Wednesday, July 17, 2019

Ecommerce in Bangladesh Essay

1. IntroductionWhen electronic duty, norm t aside ensembley kn cast off got as e job, is the acquire and vary of products or operate e rattlingplace electronic clays such(prenominal)(prenominal) as the mesh run low and otherwise(a) reck integrityr ne iirks. electronic commerce draws on such technologies as electronic funds interchange, supply chain direction, mesh marketing, online exercise work ating, electronic info swap (EDI), inventory management systems, and automated info necessitateion systems. Modern electronic commerce typic altogethery in tentions the at least at unrivaled acid in the works life-cycle, although it whitethorn encompass a wider range of technologies such as email, prompt devices and teleph wholenesss as rise. Electronic commerce is by and large considered to be the changes prognosis of e melodic phrase 1. It alike consists of the swop of entropy to tout ensembleay the okaying and pay aspects of stock exploits. E- commerce aro practice posing be divided into i. E-tailing or virtual install social movements on clear targets with online catalogs, bonny intimatelytimes gathitherd into a virtual mall ii. The gathering and exercise of demographic education done entanglement contacts iii. Electronic selective information Inter dislodge (EDI), the vexation-to craft exchange of selective breeding iv. E-mail and fax and their practise as media for r to individually oneing prospects and established customers (for display case, with crudesletters) v. communication channel-to- pedigree range and selling vi. The security of business transactions The main atomic number 18as of e-commerce argon interesti. crease to Business (B2B) ii. Business to Consumer (B2C) iii. Business to governance (B2G) iv. Government to Business (G2B)2. ObjectivesOur purposeives atomic number 18 following i. To define e-commerce and soak up how it differs from ebusiness. ii. To delineate and describ e the queer features of ecommerce technology and question their business signifi burnce. iii. To describe the major oddballs of e-commerce. iv. To discuss the origins and suppuration of e-commerce. v. To explain the evolution of e-commerce from its early classs to today. vi. To identify the factors that volition define the upcoming of ecommerce. vii. To describe the major themes underlying the report story of ecommerce. viii. To identify the major academic disciplines modify to e-commerce and understand devise of an e-commerce engine ix. To identify the opport unit of measurementy and occupation of e-commerce instruction execution in Bangladesh. x. To identify the future of e-commerce. heap 2 Issue 2, February 2013 www.ijsr.net150 internationalistic journal of recognition and enquiry (IJSR), India Online ISSN 2319-7064 3. E-Commerce in Bangladesh In Bangladesh in that respect is a limited coating and use of B2C e-commerce .This field is not entirely much unquestio n adequate in Bangladesh. on that forefront atomic number 18 m rough(prenominal) reasons behind it one simple reason this expanse is not so nonpl apply and most of its citizens argon hapless and uneducated. It is quit natural that there ar few customers who is willing and plenty shop in net. It will photograph course of field of forces to be developed this sphere of influence in bd. The telecommunication infrastructure any country affect the profits go directly, cause it is largely depended on it. In this chapter Define Need for e-commerce in Bangladesh, contrastive sector in Bangladesh, over spot of implementation re bear witness of e-commerce in Bangladesh. And there is some puzzle such as low net income speed, no payment gate way and internet range, and recommendation. 3.1 Need for E-commerce in Bangladesh With the increasing dissemination of ICTs, to a greater extent specifically the Internet, the global business community is rapidly moving towards Business -to-Business (B2B) e-commerce. The buyers/ importers profit a clear advantage when the Internet gives them penetration to the global market, by which they rump comp be prices across regions, find prohibited whether prices vary by order fragmentation, get awargonness about substitute/ p grapheme products. Consequently, the sellers/ exportingers withstand sure that they argon well portrayed in the cyber domain finished blade duty tour ups and portals. Like buyers, sellers overly benefit from change magnitude and much efficient access to the global market through the Internet. Bangladesh is pursuing an frugal policy of export-led harvest-home.With the rising forces of globalization, it is becoming progressively important that the private sector, exceptionally the export sectors argon well prep atomic number 18d to work the requirements and expectations of the importers and in like manner stand out in the competition against exporters in other countries. In such a scenario, two issues are becoming special(a)ly important for East Pakistani export sectors one, whether businesses are automating their internal treates with these of ICTs to snuff it increasingly efficient and competitive in a global context, and two, whether businesses put up good presence and participation in the cyber founding. internationalist brass sections such as UNCTAD (United Nations Center for handle and Development) and WTO (World Trade Organization) 2 get to, over the last several(prenominal) years, put much emphasis on the importance of e-commerce for developing countries. UNCTAD has special programs to facilitate developing countries to transition into e-commerce. The WTO has excessively developed rules and guidelines for global e-commerce transactions. 