An online shopping is a form of electronic commerce that allows consumers to purchase goods or services directly from a seller over the Internet using a web browser.Consumers find a product of interest by visiting the retailer’s website directly or by searching among alternative sellers using a shopping search engine, which displays the same product’s availability and pricing at various electronic retailers. As of 2016, customers can shop online using a range of different computers and devices, including desktop computers, laptops, tablet computers, and smartphones.
An online store evokes the physical analogy of buying products or services in a regular “brick and mortar” retail or shopping mall. The business-to-consumer (B2C) process is called online shopping. When an online store is set up to enable companies to buy from other companies, the business to business (B2B) process is called online shopping. A typical online store allows the customer to browse a company’s range of products and services, viewing photos or images of products, along with information about product specifications, features and prices. Online stores usually enable shoppers to use “search” features to find specific models, brands, or items. Online customers must have access to the Internet and a valid payment method to complete a transaction, such as an Interac-enabled credit or debit card or a service such as PayPal. For physical products (for example, paper books or clothing), the e-seller transfers the products to the customer; For digital products, such as digital audio files for songs or software, an electronic tailor usually sends the file to the customer over the Internet.
The beginning of online shopping
Online shopping with Amazon Marketing in the global network of the Internet began with the Amazon site for selling books, which later developed to market other goods, and then spread to all sectors and in all countries of the world.
How to pay online
The name, address and credit card number of the user are written in the shopping site form so that this process is done in a confidential manner and the data remains safe and protected so that the browser issues the security certificate and it is issued by a recognized certificate authority that helps to exchange secret words between the user and the shopping site and after the system verifies that the security certificate Issued by a trusted certificate authority (the browser trusts) in order to accept the certificate, and the secure shopping site uses encryption technology, which is a technique of complex data rearrangement in order to make the connection between the system and the shopping site (in other words, making the purchase mechanism secure between the provider and the beneficiary), and it is protected from The eyes of others or Internet spies, and then the data is transmitted through the Internet, as the purchase order is usually confirmed.
Online shopping sites usually display pictures and descriptions of the items offered on the site. It is imperative to choose between the items to be purchased, and add them to the special shopping cart. You can add and remove items from the shopping cart until the purchase and shopping process is completed by paying the amount due for purchasing the required items.
Safe shopping site specifications
The administration building of eBay, one of the most popular e-shopping sites on the Internet Some of the safe shopping sites have high security measures to prevent unauthorized persons from seeing the information sent to and from the site. These security measures are:
- The address of a secure shopping website usually begins with https instead of http and the addition of the letter s means secure and the lock symbol is placed next to the address bar or at the bottom of the browser window.
- Secure Shopping uses a technology called Secure Sockets Layer (SSL) that controls the processes needed to keep data secure as it travels over the Internet.
- Some secure shopping sites encrypt data using bit-level encryption technology and secure sites use 128-bit encryption for data exchanges.