.

Wednesday, March 6, 2019

Ecommerce in Bangladesh Essay

1. IntroductionWhen electronic vocation, unremarkably known as ecommerce, is the buying and selling of harvest-feasts or services oer electronic arrangings much(prenominal)(prenominal) as the lucre and distinguish adequate to(p) com inducter ne tworks. electronic commerce draws on much(prenominal)(prenominal) technologies as electronic funds transfer, go forth chain management, Internet merchandiseing, online execution processing, electronic selective information inter falsify (EDI), inventorying management bodys, and automated info put inion musical arrangements. Modern electronic commerce typic solelyy carnal exercises the at least at angiotensin converting enzyme halt in the feats life-cycle, although it whitethorn encompass a wider range of technologies such(prenominal) as email, mobile devices and teleph stars as well. Electronic commerce is mostly considered to be the bargains aspect of e origin 1. It as well as consists of the exchange of entro py to further the profits and payment aspects of trade transactions. E-commerce lot be divided into i. E-tailing or practical(prenominal) gunstockfronts on sack grades with online catalogs, nearly cartridge clips ga in that respectd into a virtual nerve c tuck ii. The gathering and expenditure of demographic selective information through vane contacts iii. Electronic Data Interchange (EDI), the business-tobusiness exchange of info iv. E-mail and fax and their use as media for r tot every(prenominal)y(prenominal)ing prospects and established clients (for example, with smartsletters) v. line-to-business buying and selling vi. The security of business transactions The main beas of e-commerce atomic piece 18 questi. Business to Business (B2B) ii. Business to Consumer (B2C) iii. Business to Government (B2G) iv. Government to Business (G2B)2. ObjectivesOur objectives argon following i. To mold e-commerce and describe how it differs from ebusiness. ii. To identify an d describe the ridiculous features of ecommerce employ science and discuss their business signifi hind endce. iii. To describe the major eccentric somebodys of e-commerce. iv. To discuss the origins and harvest-feast of e-commerce. v. To explain the evolution of e-commerce from its wee eld to today. vi. To identify the factors that forget deem up ones mind the future of ecommerce. vii. To describe the major themes underlying the study of ecommerce. viii. To identify the major academic disciplines contri neverthe slighting to e-commerce and empathize design of an e-commerce engine ix. To identify the opportunity and problem of e-commerce implementation in Bangladesh. x. To identify the future of e-commerce. tidy sum 2 be intimate 2, February 2013 www.ijsr.net150 orbicular Journal of light and explore (IJSR), India Online ISSN 2319-7064 3. E-Commerce in Bangladesh In Bangladesh there is a limited practical application and use of B2C e-commerce .This field is non yet often actual in Bangladesh. There are m each(prenominal) reasons behind it one simple reason this country is not so developed and to the high gearest degree of its citizens are poor and uneducated. It is quit natural that there are a couple of(prenominal) customsers who is willing and evict shop in meshwork. It will take years to be developed this sector in bd. The telecommunication infrabody social system every country affect the Internet services directly, cause it is largely dep annihilateed on it. In this chapter Define Need for e-commerce in Bangladesh, varied sector in Bangladesh, overview of implementation do of e-commerce in Bangladesh. And there is some problem such as low internet speed, no payment gateway and internet range, and recommendation. 3.1 Need for E-commerce in Bangladesh With the increasing diffusion of ICTs, more specific completelyy the Internet, the global business community is rapidly moving towards Business-to-Business (B2B) e-commerce. The em ptors/ importers gain a agnise advantage when the Internet gives them opening to the global market, by which they can match prices across regions, find out whether prices vary by fiat fragmentation, sign up awareness active substitute/ alternative products. Consequently, the sellers/ exporters make sure that they are well portrayed in the cyber world through websites and portals. Like buyers, sellers also benefit from increased and more efficient access to the global market through the Internet. Bangladesh is pursuing an economic policy of export-led emersion.With the rising forces of globalization, it is get more and more important that the private sector, extraly the export sectors are well watchful to meet the requirements and expectations of the importers and also stand out in the competition against exporters in some opposite countries. In such a scenario, two issues are becoming particularly important for East Pakistani export sectors one, whether businesses are automating their internal processes with these of ICTs to arrest increasingly efficient and competitive in a global context, and two, whether businesses conduct effective presence and participation in the cyber world. International organisations such as UNCTAD (United Nations Center for Trade and Development) and WTO (World Trade Organization) 2 constitute, over the last several years, put much emphasis on the importance of e-commerce for developing countries. UNCTAD has special programs to facilitate developing countries to transition into e-commerce. The WTO has also developed rules and guidelines for global e-commerce transactions. 