commerce is about doing business electronically. It is based on the electronic processing and transmission of data, including text, sound and video. It encompasses many diverse activities including electronic trading of goods and services, online delivery of digital content, electronic fund transfers, electronic share trading, electronic bills of lading, commercial auctions, collaborative design and engineering, on-line sourcing, public procurement, direct consumer marketing, and after-sales service. It involves (e.g. consumer goods, specialized medical equipment) and services (e.g. information services, financial and legal services); traditional activities (e.g. healthcare, education) and new activities (e.g. virtual malls).” (Lincoln, 1997)

Electronic commerce is the exchange of information across electronic networks, at any stage in the supply chain, whether within an organization, between businesses, between businesses and consumers, or between the public and private sectors, whether paid or unpaid (Edward, 1999).

Every one of the definitions is quite expansive, including not only the actual commercial transaction between buyer and seller but also the upstream and downstream activities that made that transaction possible. The need for such an expansive definition is a reflection of the embryonic state of electronic commerce today, where it is difficult to quantify the contribution of electronic commerce totally separated from the traditional activities. Most analysts include only transactions actually carried out on the Internet; but many consumers research their purchases online and then buy in some other way.

As a result of different definitions of electronic commerce, the forecasts presented by various analysts are very widely spread. “Only 3% of business-to-business Web sites is designed for direct sales, rather than for marketing and customer service, says (Benjamin, 1997). Even for consumer businesses, only 9% of sites offer online transactions.” Another survey carried out by (Nielsen, 1997) found that “whereas 53% of Internet users in the United States and Canada had used the Internet to reach a decision on a purchase, just 15% carried out the final transaction on the Internet”

Despite the slowing penetration of regular Internet users, the number of consumers using the Internet to shop for consumer goods and services is still growing (Forrester, December 2001). Research from the (GFK, 2002) shows that the number of online shoppers in six key European markets has risen to 31.4 percent from 27.7 percent last year. This means that 59 millionEuropeans use the Internet regularly for shopping purposes. However, not only does the number of online shoppers grow, the volume of their purchases also increases over-proportionally. In the US, online sales are forecasted to exceed$36 billion in 2002, and grow annually by 20.9 percent to reach $81 billion in2006. Europeans are spending more money online as well. For instance,Europe’s largest discount carrier, easyJet Airline Co., sold $80 million more tickets online in the six months ended March 31 than it did a year earlier(Reinhardt and Passariello, 2002), whereas combined revenues forAmazon.com’s European operations grew at more than 70 percent annually in each of the past three quarters, topping $218 million.

While these figures show that a large number of consumers in the US andEurope frequently use the Internet for shopping purposes, it is not clear what drives them to shop online and whether these numbers could be even increased if more attractive online stores were developed. This raises the issue of examining what factors affect consumers to shop online. Therefore, a framework is needed to structure the complex system of effects of these different factors, and develop an in-depth understanding of consumers’ attitudes toward Internet shopping and their intentions to shop online.

In this study, we build up such a framework based on previous research on consumer adoption of new self-service technologies and Internet shopping systems (Dabholkar and Bagozzi, 2002; O’Cass and Fenech, 2002; Childers et al., 2001; Davis, 1993). This research suggests that consumers’ attitude towardInternet shopping first depends on the direct effects of relevant online shopping features (Davis, 1993). Online shopping features can be either consumers’ perceptions of functional and utilitarian dimensions, like “ease of use” and“Usefulness” or their perceptions of emotional and hedonic dimensions like“Enjoyment” (Menon and Kahn, 2002; Childers et al., 2001; Mathwick et al.,2001). by including both utilitarian and hedonic dimensions, aspects from the information systems or technology literature, as well as the consumer behavior literature are integrated in our framework.

In addition to these relevant online shopping features, also exogenous factors are considered that moderate the relationships between the core constructs of the framework. Relevant exogenous factors in this context are “consumer traits” (Burke, 2002; Dabholkar and Bagozzi, 2002; Brown et al., 2001; Eastin and LaRose, 2000), “situational factors” (Wolfinbarger and Gilly, 2001; Avery, 1996), “product characteristics” (Grewal et al., 2002; Elliot and Fowell, 2000), “previous online shopping experiences” (Shim et al., 2001; Eastlick and Lotz, 1999), and “trust in online shopping” (Yoon, 2002; Lee and Turban, 2001). By incorporating these exogenous factors next to the basic determinants of consumers’ attitude and intention to use a technology, the framework is applicable in the online shopping context. Together, these effects and influences on consumers’ attitude toward online shopping provide a framework for understanding consumers’ intentions to shop on the Internet. An important note to our proposed framework is that throughout this paper we will define Internet shopping or online shopping as the use of online stores by consumers up until the transactional stage of purchasing and logistics.

