You are on page 1of 6

Assignment 3 CAP312 Ecommerce and e-business

SUBMITTED BY: Rohin nagpal


Homework No: 3 Course Instructor: Sartaj sir Date of submission: 05\04\2011 Students Roll No. 30 Section No. : E3802

SUBMITTED TO: sartaj sir

Declaration: I declare that this assignment is my individual work. I have not copied from any other students work or from any other source except where due acknowledgment is made explicitly in the text, nor has any part been written for me by another person. Students Signature: Rohin Nagpal

PART A Q1 why there is a risk factor the BPR approach? Ans) Business Process Reengineering is the analysis and design of workflows and processes within an organization. A business process is a set of logically related tasks performed to achieve a defined business outcome. Re-engineering is the basis for many recent developments in management. Risks associated with BPR projects Process reengineering initiatives are undertaken with a view to achieving drastic improvements in the business process results. Cost reduction, time optimization, better service efficiency and increases in productivity are some of the major gains reported. However, there are serious risks in implementing business process re-engineering (BPR) projects. These risks are discussed below. 1) Financial risks BBR projects are undertaken with a view to getting high returns on investment. However, the efforts do not necessarily yield the desired results as the returns on investment are often intangible and not quantifiable. 2) Technical risks BPR projects are based on the use of Information Technology. However, it may so happen that the IT solutions oriented for process re-engineering are either not available or do not work to satisfaction. 3) General project risks The organization taking up process re-engineering projects may not have the competence to implement the solution it is seeking or the BPR team which is entrusted with the project may not perform to the desired level. 4) Functional risks Process re-engineering may need a reorganizational plan which may not be applicable to the kind of business in which the organization is engaged. 5) Political risks Very often, the BPR initiative loses the support and commitment of the top management either due to change in leadership or due to change in perception. The process re-engineering projects lose the budgetary or personnel support and are finally given up. There is also the dimension of acceptability by the end user and operational staff that may resist the change.

Q2 Frame out some legal issues for paper document vs. electronic document? Ans) some legal issues for paper document are: In traditional methods people used to send messages electronically by telegraphy. Some of these messages were agreements to terms that were intended as enforceable contracts. An early acceptance of the enforceability of telegraphic messages as electronic signatures came from the New Hampshire Supreme Court in 1869. In the 1980s, many companies and even some individuals began using fax machines for highpriority or time-sensitive delivery of documents. Although the original signature on the original document was on paper, the image of the signature and its transmission was electronic. Courts in various jurisdictions have decided that enforceable electronic signatures can include agreements made by email, entering a personal identification number (PIN) into a bank ATM, signing a credit or debit slip with a digital pen pad device (an application of graphics tablet technology) at a point of sale, installing software with a click wrap software license agreement on the package, and signing electronic documents online citation needed. The United Nations Commission on International Trade Law (UNCITRAL) describes the functions of the traditionally handwritten signature as follows: a signature is to identify a person, to provide certainty as to the personal involvement of that person in the act of signing, and to associate that person with the content of documents. Some of the legal issues in E-commerce are as follow: Electronic contracting: Traditionally, a contract comes into being if an offer is unequivocally accepted and a clear intent to create a legal relation exists. The contract, with all its provisions, is mutually agreed upon, usually by either signature or shake of hands. In ecommerce, both offer and acceptance can be communicated via electronic means. Electronic contracting raises many legal questions, including whether an electronic contract is legally binding and to what extent, or whether it can be used as evidence in the event of dispute. Electronic signature/Digital signature: Electronic signature or e-signature refers to any method to sign an electronic document. Examples are the name of the sender typed at the end of a document, a secret code, a PIN, an image of a handwritten signature, etc. A digital signature is a type of electronic signature that involves the use of public key cryptography or infrastructure (PKI), meaning that messages are encrypted with a specific key and can only be decrypted with a second specific key. Electronic Payment and security thereof: A key requirement for electronic commerce is the development of secure and efficient electronic payment systems. Electronic payment systems come in many forms including digital checks, debit cards, credit cards, and stored value cards (SVC). With new technologies, it is increasingly common that payment takes place using a transmission medium not under the control of the financial system. It therefore is necessary to take steps to ensure the security of the messages sent along such a medium.