3.2 E-commerce in diametric Sector in Bangladesh Despite world a under developed country, selected segments of the Bangladeshi business community has embraced technology with reasonable success. Personal computers and the Internet are also emerging as day-to-day business tools. These tyrannical indicators are favoring the prospects of e-commerc e in Bangladesh. i. RMG Sector ii. Banking on the Web (Online Banking) iii. Online Shopping iv. Web Hosting, Domain v. Online autods, gifts vi. Pay Bill 3.3 The Existing Situation and Potential of E-commerce in Bangladesh Internet services are presently available in Bangladesh. Its exercise for e-commerce by the Bangladeshi producers to export as well as to access inputs will be dependent on their willingness and office to use this mean(a) as well as that of the buyers of final products and the sellers of in conditionediate goods and services. project 1 depicts the trey dimensions of e-commerce. Business to-Consumers (B2C) e-commerce is practic whollyy non-existent within Bangladesh, while a in truth limited level of Business-to-Business (B2B) and Businessto-Government (B2G) transactions exists 3. The potential for use of e-commerce by Bangladeshi consumers and businesses with foreign firms is much brighter, and can play an important role in boosting the countrys exports. A si gnificant volume of B2G is also possible, as the government remains the biggest spender.Figure 1. The Three Dimensions of E-commerce 3.4 E-commerce growth in Bangladesh E-commerce growth in Bangladesh shown in figure 3.2 in the year of 2000 e-commerce business is 11440 billion taka. In the years of 2001 business of e-commerce is 15840 million taka and increase year by year 2002 business is 18980 million taka 2002 to 2004 businesses is not very fast exclusively in the year of 2005 business of e-commerce is 22480 and end the year of 2006 business of e-commerce growth is 252000 million taka.Figure 2. E-commerce growth in Bangladesh4. MethodologiesThe methodologies of our survey are apt(p) below 4.1 Identification of scope of study 151Volume 2 return key 2, February 2013 www.ijsr.netInternational Journal of experience and Re reckon (IJSR), India Online ISSN 2319-7064 To accomplish the project objectives, a systematic process is followed. The project process begins with the identifi cation of the project consequence where studies was carried out to obtain enough information on the topic. 4.2 Group discussions to collect suggestions on the survey of e-commerce system Discuss with group member approximately the topic and collect their suggestions on this topic. Also discuss impacts of ecommerce in our party and business and barriers ecommerce in different sectors in Bangladesh and the future of e-commerce system. 4.3 E-commerce site visits as clients Some e-commerce websites visits were made as clients. We visited websites like www.ebay.com, browsed mevery products, added product to shop cart, created drug exploiter account and observed the check out process. We also examined their user interface, front end design and various category of product. We searched products by different slips, the product names and the company name. 4.4 Internet search to collect data on e-commerce growth world wide We searched the internet to collect data on e-commerce business g rowth ground on time, data on e-commerce revenue based on geographic locations. We also collected data closely e-commerce business growth and present situation of ecommerce in Bangladesh. 4.5 architecture and commandment review of e-commercesite We reviewed the main technologies involved in ecommerce site, which imply php sessions, catalog technology, server technology (hardware and computer software). We also reviewed acknowledgement identity control panel transaction and shop cart checkout process. 4.6 Interviews to find what people think about ecommerce We interviewed people from various sections of the society to find out what they think about e-commerce and what changes they needed. We also discussed with them what the advantages and disadvantages of e-commerce systems are. 4.7 Introducing intentional change to understand ecommerce engine We downloaded e-commerce site work out and changed the catalog of product, banner, product flesh out, product image, and increase and decrease number of product show in the main page also changed the theme of e-commerce site. We entered sore products and removed selling product and updated the products. 5.1 Architecture This is the design of front-end design shown in Figure 3. There is a one home page, wish list, account, shopping cart, and product list and checkout option.Figure 3. E-commerce site front end design 5.2 Database Structure 5.2.1 E-R Diagram A sample entity race plat using Chens notation is shown in Figure 4.5. expert Design of E-Commerce SiteThe technical design of e-commerce site include database structure, database precis, submit structure, php session, shopping cart, e-r diagram, and credit card transaction.Figure 4. A sample entity consanguinity diagram using Chens notation In software engineering, an entity birth homunculus (ER example for short) is an abstract 4 and conceptual representation of data. Entity family sexual family illustrationing is a database good exampleing metho d, used to produce a type of conceptual system or semantic data exemplification of a system, often 