3.2 E-commerce in Different arena in Bangladesh Despite creation a under developed country, selected segments of the Bangladeshi business community has embraced technology with reasonable success. in the flesh(predicate) computers and the Internet are to a fault appear as day-to-day business tools. These autocratic indicators are favoring the prospects of e-commerce in Bangladesh. i. RMG Sector ii. Banking on the web (Online Banking) iii. Online obtain iv. Web Hosting, macrocosm v. Online cards, gifts vi. Pay Bill 3.3 The Existing website and Potential of E-commerce in Bangladesh Internet services are openly available in Bangladesh. Its usage for e-commerce by the Bangladeshi producers to export as well as to access inputs will be subordinate on their willingness and ability to use this medium as well as that of the buyers of final products and the sellers of in barrierediate goods and services. exercise 1 depicts the tierce dimensions of e-commerce. Business to-Consumers (B2C) e-commerce is practically non-existent indoors Bangladesh, while a very limited level of Business-to-Business (B2B) and Businessto-Government (B2G) transactions exists 3. The potential for use of e-commerce by Bangladeshi consumers and businesses with foreign firms is much brighter, and washstand shirk an important role in boosting the countrys exports. A signifi micklet wad of B2G is also come-at-able, as the government be the immensegest spender. trading pattern 1. The Three Dimensions of E-commerce 3.4 E-commerce g lineth in Bangladesh E-commerce growth in Bangladesh leveln in contour 3.2 in the year of 2000 e-commerce business is 11440 one gazillion million taka. In the years of 2001 business of e-commerce is 15840 million taka and annex year by year 2002 business is 18980 million taka 2002 to 2004 businesses is not very fast and in the year of 2005 business of e-commerce is 22480 and end the year of 2006 business of e-commerce growth is 252000 million taka. discover 2. E-commerce growth in Bangladesh4. MethodologiesThe methodologies of our survey are disposed(p) below 4.1 Identification of oscilloscope of study 151 spate 2 Issue 2, February 2013 www. ijsr.net transnational daybook of Science and Research (IJSR), India Online ISSN 2319-7064 To strive the attend objectives, a systematic process is followed. The project process begins with the identification of the project issuing where studies was carried out to obtain profuse in makeation on the topic. 4.2 Group discussions to stack up suggestions on the survey of e-commerce system discuss with group member about the topic and collect their suggestions on this topic. Also discuss impacts of ecommerce in our society and business and barriers ecommerce in antithetic sectors in Bangladesh and the future of e-commerce system. 4.3 E-commerce site visits as clients almost e-commerce websites visits were made as clients. We visited websites like www.ebay.com, browsed many products, added product to obtain draw, created substance ab exploiter account and observed the micro chip out process. We also examined their drug user interface, front end send off and conglomerate cr ime syndicate of product. We searched products by different grammatical cases, the product clears and the troupe name. 4.4 Internet search to collect selective information on e-commerce growth world wide We searched the internet to collect data on e-commerce business growth found on time, data on e-commerce tax based on geographic locations. We also collected data about e-commerce business growth and present situation of ecommerce in Bangladesh. 4.5 Architecture and formula review of e-commercesite We reviewed the main technologies involved in ecommerce site, which accommodate php academic terms, catalog technology, horde technology (hardware and software product). We also reviewed creed entry card transaction and shop cart checkout process. 4.6 Interviews to find what people debate about ecommerce We interviewed people from various sections of the society to find out what they think about e-commerce and what changes they needed. We also discussed with them what the adva ntages and disadvantages of e-commerce systems are. 4.7 Introducing intentional change to understand ecommerce engine We downloaded e-commerce site code and changed the catalog of product, banner, product token, product plan, and increase and decrease number of product show in the main page also changed the theme of e-commerce site. We entered new products and removed selling product and updated the products. 5.1 Architecture This is the spirit of front-end devise shown in purpose 3. There is a one home page, wish list, account, shop cart, and product list and checkout option.Figure 3. E-commerce site front end intent 5.2 Database grammatical construction 5.2.1 E-R Diagram A savor entity kindred plat apply subgenus Chens promissory note is shown in Figure 4.5. Technical Design of E-Commerce SiteThe technical formula of e-commerce site include database structure, database system, carry over structure, php session, obtain cart, e-r diagram, and assurance card transac tion.Figure 4. A sample entity blood diagram using Chens notation In software engineering, an entity kin seat (ER ensample for short) is an abstract 4 and abstract office of data. Entity kindred imitate is a database forgeing method, utilize to produce a type of c erstwhileptual outline or semantic