Professional Documents
Culture Documents
Unit1 Ecommerce
Unit1 Ecommerce
Unit1 Ecommerce
Ans:- Defination:- ‘Electronic Commerce is a general concept covering any form of business
transactions or information exchange executed using information and communication technology,
between companies, between companies and their customers, or between companies and public
administrations.
Electronic Data Interchange (EDI): EDI provides a standardized system for coding trade
transactions so that they can be communicated directly from one computer system to another
without the need for printed orders and invoices and the delays and errors implicit in paper
handling. EDI is used by organizations that make a large number of regular transactions. One sector
where EDI is extensively used is the large supermarket chains which use EDI for transactions with
their suppliers.
Internet Commerce: Information and communications technologies can also be used to advertise
and make once-off sales of a wide range of goods and services. This type of e-Commerce is typified
by the commercial use of the Internet. The Internet can, for example, be used for the purchase of
books that are then delivered by post or the booking of tickets that can be picked up by the clients
when they arrive at the event.
2)Explain about E-commerce and Trade cycle?
Ans:- E-Commerce can be applied to all, or to different phases, of the trade cycle. The trade cycle
varies depending on:
The nature of the organizations (or individuals) involved.
The frequency of trade between the partners to the exchange.
The nature of the goods or services being exchanged.
The trade cycle has to support :-
Finding goods or services appropriate to the requirement and agreeing the terms of trade
(referred to as search and negotiation).
Placing the order, taking delivery and making payment (execution and settlement).
After-sales activities such as warrantee, service, etc.
Electronic Markets (and electronic information services giving product and price data) exist in
commodity exchanges, financial markets and they are also extensively used in the airline industry
for passenger seat sales. ‘…the overall effect of this technology will be to increase the proportion of
economic activity co-ordinated by markets’. The importance of electronic markets in the sectors
where they operate has increased but there has not been any dramatic expansion of the use of
electronic markets to additional economic sectors. Part of the difficulty of establishing new
electronic markets relates to activities by vendors to gain competitive advantage by product
differentiation and techniques to lock-in customers.
4)Explain about Electronic Data interchange?
Ans:- EDI is based on a set of standardized messages for the transfer of structured data between
computer applications. it is principally used for trade exchanges: orders, invoices, payments and the
many other transactions that can be used in national and international trade exchanges.. EDI allows
the stock control/materials management system of the customer to interface with the stock
control/production systems of the suppliers without the use of paper documents or the need for
human intervention. EDI is used for regular repeat transactions, it takes quite a lot of work to set up
systems to send and retrieve EDI messages and,
Security to EDI:-
Security is an essential part of any transaction that takes place over the internet. Customers will
lose his/her faith in e-business if its security is compromised. Following are the essential
requirements for safe e-payments/transactions −
Integrity − Information should not be altered during its transmission over the network.
Availability − Information should be available wherever and whenever required within a time
limit specified.
Non-Repudiability − It is the protection against the denial of order or denial of payment. Once
a sender sends a message, the sender should not be able to deny sending the message. Similarly,
the recipient of message should not be able to deny the receipt.
Auditability − Data should be recorded in such a way that it can be audited for integrity
requirements.
5)Explain Internet commerce?
Ans:- Internet Commerce is the use of the Internet for all phases of creating and completing
business transactions. Various surveys suggest that the amount of business conducted online will
increase ten-fold over the next few years, from around $500 million in 1996 to over $6 billion in
2000. However, this still represents less than 10 per cent of the business conducted by mail order.
In our view too much focus of electronic commerce to date has been put on carrying out the final
transactional phases - the ordering and payment. While such a perspective is all right when there are
established supply chains for regular and routine purposes, this overlooks the wider perspective. It
is often said, that the formal placement of an order is preceded by as many as 30 previous
information exchanges. Thus, in its broadest sense we view Internet Commerce as also including:
The full sales and marketing cycle - for example, by analysing online feedback to ascertain
customer's needs
Identifying new markets - through exposure to a global audience through the World Wide Web
interaction
Assisting potential customers with their purchasing decision - for example by guiding them
Providing round-the-clock points of sale - making it easy for buyers to order online,
irrespective of location
Supply Chain Management - supporting those in the supply chain, such as dealers and
methods; thus increasing satisfaction, deepening the customer relationship and closing the
Bandwidth - There is concern that as usage of the Internet grows exponentially, that there
will be insufficent bandwidth and it will grind to a halt. However, various analysts have
shown that, in general, market forces will enable capacity to keep up with demand, though it
may be patchy in places. Solutions: Some suppliers are talking of multi-tiered services with
premium pricing guanteeing faster levels of service.
