You are on page 1of 8

E-commerce

E-commerce (electronic commerce) is the buying and selling of goods and services, or the
transmitting of funds or data, over an electronic network, primarily the internet. These
business transactions occur either as business-to-business (B2B), business-to-consumer
(B2C), consumer-to-consumer or consumer-to-business.

Advantages of Ecommerce
 Faster buying/selling procedure, as well as easy to find products.
 Buying/selling 24/7.
 More reach to customers, there is no theoretical geographic limitations.
 Low operational costs and better quality of services.
 No need of physical company set-ups.
 Easy to start and manage a business.
 Customers can easily select products from different providers without moving around
physically.

Disadvantages of Ecommerce
 Any one, good or bad, can easily start a business. And there are many bad sites which
eat up customers’ money.
 There is no guarantee of product quality.
 Mechanical failures can cause unpredictable effects on the total processes.
 As there is minimum chance of direct customer to company interactions, customer
loyalty is always on a check.
 There are many hackers who look for opportunities, and thus an ecommerce site,
service, payment gateways, all are always prone to attack.

Cybercrime
Cybercrime, or computer-oriented crime, is a crime that involves a computer and a
network.[1] The computer may have been used in the commission of a crime, or it may be the
target.[2] Cybercrimes can be defined as: "Offences that are committed against individuals or
groups of individuals with a criminal motive to intentionally harm the reputation of the victim
or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern
telecommunication networks such as Internet (networks including chat rooms, emails, notice
boards and groups) and mobile phones (Bluetooth/SMS/MMS)".[3] Cybercrime may threaten
a person or a nation's security and financial health.[4] Issues surrounding these types of crimes
have become high-profile, particularly those surrounding hacking, copyright infringement,
unwarranted mass-surveillance, sextortion, child pornography, and child grooming.

Total Cost of Ownership


TCO is an estimate of the total cost to own a car for a five year period. It includes all the
expenses spent on fuel, insurance, maintenance, repairs, service, interest on loan payments as
well as the losses incurred due to depreciation of the car at the end of the same period.
Internet Marketing

Meaning:
Internet marketing, also referred to as web marketing, online marketing, or e-marketing, is
the marketing of products or services over the Internet. The Internet has brought media to
global audience. The interactive nature of the Internet marketing in terms of providing instant
responses and eliciting responses is the unique quality of the medium.

Internet marketing is sometimes considered to be broad in scope because it not only refers to
marketing on the Internet but also includes marketing done via e-mail and wireless media.
The management of digital customer data and electronic customer relationship management
systems are also often grouped together under the Internet marketing.

Internet marketing ties together creative and technical aspects of the Internet, including
design, development, advertising and sales.

Components of Internet Marketing:

Internet marketing evolves in a fast-phase manner. It is dynamic and requires every online
business and marketers to keep updated with the changes in the system. There are two
components of Internet marketing:

1. B-to-B (B2B):

It refers to business to business e-commerce, where business firms sell their products and
services to other business firms using the Internet.

2. B-to-C (B2C):

It refers to business to consumers, where business firms sell their products and services to the
consumers using the Internet.

hreat to E-Commerce
E-Commerce refers to the activity of buying and selling things over the internet. Simply, it
refers to the commercial transactions which are conducted online. E-commerce can be drawn
on many technologies such as mobile commerce, Internet marketing, online transaction
processing, electronic funds transfer, supply chain management, electronic data interchange
(EDI), inventory management systems, and automated data collection systems.

E-commerce threat is occurring by using the internet for unfair means with the intention of
stealing, fraud and security breach. There are various types of e-commerce threats. Some are
accidental, some are purposeful, and some of them are due to human error. The most
common security threats are an electronic payments system, e-cash, data misuse, credit/debit
card frauds, etc.
LAN ( Large Area Network) - in LAN two or more computers and peripheral devices are
connected with small areas such as room office building our campus. in LAN computer
terminals are physically connected with wires the data transmission speed is slow as
compared to WAN ..

MAN ( Metropolitan Area Network)- MAN is a larger network then LAN it is spread across
the city since it covers the city it is called Metropolitan the most common example of MAN
type network is cable television branches of local bank in a city etc.

WAN ( wide Area Network)- this kind of network connect two or more computers located at
a far away places. they are linked by communication facilities like telecommunication or
satellite signals the most common example of WAN type network is telecom system. The
usage of WAN is limited to very large organisations and government Agencies. The main
characteristic of WAN is that it requires a public telecommunication media to transfer data.

