Академический Документы
Профессиональный Документы
Культура Документы
E-Commerce includes commercial transaction between and organization and individuals. E-Commerce technology is available every where,it has global reach any one can connect to internet to access e-commerce.
It operates with respect to universal standards every where,it is cost effective then traditional commerce. It allows two way communication between two different parties.It facilitate exchange of online Information,audio,visual and Text
3
It permits customization and personalization of Information.It facilitate merchants and vendor to target market segments. It has created digital market place which is more transparent than traditional market place.
Digital Markets are more flexible and efficient with reduced transaction cost and ability to change prices dynamically New Business models of E-Commerce have come up such as B2B,B2C,C2C,C2B,G2C ,M2C It allows SMES to capture important information,Data and Global branding.
5
What are the categories of electronic commerce and associated business models?
The
three Major categories of electronic commerce and associated Business models are,B2B,B2C,C2C,G2C,M2C. B2C:- Involves retailing product and services to individual shoppers eg amazon.com
7
What are the categories of electronic commerce and associated business models?
B2B:- involves sales of goods and services among businesses eg:www.sailindia.com,where manufacturing units buys and sale core iron. C2C:- Involves consumer selling directly from consumer. Eg ebay.com,auction site such as makemybit.com
What are the categories of electronic commerce and associated business models?
G2C:It involves exchange of information between govt web based portals and its citizen for example incomtax.com where a citizen can fill in their returns,RTI.com right to information ,which contains detail description about govt policies that has been framed with constitutional bills and amendments.
9
What are the categories of electronic commerce and associated business models?
M2C MOBILE COMMERCE Now mobile phones and other hand held appliances are Internet enabled to send text messages and email access website and make purchase. The use of hand held wireless device for purchasing goods and services from any location has been termed as mobile commerce
10
What are the categories of electronic commerce and associated business models?
Collaborative Commerce Intranets provide a rich set of tools for creating collaborative environment in which members of an organization can share information and exchange ideas on common or related assignments.
11
Digital credit cards payment system extends the functionality of existing credit card payment system.so that they can be used for online shopping payments. A digital wallet that securely stores credit card and owner identification information and provides that information at an electronic commerce site.
12
Micro payment system have been developed for purchase of less than 1000 Rs.Accumulated balance digital payment system are useful for such purpose. Accumulated Balance digital payment system enables the user to make micro payments and purchase on the web.
13
Stored Value Payments System. Smart cards are another type of stored value system for micro payments.It is a plastic cards the size of credit cards that stores digital information.It can store health record,identification data,or telephone number as an electronic purse.it is used to make Instant online Payment.
14
Digital Cash or electronic cash is a currency represented in electronic form that works outside the normal network of money transfer. User are supplied with client software and can exchange money with one another.
15
16
Virtual store Fronts Sell physical product directly to consumer or to individual business.eg amazon.com, redenvelope.com. Information broker :Provides product,pricing and availability information to individuals and businesses.Generates revenue from advertising or from direct buyer or seller. Eg magicbricks.com
17
Transaction Broker:-saves user money and time by processing online sales transaction and generating a fee each time a transaction occurs. e.g. :-etrade.com,expedia.com Online Marketplace:-Provides a digital environment where buyer and seller can meet search for products,display products and establish prices for those products, eg ebay.com
18
19
CONTENT PROVIDER:-creates revenue by providing digital content such as digital image ,news,music or videos over the web.consumer may pay to access the content e.g. itunes.com,games.com ONLINE SERVICE PROVIDER:- provides online service generates revenue from subscription or transaction fee,from advertising or from collecting marketing information from user.eg:-sales force.com,streamload.com
20
Features of Firewalls
Protection from Spam: Spam is an unsolicited commercial email messages and are not created with the same malicious intent as threats like viruses, but are now having a negative economic impact on the same order of magnitude. Spam clogs networks, hogs disk space and wastes countless hours of user time reading and dealing with the messages.
21
Automated data are more susceptible to destruction, fraud, error and misuse Todays organization is highly dependent of automated data for their business processes. Disaster due to information system failure is bound to create havoc
22
Hardware Failure Software Failure Attacks by malicious software Sabotage Theft of data, services, or equipments
23
Accidents / Natural Disaster User Error Bugs in the program Telecommunication failure
24
Security Policy
Policies, procedures & technical measures used to prevent unauthorized access, alteration, theft or physical damage.
25
Rules & Policy for Validation, Verification and Certification System Development Methodology
Data Quality
26
Control
All of the methods, Policies, and procedures that ensure protection of organizations assets, accuracy and reliability of its records and operational adherence to management standards
27
Types of Control
General Control: Overall controls that establish a framework for controlling the design, security and use of computer programs Application Control: Specific control unique to each computerized application
28
General Control
Implementation Control: It is a review of development and implementation methodologies and adherence to the standards. This is mainly for software quality assurance. Software Control: Controls the various categories of software, versions of software, unauthorized access of software programs.
29
General Control
Hardware Control: Ensures physical security of the hardware, Preventive maintenance audit. etc Computer Operation Control: User control, System administrator procedures, network access rules etc
30
General Control
Data Security & Control: Backup control, system audit for password security, capability lists and data access permissions Administrative Control: Formalized standard rules, procedures and disciplines to ensure that organization,s control are properly executed
31
Application Control
Input Control: The procedure to check data for accuracy and completeness Validation Authorization Control totals Processing Control: The routines for establishing that data are complete and accurate during updating
32
Application Control
Capability Control: Measures to restrict the capability of a user to use the system Output Control: Measures that ensure that the results of a computer processing are accurate, complete and properly distributed
33
The disaster recovery plan is to make a plan and strategy so as to Control the damage Reconstruction of data and information in case a disaster occurs, as well as measures to be taken for prevention of disaster. In order to control the damages due to a disaster, a disaster recovery strategy must be formed beforehand
34
36
For organizations which are highly dependent on computerized system must have documented Disaster Recovery Plan The copies of plan document should be circulated to all concern people Once the plan is circulated, it should be ensured that all concern personnel is fully aware and understood their roles and there is no ambiguity Frequent review of the plan is also necessary Any change in the plan must be informed to all concern
37