Authentication - When orders are placed over a network the buyer needs reassurance that it
was an authorized transaction and actually comes from who it purports. Solutions: Electronic
signatures, trusted third party validation .
Security - Both parties want assurance that their confidential transaction details have not
been intercepted. Solutions: Encryption, secure servers.
Legislation Harmonisation - Under which jurisdiction does a transaction take place- the
location of buyer, seller or server? Issues like these are the subject of policy debate.
Payment - How can someone set up simple, reliable and risk free mechanisms for payment,
in multiple currencies and without hefty bank charges? Solutions: Electronic cash
mechanisms, new Internet protocols such as SET (Secure Electronic Transactions), virtual
banks.
Ans:- Supply Chains The products sold in shops and purchased for use in organizations are the
result of a complex web of relationships between manufacturers, component suppliers, wholesalers,
retailers and the logistic infrastructure that links them together. Most organizations have a large
number of trade relationships. The web of trade relationships is referred to as the supply chain or
the value chain (as each stage adds value to the product before passing it on). The business goal can
be to reduce costs, improve service or to tap into a new market. The form of e-Commerce that is
appropriate is dependant on the circumstances of the party to the exchange and the nature of the
trade relationship. some of supply chain strategies are
1)Pull Supply Chain :-– Under pull supply chain, the process of manufacturing and supplying is
driven by actual customer demand. In this type of supply chain logistics, inventory is acquired on a
need-basis. The benefits of this type of planning include less wastage in the case of lower demand.
The problem, however, is that the company might not have enough inventory to meet rising
demands due to unforeseen factors. For example, an auto repair shop that only orders parts that it
needs. In this case, the business waits until it gets an order to procure the parts required for the
repair.
2)Push Supply Chain :-– Under push supply chain, the logistics are driven by long-term
projections of customer demand. For example, at the end of the summer season, clothing brands
start to manufacture more warm clothes. This type of planning becomes valuable to companies as it
helps plan them for events in the future and be prepared when winter comes. This gives the
companies meet their needs in time and also gives them time to figure out other logistics like where
to store the inventory.
3)Push and Pull Strategies in Practise:- In real life, no businesses rely entirely on either push or
pull logistics, but instead employ a mixture of the two to make the best use of them. Modern-day
supply chain operations are very complex and consist of some steps from getting the raw materials
to the delivery of the final product to the end consumer. The process roughly consists of the
following steps:
Determining the availability of raw materials. Even before the product can begin to be made
it is important to plan where and how the raw materials can be acquired from cheaply.
Processing the raw materials in a factory to yield the final products. This step varies from
company to company like food-based products, cloth-based product, etc.
Most supply chains in the world resemble this basic outline. Now, push and pull strategies
can be employed by planners by taking into account the expected demand and other factors.
The most successful shipping companies like Walmart and Amazon conduct a lot of research
into the various factors that determine demand and incorporate that knowledge into their
supply chain.
Amazon is one of the biggest online retailers in the world right now
8)Explain about Poter’s value chain Model?
Ans:- Porter’s Value Chain Model :-Porter’s model was essentially concerned with the internal activities
of the company. The three (basic) primary activities of a product process are:
Inbound Logistics: Handling goods that are bought into the company, storing them and making
them available to operations as required.
Operations: The production process, in many cases a series of sub activities that can be represented
on a detailed value chain analysis.
Outbound Logistics: Taking the products of the company, storing them if necessary and
distributing them to the customer in a timely manner. To these basic primary activities Porter adds
two further primary activities:
Marketing and Sales: Finding out the requirements of potential customers and letting them know
of the products and services that can be offered.
Service: Any requirement for installation or advice before delivery and then after-sales service once
the transaction is completed.
To support these primary functions there will be a company infrastructure that performs a number of
support activities. Porter classifies these activities as:
Procurement: The function of finding suppliers of the materials required as inputs to the operations
of the organization. Procurement is responsible for negotiating quality suppliers at an acceptable
price and with reliable delivery.
Technology Development: The organization needs to update its production processes, train staff
and to manage innovation to ensure that its products and its overall range of goods and services
remain competitive.
Human Resources Management: The recruitment, training and personnel management of the
people who work for the organization.
