Professional Documents
Culture Documents
AIS Chapter 12
AIS Chapter 12
INTERNET COMMERCE
Internet commerce, also known as e-commerce or electronic commerce, refers to the
buying and selling of goods and services over the internet. E-commerce involves the transfer of
money and data to complete the sales. It can be conducted via a desktop computer, laptop,
smartphone, or tablet.
Internet technologies
Internet technologies in internet commerce refer to the various tools, protocols, and
systems used to facilitate online business transactions. Some key types of internet technologies in
internet commerce include.
1. Packet switching
2. Virtual Private Networks
3. World Wide Web
Packet switching
Packet switching is a way of sending information over a network by dividing it into small
pieces called packets. Each packet contains a part of the data, like a message or a file. These
packets are then sent separately and can take different paths to reach their destination) (زنملکتانچنہپ.
Virtual private Networks
A Virtual Private Network (VPN) is a secure connection that allows you to access the
internet privately by creating a private network from a public internet connection.
Internet Address
The Internet uses three types of addresses for communications:
1. Email address
2. URL address
3. IP address
Email Address
An email address is a unique identifier used for sending and receiving electronic mail (email)
messages. It consists of two parts: a username and a domain name, separated by the "@" symbol.
For example, johnsmith@example.com is an email address where "johnsmith" is the username
and "example.com" is the domain name.
URL address
A URL (Uniform Resource Locator) is the web address used to access a specific resource on
the internet. It consists of the protocol, domain name, and additional path) (راہتسor parameters.
Example: https://www.example.com/website/page.html
IP Address
An IP (Internet Protocol) address is a unique numerical label assigned to each device connected to a
network. It identifies and locates devices on the internet. Example: 192.168.0.1
Definition of protocol
Protocols are a set of rules or guidelines that define how data is transmitted and communicated
over a network, ensuring smooth and standardized communication between devices.
Security Protocols
A security protocol is a set of rules and procedures designed to ensure the secure transmission and
protection of data over a network. It establishes measures for authentication, encryption, access control,
and other security mechanisms to safeguard information from unauthorized access and threats.
IP spoofing
Denial of service attack
Operational Disruption
Legal and Compliance Issues
Supply Chain Disruptions
SECURITY, ASSURANCE AND TRUST IN INTERNET/ E COMMERCE
Security, Assurance, and Trust are critical aspects of e-commerce that play a crucial role in building
a successful online business and ensuring customer confidence. Let's delve into each of these elements:
i. Protecting Your Information: Ensuring your personal data is safe and secure.
ii. Secure Online Payments: Trustworthy payment methods for worry-free transactions.
iii. Verified Websites: Identifying genuine and reliable e-commerce platforms.
iv. Customer Reviews: Real feedback from other shoppers to guide your decisions.
v. Easy Returns and Refunds: Hassle-free processes for customer satisfaction.
vi. Privacy Policy: Clear explanations of how your data is handled and protected.
vii. Trusted Seals and Badges: Recognizable symbols of credibility and security.
viii. Helpful Customer Support: Assistance whenever you need it.
ix. Safe Browsing: Protecting against scams and fraudulent websites.
x. Transparency in Product Information: Honest and accurate descriptions of products and services.
xi. SSL Encryption: Keeping your online interactions confidential and secure.
Responsibility and authority: Responsibility and authority mean being accountable for tasks and having
the power to make decisions and take actions to fulfill those tasks.
Span of control:
Span of control refers to the number of
subordinates or employees that a manager or
supervisor can effectively and directly oversee
and manage.
Management by exception:
Management by exception is a
management approach where leaders focus on
addressing and intervening only when
significant deviations or problems occur, rather than involving themselves in routine operations.
MANAGEMENT FUNCTIONS, LEVEL AND DECISION TYPES
The management functions of planning and control have a profound effect on the MRS. The
planning function is concerned with making decisions about the future activities of the organization.
Planning and control decisions are frequently classified
into four categories:
i. Strategic planning decision
ii. Tactical planning decision
iii. Managerial control decision
iv. Operational control decisions
Report Attributes
Effective management report attributes are characteristics that make a report valuable and useful
for managers. A report must possess the following attributes:
i. Relevance: Each element of information in a report must support the manager’s decision.
ii. Summarization: Reports should be summarized according to the level of the manager within
the organizational hierarchy.
iii. Exception Orientation: Control reports should identify activities that are at risk of going out of
control and should ignore activities that are under control.
iv. Accuracy: Information in reports must be free of material errors. A material error will cause the
user to make the wrong decision (or fail to make a required decision).
v. Completeness: Information must be as complete as possible.
vi. Timeliness: If managers always had time on their side, they may never make bad decisions.
vii. Conciseness: Information in the report should be presented as concisely as possible.