Академический Документы
Профессиональный Документы
Культура Документы
Subject: E-Business
Roll no: 17530214
Class: BCA 7th Semester
Submitted to: Suraj Pandey Sir.
Disadvantages:
i. Lack of personal touch:
E-business lacks the personal touch. One cannot touch or feel the
product. So it is difficult for the consumers to check the quality of
a product.
1) Cable:
2) Fiber:
Fiber optic technology is fast becoming one of the newest and most
modern ways to go about sending and receiving data. The technology
works by converting electric signals into a form of light, which is then
sent through transparent tubing (fibers).
3) DSL:
4) Satellite:
v) Lack of trust:
E-Payments have a long history of fraud, misuse, and low
reliability which has always threatened users to practice internet-based
purchases.
Components of cryptosystems:
iii) E-mail-management:
Email is important because it creates a fast, reliable form of
communication that is free and easily accessible. It helps customer
to send the notifications and keep in touch about the new products
and sales.
Raise Output
E-SCM
Disadvantages:
i) Service fees:
Payment gateways and third party payment processors charge
services fees.
Virus:
There are thousands of different types of computer viruses and internet
malicious programs. Malicious software can easily attack the mobile banking
payment system by taking up passwords on the web browser or any cached
information on operating system.
Worms:
Worms can be categorized as special viruses that spread using direct
Internet connections. They are standalone programs that do not require a host
program for activation and spread themselves independently from computer to
computer by exploiting security vulnerabilities or configuration errors in
operating systems or applications.
Trojan horse:
Trojan horse programs launched against client systems pose the greatest
threat to the e-Payment systems because they can bypass or subvert most of the
authentication and authorization mechanisms used in an electronic transaction.
The Trojan horses aim to spy on sensitive data (e.g. passwords, confidential
data, etc.) and send it back to their owners to gain access to third-party
computers and thus take control of them remotely.
Trojans are normally disguised as applications that are useful to users of
the computers they infect. These programs can be installed on a remote
computer by the simplest of means, for example an email attachment or when
users visit certain websites and download a so called "harmless" program.
2. Structure:
It is the way the organization is structured and who reports to whom. It
defines the inter-relationship of processes and human capital to fulfill the
enterprise’s strategic objectives.
3. Systems:
These are the organization’s information systems and infrastructure
through which the organization communicates to its environment. Organization
should create flexible systems infrastructure and consider the following three
major dimensions;
a. Enterprise Resource Planning (ERP):
ERP is business process management software that allows an
organization to use a system of integrated applications to manage the
business and automate much back office functions related to technology,
services and human resources.
b. Data Warehouses:
Data Warehouse are central repositories of integrated data from
one or more disparate sources and Data Warehousing is the basis of a
knowledge a repository that, when used effectively, enables cost
reduction strategies to be identified, added-value services to be achieved
at a manageable cost, and the delivery of improved data effectiveness
within the organization.
c. Knowledge Management (KM):
KM is the process of capturing, developing, sharing, and
effectively using organizational knowledge. It refers to a multi-
disciplinary approach to achieving organizational objectives by making
the best use of knowledge.
4. Staff:
It is the human resources management which includes the employees and
their general capabilities. As organizations become more knowledge-based,
more value is created for an organization’s intellectual assets. At recent times,
outsourcing has also been a trend in many organizations for HRM.
5. Style:
It is the style of leadership adopted. It can be defined as a characterization
of how key managers behave in achieving the organizational goals, and also the
cultural style of the organization.
6. Skills:
It is the actual skills and competencies of the employees working for the
company. If can refer to both the technical skills and relationship management
skills.
7. Shared Values:
Shared values can be defined as the significant meanings or concepts that
an organization utilizes to drive towards a common goal through common
objectives and a common value set. To acquire shared values, it is required to
provide flexibility in the process, induce lower transaction costs and achieve
mass customization for the customers.
v) Reactive agents:
These agents are responsible for stimulating the response to the
present state of the environment in which they are embedded.
These agents interact with other agents in a very simple and basic
way.