Documentos de Académico
Documentos de Profesional
Documentos de Cultura
It has been said that the meeting of money, commerce, computing and networks form
the global consumer market place. It includes facilities for negotiations, bargaining; order
processing, payment and customer service. Though it is desirable that the entire system
is automated, it may be possible that one/more of these activities may be transactcd in a
traditional manner. The order is placed over phone, further negotiations may be made
with the sales representative calling on the buyer, the payment may be made through a
cheque etc.
The following criteria arc essential for consumer-oriented electronic commerce:
Critical mass of buyers and sellers. The trick is getting a critical mass of corporations
and consumers to use electronic mechanisms. In other words, the electronic
marketplace should be the first place customers go to find the products and services
they need.
Opportunity for independent evaluations and for customer dialogue and discussion. In
the marketplace, not only do users buy and sell products or services, they also compare
notes on who has the best products and whose prices are outrageous. The ability to
openly evaluate the wares offered is a fundamental principle of a viable marketplace.
Negotiation and bargaining. No market place is complete if it does not support
negotiation. Buyers and sellers need to be able to haggle over conditions of mutual
satisfaction, including money, terms and conditions, delivery dates, and evaluation
ctiteria New products and services. In a viable marketplace, consumers can make
requests for products and services not currently offered and have reasonable
expectations that someone will turn up with a proposed offering to meet that request.
List the OMCs (Order Management Cycle) generic steps.
OMC has the following generic steps:
1)Order Planning and Order Generation: The business process begins long before an
actual order is placed by the customer. The first step is order planning. Order planning
leads into order generation. Orders are generated in number of ways in the e-commerce
environment. The sales force broadcasts ads (direct marketing), sends personalized email to customers (cold calls), or creates a WWW page.
2) Cost Estimation and Pricing: Pricing is the bridge between customer needs and
company capabilities. Pricing at the individual order level depends on understanding, the
value to the customer that is generated bye ach order, evaluating the cost of filling each
order; and instituting a system that enables the company to price each order based on
its valued and cost.
3) Order Receipt and Entry: After an acceptable price quote, the customer enters the
order receipt and entry phase of OMC. Traditionally, this was under the purview of
departments variously titled customer service, order entry, the inside sales desk, or
customer liaison. These departments are staffed by customer service representatives,
usually either very experienced, long-term employees or totally inexperienced trainees.
4) Order Selection and Prioritization: Customer service representatives are also often
responsible for choosing which orders to accept and which to decline. In fact, not all
customer orders are created equal; some are simply better for the business than others.
Another completely ignored issue concerns the importance of order selection and
prioritization. Companies that put effort into order selection and link it to their business
strategy stand to make more money.
5) Order Scheduling: Ordering scheduling phase the prioritized orders get slotted into
an actual production or operational sequence. This task is difficult because the different
functional departments sales, marketing, and customer service may have conflicting
goals.
6) Order Fulfillment and Delivery: The order fulfillment and delivery phase the actual
provision of the product or service is made. While the details vary from industry to
industry, in almost every company this step has become increasingly complex. Often,
order fulfillment involves multiple functions and locations.
7)
Order Billing and Account/Payment management: After the order has been fulfilled
and delivered, billing is typically handled by the finance staffs, who view their job as
getting the bill out efficiently and collecting quickly.
8) Post-sales Service: This phase plays an increasingly important role in all elements of
a companys profit equation: customer value, price, and cost. Depending on the specifics
of the business, it can include such elements as physical installation of a product, repair
and maintenance, customer training, equipment upgrading and disposal. Because of the
information conveyed and intimacy involved, post sales service can affect customer
satisfaction and company profitability for years.
What is supply chain management? Give its characteristics.
Supply Chain Management (SCM): Supply chain management (SCM) is a network of
suppliers and customers within which any business can operates. It is a chain of
suppliers and customers for a particular business
In electronic commerce, supply chain management has the following
characteristics:
An ability to source raw material or finished goods from anywhere in the world.
A global business and management strategy with flawless local execution.
On-line, real-time distributed information processing to the desktop, providing total
supply chain information visibility.
The ability to manage information not only within a company but across industries and
enterprises.
The seamless integration of all supply chain processes and measurements, including
third-party suppliers, information systems, cost accounting standards, and measurement
systems.
The development and implementation of accounting models such as activity-based
costing that 1 ink cost to performance are used as tools for cost reduction.
A reconfiguration of the supply chain organization into high-performance teams going
from the shop floor to senior management.
B1
What are the desirable characteristics of E-marketing ?
Before we embark on the detailed study of e-commerce, we shall discuss some of
related issues.
Commonsense tells us that few transactions are more congenial for e-marketing than
others. We list out the desirable features of a hypothetical market pace let us call it emarket.
1. A minimal size of the place- Obviously for any such place to thrive there is a critical
size, below which it is not profitable to operate. This minimal number of buyers and
sellers characterises the profitability of the place.
