.

Thursday, April 11, 2019

Ecommerce in Bangladesh Essay Example for Free

Ecommerce in Bangladesh Essay1. IntroductionWhen Electronic commerce, normall(a)y known as ecommerce, is the buying and selling of products or operate over electronic systems such(prenominal) as the lucre and otherwise computer net motions. Electronic commerce draws on such technologies as electronic funds transfer, supply chain commission, earnings marketing, online transaction processing, electronic selective instruction inter mixture (EDI), inventory management systems, and automated entropy collection systems. Modern electronic commerce typically personas the at least at iodine point in the transactions life-cycle, although it may encompass a wider range of technologies such as email, mobile plaits and teleph onenesss as substantially. Electronic commerce is generally considered to be the gross revenue looking of ebusiness 1. It withal consists of the qualify of selective information to facilitate the financing and payment aspects of business transactions. E-c ommerce nookie be divided into i. E-tailing or virtual store expects on nett sites with online catalogs, sometimes ga on that pointd into a virtual centerfield ii. The gathering and expenditure of demographic entropy through Web contacts iii. Electronic Data Interchange (EDI), the business-tobusiness exchange of data iv. E-mail and fax and their intake as media for r for for from each one one oneing prospects and established customers (for causa, with innovativesletters) v. Business-to-business buying and selling vi. The protective covering of business transactions The main atomic number 18as of e-commerce atomic number 18 followingi. Business to Business (B2B) ii. Business to Consumer (B2C) iii. Business to governing (B2G) iv. Government to Business (G2B)2. ObjectivesOur objectives argon following i. To define e-commerce and chance upon how it differs from ebusiness. ii. To identify and describe the uncomparable features of ecommerce technology and discuss their b usiness signifi sufferce. iii. To describe the major theatrical roles of e-commerce. iv. To discuss the origins andgrowth of e-commerce. v. To explain the evolution of e-commerce from its early eld to today. vi. To identify the factors that will define the future of ecommerce. vii. To describe the major themes underlying the drive of ecommerce. viii. To identify the major academic disciplines contri aloneing to e-commerce and under expect forge of an e-commerce engine ix. To identify the opportunity and problem of e-commerce implementation in Bangladesh. x. To identify the future of e-commerce. glitz 2 Issue 2, February 2013 www.ijsr.net150 foreign Journal of cognition and question (IJSR), India Online ISSN 2319-7064 3. E-Commerce in Bangladesh In Bangladesh there is a limited action and drop of B2C e-commerce .This field is non to that degree frequently real in Bangladesh. There be more fences behind it one simple reason this country is not so real and most of its citizens are poor and uneducated. It is quit graphic that there are few customers who is willing and force out shop in net income. It will take historic period to be developed this sector in bd. The telecommunication infrastructure any country affect the profits go directly, cause it is largely depended on it. In this chapter Define Need for e-commerce in Bangladesh, distinct sector in Bangladesh, overview of implementation stage of e-commerce in Bangladesh. And there is some problem such as low internet speed, no payment gateway and internet range, and recommendation. 3.1 Need for E-commerce in Bangladesh With the increasing diffusion of ICTs, more specifically the Internet, the global business community is rapidly moving towards Business-to-Business (B2B) e-commerce. The buyers/ importers gain a clear advantage when the Internet gives them access to the global market, by which they undersurface compare prices across regions, find out whether prices vary by order fragmentat ion, get awareness rough substitute/ alternative products. Consequently, the sellers/ exporters make sure that they are well up portrayed in the cyber world through bladesites and portals. Like buyers, sellers also benefit from incrementd and more economic access to the global market through the Internet. Bangladesh is pursuing an economic policy of export-led growth.With the rising forces of globalization, it is becoming progressively important that the private sector, featurely the export sectors are well prepared to meet the requirements and expectations of the importers and also stand out in the competition against exporters in other countries. In such a scenario, two issues are becoming particularly important for East Pakistani export sectors one, whether businesses are automating their internal processes with these of ICTs to become increasingly cost-efficient and competitive in a global context, and two, whether businesses make up effective presence and participatio n in the cyber world. internationalistic organizations such as UNCTAD (United Nations Center for Trade and Development) and WTO (World Trade Organization) 2 necessitate, over the last several years, put often emphasis on the importance of e-commerce for developing countries. UNCTAD has special programs to facilitate developing countries to transition into e-commerce. The WTO has also developed rules and guidelines for global e-commerce transactions. 