152Volume 2 Issue 2, February 2013 www.ijsr.netInternational Journal of cognition and Research (IJSR), India Online ISSN 2319-7064 a relational database, and its requirements in a top-down fashion.Diagrams created by this process are called entity relationship diagrams or ER diagrams. Using the three schema approach to software engineering, there are three levels of ER specimens that may be developed. The conceptual data dumbfound is the highest level ER model in that it contains the least granular detail but establishes the boilersuit scope of what is to be included within the model set. The conceptual ER model commonly defines master reference data entities that are usually used by the organization. Developing an enterprise-wide conceptual ER model is recyclable to gage documenting the data architecture for an organization. A conceptual ER model may be used as the foundati on for one or more ordered data models. The purpose of the conceptual ER model is thusly to establish structural metadata commonality for the master data entities betwixt the set of tenacious ER models. The conceptual data model may be used to form commonality relationships between ER models as a basis for data model integration. A limpid ER model does not require a conceptual ER model especially if the scope of the discursive ER model is to develop a single disparate information system. The rational ER model contains more detail than the conceptual ER model. In addition to master data entities, operational and transactional data entities are now defined 5. The details of each data entity are developed and the entity relationships between these data entities are established. The tenacious ER model is however developed independent of technology into which it will be implemented. ace or more physical ER models may be developed from each logical ER model. The physical ER mode l is normally developed be instantiated as a database. Therefore, each physical ER model must(prenominal) contain enough detail to produce a database and each physical ER model is technology dependent since each database management system is somewhat different. The physical model is normally forward engineered to instantiate the structural metadata into a database management system as relational database objects such as database display panels, database indexes such as preposterous key indexes, and database coynesss such as a foreign key constraint or a commonality constraint. The ER model is also normally used to design modifications to the relational database objects and to maintain the structural metadata of the database. The first stage of information system design uses these models during the requirements analysis to describe information ineluctably or the type of information that is to be stored in a database. The data modelingtechnique can be used to describe any ontolog y (i.e. an overview and classifications of used experimental conditions and their relationships) for a certain area of interest. In the caseful of the design of an information system that is based on a database, the conceptual data model is, at a later stage (usually called logical design), mapped to a logical data model, such as the relational model this in turn is mapped to a physical model during physical design. 5.2.2 The construct Blocks Entities, Relationships, and Attributes The create blocks entities, relationships, and attributes as shown in Figure 5, first here two related entities then an entity with an attribute next in this figure a relationship with and attribute and finally see primary key.Figure 5. The building blocks entities, relationships, and attributes An entity may be defined as a thing which is current as being capable of an independent existence and which can be uniquely identified. An entity is an abstraction from the complexities of some domain. When we speak of an entity we normally speak of some aspect of the significant world which can be distinguished from other aspects of the real world. An entity may be a physical object such as a house or a car, an event such as a house sale or a car service, or a concept such as a node transaction or order. Although the depot entity is the one most commonly used, following Chen we should really distinguish between an entity and an entity-type. An entity-type is a category. An entity, strictly speaking, is an instance of a devoted entity-type. There are usually many instances of an entity-type. Because the term entity-type is somewhat cumbersome, most people tend to use the term entity as a synonym for this term. Entities can be thought of as nouns. Examples a computer, an employee, a meter, a mathematical theorem. A relationship captures how entities are related to one another. Relationships can be thought of as verbs, linking two or more nouns. Examples owns relationship between a company and a computer, supervises relationship between an employee and a department 6, performs relationship between an artist and a song, a proved relationship between a mathematician and a theorem. The models linguistic aspect described above is utilized inVolume 2 Issue 2, February 2013 www.ijsr.net153International Journal of Science and Research (IJSR), India Online ISSN 2319-7064 the declarative database query language ERROL, which mimics natural language, constructs. ERROLs semantics and implementation are based on Reshaped relational algebra (RRA), a relational algebra which is adapted to the entityrelationship model and captures