2. A scope for interactions- Interactions include trial runs of the products, classifications
of doubts on the part of the customers, details of after sales services, ability to compare
different products and of course scope for negotiations and bargaining. Negotiations can
be in terms of cost, value additions, terms and conditions, delivery dates etc.
What are the three types electronic tokens? Explain.
None of the banking or selling payment methods is completely adequate in their present
form for the consumer-oriented e-commerce environment. Totally new forms of financial
instruments are also being developed. One such new financial instrument is electronic
tokens in the form of electronic cash / money or checks. Electronic tokens are designed
as electronic analogs of various forms of payment backed by a bank or financial
institution. Simply stated, electronic tokens are equivalent to cash that is backed by a
bank.
Electronic tokens are of three types:
1. Cash or real-time. Transactions are settled with the exchange of electronic currency.
An example of on-line currency exchange is electronic cash (e-cash).
2. Debit or prepaid. Users pay in advance for the privilege of getting information.
Examples of prepaid payment mechanisms are stored in smart cards and electronic
purses that store electronic money.
3. Credit or postpaid. The server authenticates the customers and verifies with the
bank that funds are adequate before purchase. Examples of postpaid mechanisms are
credit / debit cards and electronic checks.
Draw the layered architecture of EDI.
EDI architecture specifies four layers:
a) The semantic (or application) layer
b) The standards translation layer
c) The packing (or transport) layer
d) The physical network infrastructure layer.
The EDT semantic layer describes the business application that is driving EDT. The
Information seen at the EDT semantic layer must be translated from a company-specific
form to a more generic or universal form so that it can be sent to various trading
partners, who could be using a variety of software applications at their end. To facilitate
the transfer of computer files between two trading partners requires that the computer
applications of both sender and receiver use a compatible format for EDT document
exchange. The EDT translation software converts the proprietary format into a standard
mutually agreed on by the processing systems. When a company receives the
document, their EDT translation software automatically changes the standard format into
the proprietary format of their document processing software.
The EDT transport layer corresponds closely with the non-electronic activity of sending a
business form one company to another. The content and structure of the form are
separated from the transport carrier. EDT documents are exchanged rapidly over
electronic networks using the existing e-mail programs and infrastructure.
EDI in Action The use of EDT transporter saves large administration costs by
Communities.
Communities of all types have sprung up on the internet. Its a great way to meet up with
people of similar interest and discuss common issues.
What are the security threats to E-commerce ?
Some of the threats that stimulated the upsurge of interest in security include the
following
Organized and internal attempts to obtain economic or market information from
competitive organizations in the private sector.
Organized and intentional attempts to obtain economic information from government
agencies.
Inadvertent acquisition of economic or market information.
Inadvertent acquisition of information about individuals.
Intentional fraud through illegal access to computer repositories including acquisition of
funding data, economic data, law enforcement data, and data about individuals.
Government intrusion on the rights of individuals
Invasion of individuals rights by the intelligence community.
sink.
Explain secure electronic payment protocol.
SEPP: SEPP stands from Secure Electronic Payment System. SEPP is the electronic
corresponding of the paper charge slide, signature, and submission process. SEPP is an
open, vendor-neutral, nonproprietary, license free specification for securing on-line
transactions. SEPP takes input from the cooperation process and causes the payment to
happen via a three-way communication among the cardholder, merchant, and acquirer.
SEPP only addresses the payment process.
There are several major business requirements addressed by SEPP.
1. To enable confidentiality of payment information.
2. To ensure integrity of all payment data transmitted.
3. To provide authentication that a cardholder is the legitimate owner of a card account.
4. To provide authentication that a merchant can accept master-card, branded card
payments with an acquiring member financial institution.
SEPP PROCESS: SEPP suppose the cardholder and merchant have been
communicating in order to negotiate terms of a purchase and generate an order. These
processes may be conducted via a WWW browser. SEPP is designed to support
transaction action swapped in both interactive and non interactive modes.
The SEPP system is composed of a collection of elements involved in electronic
commerce.
Card holder: This is an authorized holder of a bankcard supported by an issuer and
registered to perform electronic commerce.
Merchant: This is a merchant of goods, services, and/or e-products who accepts
payment for them electronically and may provide selling services and / or electronic
delivery of items for sale.
Acguirer: This is a financial institution that supports merchants by providing service for
processing credit card based transactions.
Certificate management system: This is an agent of one or more bankcard associations
that provides for the creation and distribution of electronic certificates for merchants,
acquirers, and cardholders.
Banknet: This represents the existing Network which interfaces acquirers, issuers and
the certificate management systems.
What are the desirable characteristics of an electronic market.
Desirable characteristics of E-Marketplace:
The following criteria are essential for consumer-oriented electronic commerce:
Critical mass of buyers and sellers. The trick is getting a critical mass of
corporations and consumers to use electronic mechanisms. In other words, the
electronic marketplace should be the first place customers go to find the products and
services they need.