3.2 E-commerce in Different Sector in Bangladesh Despite being a under developed country, selected segments of the Bangladeshi business community has embraced technology with reasonable success. Personal computers and the Internet are also emerge as day-to-day business tools. These positive indicators are favoring the prospects of e-commerce in Bangladesh. i. RMG Sector ii. Banking on the Web (Online Banking) iii. Online obtain iv. Web Hosting, Domain v. Online witticisms, gifts vi. Pay Bill 3.3 The Existing Situation and Potential of E-commerce in Bangladesh Internet service are presently available in Bangladesh. Its usage for e-commerce by the Bangladeshi producers to export as well as to access inputs will be open on their willingness and superpower to use this medium as well as that of the buyers of final products and the sellers of intermediate goods and services. issue 1 depicts the terce dimensions of e-commerce. Business to-Consumers (B2C) e-commerce is practically non-existent deep down Bangladesh, while a very limited level of Business-to-Business (B2B) and Businessto-Government (B2G) transactions exists 3. The potential for use of e-commerce by Bangladeshi consumers and businesses with foreign firms is much brighter, and can play an important role in boosting the countrys exports. A significant volume of B2G is also possible, as the government remains the biggest spender.Figure 1. The Three Dimensions of E-commerce 3.4 E-commerce growth in Bangladesh E-commerce growth in Bangladesh shown in encipher 3.2 in the year of 2000 e-commerce business is 11440 one million million taka. In the years of 2001 business of e-commerce is 15840 million taka and increase year by year 2002 business is 18980 million taka 2002 to 2004 businesses is not very fast but in the year of 2005 business of e-commerce is 22480 and end the year of 2006 business of e-commerce growth is 252000 million taka.Figure 2. E-commerce growth in Bangladesh4. MethodologiesThe methodologies of our survey are assumption below 4.1 Identification of scope of study 151Volume 2 Issue 2, February 2013 www.ijsr.net multinational Journal of accomplishment and Research (IJSR), India Online ISSN 2319-7064 To accomplish the project objectives, a systematic process is followed. The project process begins with the identification of the project topic where studies was carried out to obtain fair to middling information on the topic. 4.2 Group discussions to collect suggestions on the survey of e-commerce system Discuss wit h group outgrowth about the topic and collect their suggestions on this topic. Also discuss impacts of ecommerce in our society and business and barriers ecommerce in contrastive sectors in Bangladesh and the future of e-commerce system. 4.3 E-commerce site visits as clients some e-commerce websites visits were made as clients. We visited websites like www.ebay.com, browsed many products, added product to shop cart, created user account and observed the check out process. We also examined their user interface, front end design and various category of product. We searched products by different types, the product names and the company name. 4.4 Internet search to collect data on e-commerce growth world wide We searched the internet to collect data on e-commerce business growth establish on time, data on e-commerce revenue based on geographic locations. We also collected data about e-commerce business growth and present situation of ecommerce in Bangladesh. 4.5 Architecture and l abel review of e-commercesite We reviewed the main technologies involved in ecommerce site, which include php sessions, catalog technology, waiter technology (hardware and software). We also reviewed credit humor transaction and shop cart checkout process. 4.6 Interviews to find what nation think about ecommerce We interviewed people from various regions of the society to find out what they think about e-commerce and what changes they necessitateed. We also discussed with them what the advantages and disadvantages of e-commerce systems are. 4.7 Introducing intentional change to understand ecommerce engine We downloaded e-commerce site code and changed the catalog of product, banner, product detail, product image, and increase and decrease number of product show in the main page also changed the theme of e-commerce site. We entered new products and removed selling product and updated the products. 5.1 Architecture This is the design of front-end design shown in Figure 3. There i s a one home page, wish list, account, shopping cart, and product list and checkout option.Figure 3. E-commerce site front end design 5.2 Database Structure 5.2.1 E-R Diagram A sample entity kin diagram employ Chens bordernoteal system is shown in Figure 4.5. Technical Design of E-Commerce SiteThe technical design of e-commerce site include database structure, database abstract, get across structure, php session, shopping cart, e-r diagram, and credit note transaction.Figure 4. A sample entity affinity diagram using Chens notation In software engineering, an entity alliance feigning (ER mold for short) is an abstract 4 and abstract exemplifyation of data. Entity kind simulation is a database simulateing method, utilise to produce a type of ideaual lineation or semantic data determine of a system, often 152Volume 2 Issue 2, February 2013 www.ijsr.netInternational Journal of light and Research (IJSR), India Online ISSN 