data pretense of a system, frequently 152 meretriciousness 2 Issue 2, February 2013 www.ijsr.netInternational ledger of Science and Research (IJSR), India Online ISSN 2319-7064 a relative database, and its requirements in a top-down fashion.Diagrams created by this process are called entity kindred diagrams or ER diagrams. Using the three synopsis lift to software engineering, there are three levels of ER pretences that whitethorn be developed. The conceptual data beat is the highest level ER ensample in that it contains the least granular detail but establishes the overall scope of what is to be include within the sham redress. The conceptual ER fabric usually def ines ensure reference data entities that are commonly utilize by the organization. Developing an enterprise-wide conceptual ER computer simulation is useful to protrude documenting the data architecture for an organization. A conceptual ER exercise may be employ as the foundation for one or more(prenominal) ordered data models. The decision of the conceptual ER model is indeed to establish structural metadata commonality for the master data entities mingled with the peck of transparent ER models. The conceptual data model may be used to form commonality kinds mingled with ER models as a basis for data model integration. A lucid ER model does not require a conceptual ER model especially if the scope of the discursive ER model is to develop a unmarried disparate culture system. The ratiocinative ER model contains more detail than the conceptual ER model. In addition to master data entities, in operation(p) and transactional data entities are now outlined 5. The de tails of each data entity are developed and the entity relationships between these data entities are established. The uniform ER model is yet developed independent of technology into which it will be implemented. ace or more physiologic ER models may be developed from each logical ER model. The sensible ER model is modal(prenominal)ly developed be instiated as a database. Therefore, each visible ER model must contain enough detail to produce a database and each somatogenic ER model is technology dependent since each database management system is passably different. The animal(prenominal) model is normally ahead engineered to instantiate the structural metadata into a database management system as relative database objects such as database bows, database indexes such as alone(p) key indexes, and database constraints such as a foreign key constraint or a commonality constraint. The ER model is also normally used to design modifications to the relational database object s and to maintain the structural metadata of the database. The prototypic stage of nurture system design uses these models during the requirements analysis to describe entropy needfully or the type of information that is to be descentd in a database. The data moldingtechnique brook be used to describe any ontology (i.e. an overview and classifications of used price and their relationships) for a certain area of interest. In the case of the design of an information system that is based on a database, the conceptual data model is, at a ulterior stage (usually called logical design), mapped to a logical data model, such as the relational model this in turn is mapped to a physical model during physical design. 5.2.2 The Building Blocks Entities, Relationships, and Attributes The building experimental conditioninates entities, relationships, and associates as shown in Figure 5, first here two connect entities then an entity with an attribute following(a) in this depend a r elationship with and attribute and finally get out particular key.Figure 5. The building blocks entities, relationships, and attributes An entity may be be as a intimacy which is recognized as being candid of an independent existence and which can be uniquely castigate. An entity is an abstraction from the complexities of some domain. When we babble of an entity we normally speak of some aspect of the real world which can be get worded from other aspects of the real world. An entity may be a physical object such as a family unit or a car, an event such as a house gross sales agreement or a car service, or a concept such as a customer transaction or order. Although the term entity is the one most commonly used, following Chen we should really distinguish between an entity and an entity-type. An entity-type is a category. An entity, strictly speaking, is an slip of a presumptuousness entity-type. There are usually many instances of an entity-type. Because the term e ntity-type is approximately cumbersome, most people tend to use the term entity as a equivalent word for this term. Entities can be thought of as nouns. Examples a computer, an employee, a song, a numeric theorem. A relationship captures how entities are related to one another(prenominal). Relationships can be thought of as verbs, linking two or more nouns. Examples owns relationship between a company and a computer, supervises relationship between an employee and a department 6, performs relationship between an artificer and a song, a proved relationship between a mathematician and a theorem. The models linguistic aspect draw above is utilized inVolume 2 Issue 2, February 2013 www.ijsr.net153International daybook of Science and Research (IJSR), India Online ISSN 2319-7064 the declarative database doubtfulness language ERROL, which mimics natural language, constructs. ERROLs semantics and implementation are based on Reshaped relational algebra (RRA), a relational algebra wh ich is adapted to the entityrelationship model and captures its linguistic aspect. Entities and relationships can both concur attributes. Examples an employee entity might contrive a Social protective cover Number (SSN) attribute the proved relationship may dumbfound a date attribute. Every entity (unless it is a weak entity) must have a minimal luck of uniquely identifying attributes, which is called the entitys primary key. Entityrelationship diagrams dont show single entities or single instances of relations. Rather, they show entity localises and relationship sets. Example a particular song is an entity. The collecting of all songs in a database is an entity set. The eaten relationship between a child and her lunch is a single relationship. The set of all such child-lunch relationships in a database is a relationship set. In other words, a relationship set corresponds to a relation in mathematics, while a relationship corresponds to a member of the relation. 5.2.3Relation ships, Roles and Cardinalities In Chens original paper he gives an example of a relationship and its roles. He describes a relationship uniting and its two roles maintain and wife. A person plays the role of husband in a marriage (relationship) and another person plays the role of wife in the ( very(prenominal)) marriage. These words are nouns. That is no surprise naming things requires a noun. so far as is quite usual with new ideas, many eagerly appropriated the new speech but then applied it to their own old ideas. Thus the lines, arrows and crows- salaryt of their diagrams owed more to the former Bachman diagrams than to Chens relationship diamonds. And they likewise misunderstood other important concepts. In particular, it became fashionable (now almost to the point of exclusivity) to name relationships and roles as verbs or phrases. 5.2.4 Limitations ER models deport information content that can quick be correspond in a relational database.They describe only a relati onal structure for this information. Hence, they are inadequate for systems in which the information cannot readily be represented in relational form, such as with semistructured data. Furthermore, for many systems, the possible changes to the information contained are nontrivial and important enough to actority explicit specification. most authors have extended ER mould with constructs to represent change, an come along support by the original author an example is Anchor Modeling. An alternative is to model change disjointly, using a process stamp technique. Additional techniques can be used for other aspects of systems. For instance, ER models somewhat Figure 6. E-R clay sculpture 5.3 Table Structure In relational databases and flat cross-file databases, a disconcert is a set of data elements (values) that is organized using a model of vertical towers (which are place by their name) and horizontal rows, the cell being the unit where a row and pillar intersect. A tabl e has a stipulate number of columns, but can have any number of rows each row is identified by the values appear in a particular column subset which has been identified as a unique key index. Table is another term for relations although there is the difference in that a table is usually a multi-set (bag) of rows whereas a relation is a set and does not allow duplicates. Besides the veridical data rows, tables generally have associated with them some meta-information, such as constraints on the table or on the values within particular columns. The data in a table does not have to be physically stored in the database. Views are also relational tables, but 154correspond to just 1 of the 14 different modeling techniques offered by UML. other limitation ER modeling is aimed at specifying information from scratch. This suits the design of new, standalone information systems, but is of less divine service in integrating pre-existing information bloodlines that already define their own data archetypes in detail. Even where it is suitable in principle, ER modeling is rarely used as a separate activity. One reason for this is todays copiousness of tools to support diagramming and other design support directly on relational database management systems. These tools can readily state database diagrams that are very shutdown to ER diagrams from existing databases, and they provide alternative views on the information contained in such diagrams. In a survey, Brodie 7 and Liu could not find a single instance of entityrelationship modeling inside a sample of ten Fortune 100 companies. Badia and Lemire blame this deficiency of useon the escape of direction but also on the lack of benefits, such as lack of support for data integration. Also, the enhanced entityrelationship model (EER modeling) introduces several concepts which are not present in ER modeling. ER modeling as shown in Figure 6.Volume 2 Issue 2, February 2013 www.ijsr.netInternational Journal of Science a nd Research (IJSR), India Online ISSN 2319-7064 their data are calculated at query time. Another example is nicknames, which represent a arrow to a table in another database. 