Professional Documents
Culture Documents
Chapter - 5 Material With MCQ Only For Board Leval Most Imp
Chapter - 5 Material With MCQ Only For Board Leval Most Imp
Introduction :
Mobile Commerce is also known as M-commerce.
It refers to buying and selling of goods or services through the use of Internet enabled
wireless devices such as a mobile phone, PDA’s (Personal Digital Assistants), Smartphone,
Tablet, Palmtop or any other mobile devices.
M-commerce provides the user with the advantage of flexibility and ubiquity.
By using the mobile phone, customers can conduct business transactions without being
fixed at a computer terminal or being physically present at the shop.
These devices are carried by the user wherever he/she goes, making it possible to access
the Internet from any place.
It allows real time transaction while on the move. As the popularity of smart phone’s and
tablets is increasing day by day, more users are moving towards the use of M-commerce.
Some of the examples of M-commerce are:
Benefits of M-commerce :
The ease of availability and faster speed has made M-commerce more popular now-a-days.
The web design and development companies have also optimized the websites, such that it
can be viewed correctly on mobile device.
M-commerce is the integration of wireless networks accessed through handheld devices and
Internet.
The benefits of Internet and E-commerce are offered by M-commerce also.
Some of the Advantages of M-commerce are:
It provides convenience to the user. In just a few clicks on the mobile device, the user can
do shopping, banking and download media files while on the move.
Mobile device enables the user to be contacted at virtually anytime and anywhere.
Reduces transaction cost.
Reduces the time to order. The user does not need to be on the PC or laptop to order.
Streamline business processes.
Provide Global reach.
Conduct business 24x7.
Flexibility of accessing the information through any one mobile devises.
Payment can be done using the mobile devices itself just the same way as we do it on
personal computer.
Useful to deliver time critical and emergency information.
1
Easily identifies the physical location of the handheld devices.
Customized alerts can be easily received on the mobile devices.
Instant connectivity and availability of faster 3G services has made M-commerce more
popular these days.
Timely information can reach the user.
Limitations of M-commerce :
The handheld devices commonly used today offer a limited screen size. This further limits
the types of files and data transfer. At time it is difficult to display videos.
User interface is less convenient when compared to personal computer.
Mobile Devices have limited computing power, memory and storage capacity.
It operates over wireless networks which are less secured as compare to wired network.
It offers a limited bandwidth.
High cost of establishing mobile and wireless broadband infrastructure.
Application of M-commerce :
4
If the GPS signal is poor, weak or blocked, the mobile device can use the signals from cell
tower and Wi-Fi hot spots.
These signals do not broadcast their own locations but Smartphone companies use
database that stores the locations of these sources.
Another example of location based services is where one can use maps to find the path to
the destination.
The current location is indicated using blue color pointer.
Location based services offers convenience and opportunity to provide services that are
more quick or precise and can meet a customer’s needs.
Examples of location-based applications are:
1) Information or directory services : dynamic yellow pages automatically inform the users
about the nearest restaurants, parking facility, traffic updates.
2) Tracking services: locating friends in a geographic location, tracking stolen cars, tracking of
children by parents.
3) Emergency services: emergency medical ambulance, search and rescue mission, roadside
assistance, police and fire response.
4) Advertising promotion: targeted ads, promotional message, customer identification in a
store.
5) Mapping: Creating maps of specific geographical location.
6) Navigation: plotting route from one place to another.
5
Also, these are possibilities that order information might be changed in between.
If the customer has ordered 10 items, and somehow the merchant receives order of 100
items, he would ask us to pay for 100 items.
An intruder can steal or temper information anywhere in the world wide sitting on his
computer.
He can create new programs and run them on remote computers causing it to malfunction or
break down in worst cases while hiding his identity.
E-commerce / M-commerce sites have to keep their online data such as customer’s
personal details, their bank details and many more safe.
They have to be aware of all the frauds that are taking place now-a-days.
As E-commerce deals with payments such as online banking, electronic transactions, using
debit cards, credit cards and many others; the E-commerce/M-commerce websites have
more security issues.
They are at more risk of being targeted than other normal websites. Thus, it becomes very
important to secure the data on Internet.
The E-commerce / M-commerce security must meet four important aspects as mentioned
below:
(1) Confidentiality:
It refers to the secrecy of the information so that unauthorized user cannot read it.
It is achieved by using cryptography in which all the messages transmitted are encrypted
and only the receiver can read it after decrypting the message using appropriate key.
This protects the data from private attacks and ensures that the message is not revealed or
leaked to anyone as it travels to the destination.
It helps in protecting the confidential data like credit card number.
(2) Integrity:
It ensures that the information must not be accidentally or maliciously altered or tempered in
transit.