its linguistic aspect. Entities and relationships can both give attributes. Examples an employee entity might collapse a Social Security Number (SSN) attribute the proved relationship may amaze a date attribute. Every entity (unless it is a weak entity) must have a minimal set of uniquely identifying attributes, which is called the entitys prima ry key. Entityrelationship diagrams dont show single entities or single instances of relations. Rather, they show entity sets and relationship sets. Example a particular song is an entity. The collection of all songs in a database is an entity set. The eaten relationship between a child and her lunch is a single relationship. The set of all such child-lunch relationships in a database is a relationship set. In other words, a relationship set corresponds to a relation in mathematics, while a relationship corresponds to a member of the relation. 5.2.3Relationships, Roles and Cardinalities In Chens pilot program paper he gives an example of a relationship and its roles. He describes a relationship marriage and its two roles husband and wife. A soul plays the role of husband in a marriage (relationship) and another person plays the role of wife in the ( alike(p)) marriage. These words are nouns. That is no bewilderment naming things requires a noun. However as is quite usual with new ideas, many eagerly appropriated the new linguistic process but then applied it to their own old ideas. gum olibanum the lines, arrows and crows-feet of their diagrams owed more to the earlier Bachman diagrams than to Chens relationship diamonds. And they similarly misunderstood other important concepts. In particular, it became swank (now almost to the point of exclusivity) to name relationships and roles as verbs or phrases. 5.2.4 Limitations ER models give birth information content that can readily be correspond in a relational database.They describe only a relational structure for this information. Hence, they are inadequate for systems in which the information cannot readily be represented in relational form, such as with semistructured data. Furthermore, for many systems, the possible changes to the information contained are nontrivial and important enough to warrant explicit specification. Some authors have extended ER modeling with constructs to represent change, an ap proach supported by the original author an example is Anchor Modeling. An alternative is to model change disassemblely, using a process modeling technique. Additional techniques can be used for other aspects of systems. For instance, ER models roughly Figure 6. E-R modeling 5.3 wee-wee over Structure In relational databases and flat file databases, a delay is a set of data elements (values) that is organized using a model of vertical columns (which are identified by their name) and horizontal rows, the cell being the unit where a row and column intersect. A table has a specified number of columns, but can have any number of rows each row is identified by the values appearing in a particular column subset which has been identified as a unique key index. Table is another term for relations although there is the remnant in that a table is usually a multi-set (bag) of rows whereas a relation is a set and does not give duplicates. Besides the actual data rows, tables generally have associated with them some meta-information, such as constraints on the table or on the values within particular columns. The data in a table does not have to be physically stored in the database. Views are also relational tables, but 154correspond to just 1 of the 14 different modeling techniques offered by UML. other limitation ER modeling is aimed at specifying information from scratch. This suits the design of new, standalone information systems, but is of less help in integrating pre- live information sources that already define their own data representations in detail. Even where it is suitable in principle, ER modeling is rarely used as a separate activity. One reason for this is todays abundance of tools to support diagramming and other design support directly on relational database management systems. These tools can readily extract database diagrams that are very close to ER diagrams from existing databases, and they tin alternative views on the information contained in such diagrams. In a survey, Brodie 7 and Liu could not find a single instance of entityrelationship modeling inside a sample of ten Fortune light speed companies. Badia and Lemire blame this lack of useon the lack of guidance but also on the lack of benefits, such as lack of support for data integration. Also, the enhanced entityrelationship model (EER modeling) introduces several concepts which are not present in ER modeling. ER modeling as shown in Figure 6.Volume 2 Issue 2, February 2013 www.ijsr.netInternational Journal of Science and Research (IJSR), India Online ISSN 2319-7064 their data are calculated at query time. Another example is nicknames, which represent a pointer to a table in another database. 