Opportunity for independent evaluations and for customer dialogue and
discussion. In the marketplace, not only do users buy and sell products or services,
they also compare notes on who has the best products and whose prices are
outrageous. The ability to openly evaluate the wares offered is a fundamental principle of
a viable marketplace.
Negotiation and barainin. No market place is complete if it does not support
negotiation. Buyers and sellers need to be able to haggle over conditions of mutual
satisfaction, including money, terms and conditions, delivery dates, and evaluation
criteria.
New products and services. In a viable marketplace, consumers can make requests
for products and services not currently offered and have reasonable expectations that
someone will turn up with a proposed offering to meet that request.
Seamless interface. The biggest barrier to electronic trade is having all the pieces
work together so that information can flow seamlessly from one source to another. This
requires standardization. On the corporate side, companies need compatible EDT
software and network services in order to send electronic purchase orders, invoices, and
payments back and forth.
Recourse for disgruntled buyers. A viable marketplace must have a recognized
mechanism for resolving disputes among buyers and sellers. Markets typically include a
provision for resolving disagreements by returning the product or through arbitrage in
other cases.
B2
PINs.
Public Key cryptography, also known as
asymmetric cryptography, uses two keys: one key to encrypt the message and the other
key to decrypt the message. The two keys are mathematically related such that data
encrypted with either key can only be decrypted using the other. Each user has two
keys: a public key and a private key. The user distributes the public key. Because of the
relationship between the two keys, the user and anyone receiving the public key can be
assured that data encrypted with the public key and sent to the user can only be
decrypted by the user using the private key. This assurance is only maintained if the user
ensures that the private key is not disclosed to another. Therefore, the key pair should
be generated by the usr. The best known public-key cryptography algorithm is RSA
( named after its inventors Rivest, Shamir and Adleman).
This section describes the flow of transactions as they are processed by various
systems.
SET defines a variety of transaction protocols that utilize the cryptographic concepts
introduced in
previous section to securely conduct electronic commerce. The section describes the
following transactions:
Cardholder registration
Merchant registration
Purchase request
Payment authorization
Payment capture
Other transactions
The following additional transactions are part of these specifications, but are not
described in this
section:
Certificate query
Purchase inquiry
Purchase notification
Sale transaction
Authorization reversal
Capture reversal
Credit
Credit reversal
Stages of E-Commerce architecture on Web.
1 .Client browser,
2. WWW server functions and
3. third party services.
The Web community of developers and users is tackling these complex problems. The
architecture is made up
of three primary entities: client browser, Web server, and third-party services. The client
browser usually
interacts with the WWW server, which acts as an intermediary in the interaction with
third-party services. The
client browser resides on the users PC or workstation and provides an interface to the
various types of content. The browser has to be smart enough to understand what file it
is downloading and what browser extension it needs to activate to display the file.
Browsers are also capable of manipulating local files
What are the basic banking services provided in e-commerce.
1. Basic banking services: -normal customer would be transacting with his bank most
of the time. They are mainly related to personal finances. A customer has with his bank
can be classified into the following:
i Checking his accounts statements
ii Round the
clock banking (ATM)
iii Payment of bills etc.
iv Fund transfer and
v Updating of his
pass books etc. The concept of Automated Teller Machines is to allow the customer to
draw money from his account at any part of the day or night. The customer need not go
to the bank at all for his most important service. ATMs are connected to a Bank
Switching Centre. The Switching Centre of several banks is interconnected to an
association switching centre.
2. Home shopping: -We assume it is television based shopping. It may be noted that
this concept is picking up now in India in a small way, wherein the channels set apart
only a very small portion of their broadcasting time to teleshopping. Customer can order
the items over phone. The goods are delivered to his home and payment can be made
in the normal modes. Concepts of traditional marketing like negotiations, trial testing etc.
are missing from this scheme and it is most suitable for those customers who are almost
sure of what they need to buy but who are to busy to go to the shops.
3. Home entertainment: - The next example of this type of commerce is home
entertainment. Dubbed on line movies, it is possible for the user to select a movie/CD
online and make his cable operator play the movie exclusively for him (movie on
demand) cause against payment like Tata Sky. Payment can be either online/ payable to
his account. It is also possible to play interactive games online/download them to your
computer to play. The concept of downloading games/news etc. At a cost to the mobiles
is also a similar concept. It may be noted that in all these cases, the physical movement
of the customer/trader is avoided; of course, the computer need not always be a part of
the deal.
4. Micro-transaction for information: - The telephone directories provide a basic type
of micro- transaction. If we want by one particular type of item say books they list
the addresses and phone numbers of the various book dealers whom we may contact.
Similar facilities are available on the internet may be for more number of items and
also with more details. This can be though of as an extension of the earlier described
television based ordering. We dont have to order only those items that are shown in the
computer, but search for an item that we need.
Basic Tenets of E-Commerce in a consumer oriented scenario: - It has been said
that the meeting of money, commerce, computing and networks form the global
consumer market place. It includes facilities for negotiations, bargaining; order
processing, payment and customer service. Though it is desirable that the entire system
is automated, it may be possible that one/more of these activities may be transacted in a
traditional manner. The order is placed over phone, further negotiations may be made
with the sales representative calling on the buyer, the payment may be made through a
cheque etc.