The receiver should receive the same message as was sent by the sender.
If the message is altered in between the transition, it should be detected.
This removes the problem of modifying the order quantity in between and later creating the
payment problems.
(3) Authorization:
It ensures that only authentic users are allowed to use the system.
The login and password is one of the ways to achieve authentication.
(4) Non-repudiation:
It ensures that the sender of the message cannot deny that he/she has sent the message.
6
It prevents sender or receiver from denying a transmitted message when in fact they did
send it.
For example, if the customer denies of sending a purchase order for any reason, then it can
be proved that the customer has send the message.
It is usually accomplished via digital signatures or a Trusted Third Party (TTP).
7
(5) Spoofing:
Spoofing or masquerading is pretending to be someone you are not, or representing a
website as authentic when it is actually a fake.
It is a technique where the attacker tries to assume the identity of another person or system
for transacting with victim site.
For Example, an attacker can create a fake website as www.gswan.co.in and substitute his
IP address for the real IP address. All the user’s visiting to the real site will then be
redirected to the fake website.
Security measures :
1) Antivirus software
Antivirus software is a computer program that detects, prevents and takes action to remove
the malicious codes like viruses, worms and Trojan horses from the infected system.
To protect your computer you need good antivirus software.
A system without antivirus software can easily be targeted by malicious code within a short
span of time on Internet.
The problems and damage that are caused by an infection can be extremely varied.
The infection may be simple as causing strange noises, pop-ups and other annoying things
on the system.
It may delete the files and slow down system or also can damage the hardware or destroy
the entire computer system.
Once a system is infected by virus, it will spread by attaching to other programs and files
within the system.
Viruses not only replicates itself within the system but can also spread to other systems by
taking control of the users email and sending out copies of itself to those in the users cannot
contacts list.
The most common way a system is attacked is through infected attachments to email.
This attachment can be in the form of pictures, videos, sound clips or any other type of file
that can be attached to an email.
Infections can also be spread through Internet downloads.
Today, we have antivirus software for mobile devices also due to prevalent use of internet
on these devices.
You can find a large range of antivirus software in the market.
Antivirus software is a critical to be installed and kept updated regularly on the computer.
2) Firewall
The most commonly used network protection barrier between the company’s network and
the outside world is Firewall.
8
Firewall is a devices placed between the network and the internet to monitor and control the
traffic between the network and the Internet to monitor and control the traffic between the
company’s local network and outside world.
The primary goal of firewall is to keep intruders away from the company’s E-commerce
infrastructure.
A firewall protects the local network against the following:
1) Email services that sometimes create problems.
2) Undesirable material like photos, videos entering into local network.
3) Unauthorized persons gaining access to local area
4) Unauthorized data or information leaving the company’s network.
5) Blocks the traffic from outside world to the local network.
6) Protects from any type of network attack.
3) Digital Certificate
Digital Certificates or Digital ID are used for proving our identity in electronic transaction.
Just as we have a driving license or a passport to prove our identity in the real world.
With a digital certificate, we can assure the business organizations, online service and
friends that the electronic information they receive from us are authentic.
Digital certificate is issued by a trusted third party to establish the identity of the holder.
The third party who issues certificate is known as a Certification Authority (CA).
Digital Certificate contains the holder’s name, a serial number, expiration dates, a copy of
the certificate holder’s public key which is used for encrypting messages and digital
signature of the certificate authority so that a receiver can verify that the certificate is real.
4) Cryptography
Cryptography is an art of protecting the information by transforming it into an unreadable
form.
Encryption is the transformation of normal text known as “plain text” into unreadable or
secret text known as “cipher text” using encryption algorithm.
A secret key is used to encrypt and decrypt a message.
It does not hide the text but converts it into other text that does not make any meaning.
Its purpose is to ensure privacy by keeping the information hidden from anyone on the
Internet except the receiver of the message.
Messages are encrypted just before they are sent on the Internet or network.
When the encrypted message is received by the receiver, it needs to be decrypted.
Description is the reverse of encryption. It is the transformation of encrypted text back into
normal text.
There are number of algorithms available in the market today.
9
Example:
13
Charge cards :
A charge card is another form of payment mechanism wherein the customer can pay
through the card to the vendor.
As compared to credit cards that have a credit limit, the charge card does not carry any
spending limit.
(I) Net Banking
Another option which is becoming more popular is net banking or online banking.
It does not involve any type of card.
It can be used by customers who have bank accounts enable with Internet Banking.
(III) E-wallet
Most of the time when you make purchase on the web, you are required to fill out a form with
name, shipping address, billing address, credit information and so on.