2.2 ELECTRONIC PAYMENT SYSTEM IN B2C AND C2C EC

Electronic cash: electronic cash is a method of payment in which a unique identification number is associated with a specific amount of money. Electronic cash is often referred to as e-cash or cyber cash (jewson, 2001). This method was developed as an alternative to the use of credit cards for internet purchases of goods or services. For using this payment system, customers purchase electronic digital-cash from the issuing company (Abrazhevich, 2004). The cash may then be transferred through computers or other telecommunications channels (Hsieh, 2001). The digital-cash method involves a single organization for the issuance and redemption of cash. The low cost characteristic of electronic cash makes it one of the most promising methods.

Fig. 2.1 Classification of electronic payment systems

2.2.1 Pre-paid card: Pre-paid cards are issued for a particular value by a particular merchant and are frequently used in store transactions. The card can be given as a gift or just used as a convenient way of making purchases. Ease of use and convenience are the primary reasons. Consumers to use this card, the pre-paid card are also favorable for merchants because customers tend to spend more freely when using it (Kniberg, 2002).

2.2.1 Credit card: credit card payments originate from offline credit card mechanisms (Lawrence, 2002). Credit cards are the most frequently used form of e-payment (Hsieh, 2001). Two important issues associated with the credit card method involve an irreducibly complex transaction- structure (Hsieh, 2001). Compared to other EPS, it is not appropriate for small-value transactions, i.e., transactions involving less than a dollar (Kalakota and Whinston, 1996).

2.2.1 Debit card: Debit card is one of the most widely used systems for e-payment. The debit card method combines the features of the Automatic Teller Machine (ATM) card with internet banking. When customers pay with a debit card, money is automatically deducted from their bank accounts. In contrast with credit cards, the expended money comes directly from a bank account. Many banks issue a debit card that can be used in places where credit cards are not accepted. When users pay with a debit card, the payment is processed as a debit transaction (Abrazhevich, 2004).

2.3 HISTORY OF CREDIT CARD (EARLY DEVELOPMENT)

This meaning of electronic commerce has changed over the last 30 years. Originally, electronic commerce meant the facilitation of commercial transactions electronically, using technology such as Electronic Data Interchange (EDI) and Electronic Funds Transfer (EFT). These were both introduced in the late 1970s, allowing businesses to send commercial documents like purchase orders or invoices electronically. The growth and acceptance of credit cards, automated taller machines (ATM) and telephone banking in the 1980s were also forms of electronic commerce. Another form of online shopping was the airline reservation system typified by Sabre in the USA and Travicom in the UK.

Online shopping is an important component of electronic commerce. From the 1990s onwards, electronic commerce would additionally include Enterprise resource planning systems (ERP), Data mining and Data warehousing. An early example of many-to-many electronic commerce in physical goods was the Boston Computer Exchange, a marketplace for used computers launched in 1982. An early online information marketplace, include online consulting, was the American Information Exchange, another pre internet online system introduced in 1991.

In 1990 Tim Berners-Lee invented the World Wide Web browser and transformed an academic telecommunication network into a world wide everyman everyday communication system called internet/www. Commercial enterprise on the internet was strictly prohibited until1991. Although the internet became popular worldwide around 1994 when the first internet online shopping started, it took about five years to introduce security protocols and DSL allowing continual connection to the internet. By the end of 2000, many European and American business companies offered their services through the worldwide web. Since then people began to associate a word “online shopping” with the ability of purchasing various goods through the internet using secure protocols and electronic payment services.

2.4 ADVANTAGES OF ONLINE SHOPPING:

Electronic commerce is defined simply as commerce that is transacted electronically, as over the internet (The American Heritage Dictionary of the English Language, fourth Edition). While technology, consumers and organizations are increasingly moving in this direction because of the many advantages such as: time saving, access to wider range of goods and services for the consumer and access to wider markets for the company. Although there are still a great number of disadvantages of electronic commerce, of most concern are those associated with crime. This essay will bring to light the pros and cons of this relatively new form of commerce.

One of the most obvious advantages of online shopping is that it is time saving, (Rutter & Southernton, 2000) studies show that time saving is the number one reason for using electronic commerce. People now have access to their money from home and work all from a desktop computer, paying monthly bills to large organization that implement electronic transactions no longer requires you to stand in lines or withdraw large sums of money from your account to carry around in your wallet and pay at a point of sale. Not only a bills be paid you can shop online for groceries, clothing and hobbies, the work is endless as most things these days can be purchased right from a store by engaging yourself onto an internet site from your home computer. This is why some saving is the single most reason online shopping has grown and incorporated in a large organization in the last few years.

