Professional Documents
Culture Documents
Module IV E-Commerce (Sem II)
Module IV E-Commerce (Sem II)
4.1 E-Commerce-Concept
E-commerce - E-commerce or electronic commerce just like traditional commerce involves
buying and selling of goods and services but over internet.
The World Trade Organization defines e-commerce as, “E-commerce is the production,
distribution, marketing, sales or delivery of goods and services by electronic means”.
Electronic commerce or e-commerce refers to a wide range of online business activities for
products and services. It also pertains to "any form of business transaction in which the parties
interact electronically rather than by physical exchanges or direct physical contact. E-commerce
is usually associated with buying and selling over the Internet, or conducting any transaction
involving the transfer of ownership or rights to use goods or services through a computer-
mediated network. Though popular, this definition is not comprehensive enough to capture
recent developments in this new and revolutionary business phenomenon. A more complete
definition is E-commerce is the use of electronic communications and digital information
processing technology in business transactions to create, transform, and redefine relationships for
value creation between or among organizations, and between organizations and individuals
Functions:
The four functions of e-commerce are:
1) Communication Function: It is related with exchange of information or documents for
carrying out business transactions. E.g.E-mail Communication
2) Process management function: It includes computerization and improvement of business
processes. e.g. Connecting two computers in networking to share and transfer data instead of
manually copying information from one computer to another.
3) Service management function: This is related with applying technology to improve the
quality of service .E.g. Federal Express website. It allows customers to follow shipment and
schedule picks up 24 hours a day with a worldwide network automatically without taking the
help of service representative. Customer service is improved because of sites Transaction
Capabilities.
4) Transaction capabilities: it is a process effective and cheap for suppliers and customers. It
allows buying and selling on the internet or allows to carry out any online service E.g. Retail
website of Amazon.com and REI
Debit cards
Mediating services
Online Banking
Escrow Account
Online payment Instruments
Reward points
Account based: Payment modes connected with the bank account of the user:
Credit card- Credit cards are the most widely used technology based payment mode. It is
a plastic card with high security features as 3D secure/verified by VISA etc. The provider
allows customer to purchase goods and services on credit.
Debit card- The amount paid through this card is directly debited from the customer’s
account as soon as transaction is made.
Mediating services- Mediating service providers provide additional layer of security to
the customer. Debit/ credit card of the customer is registered with the service provider.
Payment made through this system provides additional security as account information is
not transmitted to the seller and payment is made through mediators. Example: Paypal.
Mobile/ App based- Account no. of the user is registered with the service provider and
payments are made using mobile phones. IMPS( Immediate payment service) is a service
launched in 2010 for quick transfer of money using mobile phones as payment device.
Other innovation in this line is mobile wallets like Paytm.
Online Banking- Online banking refers to banking operations, which is done over World
Wide Web.
Escrow Account- This is a relatively new concept where payment is withheld by the
intermediary before delivery of goods and afterwards released to the seller.
Reward points- The reward points are awarded on the loyalty of the buyer which can be
further redeemed to buy goods and services.
Electronic currency system:
Smart card- A card or similar instrument is used to purchase at POS (Point of sale). There
is no need to link such card with accounts and cards are generally prepaid, work on the
chip embedded in the card.
Cash on delivery and credit cards are the most popular payment methods in this sector.
A Website is a collection of related web pages on a web server maintained by any individual or
organization . A website is hosted on web server, accessible via internet or private LAN through
an internet address called URL(Uniform Resource Locator). All publicly accessible websites
collectively constitute the WWW(world wide web)
As a marketer one of the most important things is the company’s website. a company website is
the first time new visitors get introduced to the company and the brand. It’s used to educate
potential clients, to capture new visitors, and it’s used in sales. The ultimate goal of any website
is to convert visitors to marketing-qualified leads and ultimately into clients or customers.
Website designing has direct link to visual aspect of a website. Effective website design is
necessary to communicate ideas effectively.
Usability
Messaging Functionality
Principles
Simplicity of Website Accessibility
Design
Engaging Branding
Professional
E-marketing or online marketing can be executed and promoted by the following techniques and
methods. These are as follows:
Importance
Cyber security is important because government, military, corporate, financial, and medical
organizations collect, process, and store unprecedented amounts of data on computers and other
devices.
1. Sensitive data: A significant portion of that data can be sensitive information, whether that be
intellectual property, financial data, personal information, or other types of data for which
unauthorized access or exposure could have negative consequences.
2. Transportation and storage of data: Organizations transmit sensitive data across networks and
to other devices in the course of doing businesses, and cyber security describes the discipline
dedicated to protecting that information and the systems used to process or store it.
3. Volume of data: As the volume and sophistication of cyber attacks grow, companies and
organizations, especially those that are tasked with safeguarding information relating to national
security, health, or financial records, need to take steps to protect their sensitive business and
personnel information.
As early as March 2013, the nation’s top intelligence officials cautioned that cyber attacks and
digital spying are the top threat to national security, eclipsing even terrorism.
Challenges
For an effective cyber security, an organization needs to coordinate its efforts throughout its
entire information system.
Elements of cyber encompass all of the following:
Network security
Application security
Endpoint security
Data security
Identity management
Database and infrastructure security
Cloud security
Mobile security
Disaster recovery/business continuity planning
End-user education
1. Constantly- growing nature of security risks: The most difficult challenge in cyber security is
the ever-evolving nature of security risks themselves. Traditionally, organizations and the
government have focused most of their cyber security resources on perimeter security to protect
only their most crucial system components and defend against known treats.
2. New approaches to handle risks: Today the approach to handle risks are insufficient, as the
threats advance and change more quickly than organizations can keep up with. Advisory
organizations promote more proactive and adaptive approaches to cyber security. Similarly, the
National Institute of Standards and Technology (NIST) issued guidelines in its risk
assessment framework that recommend a shift toward continuous monitoring and real-time
assessments, a data-focused approach to security as opposed to the traditional perimeter-based
model.
3. A proactive management: A Top-down approach to cyber security in which corporate
management leads the charge in prioritizing cyber security management across all business
practices and ensures that company assets and the company’s reputation are protected.