It becomes an annoyance if the similar from has to be filled up every time the user shops.
Today many banks, online grocery stores, telecom services etc, provide E-wallet services.
E-wallet is an electronic card for making secure online payments towards a merchant.
It works just like a credit or a debit card.
(IV) RuPay
The term RuPay is coined from two terms Rupee and Payment.
It is new card mechanism launched by National Payments Corporation of India (NPCI).
Currently, as there is no domestic card Indian banks have to tie up with MasterCard or visa
to connect cardholders, merchants and issuing banks around the globe.
MasterCard and visa are the world leaders in card payments and all payments transaction
are processed through them.
RuPay cards are the domestic alternative to the other payment cards.
By using RuPay cards, all the transaction will be processed within India.
RuPay will benefit the customers and the banks by reducing the cost.
==========
14
Lesson: 5 Introductions to M-Commerce
1. Which of the following refers to buying and selling of goods or services through the use of
internet enabled wireless devices?
Ans. M – Commerce
2. Which of the following is the use of technologies which provide the location information for
business purpose?
Ans. L – Commerce
3. Which of the following stands for GPS?
Ans. Global Positioning System
4. Which of the following security aspect refers to the secrecy of the information so that
unauthorized user cannot read it?
Ans. Confidentiality
5. Which of the following security aspect ensures that the information must not be accidentally
or maliciously altered or tampered in transit?
Ans. Integrity
6. Which of the following security aspect ensures that only authentic users are allowed to use
the system?
Ans. Authorization
7. Which of the following security aspect ensures that the sender of the message cannot deny
that he/she has sent the message?
Ans. Non-repudiation
8. Which of the following is a program that uses Internet to record information that passes
through a computer or router in transit form sender to receiver?
Ans. Sniffer
9. Which of the following is an attack used to shut down a machine or network, making it
inaccessible to its intended users?
Ans. Denial of service
10. Which of the following is known as electronic defacing of an existing website page?
Ans. Cyber vandalism
11. Which of the following is pretending to be someone you are not, or representing a website
as authentic when it is actually a fake?
Ans. Spoofing
12. Which of the following is a computer program that detects, prevents and takes action to
remove the malicious codes like viruses, worms and Trojan horses form the infected
system?
Ans. Antivirus software
15
13. Which of the following is the transformation of normal text known as “Plain text” into
unreadable or secret text known as “Chipper text” using encryption algorithm?
Ans. Encryption
14. Which of the following is the transformation of encrypted text back into normal text?
Ans. Decryption
15. Which of the following is a protocol used for securing web transactions on the Internet?
Ans. SSL
16. Who developed SSL protocol?
Ans. Netscape
17. Which of the following starting address indicates that site is secured by SSL protocol ?
Ans. https://
18. Which of the following provides the author with a tool to protect his/her original work from
being used or taken by others without permission?
Ans. Copyright
19. Which of the following is a specific logo, mark, word, symbol, design, phrase or image which
is used by an individual or a company to distinguish a product or service from that of others
in the market?
Ans. Trademark
20. Which of the following is the symbol for trademark?
Ans. TM, SM and ®
21. Which of the following is the process of hiding information within other information?
Ans. Steganography
22. Which of the following is a digital code inserted into a digital image, audio or video file which
can identify the file’s copyright information?
Ans. Water mark
23. Who issues the credit card and guarantees the payment to the merchant?
Ans. Issuing bank
24. Which of the following payment card has a microchip embedded in its surface?
Ans. Smart card
17
=> Oct – 2015 (Science Stream)
43. Which of the following is an example of M –Commerce application?
Ans. Mobile Marketing and Advertising, Mobile Ticketing, Mobile Entertainment
44. Which of the following refers to the stock market services offered via mobile devices?
Ans. Mobile brokerage
45. Which of the following is an example of location based services?
Ans. Tracking services, Navigation, Directory services
46. Major credit card companies use which security system to make online transaction secure?
Ans. SET
47. Which of the following is known as electronic defacing of an existing website page?
Ans. Cyber vandalism
48. Which of the following is the network protection barrier most commonly used between the
company’s network and the outside world?
Ans. Firewall
49. Which of the following is an art of protecting the information by transforming it into an
unreadable form?
Ans. Cryptography
50. Which of the following symbol is not used for trademark?
Ans. C
51. What is known as the process of hiding information within other information?
Ans. Steganography
52. The payment cards can be classified into which of the following type?
Ans. Credit Card, Debit Card, Smart Card
53. Which of the following entity pay role in online payment?
Ans. Payment gateway, Processor
54. Which making payment through which the customer is not required to provide the
credit/debit card number?
Ans. E – wallet
19
Ans. E-Wallet
===========
22