2319-7064 a relative database, and its require ments in a top-down fashion.Diagrams created by this process are called entity relationship diagrams or ER diagrams. Using the three system approach to software engineering, there are three levels of ER models that may be developed. The conceptual data model is the highest level ER model in that it checks the least granular detail but establishes the overall scope of what is to be included within the model nonplus. The conceptual ER model ordinarily defines master reference data entities that are commonly apply by the organization. Developing an enterprise-wide conceptual ER model is useful to complement documenting the data architecture for an organization. A conceptual ER model may be used as the foundation for one or more legitimate data models. The purpose of the conceptual ER model is wherefore to establish geomorphologic metadata everydayness for the master data entities between the set of consistent ER models. The conceptual data model may be used to form commonality relationships between ER models as a grounding for data model integration. A logical ER model does not require a conceptual ER model especially if the scope of the logical ER model is to develop a oneness disparate information system. The logical ER model contains more detail than the conceptual ER model. In addition to master data entities, operational and transactional data entities are now defined 5. The details of each data entity are developed and the entity relationships between these data entities are established. The logical ER model is yet developed independent of technology into which it will be implemented. One or more physical ER models may be developed from each logical ER model. The physical ER model is normally developed be instantiated as a database. Therefore, each physical ER model must contain enough detail to produce a database and each physical ER model is technology dependent since each database management system is somewhat different. The physical model is normally forward engineered to instantiate the morphologic metadata into a database management system as relational database objects such as database put sanctions, database indexes such as extraordinary key indexes, and database constraints such as a foreign key constraint or a commonality constraint. The ER model is also normally used to design modifications to the relational database objects and to maintain the structural metadata of the database. The premier(prenominal) stage of information system design uses these models during the requirements analysis to describe information needs or the type of information that is to be stored in a database. The data bordertechnique can be used to describe any ontology (i.e. an overview and classifications of used terms and their relationships) for a certain area of interest. In the case of the design of an information system that is based on a database, the conceptual data model is, at a later stage (usually called logical design), ma pped to a logical data model, such as the relational model this in turn is mapped to a physical model during physical design. 5.2.2 The Building Blocks Entities, Relationships, and Attributes The building blocks entities, relationships, and attributes as shown in Figure 5, first here two related entities then an entity with an attribute next in this figure a relationship with and attribute and finally see primary key.Figure 5. The building blocks entities, relationships, and attributes An entity may be defined as a thing which is recognized as being capable of an independent cosmea and which can be uniquely set. An entity is an abstraction from the complexities of some domain. When we speak of an entity we normally speak of some aspect of the real world which can be distinguished from other aspects of the real world. An entity may be a physical object such as a house or a car, an event such as a house sales event or a car service, or a concept such as a customer transaction or or der. Although the term entity is the one most commonly used, following Chen we should really distinguish between an entity and an entity-type. An entity-type is a category. An entity, strictly speaking, is an instance of a given entity-type. There are usually many instances of an entity-type. Because the term entity-type is somewhat cumbersome, most people tend to use the term entity as a synonym for this term. Entities can be imagination of as nouns. Examples a computer, an employee, a song, a mathematical theorem. A relationship captures how entities are related to one other. Relationships can be thought of as verbs, linking two or more nouns. Examples owns relationship between a company and a computer, supervises relationship between an employee and a department 6, performs relationship between an artist and a song, a proved relationship between a mathematician and a theorem. The models linguistic aspect described above is utilized inVolume 2 Issue 2, February 2013 www.ijsr.net 153International Journal of Science and Research (IJSR), India Online ISSN 2319-7064 the declarative database query language ERROL, which mimics natural language, constructs. ERROLs semantics and implementation are based on Reshaped relational algebra (RRA), a relational algebra which is adapted to the entityrelationship model and captures its linguistic aspect. Entities and relationships can both have attributes. Examples an employee entity might have a Social Security itemize (SSN) attribute the proved relationship may have a date attribute. Every entity (unless it is a flimsy entity) must have a minimal set of uniquely identifying attributes, which is called the entitys primary key. Entityrelationship diagrams dont show undivided entities or single instances of relations. Rather, they show entity sets and relationship sets. Example a particular song is an entity. The collection of all songs in a database is an entity set. The eaten relationship between a child and her lunch is a single relationship. The set of all such child-lunch relationships in a database is a relationship set. In other words, a relationship set maps to a relation in mathematics, while a relationship corresponds to a member of the relation. 