Вы находитесь на странице: 1из 37

E-Commerce:Digital Markets,Digital Goods of Business Information System

Major Features of E-Commerce

E-Commerce includes commercial transaction between and organization and individuals. E-Commerce technology is available every where,it has global reach any one can connect to internet to access e-commerce.

Major Features of E-Commerce

It operates with respect to universal standards every where,it is cost effective then traditional commerce. It allows two way communication between two different parties.It facilitate exchange of online Information,audio,visual and Text
3

Major Features of E-Commerce

It permits customization and personalization of Information.It facilitate merchants and vendor to target market segments. It has created digital market place which is more transparent than traditional market place.

Major Features of E-Commerce

Digital Markets are more flexible and efficient with reduced transaction cost and ability to change prices dynamically New Business models of E-Commerce have come up such as B2B,B2C,C2C,C2B,G2C ,M2C It allows SMES to capture important information,Data and Global branding.
5

Describe the Role of Emerging Digital Firm & E-Business

What are the categories of electronic commerce and associated business models?
The

three Major categories of electronic commerce and associated Business models are,B2B,B2C,C2C,G2C,M2C. B2C:- Involves retailing product and services to individual shoppers eg amazon.com
7

What are the categories of electronic commerce and associated business models?

B2B:- involves sales of goods and services among businesses eg:www.sailindia.com,where manufacturing units buys and sale core iron. C2C:- Involves consumer selling directly from consumer. Eg ebay.com,auction site such as makemybit.com

What are the categories of electronic commerce and associated business models?
G2C:It involves exchange of information between govt web based portals and its citizen for example incomtax.com where a citizen can fill in their returns,RTI.com right to information ,which contains detail description about govt policies that has been framed with constitutional bills and amendments.
9

What are the categories of electronic commerce and associated business models?

M2C MOBILE COMMERCE Now mobile phones and other hand held appliances are Internet enabled to send text messages and email access website and make purchase. The use of hand held wireless device for purchasing goods and services from any location has been termed as mobile commerce
10

What are the categories of electronic commerce and associated business models?
Collaborative Commerce Intranets provide a rich set of tools for creating collaborative environment in which members of an organization can share information and exchange ideas on common or related assignments.

11

What are the types of Payment System

Digital credit cards payment system extends the functionality of existing credit card payment system.so that they can be used for online shopping payments. A digital wallet that securely stores credit card and owner identification information and provides that information at an electronic commerce site.
12

What are the types of Payment System

Micro payment system have been developed for purchase of less than 1000 Rs.Accumulated balance digital payment system are useful for such purpose. Accumulated Balance digital payment system enables the user to make micro payments and purchase on the web.

13

What are the types of Payment System


Stored Value Payments System. Smart cards are another type of stored value system for micro payments.It is a plastic cards the size of credit cards that stores digital information.It can store health record,identification data,or telephone number as an electronic purse.it is used to make Instant online Payment.
14

What are the types of Payment System

Digital Cash or electronic cash is a currency represented in electronic form that works outside the normal network of money transfer. User are supplied with client software and can exchange money with one another.

15

What are the types of Payment System


Peer-to-Peer Payment System Such as Pay pal serve people who want to send money to vendor or individuals who are not set up to accept credit cards . The party sending money uses his or her credit card to create an account with the designated payment at a website dedicated to peer-to peer Payments.

16

What are Internet Business models explain with example?


Virtual store Fronts Sell physical product directly to consumer or to individual business.eg amazon.com, redenvelope.com. Information broker :Provides product,pricing and availability information to individuals and businesses.Generates revenue from advertising or from direct buyer or seller. Eg magicbricks.com
17

What are Internet Business models explain with example?

Transaction Broker:-saves user money and time by processing online sales transaction and generating a fee each time a transaction occurs. e.g. :-etrade.com,expedia.com Online Marketplace:-Provides a digital environment where buyer and seller can meet search for products,display products and establish prices for those products, eg ebay.com

18

What are Internet Business models explain with example?