5.4 Database Schema A database schema of a database system is its structure described in a formal language supported by the database management system (DBMS) and refers to the organization of data to create a intent of how a database will be constructed (divided into database tables). The formal definition of database schema is a set of formulas (sentences) called integrity constraints imposed on a database. These integrity constraints correspond compatibility between parts of the schema. All constraints are expressible in the alike language. A database can be considered a structure in actualization of the database language. The states of a created conceptual schema are transformed into an explicit mapping, the database schema. This describes how real world entities are modeled in the database. A database schema specifies, based on the database administrators knowledge of possible applications, the facts that can enter the database, or those of interest to the possible end-users. The notion of a database schema plays the equivalent role as the notion of theory in predicate calculus. A model of this theory closely corresponds to a database, which can be seen at any instant of time as a mathematical object. Thus a schema can contain formulas representi ng integrity constraints specifically for an application and the constraints specifically for a type of database, all expressed in the kindred database language. In a relational database 8, the schema defines the tables, fields, relationships, views, indexes, packages, procedures, functions, queues, triggers, types, sequences, materialized views, synonyms, database links, directories, Java, XML schemas, and other elements. Schemas are generally stored in a data dictionary. Although a schema is defined in text database language, the term is often used to refer to a graphicaldepiction of the database structure. In other words, schema is the structure of the database that defines the objects in the database. In an Oracle Database system, the term schema has a slightly different connotation. For the explanation used in an Oracle Database, see schema object. 5.5 Levels of Database Schema A conceptual schema or conceptual data model is a map of concepts and their relationships. This de scribes the semantics of an organization and represents a series of assertions about its nature. Specifically, it describes the things of significance to an organization (entity classes), about which it is inclined to collect information, and characteristics of (attributes) and associations between pairs of those things of significance (relationships).Figure 7. abstract schema or conceptual data model A logical schema is an alias that allows a unique name to be given to all the physical schemas containing the same data store structures. The aim of the logical schema is to ensure the portability of the procedures and models on the different physical schemas. In this way, all developments in Designer are carried out exclusively on logical schemas. A logical schema can have one or more physical implementations on separate physical schemas, but they must be based on data servers of the same technology. A logical schema is always directly linked to a technology. To be usable, a logical schema must be declared in a context. Declaring a logical schema in a context consists of indicating which physical schema corresponds to the alias logical schema for this context. For example The logical schema LEDGER is the set of Sybase tables required for the functioning of the accounting application. These tables are stored in a physical schema for each installation of the accounting application. imprint in Designer or Operator is always done on the logical schema LEDGER. Only the context allows the physical schema on which the operations are actually done to be determined. Thus, the user can switch from one physical environment to another in a single action. A logical schemas example is shown in figure 8. Table 1 distinguish of the logical schema Name of the logical schema LEDGER LEDGER LEDGER Context capital of Massachusetts Seattle Production Seattle Test Physical Schema Sybase Boston LDG Sybase SEATTLE PROD LDG Sybase SEATTLE psychometric test LDGVolume 2 Issue 2, Febr uary 2013 www.ijsr.net155International Journal of Science and Research (IJSR), India Online ISSN 2319-7064 This article discusses the Oracle use of the term. For other uses of schema in a database context, such as a graphical representation of tables and other objects in a database, see database schema. In an Oracle database, associated with each database user is a schema. A schema comprises a collection of schema objects. Examples of schema objects include tables, views, sequences, synonyms, indexes, clusters, database links, snapshots, procedures, functions and packages.Figure 8. Logical schemas Physical schema is a term used in data management to describe how data is to be represented and stored (files, indices, et al.) in secondary terminus using a particular database management system (DBMS) (e.g., Oracle RDBMS, Sybase SQL Server, etc.). The logical schema was the way data were represented to conform to the constraints of a particular approach to database management. At that t ime the choices were hierarchical and network. Describing the logical schema, however, still did not describe how physically data would be stored on disk drives. That is the domain of the physical schema. Now logical schemas describe data in terms of relational tables and columns, object-oriented classes, and XML tags. A single set of tables, for example, can be implemented in numerous ways, up to and including an architecture where table rows are maintained on computers in different countries.Figure 10. Schema objects 5.6 Php Sessions A PHP session variable is used to store information about, or change settings for a user session. Session variables hold information about one single user, and