5.2.3Relationships, Roles and visorinalities In Chens original paper he gives an example of a relationship and its roles. He describes a relationship labor union and its two roles husband and wife. A person plays the role of husband in a marriage (relationship) and another person plays the role of wife in the (same) marriage. These words are nouns. That is no surprise naming things requires a noun. However as is quite usual with new ideas, many eagerly appropriated the new terminology but then applied it to their own old ideas. Thus the lines, arrows and crows- compensationt of their diagrams owed more to the earlier Bachman diagrams than to Chens relationship diamonds. And they similarly see other important concepts. In particular, it became f ashionable (now almost to the point of exclusivity) to name relationships and roles as verbs or phrases. 5.2.4 Limitations ER models assume information content that can pronto be represented in a relational database.They describe only a relational structure for this information. Hence, they are inadequate for systems in which the information cannot readily be represented in relational form, such as with semistructured data. Furthermore, for many systems, the possible changes to the information contained are nontrivial and important enough to warrant explicit specification. virtually authors have extended ER modeling with constructs to represent change, an approach geted by the original author an example is Anchor Modeling. An alternative is to model change separately, using a process modeling technique. Additional techniques can be used for other aspects of systems. For instance, ER models roughly Figure 6. E-R modeling 5.3 Table Structure In relational databases and flat file da tabases, a table is a set of data elements (values) that is organized using a model of vertical columns (which are identified by their name) and horizontal rows, the cell being the unit where a row and column intersect. A table has a specified number of columns, but can have any number of rows each row is identified by the values appearing in a particular column subset which has been identified as a unique key index. Table is another term for relations although there is the remainder in that a table is usually a multi-set (bag) of rows whereas a relation is a set and does not allow duplicates. Besides the real data rows, tables generally have associated with them some meta-information, such as constraints on the table or on the values within particular columns. The data in a table does not have to be physically stored in the database. Views are also relational tables, but 154correspond to just 1 of the 14 different modeling techniques offered by UML. Another limitation ER modeling is aimed at specifying information from scratch. This suits the design of new, standalone information systems, but is of less help in integrating exist information sources that already define their own data representations in detail. Even where it is suitable in principle, ER modeling is rarely used as a separate activity. One reason for this is todays abundance of tools to support diagramming and other design support directly on relational database management systems. These tools can readily extract database diagrams that are very close to ER diagrams from existing databases, and they provide alternative views on the information contained in such diagrams. In a survey, Brodie 7 and Liu could not find a single instance of entityrelationship modeling inside a sample of ten Fortune 100 companies. Badia and Lemire blame this privation of useon the lack of guidance but also on the lack of benefits, such as lack of support for data integration. Also, the enhanced entityrelationship mo del (EER modeling) introduces several concepts which are not present in ER modeling. ER modeling as shown in Figure 6.Volume 2 Issue 2, February 2013 www.ijsr.netInternational Journal of Science and Research (IJSR), India Online ISSN 2319-7064 their data are calculated at query time. Another example is nicknames, which represent a pointer to a table in another database. 