Some of the fundamental issues of consumer oriented e-commerce can be made
broad based are listed below:
a) Standard business practices and processes for buying and selling of products as well
as services need to be established.
b) Easy to use and well accepted software and hardware implementations of the various
stages of ecommerce like order taking, payment, delivery, after sales interactions etc.
need to be established.
c) Secure commercial and transport practices that make the parties believe that they are
not at the mercy of any body else for the safety of their information and goods need to
be in place.
It may be noted that each one of the above requirements can be established only over a
period of time with several trial and error methods.
What are the benefits of EDI.
EDI can be a costand time-saving system, for many reasons. The automatic transfer of information from
computer to computer reduces the need to rekey information and as such reduces costly
errors to near zero. EDI transactions produce acknowledgments of receipt of data.
Saving also accrues from the following improvements: Reduced paper-based systems:
EDI can impact the effort and expense a company devotes to maintaining records,
paper- related supplies, filing cabinets, or other storage systems and to the personnel
required to maintain all of these systems. EDI can also reduce postage bills because of
the amounts of paper that no longer need be sent.
Improved problem resolution and customer service:
EDI can
minimize the time companies spend to identify and resolve inter-business problems. EDI
can improve customer service by enabling the quick transfer of business documents and
a marked decrease in errors.
Expanded customer/supplier base: Many large manufacturers and retailers with the
necessary clout are ordering their suppliers to institute an EDT program. However, these
are isolated islands of productivity because they are unable to build bridges to other
companies. With the advent of electronic commerce, the bridge is now available.
and constantly on the lookout for new sounds that is electronic pulse records!!
Compare push and pull based supply chains.
The business terms push and pull originated in the marketing and selling world.but are
also applicable in the world of electronic content and supply chain management. The
push/pull relationship is that between a product or piece of information and who is
moving it. A customer pulls things towards themselves, while a
producer pushes things toward customers.
With a push-based supply chain, products are pushed through the channel, from the
production side up to the retailer. The manufacturer sets production at a level in accord
with historical ordering patterns from retailers. It takes longer for a push-based supply
chain to respond to changes in demand, which can result in overstocking or bottlenecks
and delays, unacceptable service levels and product obsolescence.
In a pull-based supply chain, procurement, production and distribution are demand
driven so that they are coordinated with actual customer orders, rather than forecast
demand. A supply chain is almost always a combination of both push and pull, where the
interface between the push- based stages and the pull-based stages is known as the
push-pull boundary. An example of this would be Dells build to order supply chain.
Inventory levels of individual components are determined by forecasting general
demand, but final assembly is in response to a specific customer request. The push-pull
boundary would then be at the beginning of the assembly line. A push-pull-system in
business describes the movement of a product or information between two subjects. On
markets the consumers usually pulls the goods or information they demand for their
needs, while the offerers or suppliers pushes them toward the consumers. In logistic
chains or supply chains the stages are operating normally both in push- and pullmanner. The interface between push-based stages and pull-based stages are called
push-pull boundary or decoupling point .
Explain electronic tokens present in payment systems
None of the
banking or selling payment methods is completely adequate in their present form for the
consumer-oriented e-commerce environment. Totally new forms of financial instruments
are also being developed. One such new financial instrument is electronic tokens in
the form of electronic cash / money or checks. Electronic tokens are designed as
electronic analogs of various forms of payment backed by a bank or financial institution.
Simply stated, electronic tokens are equivalent to cash that is backed by a bank.
Electronic tokens are of three types:
1. Cash or real-time. Transactions are settled with the exchange of electronic currency.
An example of on-line currency exchange is electronic cash (e-cash).
2. Debit or prepaid. Users pay in advance for the privilege of getting information.
Examples of prepaid payment mechanisms are stored in smart cards and electronic
purses that store electronic money.
3. Credit or postpaid. The server authenticates the customers and verifies with the
bank that funds are adequate before purchase. Examples of postpaid mechanisms are
credit / debit cards and electronic checks.
B4
the protocol data units. The acknowledgement number is the sequence number of the
last packet transmitted. The two most prominent secure transmission protocols for
secure Web communication are:
Secure Sockets Layer: SSL is an encrypted communication protocol that we use to
implement security by switching a website into the secure mode. SSL prevents
transactions between a company and its customers from packet-sniffing attacks. The
protocol allows client/server applications to communicate in a way that data
transmissions cannot be altered. The strength of SSL is that it is applicationindependent. HTTP, telnet, and FTP can be placed on top of SSL transparently. SSL
provides channel security through encryption and reliability through a message integrity
check.
SSL uses three-part process. First, information is encrypted to prevent unauthorized
disclosure. Second, the information is authenticated to make sure that the information is
being sent and received by the correct party. Finally, SSL provides message integrity to
prevent the information from being altered during interchanges between the source and
sink.
