- UNIT-I
The Scope of Electronic Commerce
Definition of Electronic Commerce,
Electronic E-commerce and the Trade Cycle
Electronic Markets, Electronic Data Interchange
Internet Commerce, E-Commerce in Perspective
Business Strategy in an Electronic Age: Supply Chains
Porter’s Value Chain Model, Inter-Organizational Value Chains
Competitive Strategy, Porter’s Model
First Mover Advantage Sustainable Competitive Advantage
Competitive Advantage using E-Commerce
Business Strategy, Introduction to Business Strategy
Strategic Implications of IT, Technology
Business Environment, Business Capability
Exiting Business Strategy, Strategy Formulation & Implementation Planning
E-Commerce Implementation
E-Commerce Evaluation
Characteristics of B2B EC
Models of B2B Ec
Procurement Management Using the Buyer’s Internal Marketplace
Just in Time Delivery
B2B Models
Auctions and Services from Traditional to Internet-Based EDI
The Role of Software Agents for B2B EC
Electronic marketing in B2B
Solutions of B2B EC
Managerial Issues
Electronic Data Interchange (EDI)
EDI: The Nuts and Bolts
EDI & Business
Automotive Network Exchange
The Largest Extranet
Architecture of the Internet
Intranet and Extranet
Intranet software
Applications of Intranets
Intranet Application Case Studies
Considerations in Intranet Deployment
The Extranets,
The structures of Extranets
Extranet products & services
Applications of Extranets
Business Models of Extranet Applications, Managerial Issues
Electronic Payment Systems
Is SET a failure
Electronic Payments & Protocols
Security Schemes in Electronic payment systems
Electronic Credit card system on the Internet
Electronic Fund Transfer and Debit cards on the Internet
Stored – value Cards and E-Cash
Electronic Check Systems
Prospect of Electronic Payment Systems
Managerial Issues
Internet Security
Security is a fundamental piece of any exchange that happens over the web. Clients will lose his/her confidence in e-business if its security is undermined. Following are the basic necessities for safe e-installments/exchanges −
Secrecy − information ought not to be open to an unapproved individual. It ought not be blocked during the transmission.
Honesty − Information ought not to be modified during its transmission over the system.
Accessibility − Information ought to be accessible any place and at whatever point required inside a period limit indicated.
Genuineness − There ought to be a system to validate a client before giving him/her entrance to the necessary data.
Non-Repudiability − It is the insurance against the disavowal of request or forswearing of installment. When a sender communicates something specific, the sender ought not to have the option to deny sending the message. Correspondingly, the beneficiary of the message ought not to have the option to deny the receipt.
Encryption − Information ought to be scrambled and unscrambled distinctly by an approved client.
Auditability − Data ought to be recorded so that it very well may be reviewed for honesty prerequisites.
Measures to guarantee Security
Significant safety efforts are following −
Encryption − It is a compelling and functional approach to protect the information being transmitted over the system. The sender of the data scrambles the information utilizing a mystery code and just the predetermined recipient can unscramble the information utilizing the equivalent or an alternate mystery code.
Advanced Signature − Digital mark guarantees the genuineness of the data. An advanced mark is an e-signature validated through encryption and secret key.
Security Certificates − Security declaration is a one of a kind advanced id used to check the character of an individual site or client.
Security Protocols in the Internet
We will talk about here a portion of the well-known conventions utilized over the web to guarantee made sure about online exchanges.
Secure Socket Layer (SSL)
It is the most regularly utilized convention and is generally utilized over the business. It meets following security prerequisites −
Verification
Encryption
Uprightness
Non-reputability
"https://" is to be utilized for HTTP urls with SSL, whereas "http:/" is to be utilized for HTTP urls without SSL.
Secure Hypertext Transfer Protocol (SHTTP)
SHTTP broadens the HTTP web convention with open key encryption, validation, and computerized signature over the web. Secure HTTP bolsters numerous security components, giving security to the end-clients. SHTTP works by arranging encryption plot types utilized between the customer and the server.
Secure Electronic Transaction
It is a protected convention created by MasterCard and Visa in cooperation. Hypothetically, it is the best security convention. It has the accompanying segments −
Card Holder's Digital Wallet Software − Digital Wallet permits the cardholder to make secure buys online by means of point and snap interface.
Vendor Software − This product encourages traders to speak with potential clients and money related establishments in a protected way.
Installment Gateway Server Software − Payment entryway gives programmed and standard installment process. It bolsters the procedure for the shipper's endorsement demand.
Endorsement Authority Software − This product is utilized by money related organizations to give advanced testaments to cardholders and dealers, and to empower them to enroll their record understandings for secure electronic trade.
Secrecy − information ought not to be open to an unapproved individual. It ought not be blocked during the transmission.
Honesty − Information ought not to be modified during its transmission over the system.
Accessibility − Information ought to be accessible any place and at whatever point required inside a period limit indicated.
Genuineness − There ought to be a system to validate a client before giving him/her entrance to the necessary data.
Non-Repudiability − It is the insurance against the disavowal of request or forswearing of installment. When a sender communicates something specific, the sender ought not to have the option to deny sending the message. Correspondingly, the beneficiary of the message ought not to have the option to deny the receipt.
Encryption − Information ought to be scrambled and unscrambled distinctly by an approved client.
Auditability − Data ought to be recorded so that it very well may be reviewed for honesty prerequisites.
Measures to guarantee Security
Significant safety efforts are following −
Encryption − It is a compelling and functional approach to protect the information being transmitted over the system. The sender of the data scrambles the information utilizing a mystery code and just the predetermined recipient can unscramble the information utilizing the equivalent or an alternate mystery code.
Advanced Signature − Digital mark guarantees the genuineness of the data. An advanced mark is an e-signature validated through encryption and secret key.
Security Certificates − Security declaration is a one of a kind advanced id used to check the character of an individual site or client.
Security Protocols in the Internet
We will talk about here a portion of the well-known conventions utilized over the web to guarantee made sure about online exchanges.
Secure Socket Layer (SSL)
It is the most regularly utilized convention and is generally utilized over the business. It meets following security prerequisites −
Verification
Encryption
Uprightness
Non-reputability
"https://" is to be utilized for HTTP urls with SSL, whereas "http:/" is to be utilized for HTTP urls without SSL.
Secure Hypertext Transfer Protocol (SHTTP)
SHTTP broadens the HTTP web convention with open key encryption, validation, and computerized signature over the web. Secure HTTP bolsters numerous security components, giving security to the end-clients. SHTTP works by arranging encryption plot types utilized between the customer and the server.
Secure Electronic Transaction
It is a protected convention created by MasterCard and Visa in cooperation. Hypothetically, it is the best security convention. It has the accompanying segments −
Card Holder's Digital Wallet Software − Digital Wallet permits the cardholder to make secure buys online by means of point and snap interface.
Vendor Software − This product encourages traders to speak with potential clients and money related establishments in a protected way.
Installment Gateway Server Software − Payment entryway gives programmed and standard installment process. It bolsters the procedure for the shipper's endorsement demand.
Endorsement Authority Software − This product is utilized by money related organizations to give advanced testaments to cardholders and dealers, and to empower them to enroll their record understandings for secure electronic trade.
कोई टिप्पणी नहीं:
एक टिप्पणी भेजें