Firm Infrastructure: The overall management of the company including planning and
accountancy.
9)Explain about competitive strategy?
Ans:- Definition:-Competitive Strategy is defined as the long term plan of a particular company in
order to gain competitive advantage over its competitors in the industry. It is aimed at creating
defensive position in an industry and generating a superior ROI (Return on Investment). Such type
of strategies play a very important role when industry is very competitive and consumers are
provided with almost similar products. One can take example of mobile phone market.
1. Cost Leadership :- Here, the objective of the firm is to become the lowest cost producer in the
industry and is achieved by producing in large scale which enables the firm to attain economies of
scale. High capacity utilization, good bargaining power, high technology implementation are some
of factors necessary to achieve cost leadership. e.g Micromax phones
2. Differentiation leadership:- Under this strategy, firm maintains unique features of its products
in the market thus creating a differentiating factor. With this differentiation leadership, firms target
to achieve market leadership. And firms charge a premium price for the products (due to high value
added features). Superior brand and quality, major distribution channels, consistent promotional
support etc. are the attributes of such products.E.g. BMW, Apple
3. Cost focus:-Under this strategy, firm concentrates on specific market segments and keeps its
products low priced in those segments. Such strategy helps firm to satisfy sufficient consumers and
gain popularity. E.g. Sonata watches
4. Differentiation focus:-Under this strategy, firm aims to differentiate itself from one or two
competitors, again in specific segments only. This type of differentiation is made to meet demands
of border customers who refrain from purchasing competitors’ products only due to missing of
small features. It is a clear niche marketing strategy. E.g. Titan watches
Ans:- The ability to gain advantage from the innovative use of IS/IT can owe a lot to timing.
The first organization to implement a new type of ICT system will, if the system is successful, gain
the price advantage or the differentiation while competitors are still operating with traditional
methods and systems. The first mover can gain advantage but it is a risky business. New
technologies and new ways of using them are expensive to develop and are often not successful.
There are advantages to being a late mover: the idea has been tried, its effectiveness can be assessed
and the late mover can implement an improved version of the system.
In terms of the technology, the advantages are that it has been tested and will be cheaper and
easier to implement the second time round; it may be that standard components have been
developed or that packaged solutions are available, advantages that were not available to the first
mover. Newcomers to the e-Commerce scene, using EDI or Internet e-Commerce, have the
advantages of being able to benefit from the work of the pioneers without the need to contribute to
the development effort. The late move does not, however, have the ability to surprise competitors or the
market; it is essentially a catching up operation.
11) Explain about Sustainable Competitive Advantage?
Ans:- Competitive advantages are conditions that allow a company or country to produce a
good or service of equal value at a lower price or in a more desirable fashion. These conditions
allow the productive entity to generate more sales or superior margins compared to its market
rivals.
BREAKING DOWN Competitive Advantage:- Competitive advantages generate greater
value for a firm and its shareholders because of certain strengths or conditions. The more
sustainable the competitive advantage, the more difficult it is for competitors to neutralize
the advantage. The two main types of competitive advantages are comparative
advantage and differential advantage.
Comparative Advantage:- A firm's ability to produce a good or service more efficiently
than its competitors, which leads to greater profit margins, creates a comparative advantage.
Rational consumers will choose the cheaper of any two perfect substitutes offered. For
example, a car owner will buy gasoline from a gas station that is 5 cents cheaper other
stations in the area. For imperfect substitutes, like Pepsi versus Coke, higher margins for the
lowest-cost producers can eventually bring superior returns.
Differential Advantage
A differential advantage is when a firm's products or services differ from its competitors'
offerings and are seen as superior. Advanced technology, patent-protected products or
processes, superior personnel and a strong brand identity are all drivers of differential
advantage. These factors support wide margins and large market shares.
Apple is famous for creating innovative products, such as the iPhone, and supporting their market
leadership with savvy marketing campaigns to build an elite brand. Major drug companies can also
market branded drugs at high price points because they are protected by patents.