are available to all pages in one application 9. When you are work with an application, you open it, do some changes and then you close it. This is much like a Session. The computer knows who you are. It knows when you start the application and when you end. But on the internet there is one pr oblem the web server does not know who you are and what you do because the HTTP address doesntmaintain state. A PHP session solves this problem by allowing you to store user information on the server for later use (i.e. username, shopping items, etc). However, session information is temporary and will be deleted later the user has left the website. If you need a permanent storage you may want to store the data in a database. Sessions work by creating a unique id (UID) for each visitor and store variables based on this UID. The UID is any stored in a cookie or is propagated in the URL. In PHP, sessions can keep track of authenticated in users. They are an innate building block in todays websites with big communities and a lot of user activity. Without sessions, everyone would be an anonymous visitor. In system terms, PHP sessions are little files, stored on the servers disk. But on high traffic sites, the disk I/O involved, and not being able to share sessions between multiple web servers make this default system far from ideal. This is how to enhance PHP session management in terms of mental process and share ability. If you have multiple web servers all serving the same site, sessions should be shared among those servers, and not 156Figure 9. Physical schema In Database lore, a schema object is a logical data storage structure. This possibly originates from the use of the term in the context of Oracle databases. The term schema can have other meanings when talking about non-Oracle databases.Volume 2 Issue 2, February 2013 www.ijsr.netInternational Journal of Science and Research (IJSR), India Online ISSN 2319-7064 abide on each servers individual disk. Because once a user gets load-balanced to a different server, the session cannot be found, effectively log the user out. A common way around this is to use custom session handlers. 5.7 Shopping Card A shopping cart is a software application that typically runs on the computer where your Web site is located (the Web server), and allows your customers to do things such as searching for a product in your store catalog, adding a selected product to a basket, and placing an order for it. The shopping cart integrates with the rest of your Web site. In other words, there are typically links on your Web pages that customers can pass over on, and which allow them to perform someof the functions described above. For example, many e-commerce Web sites have a search link appearing on every Web page, as part of the navigation area Shopping carts are write in a variety of different programming languages. Some of them provide full access to the source code, thus allowing experienced programmers to make modifications to the system features, some others dont. Some shopping carts run on Windows Web servers, some on Unix, others on both. In most cases, you can place the shopping cart on your Web server alone by transferring its files there using any FTP 10 software, where FTP stands for send Transf er Protocol. For example, our shopping cart software called Product Card is a collection of files written in a programming language called chaste ASP, and that you host on a Windows server. Experienced programmers can customize the system as they wish as the source code is included. iii. Merchant runs credit card through the point of sale unit. The amount of the sale is both hand-entered or transmitted by the cash register. iv. Merchant transmits the credit card data and sales amount with a request for authorization of the sale to their acquiring bank. . v.The acquiring bank that processes the transaction, routes the authorization request to the card-issuing bank. The credit card number identifies type of card, issuing bank, and the cardholders account. vi. If the cardholder has enough credit in their account to cover the sale, the issuing bank authorizes the transaction and generates an authorization code. This code is sent back to the acquiring bank. vii. The acquiring bank pr ocessing the transaction, and then sends the approval or denial code to the merchants point of sale unit. Each point of sale device has a separate terminal ID for credit card processors to be able to route data back to that particular unit. viii. A sale draft, or slip, is printed out by the point of sale unit or cash register. The merchant asks the buyer to sign the sale draft, which obligates them to reimburse the cardissuing bank for the amount of the sale. ix. At a later time, probably that night when the store is closing up, the merchant reviews all the authorizations stored in the point of sale unit against the signed sales drafts. When all the credit card authorizations have been verified to match the actual sales drafts, the merchant will capture, or transmit, the data on each trustworthy credit card transaction to the acquiring bank for deposit. This is in office of depositing the actual signed paper drafts with the bank. x. The acquiring bank performswhat is called an fi ll in for each sales draft, with the appropriate card-issuing bank. The card-issuing bank transfers the amount of the sales draft, minus an interchange fee to the acquiring bank. xi. The acquiring bank then deposits the