Professional Documents
Culture Documents
UNIT-1
Introduction of electronic commerce
E-Commerce
E-commerce (electronic commerce) is the buying and selling
of goods and services, or the transmitting of funds or data, over an
electronic network, primarily the internet. These business transactions
occur either as business-to-business (B2B), business-to-consumer (B2C),
consumer-to-consumer or consumer-to-business.
Goals of E- commerce
2. Warehouse operations
Functions of e-commerce
• Registration
• Basket
• Payment
• Product management
• Orders management
• VAT and shipping costs
Registration
In order to make a purchase, users must register with the site,
providing all the information needed for shipping and billing.
The data will be stored on a database and will be available from the
back office.
Basket
Payment
The payment system is a mechanism that facilitates dialogue between
the parties involved in financial transactions: the bank, the store and
you with your credit card.
After filling in the order, the customer enters his/her credit card
number that travels along a channel solely accessible
to the bank. The bank checks the customer's account and decides
whether or not to authorize the payment.
The operation takes a few moments. If approved, the bank performs
the transaction and transfers the payment to the account. If denied
the user is notified that the transaction cannot be completed and his
order is cancelled.
Product management
Order management
The order is the card that summarises all the delivery
and order information to enable correct delivery. It includes:
List of products purchased
User information
Details of place of delivery
Delivery time information
Payment information
From the back office of the site you can search and sort orders by:
• Customer
• Order status
• Date
• Payment
Orders may be printed for attachment to the shipment (packing list).
Discounts
Discounts and promotions are managed for a single product or
product category.
This second phase of the site requires a detailed analysis of
your current storage and order management system which it will be
necessary to integrate.
Advantages of e-commerce.
Disadvantages OF E-Commerce
Scope of E- Commerce
2.Technology-enabled:
E-Commerce is about technology-enabled transactions.
Web browsers are perhaps the best Know of these technology-enabled
customer interfaces. However, other interfaces including automated
teller machines (ATM's) also fall in the general category of e-commerce.
Business once managed transactions with customers and markets strictly
through human interaction; In e-commerce, such transitions can be
managed using technology.
3.Customers retention:
E-Commerce enables organizations to get classified and
customized market information that helps in retaining customers through
fast order fulfillment and effective customers relationship
management (CRM). End-to-End supply chain management in e-commerce
provides the opportunity the overall flow of demand and supply and
results in fruitful customers retention.
Applications of e-commerce
Finance
Manufacturing
Online Auction
Online publishing
Entertainment
Education
Types of E-Commerce
E-commerce is used in various business fields; the
major categories of e-commerce are:
Business-to-Business (B2B)
B2B is e-commerce representing electronic
exchange of products, services and information between
businesses Some of the B2B e-commerce applications are product
and supply exchange websites, online directories, that feature an
option to search for particular products and services and thus
initiate payment transactions within.
Business-to-Consumer (B2C)
B2C is the retail part of e-commerce where
businesses sell products, services and information directly to its
customers online. Now the B2C market comprises all sorts of
consumer goods including many virtual stores and online shopping
platforms where Amazon or flipkart leading the markets with
domination and valuable customers.
Consumer-to-Consumer (C2C)
It is a type of e-commerce where consumers
could trade their products or services with each other online.
The transactions are carried out through third party online
platforms.
Business-to-Administration (B2A)
This kind of e-commerce platform enables online
payment transactions between companies and administration or
government bodies.Many government authorities depend on e
services or products directly or indirectly.
Consumer-to-Administration (C2A)
C2A e-commerce refers to transactions
conducted between individual customers and public
administration or government authorities. Unlike government
authorities, consumers make use of e-commerce and methods to
make transactions for various industries including educational,
health, retail industries.
Government to Government (G2G) -
Government to government (G2G) is the sharing of
data and/or information systems electronically between government
agencies, departments or organizations. The main aim of G2G is to favour
e-government initiatives by improving communication, data access and
data sharing.
Business to people(B2P)
A B2P strategy transcends the B2B/B2C distinctions
by placing the emphasis back on people — either individual consumers or
the several individuals that make up a B2B buying committee.
peer-to-peer (P2P)
Internet Security
computer monitoring
Privacy of internet
Internet privacy involves the right or mandate of
personal privacy concerning the storing, re-purposing, provision to third
parties, and displaying of information pertaining to oneself
via Internet.Internet privacy is a subset of data privacy. Privacy concerns
have been articulated from the beginnings of large-scale computer
sharing and especially relate to mass surveillance enabled by the
emergence of computer technologies.
Privacy can entail either personally identifiable information (PII) or non-
PII information such as a site visitor's behavior on a website. PII refers
to any information that can be used to identify an individual. For example,
age and physical address alone could identify who an individual is without
explicitly disclosing their name, as these two factors are unique enough to
identify a specific person typically. Other forms of PII may soon
include GPS tracking data used by apps , as the daily commute and routine
information can be enough to identify an individual.