UNIT-2
Ans:- Business - to – Business :- Electronic commerce is an emerging concept that describes the
process of buying and selling or exchanging products, services and information via computer
networks including the Internet. E-Commerce can be mainly divided into Business-to-Business
electronic commerce (B2B EC) and Business-to-Consumer electronic commerce (B2C EC). B2B
EC implies that both sellers (suppliers) and buyers are business corporations, while B2C EC
implies that the buyers are individual consumers.
characteristics of B2B E-commerce:-
1)Longer decision making process
Ans:- Just-in-Time (JIT) logistics operate under the concept of receiving raw materials, products
and parts as they are needed, rather than days or even weeks before. This allows businesses to
significantly cut inventory costs by having fewer unnecessary supplies on hand and far less material
to store. As effective as Just-in-Time Delivery is, it can be difficult to coordinate large amounts of
shipments efficiently, especially when dealing with shipments that vary in size and destination.
With Just-in-Time Delivery services from Expedited Transportation, our team of experts and
superior customer service can coordinate your shipments for you; freeing you up to focus on what’s
important – your business’ bottom line.
JIT Services Include:
Expert Customer Service
Direct Trucking
Naturally, in order for Just-in-Time (JIT) inventory to work, there must be a great deal of efficiency
in logistics; coordinating shipments of different sizes to different locations. That’s where Expedited
Transportation comes in. Our experience and proven processes allow us to deliver shipments all
over the nation and across the world with reliability and efficiency.
3)Explain about B2B model in E-commerce?
Ans:-A website following the B2B business model sells its products to an intermediate buyer who
then sells the products to the final customer. As an example, a wholesaler places an order from a
company's website and after receiving the consignment, it sells the endproduct to the final customer
who comes to buy the product at the wholesaler's retail outlet.
B2B identifies both the seller as well as the buyer as business entities. B2B covers a large number
of applications, which enables business to form relationships with their distributors, re-sellers,
suppliers, etc. Following are the leading items in B2B eCommerce.
Electronics
Shipping and Warehousing
Motor Vehicles
Petrochemicals
Paper
Office products
Food
Agriculture
Key Technologies :- Following are the key technologies used in B2B e-commerce −
Electronic Data Interchange (EDI) − EDI is an inter-organizational exchange of business
documents in a structured and machine processable format.
Internet − Internet represents the World Wide Web or the network of networks connecting
computers across the world.
Intranet − Intranet represents a dedicated network of computers within a single
organization.
Extranet − Extranet represents a network where the outside business partners, suppliers, or
customers can have a limited access to a portion of enterprise intranet/network.
Back-End Information System Integration − Back-end information systems are database
management systems used to manage the business data.
Architectural Models :- Following are the architectural models in B2B e-commerce −
Supplier Oriented marketplace − In this type of model, a common marketplace provided
by supplier is used by both individual customers as well as business users. A supplier offers
an e-stores for sales promotion.
Buyer Oriented marketplace − In this type of model, buyer has his/her own market place
or e-market. He invites suppliers to bid on product's catalog. A Buyer company opens a
bidding site.
Intermediary Oriented marketplace − In this type of model, an intermediary company
runs a market place where business buyers and sellers can transact with each other.
4)Explain about Auctions and services from traditional to EDI?
Ans:- An auction is the process of buying and selling goods by offering them up for bid, taking
bids, and then selling the item to the winning bidder. In economic theory, an auction is a method
for determining the value of a commodity that has an undetermined or variable price.
Types of Auction:-
1) English auction: This is the type of auction commonly used by the English auction houses
like Sotheby's, Christie's, and Phillips. Participants bid openly against one another, with each
bid being higher than the previous bid. The auction ends when no participant is willing to bid
further, or when a pre-determined "buy-out" price is reached, at which point the highest
bidder pays the price.
2) Dutch auction: In the traditional Dutch auction the auctioneer begins with a high asking
price, which is lowered until some participant is willing to accept the auctioneer's price, or a
predetermined minimum price is reached. That winning participant pays the last announced
price.
3) Sealed-bid first-price auction: Also known as Sealed High-Bid Auction or First-Price
Sealed-Bid Auction (FPSB). In this type of auction all bidders simultaneously submit bids so
that no bidder knows the bid of any other participant. The highest bidder pays the price they
submitted.
Phase 1: Sell only a subset of items (one product family) online, and use manual integration.
Customers will still be able to order from your site. But you will need to print out the online orders,
keypunch each order into your existing back-end system, and then manually enter the ensuing order
status into the electronic commerce system. Because you’ll likely be batch-processing the online
orders-downloading all of them once a day-orders submitted early in the day aren’t likely to be
fulfilled till at least the next morning, which may result in customers receiving their orders later
than they expected.