5.4 Database abstract A database scheme of a database system is its structure described in a formal language supported by the database management system (DBMS) and refers to the organization of data to create a blueprint of how a database will be constructed (divided into database tables). The formal definition of database dodge is a set of formulas (sentences) called justice constraints imposed on a database. These integrity constraints gibe compatibility between parts of the dodge. All constraints are expressible in the same language. A database can be considered a structure in realization of the database langu age. The states of a created conceptual schema are transform into an explicit mapping, the database schema. This describes how real world entities are modeled in the database. A database schema specifies, based on the database administrators knowledge of possible applications, the facts that can enter the database, or those of interest to the possible end-users. The notion of a database schema plays the same role as the notion of supposition in predicate calculus. A model of this theory closely corresponds to a database, which can be seen at any instant of time as a mathematical object. Thus a schema can contain formulas representing integrity constraints specifically for an application and the constraints specifically for a type of database, all expressed in the same database language. In a relational database 8, the schema defines the tables, fields, relationships, views, indexes, packages, procedures, functions, queues, triggers, types, sequences, materialized views, synonyms, d atabase links, directories, Java, XML schemas, and other elements. lineations are generally stored in a data dictionary. Although a schema is defined in text database language, the term is often used to refer to a graphicaldepiction of the database structure. In other words, schema is the structure of the database that defines the objects in the database. In an Oracle Database system, the term schema has a slightly different connotation. For the interpretation used in an Oracle Database, see schema object. 5.5 Levels of Database Schema A conceptual schema or conceptual data model is a map of concepts and their relationships. This describes the semantics of an organization and represents a series of assertions about its nature. Specifically, it describes the things of significance to an organization (entity classes), about which it is inclined to collect information, and characteristics of (attributes) and associations between pairs of those things of significance (relationships).Fi gure 7. Conceptual schema or conceptual data model A logical schema is an alias that allows a unique name to be given to all the physical schemas containing the same data store structures. The aim of the logical schema is to ensure the portability of the procedures and models on the different physical schemas. In this way, all developments in Designer are carried out exclusively on logical schemas. A logical schema can have one or more physical implementations on separate physical schemas, but they must be based on data servers of the same technology. A logical schema is always directly linked to a technology. To be usable, a logical schema must be declared in a context. Declaring a logical schema in a context consists of indicating which physical schema corresponds to the alias logical schema for this context. For example The logical schema LEDGER is the set of Sybase tables required for the functioning of the accounting application. These tables are stored in a physical schema f or each installation of the accounting application. Work in Designer or Operator is always done on the logical schema LEDGER. Only the context allows the physical schema on which the operations are actually done to be determined. Thus, the user can switch from one physical environment to another in a single action. A logical schemas example is shown in figure 8. Table 1 Name of the logical schema Name of the logical schema LEDGER LEDGER LEDGER Context Boston Seattle Production Seattle Test Physical Schema Sybase Boston LDG Sybase SEATTLE PROD LDG Sybase SEATTLE TEST LDGVolume 2 Issue 2, February 2013 www.ijsr.net155International Journal of Science and Research (IJSR), India Online ISSN 2319-7064 This article discusses the Oracle use of the term. For other uses of schema in a database context, such as a graphical representation of tables and other objects in a database, see database schema. In an Oracle database, associated with each database user is a schema. A schema comprises a co llection of schema objects. Examples of schema objects include tables, views, sequences, synonyms, indexes, clusters, database links, snapshots, procedures, functions and packages.Figure 8. Logical schemas Physical schema is a term used in data management to describe how data is to be represented and stored (files, indices, et al.) in secondary storage using a particular database management system (DBMS) (e.g., Oracle RDBMS, Sybase SQL Server, etc.). The logical schema was the way data were represented to conform to the constraints of a particular approach to database management. At that time the choices were hierarchical and intercommunicate. Describing the logical schema, however, still did not describe how physically data would be stored on disk drives. That is the domain of the physical schema. Now logical schemas describe data in terms of relational tables and columns, object-oriented classes, and XML tags. A single set of tables, for example, can be implemented in many ways, up to and including an architecture where table rows are maintained on computers in different countries.Figure 10. Schema objects 5.6 Php Sessions A PHP session variable is used to store information about, or change settings for a user session. Session variables hold information about one single user, and are available to all pages in one application 9. When you are