Professional Documents
Culture Documents
Activity
Activity
Activity
1. What is E-commerce?
E-commerce comes in various forms, such as online marketplaces, retailers, and auctions,
and it includes digital fund transfers and electronic data interchange (EDI) to help streamline
business operations and transactions. When it comes to bringing people and companies
together, it also follows different types of e-commerce models. Some types include Business
to Consumer, Business to Business, Consumer to Consumer, Business-to-Government, and
more.
2. Features of E-commerce.
3. Online storefront and shopping cart. E-commerce websites typically have an online
storefront that displays products or services for sale, including extensive product
information such as prices, and images, along with a shopping cart feature that allows
customers to add items to a virtual cart and make multiple purchases in a single
transaction.
4. User reviews and ratings. E-commerce websites may feature reviews and ratings from
customers, which is essential considering that your buyers will not be able examine a
product in person and will most likely rely on previous customer reviews.
5. Security and privacy: To guard against fraud and theft, e-commerce websites must
guarantee the security of consumer data, including payment and personal information.
6. To analyze user behavior, uncover patterns, and enhance the user experience, e-commerce
websites use analytics technologies.
E-commerce has become increasingly popular in recent years, but it also comes with
some disadvantages. The loss of direct communication between the consumer and seller is
one example. Customers only have access to product descriptions and photographs using e-
commerce, which may not adequately depict the goods. Issues with delivery and shipping,
such as delays or lost deliveries could also be experienced by customers, which is irritating
and inconvenient. Additionally, some goods, such as fragile or perishable items, might not be
accepted for shipment, which restricts the kinds of goods that can be offered through e-
commerce platforms. There are also concerns about online security and privacy of not just
consumers but also business owners. E-commerce's biggest drawback in our society is the
possible loss of jobs, especially in the retail industry. Salespeople, cashiers, and other retail
workers may lose their jobs when traditional brick-and-mortar stores close as more
people shop online.
Business-to-Business (B2B): This concept involves firms selling items or services to one
another over the Internet.
Credit and debit cards are the most commonly used payment methods in e-commerce.
Customers enter their credit card information on the merchant's website, and the payment
is processed via a payment gateway.
Digital wallets are online accounts that store payment information for customers.
Customers can utilize digital wallets such as PayPal, Google Wallet, or Apple Pay to
make purchases without having to enter their credit card information every time.
Customers can use their cellphones to make payments through mobile payment
programs such as Google Wallet, Apple Pay, or Samsung Pay, Gcash, and more.
Customers can use online banking services to transfer funds straight from their bank
account to the merchant's account.
Customers pay for their purchases in cash when the goods are delivered to them via cash
on delivery (COD).
Cryptocurrencies are digital currencies that utilize encryption techniques to control the
production of currency units and to verify the transfer of payments. Some popular
cryptocurrencies are Bitcoin and Ethereum.
Payment gateways are services that help with online payments by encrypting sensitive
information such as credit card numbers and bank account information. PayPal, Stripe,
and Authorize.net are examples of payment gateways.
INTERNET
1. Define the following:
• Internet
The Internet is a global network of interconnected computer networks that use
defined communication protocols to communicate with one another, which allows for the
transfer of information and communication between individuals and organizations around
the world. It consists of billions of devices, including servers, routers, computers, and
mobile devices, all connected through a variety of wired and wireless communication
technologies. It is a decentralized network that allows computers and gadgets to
communicate and share information regardless of where they are physically located.
Websites, email, social networking, online shopping, and cloud computing are just a few
of the services available via the internet.
It's no brainer that the internet has transformed how we live, work, and
communicate. It has enabled people from all over the world to communicate with one
another, as well as new chances for businesses to reach clients and expand their markets.
Individuals can now easily access information and resources, ranging from educational
materials to entertainment content, thanks to the internet. The internet has also evolved
into a formidable e-commerce platform, allowing firms to offer goods and services to
people all over the world. Online marketplaces and payment systems have made it easier
for enterprises of all kinds to participate in the global economy, as well as for consumers
to access a greater variety of goods and services than ever before.
Teams can work more efficiently together both within and beyond departments.
They can collaborate on projects, exchange ideas, and gain feedback from their
peers.
By giving workers the resources that they need to do their jobs well, intranets can
help boost productivity. Without wasting time looking for it, they can swiftly and
simply obtain resources, data, and other information.
Extranet
Since they offer a safe platform for communication between a business and its
external partners, such as suppliers, customers, and distributors, extranets enhance
collaboration. All parties involved may benefit from increased communication
and collaboration as a result.
By eliminating the need for travel and in-person meetings with partners outside
the company, extranets can help businesses save money. Additionally, they can aid
in lowering the expenses related to paper-based procedures, such as printing and
mailing paperwork.
COMPUTER ETHICS
1. What is computer ethics?
The moral ideas, values, and standards of conduct that regulate the behavior of persons
and organizations in regard to technology and digital information are referred to as computer
ethics. It entails studying and evaluating emerging technologies' social and ethical
ramifications, as well as setting ethical rules and standards to ensure that computers are used
responsibly and accountable. It also covers a wide range of concerns concerning the usage,
development, and distribution of computer technology, such as privacy, intellectual property,
cybercrime, information access, and the impact of technology on society. Computer ethics is
concerned with promoting ethical behavior and responsible decision-making when using
technology, as well as identifying and addressing ethical quandaries that emerge in the
context of computer technology.