PAN - this network is used to provide connectivity to the devices like printers, scanners ,cell
phones, tablets extra belonging to an individual the coverage area of this network it's very
small and its range of just 5to10 m away.

Electronic money
Electronic money refers to money that exists in banking computer systems that may be used
to facilitate electronic transactions. Although its value is backed by fiat currency and may,
therefore, be exchanged into a physical, tangible form, electronic money is primarily used for
electronic transactions due to the sheer convenience of this methodology.

Domain Name
An Internet service that translates domain names into IP addresses. Because domain names
are alphabetic, they're easier to remember. The Internet however, is really based on IP
addresses. Every time you use a domain name, therefore, a DNS service must translate the
name into the corresponding IP address. For example, the domain name www.example.com
might translate to 198.105.232.4.

The DNS system is, in fact, its own network. If one DNS server doesn't know how to
translate a particular domain name, it asks another one, and so on, until the correct IP address
is returned

Shopping Bot mean


A shopping bot is an online price comparison software tool which automatically searches the
products of many different online stores to locate the most affordable rates for customers.
Generally, these shopping bots rank items by price and let buyers link directly to the website of an
online merchant site to actually buy their preferred product.

Shopping bots, short for "shopping robots," can find the best online deals for products, including
films, books, video games, computer devices, TVs, etc. Using shopping bots, buyers can get quotes
from multiple retailers for the same product instantly, without spending extra time searching for
each retailer's price.

Some popular shopping bots are:

 mySimon: This is the most popular shopping bot, with top ratings from reviewers. It
queries 1,700 plus merchants in various categories.

 DealPilot: This is a browser-based bot, which presents price comparison on bars


toward the bottom of a browser. It performs the online search and reports back with
the details on where the customer can get the best deal, in addition to information on
availability and shipping.

 iChoose: This one sends an advisor along with the customers (it is a free download) as
they browse and shop through their preferred sites. When the customers find a
preferred item, it informs them if there is a better deal to select from, along with info
on the pricing, shipping as well as taxes.

 Shoppinglist.com: This site provides the customers with the latest information on
sales and special offers at the brick-and-mortar stores near their location.

 StoreRunner.com: This site helps customers find services and products form 1,000-
plus brands. Then, it is up to the customers to decide whether they need to buy online
or make use of the Shop Local feature to locate the best rates in the neighborhood.

UNIQUE FEATURES OF E-COMMERCE TECHNOLOGY

1. Ubiquity - E-commerce technology is available everywhere. A unique feature of e-


commerce technology. Example is if the user is at outstation, he also can through
www.acer.com get the information of the product.
2. Global Reach - The total number of users or customers an e-commerce business can
obtain. Example is www.acer.com is whole world also can browse it. Because the website
have supplied many language to let different language users understand it.

3. Universal Standards - Standards that are shared by all nations around the world. Example
is when you see the price of product in the website, that price is very fairly and standards.

4. Richness - Video, audio and text messages are possible. Example is the richness is can
make the websites become attract people to browse.

5. Interactivity - Technology that allows for two way communication between merchant and
consumer. Example is in the website we can contract the merchants, that have many way can
contract like: phone, e-mail, video call, and etc.

6. Information Density - The total amount and quality of information available to all market
participants. Example is we can get the clearly information in the websites.

7. Personalization/Customization - It allows personalized messages to be delivered to


individuals. Example of personalization is if have a new product, the website will send the
email flyer to the customer. Example of customization is customer can customize something
in the product like name, pattern, colors, and etc.

Encryption
Encryption is the process of converting normal text (data) into “Cipher text.” Once
completed, this makes it impossible for someone to read or interpret the original data until it
is decrypted back into its original state. This allows the exchange of data between companies
and even individual-to-company without the risk of someone “in the middle” intercepting this
data and using it in a harmful or illegal way. Once the data is encrypted, only the person who
originally encrypted the data or the recipient who has been provided the decryption key will
be able to decrypt and read the data.

These days, we often hear about hackers stealing data from large-scale companies, banks and
retailers, which presents a possible threat to those databases where the data is stored. The
good news is that most (if not all) of these established websites’ online transactions have the
data stored in encryption. It takes a very significant effort and very expensive technology to
decrypt this stolen data in an effort to keep your information secure.

Using Encryption Technology in E-Commerce


As our use of e-commerce continues to soar, the need for encryption of customer data (as
well as inventories, company financial information, etc.) increases as well. When you sign up
on a website for a membership, club, or even just for their weekly newsletter, your personal
information is stored. Once you start to purchase products or services from that retailer or
service company, those transactions are stored in your “history” for a record of your activity
with that company.