working with an application, you open it, do some changes and then you close it. This is much like a Session. The computer knows who you are. It knows when you start the application and when you end. But on the internet there is one problem the web server does not know who you are and what you do because the HTTP address doesntmaintain state. A PHP session solves this problem by allowing you to store user information on the server for later use (i.e. username, shopping items, etc). However, session information is temporary and will be deleted after the user has left the website. If you need a permanent storage you may w ant to store the data in a database. Sessions work by creating a unique id (UID) for each visitor and store variables based on this UID. The UID is either stored in a cookie or is propagated in the URL. In PHP, sessions can keep track of authenticated in users. They are an essential building block in todays websites with big communities and a lot of user activity. Without sessions, everyone would be an anonymous visitor. In system terms, PHP sessions are little files, stored on the servers disk. But on high craft sites, the disk I/O involved, and not being able to share sessions between multiple web servers make this default system far from ideal. This is how to enhance PHP session management in terms of mathematical process and share ability. If you have multiple web servers all serving the same site, sessions should be shared among those servers, and not 156Figure 9. Physical schema In Database lore, a schema object is a logical data storage structure. This possibly originates f rom the use of the term in the context of Oracle databases. The term schema can have other meanings when talking about non-Oracle databases.Volume 2 Issue 2, February 2013 www.ijsr.netInternational Journal of Science and Research (IJSR), India Online ISSN 2319-7064 reside on each servers individual disk. Because once a user gets load-balanced to a different server, the session cannot be found, effectively logging the user out. A common way around this is to use custom session handlers. 5.7 Shopping Card A shopping cart is a software application that typically runs on the computer where your Web site is located (the Web server), and allows your customers to do things such as searching for a product in your store catalog, adding a selected product to a basket, and placing an order for it. The shopping cart integrates with the rest of your Web site. In other words, there are typically links on your Web pages that customers can click on, and which allow them to perform someof the functi ons described above. For example, many e-commerce Web sites have a search link appearing on every Web page, as part of the pilotage area Shopping carts are written in a variety of different programming languages. Some of them provide full access to the source code, thus allowing experienced programmers to make modifications to the system features, some others dont. Some shopping carts run on Windows Web servers, some on Unix, others on both. In most cases, you can place the shopping cart on your Web server simply by transferring its files there using any FTP 10 software, where FTP stands for File Transfer Protocol. For example, our shopping cart software called Product Card is a collection of files written in a programming language called Classic ASP, and that you host on a Windows server. Experienced programmers can customize the system as they wish as the source code is included. iii. Merchant runs credit card through the point of sale unit. The nub of the sale is either hand-e ntered or transmitted by the cash register. iv. Merchant transmits the credit card data and sales amount with a request for authorization of the sale to their getting border. . v.The getting bank that processes the transaction, routes the authorization request to the card-issuing bank. The credit card number identifies type of card, issuing bank, and the cardholders account. vi. If the cardholder has enough credit in their account to cover the sale, the issuing bank authorizes the transaction and generates an authorization code. This code is sent back to the getting bank. vii. The acquiring bank processing the transaction, and then sends the approval or denial code to the merchants point of sale unit. Each point of sale device has a separate terminal ID for credit card processors to be able to route data back to that particular unit. viii. A sale outline, or slip, is printed out by the point of sale unit or cash register. The merchant asks the buyer to sign the sale draft, whic h obligates them to reimburse the cardissuing bank for the amount of the sale. ix. At a later time, probably that night when the store is closing up, the merchant reviews all the authorizations stored in the point of sale unit against the signed sales drafts. When all the credit card authorizations have been verified to match the actual sales drafts, the merchant will capture, or transmit, the data on each authorized credit card transaction to the acquiring bank for deposit. This is in lieu of depositing the actual signed paper drafts with the bank. x. The acquiring bank performswhat is called an interchange for each sales draft, with the appropriate card-issuing bank. The card-issuing bank transfers the amount of the sales draft, minus an interchange fee to the acquiring bank. xi. The acquiring bank then deposits the amount