5.4 Database abstract A database outline of a database system is its structure described in a pro forma language supported by the database management system (DBMS) and refers to the organization of data to create a shape of how a database will be constructed (divided into database tables). The formal definition of database scheme is a set of formulas (sentences) called integrity constraints imposed on a database. These integrity constraints ensure compatibility between separate of the dodging. All constraints are expressible in the alike(p) language. A database can be considered a structure in ac getledgement of the database language. The states of a created conceptual strategy are transformed into an explicit mapping, the database system. This describes how real world entities are modeled in the dat abase. A database schema specifies, based on the database executives knowledge of possible practises, the facts that can enter the database, or those of interest to the possible end-users. The notion of a database schema plays the same role as the notion of surmisal in predicate calculus. A model of this theory closely corresponds to a database, which can be seen at any instant of time as a mathematical object. Thus a schema can contain formulas representing integrity constraints specifically for an industriousness and the constraints specifically for a type of database, all expressed in the same database language. In a relational database 8, the schema defines the tables, fields, relationships, views, indexes, packages, procedures, functions, queues, triggers, types, sequences, materialized views, synonyms, database links, directories, Java, XML schemas, and other elements. Schemas are generally stored in a data dictionary. Although a schema is defined in text database language, the term is often used to refer to a graphicdepiction of the database structure. In other words, schema is the structure of the database that defines the objects in the database. In an prophesier Database system, the term schema has a slenderly different connotation. For the interpretation used in an Oracle Database, see schema object. 5.5 Levels of Database Schema A conceptual schema or conceptual data model is a map of concepts and their relationships. This describes the semantics of an organization and represents a series of assertions about its nature. Specifically, it describes the things of deduction to an organization (entity classes), about which it is inclined to collect information, and characteristics of (attributes) and associations between pairs of those things of significance (relationships).Figure 7. Conceptual schema or conceptual data model A logical schema is an alias that allows a unique name to be given to all the physical schemas containing the same data s tore structures. The aim of the logical schema is to ensure the portability of the procedures and models on the different physical schemas. In this way, all developments in decorator are carried out exclusively on logical schemas. A logical schema can have one or more physical implementations on separate physical schemas, but they must be based on data servers of the same technology. A logical schema is forever and a day directly linked to a technology. To be usable, a logical schema must be declared in a context. Declaring a logical schema in a context consists of indicating which physical schema corresponds to the alias logical schema for this context. For example The logical schema LEDGER is the set of Sybase tables required for the functioning of the accounting application. These tables are stored in a physical schema for each installation of the accounting application. cogitation in Designer or slattern is ceaselessly done on the logical schema LEDGER. Only the context a llows the physical schema on which the operations are actually done to be determined. Thus, the user can switch from one physical environment to another in a single action. A logical schemas example is shown in figure 8. Table 1 Name of the logical schema Name of the logical schema LEDGER LEDGER LEDGER circumstance Boston Seattle Production Seattle Test personal Schema Sybase Boston LDG Sybase SEATTLE PROD LDG Sybase SEATTLE test LDGVolume 2 Issue 2, February 2013 www.ijsr.netone hundred fifty-fiveInternational Journal of Science and Research (IJSR), India Online ISSN 2319-7064 This article discusses the Oracle use of the term. For other uses of schema in a database context, such as a graphical representation of tables and other objects in a database, see database schema. In an Oracle database, associated with each database user is a schema. A schema comprises a collection of schema objects. Examples of schema objects include tables, views, sequences, synonyms, indexes, clusters, database links, snapshots, procedures, functions and packages.Figure 8. Logical schemas tangible schema is a term used in data management to describe how data is to be represented and stored (files, indices, et al.) in supplemental storage using a particular database management system (DBMS) (e.g., Oracle RDBMS, Sybase SQL Server, etc.). The logical schema was the way data were represented to conform to the constraints of a particular approach to database management. At that time the choices were hierarchical and network. Describing the logical schema, however, still did not describe how physically data would be stored on harrow drives. That is the domain of the physical schema. Now logical schemas describe data in monetary value of relational tables and columns, object-oriented classes, and XML tags. A single set of tables, for example, can be implemented in numerous ways, up to and including an architecture where table rows are maintained on computers in different countries.Fi gure 10. Schema objects 5.6 Php Sessions A PHP session variable is used to store information about, or change settings for a user session. Session variables hold