Another advantage of online shopping is that consumers have access to a wider range of products, now that company’s can use internet sites as shop fronts the consumer can browse and buy from many different sellers, making it easier to and exactly what they are looking for.

(Keeney, 1999) argues that consumers are no longer restricted to what is available in their local area; they now have access to a wider range of goods and services through electronic commerce that also provides them with more competitive prices and greater value. No longer can a company hold a monopoly with pricing on a region just because it is remote and there are no competitors near. Online shopping gives the remote consumer an option to shop somewhere else therefore driving prices down and quality of goods up in the local region. Electronic commerce also has its advantage in that it allows small businesses to mix with the big business online, for a relatively small cost a new business can set its self up to conduct transaction s online. (Wood, 2004) explains that for as little as $2000 a new business can start trading online, the website also goes on to say that by trading online smaller businesses are often preferred over the larger well established organizations just because of the level of personal service the smaller organizations provide.

Another advantage of online shopping is that organizations can now target a wider variety of consumers even take the product or service international, allowing them a means of supplying their goods to places that were before unreachable. An example of a company using this method is the computer store cyberian Outpost. (Peck, 1996) explains how this computer store was able to double its business every 90 days, where it used to make only $400 a day it was able to make that in twelve seconds in the online market place.

2.5 DISADVANTAGES OF ONLINE SHOPPING

Fraud is a big problem on the internet and a careless consumer can be targeted. Web sites may look legitimate can be deceiving, emails can be nothing but a hoax hoping to gain a bank account number or credit card information, (Goldsborough, 2003) explains that most email scams originate from Nigeria and all use the same type of scam, hoping to trick a gullible user into thinking they are helping a less fortunate person. (Goldsborough, 2003) shows that online auction sites are the main target of fraudsters and account for 46% of all internet fraud, the fact is that ‘while it may be convenient and anonymous it does have its price’ (valentine, 2003). Most of the time you are making a transaction across the internet you will never see who the other person is selling the product or service, how do you know that the reviews for a site are legitimate and secure information you are providing really is secure. The truth is you won’t ever know for sure that the company or person you are trading with will actually come through with their part of the deal.

Theft of credit card and personal information is often all somebody needs to be able to spend all your money on the internet. Being able to purchase and buy items with very little proof of your identity is another big downside to online shopping. Where as in a shop front using a credit card at least requires a signature as well as for the offending criminal to show himself. Using a credit card in an online transaction all you need is what is already printed on the card, and the offender can cover their tracks a lot easier, no one will have to see them to make the transaction. (Valentine, 2003) shows that although there have been many new ideas for improving the security of online transactions, most have never left the drawing board due to the increase in cost for the consumer and company.Losing the information stored on such a valuable piece of plastic can be a major headache for some unlucky consumers and this is why online shopping does have its disadvantages.

As well as being able to thieve credit card information from the consumer, a lot of companies that provide some sort of electronic transactions require the consumer to provide a host of information about themselves. This information is often stored on databases within the company, so effectively you are entrusting your personal information to the company. (Gow, 2005) article explains that this is the information that hackers often try to take, giving them a wealth of personal information allowing them to set up bogus credit cards and accounts in your name. Having to entrust your personal information with an organization you might only deal with once in your lifetime is also another major disadvantage to electronic commerce.

It is not only the consumer that is at risk on the internet, extortion is a major problem for company’s using online transactions from customers. (Gow, 2005) informs us that recent studies show that it is estimated more then 2/3 of organizations that have been the victims of computer attacks don’t report the incident to the federal police or FBI. Instead they just pay the offending criminal sometimes in the millions of dollars in an attempted to keep the offender from publicly displaying the consumer’s personal information on other websites. If such information was ever released it has the potential to destroy the company’s business and opens the company up to privacy lawsuits, which is why the FBI is kept in the dark on these, sought of attacks.

While it is easy to see that there are many advantages to conducting transactions online to saving time and money by using the ever increasing service of online shopping it is clear that consumers and companies need to be vigilant and cautious. With the emergence of this relatively new form of trading a whole new type of fraud, theft and extortion has started to exist that consumers now need to be aware of which is a major disadvantage for online trading. In concluding it is clear that both the advantages and disadvantages of electronic commerce need to be taken into consideration, while there are benefits there are also problems.

2.6 TYPES OF ONLINE SHOPPING MODELS.

Online shopping is the use of internet and the web to transact business but when we focus on digitally enabled commercial transactions between and among organizations and individuals involving information systems under the control of the firm it takes the form of e-business. Nowadays, ‘e’ is gaining momentum and most of the things if not everything is getting digitally enabled. Thus, it becomes very important to clearly draw the line between different types of commerce or business integrated with the ‘e’ factor.