of the all the sales drafts submitted by the merchant, less a discount fee, into the merchants bank account. Credit card transaction is shown in Figure 12.Figur e 11. Google Checkout shopping cart 5.8 Credit Card Transaction From the information presented in the preceding sections, we can start to fragment together what is occurring during a credit card transaction. We know that merchants have a relationship with either an acquiring bank or independent sales organization, through which they have their credit card transactions processed. The section on industry terminology shows us some of the fees involved in this process. Merchants must pay the acquiring bank or ISO a discount fee based on the total amount of the sale. Likewise, the acquiring bank or ISO must pay the card issuer an interchange fee when they process the sales draft from the merchant. Steps involved in a normal credit card transaction i. Merchant calculates the amount of purchase and asks buyer for payment ii. Buyer presents merchant with a credit card.Figure 12. Credit card transaction6. ConclusionElectronic commerce or e-commerce is a term for any type of business, or com mercial transaction that involves the transfer of information across the Internet. It is currently one of the most important aspects of the Internet to emerge. E157Volume 2 Issue 2, February 2013 www.ijsr.netInternational Journal of Science and Research (IJSR), India Online ISSN 2319-7064 commerce has grown staggeringly worldwide. In the future e-commerce may become totally mobile based. In Bangladesh E-commerce also become a very powerful business mechanism but Bangladesh will have to overcome the problems with poor network connectivity and electronic paymentissues. The problems identified in this Project are Security problem, Confusing checkout process, Customers cant find products, Customers cant touch and fell a product, No sales supply means any chance of up-selling, Language barrier. Regarding the identified problems the following solutions have been proposed Merchant needs to ensure the course of study employs strong encryption for payment processing and customer data reten tion. E-commerce platform should always have a visible running total of purchases prominently displayed during the customer experience. E-commerce platform must support the ability to present the customer with nested categories as well as a search box. An e-commerce platform should also support the ability to attach multiple pictures to a product catalog page, allowing the consumer to view the product from multiple angles. E-commerce platform needs to be able to associate products with related and complimentary products. The system should allow all exposition to be done centrally. My M.Sc Engg. in CSE is running at Bangladesh University of Engineering and engine room (BUET), Dhaka-1000, Bangladesh. My research interest areas are the image processing, Computer Networks, Computer Networks and Data Security, Compiler, Theory of Computations, etc. My several papers Published in International Journals. Muhammad Golam Kibria, Assistant Professor and Head, Department of CSE, University o f reading Technology Sciences, Dhaka, Bangladesh. I completed Masters in Mobile Computing and Communication from the University of Greenwich, London, UK. My research interests are Computer Network Security and image processing, Sensor, Robotics and radio Sensor Network. Mohammad Nuruzzaman Bhuiyan is working as a Lecturer at the Department of CSE IT, University of Information Technology Sciences (UITS), Baridhara, Dhaka-1212.Bangladesh. I have completed my B.Sc Engg. and M.Sc Engg. in CS from The University of Sheffield, Western Bank, Sheffield S10 2TN, UK. My research interest areas are Fundamental of Computer, Web technology, Computer Networks, Computer Networks and Data Security, Theory of Computations, etc. My several papers accepted in International Journals.References1 http//en.wikipedia.org/wiki/Electronic_commerce 2 Tkacz, Ewaryst Kapczynski, Adrian (2009), Springer, P. 255 3 Online Today, The Electronic Mall. CIS/compuserve nostalgia.Http//www.gsbrown.org/compuserve/el ectronic-mall1984-04/. 4 http//www.marketwatch.com/story/amazon-buysdiaperscom-parent-in-545-mln-deal-2010-11-08/. 5 http//techcrunch.com/2011/03/28/ebay-to-acquire-gsicommerce-for-2-4-billion 6 Miller, Holmes E. And Engemann, Kurt J. (1996) A methodology for managing information-based risk Information Resources Management Journal 92 17-24 7 http//www.e-consultancy.com/news blog/363726/whydo-customers-abandon-the-Checkoutprocess.htmlcopyright 2008 Voloper Creations Inc. 7 8 http//www.articlesbase.com/e-commercearticles/impacts-of-e-commerce-on-business1882952.html 9 http//www.startupsmart.com.au/mentor/michaelfox/2011-02-03Authors ProfileMd. Akbor Hossain received the B.Sc degrees in CSE University of Information Technology and Sciences (UITS), Baridhara, Dhaka-1212, Bangladesh. I am working as a Lab Demonstrator at the Department of CSE IT, University of Information Technology Sciences (UITS), Baridhara, Dhaka-1212, Bangladesh. *Md. Akkas Ali is working as a Lecturer at the Depar tment of CSE IT, University of Information Technology Sciences (UITS), Baridhara, Dhaka1212, Bangladesh. I completed my B.Sc Engg. in CSE from Chittagong University of Engineering and Technology (CUET), Chittagong-4349, Bangladesh.Volume 2 Issue 2, February 2013 www.ijsr.net

No comments:

Post a Comment