SSL depends on RSA encryption for exchange of the session key and client/server
authentication and for various other cryntographic algorithms. The length of key can vary
between 40 to 1024 bits. The information is sent to the company, which then uses a
private key to decrypt the information. The process is transparent to customers; hence it
is easy to use: the shoppers enter their credit card numbers, SSL encrypts them and
sends the encrypted files to the merchant; the transmission proceeds as soon as SSL
decrypts the files.
Secure HTTP (S-HTTP: S-HTTP sets up security details with special packet headers
that are exchanged in S-HTTP. The headers define the type of security techniques,
including the use of private-key encryption, server authentication, client authentication,
and message integrity. A secure envelope encapsulates a message and provides
secrecy, integrity, and client/server authentication.
S-HTTP provides a number of security features. These include:
Client and server authentication
Spontaneous encryption
What are the approaches for enterprise level security.
A firewall is a security mechanism that allows users with special rights to access a
protected network. Illegal users are denied access to the protected websites on the
Internet. It is important to note that a firewall can only prevent the corporate data against
For example, a vendor could permit entry to its website through the firewall only to those
users with specific domain names belonging to customer companies.
Firewalls are classified into three main categories: 1. Packet filters: Packet filtering at the
network layer can be use as a first defense. Basic filtering comes as part of most routers
software. Each packet is either forwarded or dropped based on its source address
destination address, or a defined (TCP) port. Configuring a filter involves some
determination of what services/ addresses should and should not be permitted to access
the network or server.2. Application level gateways: An application-level gateway
provides a mechanism
for filtering traffic for various applications. The administrator defines and implements
code specific to applications or services used by the users site. Services or users that
can compromise the network security can then e restricted. To counter some
weaknesses associated with packet filtering routers, firewalls utilize software
applications to forward and filter connections for services such as Telnet, FTP, and
HTTP. 3. Proxy servers: A proxy server terminates a users connection (by application)
and sets up a new connection to the ultimate destination on behalf of the user, proxying
for the user. A user connects with a port on the proxy; the connection is routed through
the gateway to a destination port, which is routed to the destination address.
B5
Name any four issues addressed in a e- payment system? Despite cost and
efficiency gains, many hurdles remain to the spread of electronic payment systems.
These
include several factors, many non-technical in nature that must be addressed before any
new payment method
can be successful.
Privacy: A user expects to trust in a secure system
Security: A secure system verifies the identity of two-party transaction through user
authentication
and reserves flexibility to restrict information / service through access control.
Intuitive interface: The payment interface must be as easy to use as a telephone.
Generally speaking,
users value convenience more than anything.
Database integration: With home banking, for example, a customer wants to play with
all his accounts.
To date, separate accounts have been stored on separate databases.
Brokers: A network banker someone to broker goods and services, settle conflicts,
and facilitate
financial transactions electronically must be in place.
Pricing: One fundamental issue is how to price payment system services.
Standard: Without standards, the welding of different payment users into different
networks and
different systems is impossible. Standards enable interoperability, giving users the ability
to buy and receive
information, regardless of which bank is managing their money.
None of these hurdles are intractable. The biggest question concerns how customers will
take to a paperless and (if not cashless) less-cash world.
In terms of a database data integrity refers to the process of ensuring that a database
remains an accurate reflection of the universe of discourse it is modelling or
representing. In other words there is a close correspondence between the facts stored in
the database and the real world it models
A Web server that utilizes security protocols like SSL to encrypt and decrypt data,
messages, and online payment gateways to accept credit cards, to protect them against
fraud, false identification, or third party tampering. Purchasing from a secure Web server
ensures that a users credit card information, or personal information can be encrypted
with a secret code that is difficult to break. Popular security protocols include SSL,
SHTTP, SSH2, SFTP, PCT, and IPSec.
to surf the Internet. In fact, media of internet has become quite successful in trapping
multifaceted entertainment factor. Downloading games, visiting chat rooms or just surfing
the Web are some of the uses people have discovered. There are numerous games that
may be downloaded from the Internet for free. The industry of online gaming has tasted
dramatic and phenomenal attention by game lovers. Chat rooms are popular because
users can meet new and interesting people. In fact, the Internet has been successfully
used by people to find life long partners. When people surf the Web, there are numerous
things that can be found. Music, hobbies, news and more can be found and shared on
the Internet.
Services: Many services are now provided on the internet such as online banking, job
seeking, purchasing tickets for your favorite movies, guidance services on array of topics
engulfing the every aspect of life, and hotel reservations. Often these services are not
available off-line and can cost you more.
E-Commerce: Ecommerce is the concept used for any type of commercial
maneuvering, or business deals that involves the transfer of information across the globe
via Internet. It has become a phenomenon associated with any kind of shopping, almost
anything. You name it an Ecommerce with its giant tentacles engulfing every single
product and service will make you available at your door steps. It has got a real amazing
and wide range of products from household needs, technology to entertainment.