There are mainly five types of online shopping models:

  1. Business to Customer (B2C): as the name suggests, it is the model involving business and consumers. This is the most common online shopping segment. In this model, online businesses sell to individual consumers. When B2C started, it had a small share in the market but after 1995 its growth was exponential. The basic concept behind this type is that the online retailers and marketers can sell their products to the online consumer by using crystal clear data which is made available via various online marketing tools. E.g. an online pharmacy giving free medical consultation and selling medicines to patients is following B2C model.
  2. Business to Business (B2B): it is the largest form of online shopping involving business of trillions of dollars. In this form, the buyers and sellers are both business entities and do not involve an individual consumer. It is like the manufacturer supplying goods to the retailer or wholesaler. E.g. Dell sells computers and other related accessories online but it is does not manufacture all those products. So, in order to sell those products, it first purchases them from different businesses i.e. the manufacturers of those products.
  3. Consumer to Consumer (C2C): it facilitates the online transaction of goods or services between two people. Though there is no visible intermediary involved but the parties cannot carry out the transactions without the platform which is provided by the online market maker such as eBay.
  4. Peer to Peer (P2P): though it is an online shopping model. But it is more than that. It is a technology in itself which helps people to directly share computer file and computer resources without having to go through a central web server. To use this, both sides need to install the required software so that they can communicate on the common platform. This type of online shopping has quite low revenue generation as from the beginning it has been inclined to the free usage due to which it sometimes got entangled in cyber laws.
  5. M-Commerce: it refers to the use of mobile devices for conducting the transactions. The mobile device holders can contact each other and can conduct the business. Even the web design and development companies optimize the websites to be viewed correctly on mobile devices.

2.7 ONLINE SHOPPING SECURITY

“The unique nature of the threats to online shopping companies requires new technologies and systems to provide a secure transaction environment.” (James, 2004) Trying in with many payment issues, the security of websites can never be 100% assured, however several technologies can be employed to help reduce the risk of information being compromised when conducting online shopping transactions.

  1. Passwords: password protection is the most common form of security found online. There are passwords for email accounts, bank accounts, store account, eBay account and more. Passwords are used to protect information which is stored online, and allows or prevents access to secured areas by asking users for a Username/ID and password before entering the site. By setting up accounts, customers can store personal details and information to avoid having to enter it in for every single transaction. The main disadvantage of this is that passwords are often not protected people tell others their password, write them down or choose ones that are easy for others to guess (birth date, name spelt backwards, etc). Even if the person trying to hack into your account doesn’t know you that well, clues like Hotmail as a secret question it can make it easier to obtain or change the current password.
  2. Encryption: To ensure information is kept private whilst it is being transferred across the internet, the data is encoded or encrypted into another language (some form of mathematical formula usually) and is then decoded at the receivers end. Most encryption software uses formulas so complex that it would take most powerful computers years to decode the messages. (James, 2004)
  3. Public key infrastructure: PKI is an added form of security which prevents a third party who steals encrypted information from decrypting it with any type of software. Encryption software uses pieces of additional software known as keys to ensure that only the creators and recipients of information are able to access it. A set of two keys, a public key and a private key are required to transmit encrypted data from one computer to another. Firstly the public key encrypts the data, and it is sent to the computer with the corresponding private key for decryption. In online shopping, these keys are installed on web servers and then sent to users of websites (browsers) automatically. The only involvement the user has in the process is agreeing that he or she trusts the web server. A tunnel is established between the browser and the server (called the secure sockets layer, or ssl) and the user can then confidently send encrypted information that only that server can decrypt. (School of International Business, 2004, p. 87)
  4. Securing Companies from External Attack: It is not only consumers that potentially suffer from fraud or viruses online and through online shopping. Companies need to protect themselves against a host of criminals’ worldwide thieves, hackers and virus makers to name a few. To prevent against these threats companies use several tools.
  5. Firewalls: A firewall is a computer and a software combination that is installed at the entry point of networked system. The firewall provides a defense, sometimes the first line of defense, between a network to be protected and the internet or other network that could pose a threat, all corporate access to and from the internet flows through firewall. The network and computers being protected are inside the firewall. Firewalls are computers that have the following characteristics:
  • Only authorized, as defined by the local security policy is allowed to pass through it.
  • All traffic from inside to outside and from outside to inside the network must pass through it.
  • The firewall itself is immune to penetration.
  • Those networks inside the firewall are often called trusted, whereas networks outside the firewall are called untrusted.