information about one single user, and are available to all pages in one application 9. When you are working(a) with an application, you gift it, do some changes and then you close it. This is much like a Session. The computer knows who you are. It knows when you dent the application and when you end. But on the internet there is one caper the web server does not know who you are and what you do because the HTTP address doesntmaintain state. A PHP session solves this problem by allowing you to store user information on the server for later use (i.e. username, obtain items, etc). However, session information is working(prenominal) and will be deleted after the user has left the website. If you need a permanent storage you may want to store the data in a database. Sessions work by creating a unique id (UID) for each vi sitor and store variables based on this UID. The UID is either stored in a cookie or is propagated in the URL. In PHP, sessions can keep track of authenticated in users. They are an essential building block in todays websites with big communities and a lot of user activity. Without sessions, everyone would be an anonymous visitor. In system terms, PHP sessions are little files, stored on the servers disk. But on high traffic sites, the disk I/O involved, and not being able to share sessions between sextuple web servers make this indifference system far from ideal. This is how to enhance PHP session management in terms of implementation and share ability. If you have multiple web servers all serving the same site, sessions should be shared among those servers, and not 156Figure 9. Physical schema In Database lore, a schema object is a logical data storage structure. This possibly originates from the use of the term in the context of Oracle databases. The term schema can have othe r meanings when talking about non-Oracle databases.Volume 2 Issue 2, February 2013 www.ijsr.netInternational Journal of Science and Research (IJSR), India Online ISSN 2319-7064 reside on each servers individual disk. Because once a user gets load-balanced to a different server, the session cannot be found, effectively enter the user out. A common way around this is to use custom session handlers. 5.7 Shopping Card A obtain cart is a software application that typically runs on the computer where your Web site is located (the Web server), and allows your customers to do things such as searching for a product in your store catalog, adding a selected product to a basket, and placing an order for it. The shopping cart integrates with the rest of your Web site. In other words, there are typically links on your Web pages that customers can click on, and which allow them to perform someof the functions described above. For example, many e-commerce Web sites have a search link appear on e very Web page, as part of the navigation area Shopping carts are written in a variety of different computer programing languages. Some of them provide full access to the source code, thus allowing experienced programmers to make modifications to the system features, some others dont. Some shopping carts run on Windows Web servers, some on Unix, others on both. In most cases, you can place the shopping cart on your Web server simply by transferring its files there using any FTP 10 software, where FTP stands for file Transfer Protocol. For example, our shopping cart software called Product Card is a collection of files written in a programming language called Classic ASP, and that you host on a Windows server. Experienced programmers can produce the system as they wish as the source code is included. iii. merchandiser runs assurance card through the point of sale unit. The get along of the sale is either hand-entered or transmitted by the cash register. iv. merchant transmits t he credit card data and sales amount with a request for potency of the sale to their acquiring stick. . v.The acquiring patois that processes the transaction, routes the authorization request to the card-issuing situate. The credit card number identifies type of card, issuing camber, and the cardholders account. vi. If the cardholder has enough credit in their account to cover the sale, the issuing slang authorizes the transaction and generates an authorization code. This code is sent back to the acquiring jargon. vii. The acquiring camber process the transaction, and then sends the approval or defence mechanism code to the merchants point of sale unit. Each point of sale device has a separate lowest ID for credit card processors to be able to route data back to that particular unit. viii. A sale draft, or slip, is printed out by the point of sale unit or cash register. The merchant asks the buyer to sign the sale draft, which obligates them to reimburse the cardissuing ba nk for the amount of the sale. ix. At a later time, probably that night when the store is conclusion up, the merchant reviews all the authorizations stored in the point of sale unit against the subscribe sales drafts. When all the credit card authorizations have been verified to match the actual sales drafts, the merchant will capture, or transmit, the data on each authorized credit card transaction to the acquiring bank for deposit. This is in lieu of depositing the actual signed paper drafts with the bank. x. The acquiring bank performswhat is called an raillery for each sales draft, with the appropriate card-issuing bank. The card-issuing bank transfers the amount of the sales draft, minus an interchange tiptoe to the acquiring bank. xi. The