amount of the all the sales drafts submitted by the merchant, less a discount fee, into the merchants bank account. Credit card transaction is shown in Figure 12.Figure 11. Google Checkout shopping cart 5.8 Credit Card Transaction From the information presented in the preceding sections, we can start to piece together what is occurring during a credit card transaction. We know that merchants have a relationship with either an acquiring bank or independent sales organization, through which they have their credit card transactions processed. The section on industry terminology shows us some of the fees involved in this process. Merchants must pay the acquiring bank or ISO a discount fee based on the total amount of the sale. Likewise, the acquiring bank or ISO must pay the card issuer an interchange fee when they process the sales draft from the merchant. steps involved in a normal credit card transaction i. Merchant calculates the amount of purchase and asks buyer for payment ii. Buyer presents merchant with a credit card.Figure 12. Credit card transaction6. end pointElectronic commerce or e-commerce is a term for any type of business, or commercial transaction that involves the transfer of information across the Internet. It is before long one of the most important aspects of the Internet to emerge. E157Volume 2 Issue 2, February 2013 www.ijsr.netInternational Journal of Science and Research (IJSR), India Online ISSN 2319-7064 commerce has grown enormously worldwide. In the future e-commerce may become totally mobile based. In Bangladesh E-commerce also become a very powerful business weapon but Bangladesh will have to overcome the problems with poor network connectivity and electronic paymentissues. The problems identified in this Project are Security problem, puzzling checkout process, Customers cant find products, Customers cant contact and fell a product, No sales staff means any chance of up-selling, Language barrier. Regarding the identified problems the following solutions have been proposed Merchant ineluctably to ensure the platform employs strong encryption for payment processing and customer data retention. E-commerce platform should always have a visible running game total of purchases prominently displayed during the customer experience. E-commerce platform must support the ability to present the customer with nested categories as well as a search box. An e-commerce platform should also support the ability to attach multiple pictures to a product catalog page, allowing the consumer to view the product from multiple angles. E-commerce platform needfully to be able to associate products with related and complimentary products. The system should allow all translation to be done centrally. My M.Sc Engg. i n CSE is running at Bangladesh University of Engineering and engine room (BUET), Dhaka-1000, Bangladesh. My research interest areas are the image processing, calculating machine Networks, ready reckoner Networks and Data Security, Compiler, Theory of Computations, etc. My several papers produce in International Journals. Muhammad Golam Kibria, Assistant Professor and Head, surgical incision of CSE, University of Information engineering science & Sciences, Dhaka, Bangladesh. I completed Masters in Mobile Computing and conversation from the University of Greenwich, London, UK. My research interests are Computer Network Security and image processing, Sensor, Robotics and radio Sensor Network. Mohammad Nuruzzaman Bhuiyan is working as a Lecturer at the Department of CSE & IT, University of Information Technology & Sciences (UITS), Baridhara, Dhaka-1212.Bangladesh. I have completed my B.Sc Engg. and M.Sc Engg. in CS from The University of Sheffield, Western Bank, Sheffield S10 2TN , UK. My research interest areas are Fundamental of Computer, Web technology, Computer Networks, Computer Networks and Data Security, Theory of Computations, etc. My several papers accepted in International Journals.References1 http//en.wikipedia.org/wiki/Electronic_commerce 2 Tkacz, Ewaryst Kapczynski, Adrian (2009), Springer, P. 255 3 Online Today, The Electronic Mall. CIS/compuserve nostalgia.Http//www.gsbrown.org/compuserve/electronic-mall1984-04/. 4 http//www.marketwatch.com/story/amazon-buysdiaperscom-parent-in-545-mln-deal-2010-11-08/. 5 http//techcrunch.com/2011/03/28/ebay-to-acquire-gsicommerce-for-2-4-billion 6 Miller, Holmes E. And Engemann, Kurt J. (1996) A methodology for managing information-based risk Information Resources Management Journal 92 17-24 7 http//www.e-consultancy.com/news blog/363726/whydo-customers-abandon-the-Checkoutprocess.htmlcopyright 2008 Voloper Creations Inc. 7 8 http//www.articlesbase.com/e-commercearticles/impacts-of-e-commerce-on-business18829 52.html 9 http//www.startupsmart.com.au/mentor/michaelfox/2011-02-03Authors ProfileMd. Akbor Hossain received the B.Sc degrees in CSE University of Information Technology and Sciences (UITS), Baridhara, Dhaka-1212, Bangladesh. I am working as a Lab Demonstrator at the Department of CSE & IT, University of Information Technology & Sciences (UITS), Baridhara, Dhaka-1212, Bangladesh. *Md. Akkas Ali is working as a Lecturer at the Department of CSE & IT, University of Information Technology & Sciences (UITS), Baridhara, Dhaka1212, Bangladesh. I completed my B.Sc Engg. in CSE from Chittagong University of Engineering and Technology (CUET), Chittagong-4349, Bangladesh.Volume 2 Issue 2, February 2013 www.ijsr.net

No comments:

Post a Comment