Professional Documents
Culture Documents
• Business-to-Business(B2B)
• Business-to-Consumer(B2C)
• Consumer-to-Consumer(C2C)
• Business-to-Government(B2G)
• Government-to-Business(G2B)
• Government-to-Citizen(G2C)
Business Models of E-Commerce:
Business-to-Business(B2B)
B2B is a marketing type of business wherein
businesses provide products or services to other
businesses for the production of goods, business
operations, or reselling of products.
Business Models of E-Commerce:
Business-to-Consumer(B2C)
B2C is the type of commercial transaction in which
businesses sell products or services directly to
consumers.
Business Models of E-Commerce:
Consumer-to-Consumer(C2C)
C2C is used similarly as the classified advertising
section of a local newspaper or an auction page.
Business Models of E-Commerce:
Business-to-Government(B2G)
B2G is a business model that refers to a business that
sells products, services, or information to governments
and/or government agencies.
Business Models of E-Commerce:
Government-to-Business(G2B)
This business model refers to government agencies
that provide services or information to a business
organization.
Business Models of E-Commerce:
Government-to-Citizen(G2C)
This model is being used by the government to
approach and communicate with citizens in general.
Threats of E-Commerce
• Servers containing important files and customer information
being stolen.
• Impostors duplicating e-commerce sites to steal customers’
money.
• Hackers attempting to steal customer information or mess
up the site.
• Authorized users with hidden motives attacking e-commerce
systems and/or selling information to competitors.
E-Commerce Security Systems
1. Auditability - data should be documented in such a way that it can be
audited for the real requirements.
2. Authenticity - there should be procedures to authenticate a user before
giving him/her access to the required information.
3. Availability - it is a requirement that information must be available
anytime and anywhere, and it must be bound by a time limit.
4. Confidentiality - information should be kept and not be accessible by an
unauthorized user. It should not be interrupted during the transmission.
E-Commerce Security Systems
5. Encryption - information must be secured through the encryption and
decryption of an authorized user.
6. Integrity - information must not be modified during its transmission over
a network. Honesty and strong moral principles must be applied.
7. Non-reputation - there should be assurance that someone cannot rebuff
on something. It is to certify that a person involved in the contract or in
communication cannot refute the authenticity of their signature on a
document.
Basics of M-Commerce
Interface is more complicated, and more It promotes easy use because all the functions are
functions are available simplified.