Disadvantages
Theft of Personal information
If you use the Internet, you may be facing grave danger as your personal information
such as name, address, credit card number etc. can be accessed by other culprits to
make your problems worse.
Spamming: Spamming refers to sending unwanted e-mails in bulk, which provide no
purpose and needlessly obstruct the entire system. Such illegal activities can be very
frustrating for you, and so instead of just ignoring it, you should make an effort to try and
stop these activities so that using the Internet can become that much safer.
Virus threat: Virus is nothing but a program which disrupts the normal functioning of
your computer systems. Computers attached to internet are more prone to virus attacks
and they can end up into crashing your whole hard disk, causing you considerable
headache.
Pornography: This is perhaps the biggest threat related to your childrens healthy
mental life. A very serious issue
concerning the Internet. There are thousands of pornographic sites on the Internet that
can be easily found and can be a detrimental factor to letting children use the Internet.
In short answer
The advantages of
using internet communication are that
* can callibrate easily with people
* its easy to access with just one click
* we have the ability to link to peapole and places immediately
The disadvantages of using Internet communication are that
* not everyone have the access to the Internet
* it requires a specialist staff
The disadvantages of using the Internet in general are
* young children have access to porn
* anyone can easily access instructions on making bombs, guns, silencers, or other
dangerous materials.
*anyone can find information on committing an almost untraceable murder
List the six layers of E-Commerce architecture and what are the four types of
Purchases.
The electronic commerce application architecture consists of six layers of functionality or
services:
(1) Applications Services: The application services layer of e-commerce will be
comprised of existing and hope applications built on the native architecture.
Three district classes of electronic commerce applications can be famous:
a) Customer-to- business: Customers learn about products differently through electronic
publishing, buy them using electronic cash and secure payment systems, and have them
delivered differently.
b) Business-to-business: Businesses, governments, and other organizations depend on
computer-to-computer communication as a fast, an economical, and a reliable way to
conduct business transactions. Small companies are also beginning to see the benefits
of adopting the similar methods.
c) Intra-oranization:
A Company becomes market driven by dispersing throughout the firm information about
its customers and competitors. To maintain the relationships that are critical to delivering
superior customer value, management must pay close attention to service, both before
and after sales.
(2) Brokerage services, data or transaction management: The information brokerage
and management layer provides service integration through the concept of information
brokerages, the development of which is necessitated by the increasing information
resource fragmentation. The concept of information brokerage to represent an
intermediary who provides service integration between customers and information
providers, given some constraint such as a low price, fast service, or profit maximization
for a client. In foreign exchange trading, information is retrieved about the latest currency
exchange rates in order to hedge currency holdings to minimize risk and maximize profit.
The brokerage function is the support for data management and traditional transaction
services. Brokerages may provide tools to accomplish more sophisticated, time- delayed
updates or future- compensating transactions.
(3) Interface and support layers: Interface and support services, will provide interfaces
for electronic commerce applications such as interactive catalogs and will support
directory services job needed for information search and access. Interactive catalogs
are the modified interface to consumer applications such as home shopping. An
interactive catalog is an extension of the paper-based catalog and incorporates
additional features. The primary difference between the two is that unlike interactive
catalogs, which deal with people, directory support services interact directly with
software applications. For this reason, they need not have the multimedia flash and
ballet generally associated with interactive catalogs.
(4) Secure messaging, security, and electronic document interchange: The
importance of the fourth layer, secured messaging, is clear. Messaging is the software
that sits between the network infrastructure and the clients or e-commerce applications,
masking the peculiarities of the environment. Messaging products are not applications
that solve problems; they are more enablers of the applications that solve problems. The
main disadvantages of messaging are the new types of applications it enables which
messages when convenient. It works much like residential personal mailboxes, and it
allows everybody involved to be flexible and cost-effective.
What is E-Commerce ? Name two stages of commerce that cannot be automated.
The key element of e-commerce is information processing. Every stage of commerce,
except of route
production of goods and their physical delivery can be automated. The tasks that can be
automated include
information gathering, processing, and manipulation and information distribution.
The following categories of operations came under e- commerce:
1) Transactions between a supplier/a shopkeeper and a buyer or between two
companies over a public
network like the service provider network (like ISP). With suitable encryption of data and
security for
transaction, entire operation of selling/buying and settlement of accounts can be
automated.
2) Transactions with the trading partners or between the officers of the company located
at different
locations.
3) Information gathering needed for market research.
4) Information processing for decision making at different levels of management.
5) Information manipulation for operations and supply chain management.
6) Maintenance of records needed for legal purposes, including taxation, legal suits etc.
7) Transactions for information distributions to different retailers, customers etc. including
advertising,
sales and marketing.
The uses of computers in these areas not only make the operations quicker, but also
error free and provides for consolidated approach towards the problem. It is not that the
concept of e-comnierce is totally without side effects. There are several areas of security,
safety against fraud etc., the concept of legal acceptance that is however to be solved.
Production of goods and delivery of goods.
paramount.