If you think about it, you now have a majority of your personal information tied to your
purchase history, including credit card information and more. If it weren’t for encryption, if a
hacker were to breach the initial security of these websites, they would have access to all of
your information.

To try and prevent this from happening, companies have teams within their organization that
not only are responsible for encrypting the data to keep it secure, but are also constantly
reviewing new technologies to support an even stronger encryption and data security
solution.

It is a continuing fight and commitment to increased vigilance that keeps these experts steps
ahead of hackers and thieves to keep your data safe. Here at Unleaded Group, we are
committed to keeping our clients and their customers safe with the latest encryption
technologies. If you own an ecommerce platform and are not sure if its security, call us today
to schedule an appointment with one of our consultants at 720-221-7126.

Internet
Though used on a daily basis by people all around the world, a thorough understanding of
what the internet is lacking for most of its users. The internet can best be seen as a
community of computers that are allowed to connect to each other, and any computer on the
internet can connect any other computer at any time it wishes. Through infrastructure that
spans the globe, there is one single, unified internet that all computers connect to, allowing
anyone connected to share and access all the information that they choose to. While humans
are often using computers in the traditional sense (with a mouse, keyboard, and monitor),
many of the other ‘computers' we connect to are most often servers, which act as holding
stations that store all the data that is being accessed.

Extranet
Internet and an intranet are not always separate and clear cut, and anything that is a blend of
the two is considered an extranet. An extranet is a private intranet (or local network) that is
connected to the Internet, but only allows access to certain information or access by certain
groups of people. The extranet is a blend of the secrecy and control allowed to an intranet,
but also the convenience and sheer amount of information enjoyed by using the internet.

Electronic Funds Transfer (EFT)


Electronic Funds Transfer (EFT) is a system of transferring money from one bank account
directly to another without any paper money changing hands. One of the most widely-used
EFT programs is direct deposit, through which payroll is deposited straight into an
employee's bank account. However, EFT refers to any transfer of funds initiated through an
electronic terminal, including credit card, ATM, Fedwire and point-of-sale (POS)
transactions. It is used for both credit transfers, such as payroll payments, and for debit
transfers, such as mortgage payments.

Online Stocking
Stocking is an internet meme that involves taking a photo that mimics a stock photo and
posting the two side-by-side online. As with many Internet memes, the photos are often
promoted through social media.
Electronic data interchange
Electronic data interchange (EDI) is the electronic transmission of structured data by agreed
message standards from one computer system to another without human intervention. It is a
system for exchanging business documents with external entities.

EDI refers to a family of standards and does not specify transmission methods, which are
freely agreed upon by the trading partners.

The wide adoption of EDI in the business world facilitates efficiency and cost reduction. EDI
is used in such diverse business-to-business relationships as:

 Interchanges between health care providers and insurers


 Travel and hotel bookings
 Education
 Supply chain management
 Administration
 Tax reporting

Computer-to-Computer

 EDI replaces manual B2B communications, such as postal mail, fax and email.
 Documents flow directly from the sender's computer application (e.g. a logistics system) to
the receiver's computer application (e.g., an order management system).

Traditional Manual Process

Automated EDI Process

Business Documents

 1000s of standard business transaction documents can be sent automatically using EDI.
 Some common examples include: purchase orders, invoices, shipping statuses, customs
information, inventory documents and payment confirmations.
Standard EDI Format
 EDI documents are processed by computers and use standard, computer-friendly formats.
 Standards describe each piece of data and its format (e.g., type of document, parties
involved, actions to take, mmddyy).
 Standards eliminate company-to-company variations, allowing each business partner's
computer system to speak a common language.
 There are a variety of EDI standards for various industries, regions and use cases - each with
different versions, so EDI partners must use the same standard and version
 Popular standards include: ANSI X12 in the U.S., UN/EDIFACT globally and industry-specific
standards, such as HIPAA

e- cycle

A term used to describe the practice of recycling computers, computer components and other
electronics through reusing or donating them until the end of their lifecycle. E-cycling encourages
people to reduce, reuse and recycle rather than dispose of these items prematurely when upgrading
to newer products. At the end of the electronics' life, people are then encouraged to dispose of the
item at an electronics recycler to keep the electronics out of landfills and reduce the amount of
electronic waste. May also be written as eCycle or ecycle.

You might also like