Phase 2: Sell your entire product line, and feature limited integration. Limited integration varies
depending on your priorities: Do you urgently need the ability to provide customer-specific pricing?
A real-time link to customer service? Most likely, your top priority will be to put an end to
manually rekeying orders. You can buy an EDI system that transmits online orders to your catalog
order-entry software.
Phase 3: Implement full integration with existing back-end. At this stage, your system will process
and fulfill online orders as effortlessly as orders taken by phone or fax.
But you may wonder why you should bother moving from phase 2 into phase 3. The arguments for
building a fully integrated online catalog are too compelling to ignore: * Up-to-date access. *
Improved service * Reduced costs
Ans:- Software agents are a piece of software which works for the user. However software agent is
not just a program. An agent is a system situated within and a part of an environment that senses
that environment and acts on it.
Type of Software agents:- Agents are classified into different types based on the characteristics
they posses. In order to possess the above properties agents must have distinct features such as
locomotion, integration, co-operation, information, stimulation
1)Collaborative agents: A collaborative agent is a software program that helps users solve
problem, especially in complex or unfamiliar domains by correcting errors, suggesting what to do
next, and taking care of low level details. Collaborative agents are also refereed as collagen
2)Mobile agents: A mobile agent is an executing program that can migrate during execution from
one machine to another in a heterogeneous network . Mobile agents are used to solve many problem
of network computing with minimum bandwidth and connectivity
3) Interface agents: Interface agents are computer programs that employ machine learning
techniques in order to provide assistance to a user dealing with a particular application
4) Hybrid agents: Combining two or more of the previous mentioned agent philosophies will yield
a better functioning agent.
2) Creating a New Framework :-when marketers used to push their brands among their
customers by simple ways of promotion i.e. advertising, banners, pamphlets and so on. Make
your clients aware how your organization’s products and services can benefit their operations
and bring in revenue. Share online brochures, pamphlets with your client.
4) Don’t Speak the Same Language:- Always personalize your emails as per the designation and
responsibilities shared by the individual representing your client. Address your client by his or
name. Do not share information with a single person in loop and everyone else in cc.You just
can’t send the same mail to the CEO as well as the CFO as their requirements would be
different. Understand the requirement first before sending mails.
5) Online Training Portals :- Train your clients through web based trainings. Ask the clients to
create their own login id and passwords. Share necessary information about your product and
services in the portal itself for the client to login and go through necessary information. Arrange
online trainings where the trainer addresses even the minutest query of the client. Web meeting
is one of the most cost effective ways of communicating with the clients
6) Product Feedback:- It is essential to take regular feedback of your products and services. The
clients can give their valuable feedback on your website only. The feedbacks and reviews must
be regularly monitored. Assign a single resource for the same.
7) Good relationship:-Share a good and healthy relationship with your client. Don’t forget to wish
your client on important occasions through email. It works!!
because they are formatted according to standards that stipulate where certain information
should be located, such as where net total amount should appear on an invoice.
These standards also define how individual pieces of information should be represented. For
example, in the standards for an electronics industry purchase order, there are specific codes
defined to identify the type of product or service being requested, e.g. PN (company part
number), BY (buyers part number), VP (vendors part number), PW (part drawing), etc.
Proprietary standard - EDI standard developed for a specific company or industry. This is
also called a non-public or private standard.
Public standard - EDI standard developed for use across one or more industries.
Unit-3
1)Explain about Automotive network Exchange?
Ans:- Automotive Network Exchange - the Largest Extranet:-
Companies in the automotive market swap supply and manufacturing data
Involve 10,000+ companies
Include CAD/CAM file transfers, Electronic Data Interchange (EDI), e-mail, and
groupware
The network’s EDI element alone will slice $71 from the cost of designing and building
each car
Savings of $1 billion a year for the Industry
Chrysler will pay for fewer T1 Lines and satellite connections
Standardizing one protocol-IP will reduce support costs
The time it takes to turn around an order will be much shorter
The faster the parts come in, the faster the cars leave the assembly line, the larger the
customer satisfaction and manufacturer’s profit
Business-to-business virtual private networks (VPN) are used
2)Explain about architecture of internet,intanet and extranet?
Ans:- The Internet, intranet, and extranet are the most popular platforms for e-commerce. In
Internet is the most common platform for B2C e-commerce; the intranet is most the common for
platform for corporate internal management; and the extranet is the most common platform for B2B
e-commerce.