Computer crime
Computer crime law deals with the broad range of criminal offenses
committed using a computer or similar electronic device. Nearly all of
these crimes are perpetrated online. The internet provides a degree of
anonymity to offenders, as well as potential access to personal, business,
and government data. Many computer crimes are committed as a means of
stealing money or valuable information, although financial gain is not
always the objective. In fact, some of the most notorious incidents of
computer crime involved hackers seeking "bragging rights" by overcoming
government or corporate cyber security measures.
Laws concerning computer crimes have been enacted at the state and
federal levels. In 1986, Congress passed the Computer Fraud and Abuse
Act (CFAA). This law has been amended and expanded as internet
technology has advanced, and it continues to form the basis for federal
prosecutions of computer-related criminal activities. Other relevant
federal statutes include the Electronic Communications Privacy Act
(ECPA), the Identity Theft Enforcement and Restitution Act of 2008
(ITERA), and certain provisions of the USA PATRIOT Act.
Not only software can be pirated but also music, movies, or pictures.
4. Social Media Frauds
The use of social media fake accounts to perform any kind of harmful
activities like impersonating other users or sending intimidating or
threatening messages. And one of the easiest and most common social
media frauds is Email spam.
5. Online Drug Trafficking
With the big rise of cryptocurrency technology, it became easy to
transfer money in a secured private way and complete drug deals without
drawing the attention of law enforcement. This led to a rise in drug
marketing on the internet.
Illegal drugs such as cocaine, heroin, or marijuana are commonly sold and
traded online, especially on what is known as the "Dark Web".
6. Electronic Money Laundering
Also known as transaction laundering. It is based on unknown companies or
online business that makes approvable payment methods and credit card
transactions but with incomplete or inconsistent payment information for
buying unknown products.
It is by far one of the most common and easy money laundering methods.
8. Cyber Extortion
Cyber extortion is the demand for money by cybercriminals to give back
some important data they've stolen or stop doing malicious activities such
as denial of service attacks.
9. Intellectual-property Infringements
It is the violation or breach of any protected intellectual-property rights
such as copyrights and industrial design.
9. Online Recruitment Fraud
One of the less common cybercrimes that are also growing to become
more popular is the fake job opportunities released by fake companies for
the purpose of obtaining a financial benefit from applicants or even
making use of their personal data.
Threats
Malware
Malware is usually installed into the system when the user opens a
malicious link or email. Once installed, malware can block access to critical
components of your network, damage your system, and export
confidential information to destinations unknown.
Attack on computers
Hacking
Who is a Hacker?
A Hacker is a person who finds and exploits the weakness in computer
systems and/or networks to gain access. Hackers are usually skilled
computer programmers with knowledge of computer security.
Types of Hackers
A computer virus is a program which can harm our device and files and
infect them for no further use. When a virus program is executed, it
replicates itself by modifying other computer programs and instead
enters its own coding. This code infects a file or program and if it
spreads massively, it may ultimately result in crashing of the device.
Viruses can be spread several ways, including via networks, discs, email
attachments or external storage devices like USB sticks. Since
connections between devices were once far more limited than today, early
computer viruses were commonly spread through infected floppy disks.
Viruses problem
When you arm yourself with information and resources, you’re wiser
about computer security threats and less vulnerable to threat tactics.
Take these steps to safeguard your PC with the best computer virus
protection:
Encryption
Encryption is a way of scrambling data so that only authorized
parties can understand the information. In technical terms, it is the
process of converting human-readable plaintext to incomprehensible text,
also known as ciphertext. In simpler terms, encryption takes readable
data and alters it so that it appears random. Encryption requires the use
of a cryptographic key: a set of mathematical values that both the sender
and the recipient of an encrypted message agree on.
Decryption
DES
RSA
Authentication Authorization
Firewalls
Network security
Computer Security
The business models which deal with the customers on the internet and
allow them to buy and sell things over the same require a stringent
security service. Since millions of people are involved in daily transactions
on the e-commerce website, it becomes extremely crucial for the
administrators to ensure safe transactions. If the Firewall security on
the e-commerce website is not healthy, hackers may find their way inside
the servers which may lead to loss of data, capital, and trust.
Digital signature
Email Security
Email security is a term for describing different procedures and
techniques for protecting email accounts, content, and communication
against unauthorized access, loss or compromise. Email is often used to
spread malware, spam and phishing attacks. Attackers use deceptive
messages to entice recipients to part with sensitive information, open
attachments or click on hyperlinks that install malware on the victim’s
device. Email is also a common entry point for attackers looking to gain a
foothold in an enterprise network and obtain valuable company data.
Email encryption involves encrypting, or disguising, the content of email
messages to protect potentially sensitive information from being read by
anyone other than intended recipients. Email encryption often includes
authentication.