Explain four objectives of SET and what are the seven major business
requirements addressed by SET.
At this juncture, the industry is counting on SET to accelerate internet electronic
commerce. SET is becoming the de facto standard for security. Depicts its operation.
The following list depicts key functions of the specification.
*Provide for confidential payment information and enable confidentiality of order
information that is transmitted with payment information
* Ensure integrity for all transmitted data
* Provide authentication that a buyer is a legitimate user of a branded (e.g. Visa, Master
Card, American Express) bankcard account.
* Provide authentication that a merchant can accept bank card payments through its
relationship with an appropriate financial institution.
* Ensure the use of the best security practices and design techniques to protect all
legitimate
parties in an electronic commerce transaction.
* Ensure the creation of a protocol that is neither department on transport security
mechanismsmno prevents their use.
* Facilitate and encourage interoperability across software and network providers.
What are the two desirable properties in any e-transaction ? Name any four issues
addressed in a e-payment system.
A recently proposed abstraction, called e-Transaction (exactly-once Transaction),
specifies a set of properties capturing end-to-end reliability aspects for three-tier Webbased systems. In this paper we propose a distributed protocol ensuring the eTransaction properties for the general case of multiple, autonomous back- end
databases. The key idea underlying our proposal consists in distributing, across the
back-end tier, some recovery information reflecting the transaction processing state. This
information is manipulated at low cost via local operations at the database side, with no
need for any form of coordination among asynchronous replicas of the application server
within the middle-tier. Compared to existing solutions, our protocol has therefore the
distinguishing features of being both very light and highly scalable. The latter aspect
makes our proposal particularly attractive for the case of very high degree of replication
of the application access point, with distribution of the replicas within infrastructures
geographically spread on public networks over the Internet (e.g., Application Delivery
Networks), namely, a configuration that also provides the advantages of reduced user
perceived latency and increased system availability.
What in the role of encryption in data transfer? List the various encryption
Techniques.
Introduction Often there has been a need to protect information from prying eyes. In
the electronic age, information that could otherwise benefit or educate a group or
individual can also be used against such groups or individuals. Industrial espionage
among highly competitive businesses often requires that extensive security measures be
put into place. And, those who wish to exercise their personal freedom, outside of the
oppressive nature of governments, may also wish to encrypt certain information to avoid
suffering the penalties of going against the wishes of those who attempt to control. Still,
the methods of data encryption and decryption are relatively straightforward, and easily
mastered. I have been doing data encryption since my college days, when I used an
encryption algorithm to store game programs and system information files on the
university mini-computer, safe from prying eyes. These were files that raised eyebrows
amongst those who did not approve of such things, but were harmless [we were always
careful NOT to run our games while people were trying to get work done on the
machine]. I was occasionally asked what this rather large file contained, and I once
demonstrated the program that accessed it, but you needed a password to get to certain
files nonetheless. And, some files needed a separate encryption program to decipher
them.
Methods of Encrpyting Data
Traditionally, several methods can be used to encrypt data streams, all of which can
easily be implemented through software, but not so easily decrypted when either the
original or its encrypted data stream are unavailable. (When both source and encrypted
data are available, code-breaking becomes much simpler, though it is not necessarily
easy). The best encryption methods have little effect on system performance, and may
contain other benefits (such as data compression) built in. The well-known PKZIP
utility offers both compression AND data encryption in this manner. Also DBMS
packages have often included some kind of encryption scheme so that a standard file
copy cannot be used to read sensitive information that might otherwise require some
kind of password to access. They also need high performance methods to encode and
decode the data.
With the help of a diagram explain horizontal and vertical oranization.
a) The Vertical organization: The vertical approach to corporate management poses
two problems to smooth operations. First, it creates boundaries that discourage
employees in different departments from interacting with one another. Second,
departmental goals are typically set in a way that could cause friction among
departments. For instance, goals for sales are typically set to maximize sales and pay
little attention to account collection or service delivery. The vertical organization allows
gaps to exist between employees from different departments and lacks a channel to
facilitate interaction and communication. The lower level in the hierarchy, the larger the
gap. These gaps expand with geographic dispersion and corporate growth. Problems
can result when a need arises for two departments to communicate at the lower level.
This structure consumes time and resources, and the lack of communication channels
and practices clearly contributes to misunderstanding and frustration among
departments. Finally, three key ingredients are missing from the vertical organizations
chart: The product, the process, and the customer.
b) The Horizontal Organization: The principal goal of horizontal management is to
facilitate the smooth transition of intermediate products and services through its various
functions to the customer. This is achieved by empowering employees, improving
communication, and eliminating unnecessary work. The importance of having a clear
view of how products and services flow from one department to another eventually, to
the customer is apparent. The structure of a horizontal organization is two-tiered instead
of multilayered, as seen in vertical organizations: a core group of senior management
responsible for strategic decisions and policies, and a stratum of employees in process
teams. The objective of a horizontal structure is to change the staffs focus from
coordinating and reporting to improving flow managements and work quality and
increasing value for customers. The horizontal structure eliminates the need to devote
resources to vertical communication. However, there is an increased need for
coordination of the various parties involved.
technologies. In result of this phenomenon, a variety of new markets have emerged from
Ecommerce itself giving a boost to the global market.