Network Type Typical Users Access Type of information
The Internet Any individual with Unlimited public; no General public, and
dial-up access or restrictions advertorial
LAN
The Extranet
An extranet, or “extended intranet”, uses the TCP/IP protocol network of the Internet, to link
intranets in different locations. Extranet transmission are usually conducted over the Internet, which
offers little privacy or transmission security. Therefore, when using an extranet, it is necessary to
improve the security of connecting portions of he Internet. This can be done by creating tunnels (see
paragraph on security and protection) of secured data flows, using cryptography and authorization
algorithm. The Internet with tunneling technology is known as a virtually private network (VPN).
Extranets provide secured connectivity between corporation’s intranets and the intranets of its
business partners, material suppliers, financial services, government, and customers. Access to
intranets is usually limited by agreements of the collaborating parties, is strictly controlled, and is
only available to authorized personnel. The protected environment of the extranet allows groups to
collaborate, sharing information exclusively, and exchanging it securely. Since an extranet allows
connectivity between business through the Internet, it is an open and flexible platform suitable for
supply chain management. To increase security, many companies replicate the database they are
willing to share with their business partners and separate them physically from their regular
intranets.
2 Establish a project team:- A project team helps crystallize the stated objective for the intranet,
initiates and oversees publishing standards, evaluates and specifies intranet tools and applications,
and provides the change management consulting that typically accompanies any change in
organizational dynamics.
3 Build a structure:- “The key characteristic of this technology is its ability to shift control of
information flow from the information creators to the information users.”
5 Resolve IT issues:-The IT department gets involved when the intranet discussions become
technical
6 Focus on cultural issues:- Technology is just one of the intranet challenges facing management.
Cultural challenges must also be overcome. For instance, consider the “simple” purchase of desktop
computers, especially for standalone (kiosk) access to the intranet. In many enterprises, desktop
buys are a distributed function, the participants of which might be loath to following a technology
standard from on high.
7 Start small:-Inaugurate the intranet with a pilot. In need not be fancy. It doesn’t have to be
packed with content. Part of it can even run from a CD-ROM. Because most people already know
how the Internet works, the pilot only has to demonstrate the possibilities of this communications
medium within the enterprise. It should show how easy it is to post and find information, as well as
demonstrate the effectiveness of display designs, informational structures, and Web-based tools. A
secondary outcome of the pilot would be to evaluate such issues as design, response times, policies,
and the ability to find, access, and post information.
8 Deliver tools:- An intranet toolkit is a must. Obviously, the toolkit delivers the computer-based
tools to “publish” on the intranet.
9 Perform an audit:-who is accessing what on the intranet and how often; by what path do users
surf the various sites on the intranet; and of course the technical issues, such as response times at
various times during the day.
5)Explain structure and application of extranet and its product and services?
Ans:- The Structure of Extranets:-Extranets are comprised of a wide variety of components and
participants, and there are several possible configurations. These include intranet, Web servers,
Firewall, ISP’s tunneling technology, interface software and business applications. The tunneling
means that data transmission across the internet can be made secure by authenticating and
encrypting all IP packets. Extranets are configured by two basic methods: They can be implemented
using a direct leased line with full control over it, linking all intranets. A secure link (tunnel) can be
created across the Internet, which can be used by the corporation as a VPN, usually at a much lower
cost.
Extranet Products and Services :- Four Categories of extranet products and services.
1. Extranet development tools: to design extranet servers, a clientbase, security, EC applications,
and electronic catalogs.
2. Extranet hosting and network connectivity: provide secure ISP connections to Internet back
bones and host extranet services for corporations.
3. Extranet services provide extranet design expertise with proprietary tools or turnkey services for
building and operating extranet-based services for corporate clients.
4. Virtual private networks: provide components specifically design for connecting remote
operators and creating IP WANs for corporations
Applications of Extranets :-
1. Enhanced communication:- Improved internal communication, Improved business partnership
channels ,Effective marketing, sales and customer support and Collaborative activities support
2. Productivity enhancements:- Just-in-time information delivery ,Reduction of information
overload ,Productivity collaboration between work groups and Training on demand
3. Business enhancements:- Faster time to market, Simultaneous engineering potential, Lower
design and production costs ,Improved client relationships and New business opportunities
4. Cost reduction:- Reduced error Reduced travel and meeting Improved comparison shopping
Reduced administrative and operational costs
5. Information delivery:- Low-cost publishing ,Leveraging of legacy systems ,Standard delivery
systems, Ease of maintenance and implementation Elimination of paper publishing and mailing
costs.
