Академический Документы
Профессиональный Документы
Культура Документы
1.1
1.1.1
Transaction (sales and purchase) having the objective of supplying commodities(goods and
services) is known as commerce, E-Commerce (EC) is doing commerce with the use of computer,networks and commerce-enabled S/W.
EC describes the procedure in which transaction takes place over network,mostly the Internet.
It is the process of electronically buying and selling goods, services and information.Although
in most cases e-commerce and e-business are synonymous, yet e-commerce implies that goods
and services can be purchased online, whereas e-business might be used as more of an umbrella
term for a total presence on the Web, which would naturally include the e-commerce (shopping)
component.
There are so may definition of e-commerce:According to the editor-in-chief of International Journal of Electronic Commerce, Vladimir
Zwass, Electronic commerce is sharing business information, maintaining business relationships and conducting business transactions by means of telecommunications networks
Electronic Commerce (EC) is where business transactions take place via telecommunications
networks, especially the Internet.
Electronic commerce describes the buying and selling of products, services,and information via
computer networks including the Internet.
Electronic commerce is about doing business electronically.
E-commerce, ecommerce, or electronic commerce is defined as the conduct of a financial transaction by electronic means.
At first, the term e-commerce meant the process of execution of commercial transactions
electronically, using technologies such as:
EFT(Electronic Fund Transfer)
EDI (Electronic Data Interchange)
Electronic funds transfer (EFT) is the electronic exchange, transfer of money from one account
to another, either within a single financial institution or across multiple institutions, through
computer-based systems. for example Debit card, Credit card, online payment etc..
Electronic data interchange (EDI) is an electronic communication method that provides standards for exchanging data via any electronic means. By adhering to the same standard, two
different companies, even in two different countries, can electronically exchange documents
2
1.1.2
1.2
A business contract is a legally binding agreement between two or more parties to do or not to
do certain things. For example, a business contract could be for the sale of goods or supply of
services at a certain price.
1.2.1
Paper Document
Variety
personnel
memos,
2
Metadata
files,
notes,
letters,
articles,
spreadsheets .
No meta data
Backups
Easy
Search
redundancy
Less
More
4
1.3
E-Commerce Models
E-Commerce can be classified in to four models, this can be identified by party involved in it.
B2B (Business to Business)
B2C (Business to Consumer)
C2C (Consumer to Consumer)
B2G (Business to Government)
1.3.1
B2B/Business to Business
The B2B model involves electronic transactions for ordering, purchasing, as well as other administrative tasks between houses. It includes trading goods, such as business subscriptions,
professional services, manufacturing, and wholesale dealings. Sometimes in the B2B model,
business may exist between virtual companies, neither of which may have any physical existence. In such cases, business is conducted only through the Internet.
As an example, a wholesaler places an order from a companys website and after receiving the
consignment, sells the end product to final customer, in this case wholesaler is second business
organization and company is first organization
1.3.2
B2C/Business to Consumer
The B2C model involves transactions between business organizations and consumers. It applies
to any business organization that sells its products or services to consumers over the Internet.
These sites display product information in an online catalog and store it in a database. The B2C
model also includes services online banking, travel services, and health information.
C2B/Consumer to Business this model is similar to B2C but in this model Consumer is seller
and business organization is buyer.
another example is that, a consumer approaches website showing multiple business organizations for a particular service. Consumer places an estimate of amount he/she wants to spend
for a particular service. For example, comparison of interest rates of personal loan/ car loan
provided by various banks via website. Business organization who fulfills the consumers requirement within specified budget approaches the customer and provides its services.
6
1.3.3
C2C/Consumer to Consumer
The C2C model involves transaction between consumers. Here, a consumer sells directly to
another consumer. for example www.ebay.com, www.olx.com etc
1.3.4
B2G/Business to Government
In this model, the business houses transact with the government over the Internet or other ecommerce technology.
Model that involves transactions between the government and other entities, such as consumer, business organizations, and other governments. All these transactions that involve government as one entity are called e-governance.
The various models in the e-governance scenario are:
G2B (Government to Business )
Government uses B2G model website to approach business organizations. Such websites
support auctions, tenders and application submission functionalities.
C2G(Citizen /Consumer to Government) This is similar to G2C model but in this model
citizen approach to government through various E-Commerce Technology, like Internet
G2G(Government to Government)
This model involves transactions between 2 governments.
Define e-governance.
Write short notes on e-commerce model.
8
1.4
E-Security
The security of the transaction is the core and key issues of the development of E-commerce.Esecurity is protection of information against unauthorized disclosure,transfer, modifications, or
destruction, whether accidental or intentional.it not only provide protection but also provide
mechanism for prevention. E-Security is the method of securing internet systems from malicious use. It deals with the security of the information (in electronic form) that travels over the
Internet. So e-security involves securing both the information as well as the network through
which the information flows.
In E-Commerce there is four phase i.e. Pre Sales,Execution,Settlement, post sales, each phase
requires some security measures.
Pre Sales
Execution
this
negotiation
delivery
Confidentiality,
Secure
Access Control
tract,Digital
is
involve
Con-
Settlement
Post Execution
ment
vices etc.
Encryption
Secure Contact
Certificate
Three types of security threats
Denial of Service
Unauthorized Access
Theft and Fraud
Denial of Service/DoS:- In computing, a denial-of-service (DoS) or distributed denial-of-service
(DDoS) attack is an attempt to make a machine or network resource unavailable to its intended
users.
Unauthorized Access:- Illegal access to systems, applications or data,Passive unauthorized access ,Active unauthorized access, Changes intent of message, Sniffers- software that illegally
access data traversing across the network. spoofing- sending a message that appears to be from
someone else., Software and operating systems security holes.
Theft and Fraud:- Fraud occurs when the stolen data is used or modified.Theft of software via
illegal copying from companys servers.Theft of hardware, specifically laptops.
Security requirements
Authentication
This ensure that genuine person/party is involve in electronic Communication. Technology used :-Digital Certificate,OTP, Finger print retina scan etc
Authorization
Authorization allows a person or computer system to determine if someone has the authority to request or approve an
action or information.Authorization is tied with authentication . If a system can securely verify that a request for information (such as a web page) or a service (such as a purchase
requisition) has come from a known individual, the system
can then check against its internal rules to see if that person
has sufficient authority for the request to proceed
Non-repudiation
Non-repudiation is the ability to guarantee that once someone has requested a service or approved an action, they cannot turn around and say I didnt do that!.
Integrity
Integrity of information means ensuring that a communication received has not been altered or tampered with.
Key Management
Privacy
In online commerce, privacy is the ability to ensure that information is accessed and changed only by authorized parties.
10