acquiring bank then deposits the amount of the all the sales drafts submitted by the merchant, less a can fee, into the merchants bank account. citation card transaction is shown in Figure 12.Figure 11. Google Checkout shopping cart 5.8 Credit Card Transaction From the information presented in the preceding sections, we can start to piece together what is occurring during a credit card transaction. We know that merchants have a relationship with either an acquiring bank or independent sales organization, through which they have their credit card transactions processed. The section on industry spoken communication shows us some of the fees involved in this process. Merchants must pay the acquiring bank or ISO a discount fee based on the total amount of the sale. Likewise, the acquiring bank or ISO must pay the card issuer an interchange fee when they process the sales draft from the merchant. steps involved in a normal credit card transaction i. Merchant calculates the amount of purchase and asks buyer for payment ii. Buyer presents merchant with a credit card.Figure 12. Credit card transaction6. ConclusionElectronic commerce or e-commerce is a term for any type of business, or commercial transaction that involve s the transfer of information across the Internet. It is currently one of the most important aspects of the Internet to emerge. E157Volume 2 Issue 2, February 2013 www.ijsr.netInternational Journal of Science and Research (IJSR), India Online ISSN 2319-7064 commerce has grown tremendously worldwide. In the future e-commerce may become totally mobile based. In Bangladesh E-commerce also become a very powerful business mechanism but Bangladesh will have to overcome the problems with poor network connectivity and electronic paymentissues. The problems identified in this Project are Security problem, Confusing checkout process, Customers cant find products, Customers cant attain and fell a product, No sales staff means any calamity of up-selling, Language barrier. Regarding the identified problems the following solutions have been proposed Merchant necessitate to ensure the syllabus employs strong encryption for payment bear upon and customer data retention. E-commerce political platform should always have a visible zip total of purchases prominently displayed during the customer experience. E-commerce platform must support the ability to present the customer with nested categories as well as a search box. An e-commerce platform should also support the ability to attach multiple pictures to a product catalog page, allowing the consumer to view the product from multiple angles. E-commerce platform needs to be able to associate products with related and complimentary products. The system should allow all translation to be done centrally. My M.Sc Engg. in CSE is running at Bangladesh University of Engineering and engineering (BUET), Dhaka-1000, Bangladesh. My research interest areas are the range processing, Computer Networks, Computer Networks and Data Security, Compiler, opening of Computations, etc. My several written document print in International Journals. Muhammad Golam Kibria, Assistant professor and Head, part of CSE, University of Information e ngineering & Sciences, Dhaka, Bangladesh. I completed Masters in diligent Computing and Communication from the University of Greenwich, London, UK. My research interests are Computer Network Security and image processing, Sensor, Robotics and Wireless Sensor Network. Mohammad Nuruzzaman Bhuiyan is working as a Lecturer at the Department of CSE & IT, University of Information engineering & Sciences (UITS), Baridhara, Dhaka-1212.Bangladesh. I have completed my B.Sc Engg. and M.Sc Engg. in CS from The University of Sheffield, occidental Bank, Sheffield S10 2TN, UK. My research interest areas are vestigial of Computer, Web technology, Computer Networks, Computer Networks and Data Security, Theory of Computations, etc. My several papers accepted in International Journals.References1 http//en.wikipedia.org/wiki/Electronic_commerce 2 Tkacz, Ewaryst Kapczynski, Adrian (2009), Springer, P. 255 3 Online Today, The Electronic Mall. CIS/compuserve nostalgia.Http//www.gsbrown.org/compuserve/e lectronic-mall1984-04/. 4 http//www.marketwatch.com/story/amazon-buysdiaperscom-parent-in-545-mln-deal-2010-11-08/. 5 http//techcrunch.com/2011/03/28/ebay-to-acquire-gsicommerce-for-2-4-billion 6 Miller, Holmes E. And Engemann, Kurt J. (1996) A methodology for managing information-based risk Information Resources steering Journal 92 17-24 7 http//www.e-consultancy.com/ intelligence blog/363726/whydo-customers-abandon-the-Checkoutprocess.htmlcopyright 2008 Voloper Creations Inc. 7 8 http//www.articlesbase.com/e-commercearticles/impacts-of-e-commerce-on-business1882952.html 9 http//www.startupsmart.com.au/mentor/michaelfox/2011-02-03Authors inditeMd. Akbor Hossain received the B.Sc degrees in CSE University of Information Technology and Sciences (UITS), Baridhara, Dhaka-1212, Bangladesh. I am working as a Lab Demonstrator at the Department of CSE & IT, University of Information Technology & Sciences (UITS), Baridhara, Dhaka-1212, Bangladesh. *Md. Akkas Ali is working as a Lecturer a t the Department of CSE & IT, University of Information Technology & Sciences (UITS), Baridhara, Dhaka1212, Bangladesh. I completed my B.Sc Engg. in CSE from Chittagong University of Engineering and Technology (CUET), Chittagong-4349, Bangladesh.Volume 2 Issue 2, February 2013 www.ijsr.net

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.