6)Explain about E-payment system?
Ans:- E-payment system is a way of making transactions or paying for goods and services through
an electronic medium without the use of check or cash. It’s also called an electronic payment
system or online payment system. Read on to learn more.
The electronic payment system has grown increasingly over the last decades due to the widely
spread of internet-based banking and shopping. As the world advance more on technology
development, a lot of electronic payment systems and payment processing devices have been
developed to increase, improve and provide secure e-payment transactions while decreasing the
percentage of check and cash transaction.
Electronic Funds Transfer (EFT): this is an electronic system used to transfer money from one bank
account to another without any cash exchange by hand.EFT comprises many other concepts of
payment system include:
Direct debit, that is a financial transaction in which the account holder instructs the bank to
collect a specific amount of money from his account electronically for payment of goods or
services.
E-Check, a digital version of an old paper check. It’s an electronic transfer of money from a
bank account, usually checking account without the use of the paper check.
Electronic billing: this is another form of electronic funds transfer used by companies or
businesses to collect payments from customers over electronic method.
Credit Card: this is another form of the e-payment system which required the use of the card
issued by a financial institute to the cardholder for making payments online or through an electronic
device without the use of cash.
E-Wallet: it is a form of prepaid account that stored user’s financial data like debit and credit card
information to make an online transaction easier.
Smart card: this use a plastic card embedded with the microprocessor that can be loaded with
funds to make transactions and instant payment of bills. It is also known as a chip card.
7)Explain about issues and challenges in E-payment system?
Ans:-
Lack of Usability :-Electronic payment system requires large amount of information from end
users or make transactions more difficult by using complex elaborated websites interfaces.
Lack of Security :-Online payment systems for the internet are an easy target for stealing money
and personal information. Customers have to provide credit card and payment account details and
other personal information online
Issues with e-Cash The main problem of e-cash is that it is not universally accepted because it is
necessary that the commercial establishment accept it as payment method. Another problem is that
when we makes payment by using e-cash, the client and the salesman have accounts in the same
bank which issue e-cash. The payment is not valid in other banks.
Lack of Trust:- Electronic payments have a long history of fraud, misuse and low reliability
Lack of Awareness :-Making online payment is not an easy task. Even educated people also face
problems in making online payments. Therefore, they always prefer traditional way of shopping
instead of online shopping. Sometimes there is a technical problem in server customers tried to do
online payments but they fails to do. As a result they avoid it.
Online Payments are not Feasible in Rural Areas :-The population of rural areas is not very
literate and they are also not able to operate computers. As they are unaware about technological
innovations, they are not interested in online payments. So the online payment systems are not
feasible for villagers.
Highly Expensive and Time Consuming:- Electronic payment system are highly expensive
because it includes set up cost, machine cost, management cost etc and this mode of payment will
take more time than the physical mode of payment.
UNIT-4
ANS:-Legal Issues:- The world is used to conducting business and commerce on signed paper
documents. Two millennia of commerce has been based on the written document with its value
‘authorized’ by the signature of a duly authorized officer. Strong legal framework for ensuring that
electronic documents will have a legal binding effect, subject to national laws and regulations. The
issues, which were addressed by the working party, which prepared this model Interchange
Agreement, are as follows:
1. Privacy: Data Protection Act , 1998 (rev.) (UK); European Legislation gives data protection and
privacy.
Ans:-
Ethics: Study of principles that individuals and organizations use to determine right and wrong
courses of action
Responsibility: As free moral agents, individuals, organizations and societies are responsible
for the actions they take
Due process: Refers to process by which laws are known and understood, with ability to appeal
to higher authorities to ensure that laws have been correctly applied
Privacy is the moral right of individuals to be left alone, free from surveillance or interference from
other individuals or organizations, including the state. Privacy is a girder supporting freedom:
Without the privacy required to think, write, plan, and associate independently and without fear,
social and political freedom is weakened, and perhaps destroyed. Information privacy is a subset of
privacy. The right to information privacy includes both the claim that certain information should not
be collected at all by governments or business firms, and the claim of individuals to control over
personal of whatever information that is collected about them. Individual control over personal
information is at the core of the privacy concept. Due process also plays an important role in
defining privacy.