Consumer protection: The success of e-commerce depends on the safe and attractive environment provided to consumers. Consumers personal information should be kept private and protected, payments should be secured, the choice of law and jurisdiction should be clear for the user. Cybercrime: The openness of the Internet, the lack of identification and the low level of users understanding of security give rise to cybercrimes. Cybercrimes can be described as criminal acts in which computers are a tool, a target or a place of criminal activity. In many countries, criminal law does not address cybercrimes. To meet the threat of electronic crimes, countries have to create a positive environment including laws, policies, technical standards, law enforcement and cybercrime reporting. International standards as well as international cooperation are necessary to address the global extent of cybercrime. Intellectual property: Trademarks Trademark issues are particularly relevant to domain names and cybersqatting disputes, but also arise in relation to logos or word combinations used in the design and content of a website. Trademarks are regulated by the Law on Trademarks (1992). In order to be protected in Russia, a trademark's must be registered with the Russian Patent Office. Domain Names: The Telecom Ministry is a state authority which controls and co-ordinates the issues of domain name registration in the .ru zone of internet. Domain names are registered on a first-come-first-serve basis. However, the recent amendments to the Law on Trademarks establish that unauthorized use of a trademark on internet, including the use of a trademark as a part of a domain name, constitutes a violation of the exclusive rights of the trademark owner. Copyright Copyright is an important issue for any company with a presence on the internet. Copying and reproducing website content is easy to do and difficult to prevent. Illegal copying, reproduction, and distribution of copyrighted works from the internet present an immediate challenge to legislators worldwide. Copyright claims are not yet as popular in Russia as they are in Western jurisdictions, although in one publicized copyright case last year a Russian bank was penalized for using a forged copy of Microsoft software. Copyright Protection Copyright is currently regulated by: - the Law On Copyright and Neighboring Rights (1993, as amended in 1995); - the Law On Protection of Rights in Software and Databases (1992)

Q3 Enumerate the technologies for authenticating electronic document. Ans) Electronic authentication provides a level of assurance as to whether someone or something is who or what it claims to be in a digital environment. Thus, electronic authentication plays a key role in the establishment of trust relationships for electronic

commerce, electronic government and many other social interactions. It is also an essential component of any strategy to protect information systems and networks, financial data, personal information and other assets from unauthorized access or identity theft. Electronic Signature Technologies: The Uniform Electronic Transactions Act (UETA) purposely allows for a wide range of signature technologies. It says, An electronic record or electronic signature is attributable to a person if it was the act of the person. The act of the person may be shown in any manner, including a showing of the efficacy of any security procedure applied to determine the person to which the electronic record or electronic signature was attributable. An example of this is the click through option used on many web sites. To order a product, be it a shareware application, an airline ticket, or a book, a web user has to click through a page or form that indicates approval of the vendors conditions for the sale. The system makes it impossible to transact any business without first establishing that agreement. In this instance, there is no signature or anything like it. Instead, the system is designed to make it necessary to move from A to C only through B, with B serving as the equivalent of a signature. Authentication is demonstrated by the documentation of the system and its procedures, not by a signed record of a specific, individual transaction.

PART-B Q4. Why management will be changed in ecommerce and E-business? Ans) management will be changed in e-commerce and e-business because there was a time stable requirements where seen as a pre-requisite for starting any project. There may be a few Civil Servants who still believe this but many in IT world have given up looking for the Holy Grail of stable requirements. Changing requirements have become an accepted fact of life for software developers; indeed, most of the process and methodology books now come with subtitles like Embracing change. The reason that requirements change is that we fail to capture them to start with. There are lots of opportunities for mistakes in the requirements capture phase and not all of them are because some people are better than others. At first we need to comprehend the requirements then we need to capture them and communicate them, usually this is done with a text document. Mistakes can arise at and point: comprehension, recording or communication. Other various reasons are: Key Challenges for change Gaining buy-in and budget Conflicts of ownership Coordination with different channels

Managing and integrating customer info. Achieving a unified reporting Structuring the specialist digital team In-sourcing vs. outsourcing online marketing Staff recruitment and retention

The 7S strategic framework


Strategy Structure System Staff

Style

Skills

Super ordinate

For the above reasons management needs to be changed in e-commerce and e-business Q5. Management is an art and science but why strategic alignment model will be used? Ans) Q6. Define the legal issues for internet commerce.

You might also like