Professional Documents
Culture Documents
EIS CH 4 - Charts
EIS CH 4 - Charts
EIS CH 4 - Charts
Refer Refer
4.87 & 4.88 E- Commerce 4.89
Architecture
Risks &
of Networked
Controls
System
Refer
Master Refer
4.88 Chart of 4.89
Ch 4
Guidlines &
Laws Governing Digital
E-commerce Payment
Computing
Technologies
E-Commerce
E-Commerce
1) Privacy & Security E-business Ways to protect risk Cyber Security Risk Types Advantages
2) Quality issues environment, controls 1) Educating Considerations A) New Methods 1) Easy and convenient
3) Delay in goods & Hidden are necessary for all participant about There could be cyber 1) UPI Apps 2) Pay or send money from
Costs persons in chain, nature of risks security risks with 2) Immediate Payment Service anywhere
4) Needs Access to internet & including 2) Communication of Direct as well as (IMPS) 3) Discounts from taxes
lack of personal touch organizational policies Indirect impact.
1) Users 3) Mobile Apps 4) Written record
to its customers • A Direct Financial
5) Security & credit card issues 2) Sellers / Buyers / Impact could be if 4) Mobile Wallets 5) Less Risk
6) Infrastructure Merchants 3) Ensure Compliance Application at 5) Aadhar Enabled Payment 6) Competitive advantage to
7) Problem of anonymity 3) Government with Industry Body Company’s Retailers Service(AEPS) business
8) Repudiation of contract 4) Network Service Standards
4) Protect your e- which contains 6) Unstructure Supplementary 7) Environment Friendly
Providers Commerce business financial information Service Data(USSD)
9) Lack of authenticity of
from intrusion- has weak passwords
transactions 5) Technology Service 7) Mobile Banking Drawbacks
• Viruses at all OSI layers
10) Data Loss or theft or Providers resulting in harming 8) Cryptocurrency 1) Difficult for a Non-technical
• Hackers •
duplication 6) Logistics Service integrity of data. person
Passwords •
11) Attack from hackers Providers Regular software • An Indirect B) Traditional Methods 2) The risk of data theft
12) Denial of Service 7) Payment Gateways updates Operational Impact i) Cards 3) Overspending
• Sensitive data could be if sensitive
13) Non-recognition of • Credit Cards 4) Disputed transactions
customer
electronic transactions • Debits Cards 5) Increased business costs
information
14) Lack of audit trails • Smart Card 6) The necessity of internet
15) Problem of piracy ii) Internet Banking access
E-COMMERCE, M-COMMERCE AND EMERGING TECHNOLOGY (Chart 4.90)
Computing Technologies
Cloud Computing
Cloud computing, means use of computing resources as a service through networks, typically Internet. It provides facility to access shared resources &
common infrastructure offering services on demand over network to perform operations that meet changing business needs
Computing Technologies
Computing Technologies
It refers to the technology that allows transmission of data via It is study & practice of BYOD refers to business policy that also known as
a computer without having to be connected to a fixed physical establishing/ using computers allows employees to use their Semantic Web,
link. Mobile data communication has become a very important & IT resources in a more preferred computing devices, like describes sites
& rapidly evolving technology as it allows users to transmit efficient & environmentally smart phones & laptops for business wherein
data from remote locations to other remote or fixed locations friendly & responsible way. purposes computers will be
generated raw
data on their own
Components Green Computing Best Advantages without direct user
1) Mobile Communication 3) Mobile Software Practices 1) Happy Employees interaction
2) Mobile Hardware 1) Develop a sustainable 2) Lower IT budgets
Limitations Green Computing plan 3) IT reduces support requirement
1) Insufficient Bandwidth 4) Transmission interferences 2) Recycle 4) Early adoption of new
Technologies Components
2) Security Standards 5) Potential health hazards 3) Make environmentally
3) Power consumption 6) Human interface with device sound purchase decisions 5) Increased employee efficiency 1) Semantic Web
4) Reduce Paper 2) Web Services
Consumption
Benefits Emerging BYOD Threats
1) Remote access to work order details 5) Conserve Energy 1) Network Risks
2) Update work order status in real-time, facilitating excellent Challenges 2) Device Risks
communication a) Evaluate the actual security 3) Application Risks
3) Access to corporate services & information at any time, from mechanisms in order to 4) Implementation Risks
anywhere assess their energy
consumption
4) Improve management effectiveness by enhancing
information quality b) Building new security
mechanisms by considering
5) Remote access to corporate knowledge base job location the energy costs from the
design phase.