Computer ethics is a relatively new discipline that arose in the 1970s. The phrase
"computer ethics" was coined in 1979, and the first conference on the subject was held in
1976. The rising use of computers in society in the 1980s enhanced the importance of
computer ethics. The Computer Ethics Institute was founded in 1983 to encourage ethical
computing practices. This was a period of rapid expansion and invention in the computing
industry, with an increasing understanding of the importance of ethical considerations in
computer use. As technology grew, so did the ethical dilemmas that accompanied it. Efforts
to govern computer use began during this time period, with the introduction of ethical codes
and guidelines for computer professionals. Overall, the 1980s were an important time in the
evolution of computer ethics as a distinct field of study.
With the rise of the internet in the 1990s, computer ethics emerged to address issues such
as privacy, intellectual property rights, and freedom of speech online. Cybercrime has
become a rising issue, prompting the creation of new ethical rules and legislation for online
behavior. Furthermore, arguments concerning the digital divide arose, with concerns about
unequal access to technology and its potential societal consequences. With the advent of e-
commerce and internet firms came ethical concerns about consumer privacy and data
security. In response to the expanding influence of technology in society, the 1990s marked
the continued progress and increasing importance of computer ethics. The 10 commandments
of computer ethics were first introduced by computer science professor Ramon C. Barquin in
1992. The commandments were created to encourage responsible and ethical technology use,
as well as to prevent unethical and damaging behaviors such as hacking, cyberbullying, and
copyright infringement. These commandments provide a framework for individuals and
organizations to follow in order to guarantee that technology is used responsibly, ethically,
and in the best interests of society as a whole.
Computer ethics is still important today, as new technology presents new ethical
concerns.
3. List down the 10 commandments of computer ethics.
Computer crimes, often known as cybercrime, e-crime, electronic crime, or hi-tech crime,
are any illegal conduct involving the use of a computer or computer network. This includes
hacking, the distribution of viruses or malware, phishing scams, identity theft, illegal access
to sensitive information, cyberstalking, cyberbullying, and a variety of other activities.
Sometimes, a person or group of individuals may be malicious and destroy or otherwise
corrupt the computer or data files. Individuals, corporations, and even governments can
suffer enormous financial losses, reputational damage, and breaches of privacy and security
as a result of computer crimes. As technology advances, computer crimes become more
complex, necessitating new techniques to prevent and prosecute these offenses.
Black Hat Hackers: Most common type of hackers. Hackers who use black hat
techniques are the most well-known. Black hat hackers are those who break into
computer networks or systems with the intention of causing harm to the system. They are
frequently connected to illegal and cybercriminal activity.
White Hat Hackers: Also referred to as ethical hackers, these individuals seek to
identify and repair security holes in computer networks and systems rather than exploit
them for their own advantage. White hat hackers frequently test security protocols and
ensure organizations are safeguarded from cyberattacks.
Grey Hat Hackers: A mix of both black hat and white hat hackers. They’re not
malicious but they’re also not ethical. They break into computers without permission;
however, they do not do any kind of harm. These hackers enter into a system to find
flaws and alert the owner, frequently in return for payment.
Green Hat Hackers: Green hat hackers are "green" in the sense that implies that they are
novices or learners in the hacking community. They are inexperienced individuals who
lack the technical expertise of more established hackers. Phishing and other social
engineering strategies may be used by green hats to get around security measures.
Blue Hat Hackers: Individuals who belong to the white hat hacking community but are
employed by organizations to conduct penetration tests and identify vulnerabilities to
help improve their cybersecurity defenses.
Red Hat Hackers: Often referred to as vigilante hackers. They are driven by a desire to
retaliate against black hat hackers by infiltrating the dark web and the communities of
black hat hackers and launching hacking attacks on their networks and devices. In other
words, they are hackers who engage in illegal activities to combat other illegal activities.
Hacktivists: Hacktivists are individuals who employ their hacking abilities to advance
social or political agendas, typically by altering the content of websites or exfiltrating and
publishing sensitive information. They may target government agencies, corporations, or
individuals whom they hold accountable for social or environmental harm.
Kevin Mitnick
Holds the title as the world's most famous hacker ever. He rose to notoriety in the
1980s after hacking into the North American Defense Command (NORAD).
These events inspired the film War Games.
Julian Assange
Having been on Interpol's most wanted list, many would immediately recognize
Assange as one of the world's biggest hackers, especially given the impact
revelations his organization, Wikileaks, has published to the globe.
Gary McKinnon
Perpetrated the “biggest military computer hack of all time.”
Gummo
Black-hat hacker turned good. He recently gained more publicity after
announcing that he holds nearly $7 billion dollars in Bitcoin.
Fox, J. (2021, January 5). Top 10 Famous Hackers | Cobalt. Cobalt.io; Cobalt.
https://www.cobalt.io/blog/top-ten-famous-hackers#:~:text=Kevin%20Mitnick%20holds%20the
%20title,hacking%20at%20an%20early%20age.
Investopedia. (2021, March 24). E-commerce business models.
https://www.investopedia.com/terms/e/ecommerce-business-models.asp
Layton, J. (2019). Computer Crime: Definition, Types and Examples. Investopedia. Retrieved
from https://www.investopedia.com/terms/c/computer-crime.asp
Smith, T. (2021, September 10). E-commerce payment systems: Types, advantages, and
disadvantages. FinancesOnline.com. https://financesonline.com/e-commerce-payment-systems/