WEBPORTALS:- Provides initial point of entry to the web along with specialized contents and other services.eg yahoo.com,msn.com Virtual Community:-Provides an online meeting place where people with similar interest can communicate and find useful information.youtube.com,myspace.com, ivillage.com

19

What are Internet Business models explain with example?

CONTENT PROVIDER:-creates revenue by providing digital content such as digital image ,news,music or videos over the web.consumer may pay to access the content e.g. itunes.com,games.com ONLINE SERVICE PROVIDER:- provides online service generates revenue from subscription or transaction fee,from advertising or from collecting marketing information from user.eg:-sales force.com,streamload.com
20

Features of Firewalls

Protection from Spam: Spam is an unsolicited commercial email messages and are not created with the same malicious intent as threats like viruses, but are now having a negative economic impact on the same order of magnitude. Spam clogs networks, hogs disk space and wastes countless hours of user time reading and dealing with the messages.
21

System Vulnerability and Abuse

Automated data are more susceptible to destruction, fraud, error and misuse Todays organization is highly dependent of automated data for their business processes. Disaster due to information system failure is bound to create havoc

22

Threats to Information System


Hardware Failure Software Failure Attacks by malicious software Sabotage Theft of data, services, or equipments
23

Threats to Information System


Accidents / Natural Disaster User Error Bugs in the program Telecommunication failure

24

Concern for The System Owners and Developers

Disaster Recovery Plan

Plan for running the business in the event of a system disaster

Security Policy

Policies, procedures & technical measures used to prevent unauthorized access, alteration, theft or physical damage.

25

Concern for The System Owners and Developers

Software Quality Assurance

Rules & Policy for Validation, Verification and Certification System Development Methodology

Data Quality

Policies regarding source, authorization, and auto-checking by the software

26

Control

All of the methods, Policies, and procedures that ensure protection of organizations assets, accuracy and reliability of its records and operational adherence to management standards

27

Types of Control

General Control: Overall controls that establish a framework for controlling the design, security and use of computer programs Application Control: Specific control unique to each computerized application

28

General Control

Implementation Control: It is a review of development and implementation methodologies and adherence to the standards. This is mainly for software quality assurance. Software Control: Controls the various categories of software, versions of software, unauthorized access of software programs.
29

General Control

Hardware Control: Ensures physical security of the hardware, Preventive maintenance audit. etc Computer Operation Control: User control, System administrator procedures, network access rules etc

30

General Control

Data Security & Control: Backup control, system audit for password security, capability lists and data access permissions Administrative Control: Formalized standard rules, procedures and disciplines to ensure that organization,s control are properly executed
31

Application Control

Input Control: The procedure to check data for accuracy and completeness Validation Authorization Control totals Processing Control: The routines for establishing that data are complete and accurate during updating
32

Application Control

Capability Control: Measures to restrict the capability of a user to use the system Output Control: Measures that ensure that the results of a computer processing are accurate, complete and properly distributed

33

Disaster Recovery Plan

The disaster recovery plan is to make a plan and strategy so as to Control the damage Reconstruction of data and information in case a disaster occurs, as well as measures to be taken for prevention of disaster. In order to control the damages due to a disaster, a disaster recovery strategy must be formed beforehand
34

Disaster Recovery Plan


While

designing a disaster recovery strategy following are considered:


Criticality of the non availability of the systems Cost of data reconstruction Cost of preventive measures Tangible and non tangible losses due to non availability of the system
35

Disaster recovery plan must include policies for


Backup procedures and frequency System Security and Control Procedures System Audit Procedures and frequency of audit Chronological actions and steps to be taken in case of a disaster Specific Roles and responsibility of individual personnel during maritime and during disaster recovery

36

For organizations which are highly dependent on computerized system must have documented Disaster Recovery Plan The copies of plan document should be circulated to all concern people Once the plan is circulated, it should be ensured that all concern personnel is fully aware and understood their roles and there is no ambiguity Frequent review of the plan is also necessary Any change in the plan must be informed to all concern
37

Вам также может понравиться