B7
These VANs often provide only the very basic technical services such as protocol
conversion and data
error detection and correction, directing and delivering EDT traffic to thousands of buyers
and sellers.
3) Full-service third-party VANs:
Full third-party services provide more than just communication between two or more
parties.
Electronic mailboxes and associated extra features are the heart of these third-party
services.
Extra features include access control for security and document tracking, which allows
users to track
their own documents as they pass though the system.
This feature supports audit needs.
A third-party network can also provide a gateway to interconnect with other third-party
networks.
Explain the three broad phases of consumers perspective?
The business process model from a consumers perspective consists of seven activities
that can be grouped into three phases: pre-purchase phase, purchase consummation,
and post-purchase interaction.
1) Pre-purchase Preparative: The pre-purchase preparation phase includes search
and discovery for a set of products in the larger information space capable of meeting
customer requirements and products selection from the smaller set of products based on
attribute comparison.
2)Purchase
Consummation: The purchase consummation phase includes mercantile protocols that
specify the flow of information and documents associated with purchasing and
negotiation with purchasing and negotiation with merchants for suitable terms, such as
price, availability, and delivery dates; and electronic payment mechanisms that integrate
payment into the purchasing process
3) Postpurchase interaction: The post-purchase interaction phase includes customer service
and support to address customer complaints, product returns, and product defects.
Purchase deliberation is defined as the elapsed time between a consumers first thinking
about buying and the actual purchase itself.
Name of few operations performed by e-commerce?
1) Transactions between a supplier/a shopkeeper and a buyer or between two
companies over a publicnetwork like the service provider network (like ISP). With
suitable encryption of data and security fortransaction, entire operation of selling/buying
and settlement of accounts can be automated.
2) Transactions with the trading partners or between the officers of the company located
at different locations.
3) Information gathering needed for
market research.
4) Information processing for decision making at
different levels of management.
5)
Information manipulation for operations and supply chain management.
6) Maintenance of records needed for legal purposes, including taxation, legal suits etc.
7) Transactions for information distributions to different retailers, customers etc. including
advertising,sales and marketing.
greater legal authority than handwritten signatures. For instance, if a ten-page contract is
signed by hand on the tenth page, one cannot be sure that the first nine pages have not
been altered. If the contract was signed by digital signatures, however, a their party can
verify that not one byte of the contract has been altered. Without such a framework, it is
hard to see how EDT can fulfill the role envisioned for it in the future.
Why are information brokerages needed? Explain with an example.
The information brokerage and management layer provides service integration through
the concept of information brokerages, the development of which is necessitated by the
increasing information resource fragmentation. The concept of information brokerage to
represent an intermediary who provides service integration between customers and
information providers, given some constraint such as a low price, fast service, or profit
maximization for a client. In foreign exchange trading, information is retrieved about the
latest currency exchange rates in order to hedge currency holdings to minimize risk and
maximize profit. The brokerage function is the support for data management and
traditional transaction services. Brokerages may provide tools to accomplish more
sophisticated, time-delayed updates or future- compensating transactions.
Explain Public Key.
Public Key cryptography, also known as asymmetric cryptography, uses two keys:
one key to encrypt the message and the other key to decrypt the message. The two
keys are mathematically related such that data encrypted with either key can only be
decrypted using the other. Each user has two keys: a public key and a private key. The
user distributes the public key. Because of the relationship between the two keys, the
user and anyone receiving the public key can be assured that data encrypted with the
public key and sent to the user can only be decrypted by the user using the private key.
This assurance is only maintained if the user ensures that the private key is not
disclosed to another. Therefore, the key pair should be generated by the usr. The best
known public-key cryptography algorithm is RSA ( named after its inventors Rivest,
Shamir and Adleman).
On what factors can negotiations take place?
Over money, terms and conditions, delivery dates and evaluation criteria. Negotiation
occurs in business, non-profit organizations, government branches, legal proceedings,
among nations and in personal situations such as marriage, divorce, parenting, and
everyday life. The study of the subject is called negotiation theory . Professional
negotiators are often specialized, such as union negotiators, leverage buyout
negotiators, peace negotiators, hostage negotiators, or may work under other titles, such
as diplomats , legislators or brokers.
What should be covered in the policy.
a) The following is a list of topics that should be covered in this area of the policy.
1) What guidelines you have regarding resource use.
2) What might
constitute abuse
3) Whether users are permitted
to share accounts or let others use their accounts.
4) How users should keep their passwords secret.
5) How often users
should change their passwords and any password restrictions or requirements.
6) Restrictions on disclosure of information that may be proprietary. 7) Statement or
electronic mail privacy.
8) Policy on electronic
communications, mail forging, and so on.
9) The organizations policy