Protecting privacy:-
Ans:- protecting Intellectual property: Encompasses all tangible and intangible products of
human mind
• Major ethical issue: How should we treat property that belongs to others
• Major social issue: Is there continued value in protecting intellectual property in the Internet
age?
• Major political issue: If, and if so, how, should Internet and e-commerce be
regulated/governed to protect intellectual property
• Main types of intellectual property protection:
1. Copyright: - Protects original forms of expression (but not ideas) from being copied by
others for a period of time
2. Patent: - Grants owner a 20-year exclusive monopoly on ideas behind an invention
3. Trademark law:- Identify, distinguish goods, and indicate their source. Ensure consumer gets
what is paid for/expected to receive. Protect owner against piracy and misappropriation
Ans:- Important Macroeconomic Issue: - Governments want to benefit from growth in Internet
Trade
• US: Internet Tax Freedom Act (1998) – 3-year moratorium (extended)
• US estimate: $3 - $4 billion lost Tax Revenue p.a.
• European Union: VAT Principle (neutrality; simplicity)
• Europe: Based on Country of Consumption:
NO NEW taxes (allegedly) - although EU governments are concerned about VAT leakages,
and have acted to close this loophole
• Since July 2003, VAT is payable on internet purchases made in countries OUTSIDE the EU
- US companies have to remit the tax revenue to the EU country at the appropriate rate:
“taxation without representation”
• Customs: World Trade Organisation (WTO) rules apply
6)Explain about Free speech?
Ans:-
different national perspectives on free speech be managed in a global environment like the
Internet.
Given that the Internet is supported by governments and private companies, should these
institutional and corporate needs supersede the free speech rights of individuals on the
Internet
read only by those users for whom it is intended. Nowadays various encryption techniques are
available. One of the available techniques commonly used for encryption is Public Key. In Public
Key encryption system, RSA Data Security of Redwood City offers the most popular and
commercially available algorithm. In a Public Key encryption system each user has two keys-
public key and private key. The encryption and decryption algorithms are designed in a way so that
only the private key can decrypt data that is encrypted by the public key. And the public key can
decrypt data, encrypted by the private key. Therefore, one can broadcast the public key to all users.
Data Encryption Standard (DES):- DES is secret-key, symmetric cryptosystem: When used for
communication, both sender and receiver must know the same secret key, which is used both to
encrypt and decrypt the message. DES can also be used for single user encryption, for example, to
store files on a hard disk in encrypted form. In a multi-user environment, however, secure-key
distribution becomes difficult; public-key cryptography, discussed in the next subsection, was
duty to do or refrain from doing something, and the failure to perform such duty is
aiming to restore the person wronged to the position they would occupy if the
contract had not been breached, rather than punish the breaching party. The
a) an offer;
c) a promise to perform,
d) a valuable consideration,
Gambling:-A person engages in gambling if he takes or risks something of value upon the
outcome of a contest of chance not under his control or influence, upon an agreement or
understanding that he or someone else will receive something of value in the event of a certain
outcome. Gambling does not include bonafide business transactions valid under the law of
contracts, such as the purchase or sale at a future date of securities or commodities, contracts of
indemnity or guaranty and life, health or accident insurance.
Unit-5
1)Explain about network of networks?
Ans:- A Network of Network
The internet is a network of thousands of inter connected networks .Included among the
A multitude of access/delivery subnetworks are provided by the local and regional Internet
service providers(ISPs).
Infact, the request and response are each broken into packets, and the packets can follow
different paths.
The paths traversed by the packets are determined by special computers called routers. The
routers have updateable maps of the networks on the internet that enable them to determine the
Ans:- A protocol is a set of rules that determines how two computers communicate with one
another over a network.The protocols around which the internet was designed embody a series of
design principles. Interoperable Layered Simple End –to-End
TCP/IP:-The protocol that solves the global internetworking problem is the Transmission Control
Protocol/Internet Protocol(TCP/IP). The TCP ensures that two computers can communicate with
one another in a reliable fashion.Each TCP communication must be acknowledged in a reasonable
time, then the sending computer must transmit the data. In order for one computer to send a request
or a response to another computer on the internet, the request or response must be divided into
packets that are labeled with the addresses of the sending and receiving computers.This is where IP
comes into play. The IP formats the packets and assign addresses.
program is called an http daemon. In the windows NT world the program is known as an http
service. The primary function of all of these programs is to service HTTP requests. In addition,
application programming interfaces . Enable management and administration of both the server