Breaking

रविवार, 12 अप्रैल 2020

BCA 6th Sem Notes-Protecting Privacy, Protecting Intellectual Property


  • UNIT-I 
Introduction to E-Commerce
The Scope of Electronic Commerce 
Definition of Electronic Commerce,
Electronic E-commerce and the Trade Cycle
Electronic Markets, Electronic Data Interchange
Internet Commerce, E-Commerce in Perspective
Business Strategy in an Electronic Age: Supply Chains
Porter’s Value Chain Model, Inter-Organizational Value Chains
Competitive Strategy, Porter’s Model
First Mover Advantage Sustainable Competitive Advantage
Competitive Advantage using E-Commerce
Business Strategy, Introduction to Business Strategy
Strategic Implications of IT, Technology
Business Environment, Business Capability
Exiting Business Strategy, Strategy Formulation & Implementation Planning
E-Commerce Implementation
E-Commerce Evaluation









  • UNIT-II 
  • Business-to-Business Electronic Commerce
    Characteristics of B2B EC
    Models of B2B Ec
    Procurement Management Using the Buyer’s Internal Marketplace
    Just in Time Delivery
    B2B Models
    Auctions and Services from Traditional to Internet-Based EDI
    The Role of Software Agents for B2B EC
    Electronic marketing in B2B
    Solutions of B2B EC
    Managerial Issues
    Electronic Data Interchange (EDI)
    EDI: The Nuts and Bolts
    EDI & Business









  • UNIT-III 
  • Internet and Extranet
    Automotive Network Exchange
    The Largest Extranet
    Architecture of the Internet
    Intranet and Extranet
    Intranet software
    Applications of Intranets
    Intranet Application Case Studies
    Considerations in Intranet Deployment
    The Extranets,
     The structures of Extranets
    Extranet products & services
    Applications of Extranets
    Business Models of Extranet Applications, Managerial Issues
    Electronic Payment Systems
    Is SET a failure
    Electronic Payments & Protocols
    Security Schemes in Electronic payment systems
    Electronic Credit card system on the Internet
    Electronic Fund Transfer and Debit cards on the Internet
    Stored – value Cards and E-Cash
    Electronic Check Systems
    Prospect of Electronic Payment Systems
    Managerial Issues

  • UNIT-V                 

  • Protecting Privacy, Protecting Intellectual Property

    Protecting Intellectual can be anything from a specific assembling procedure to plans for an item dispatch, a competitive innovation like a synthetic recipe, or a rundown of the nations where your licenses are enlisted. It might assist with considering it elusive exclusive data. The World Intellectual Property Organization's (WIPO's) formal meaning of IP is manifestations of the psyche — creations, scholarly and aesthetic works, images, names, pictures and structures utilized in business. 
    Protecting Intellectual is isolated into two classifications: Industrial property incorporates yet isn't restricted to licenses for developments, trademarks, modern plans, and geological signs. Copyright covers abstract works like books, sonnets and plays, movies, music and creative works, for instance, drawings, artworks, photos, models, site pages and structural plans. Rights identified with copyright incorporate those of performing specialists in their exhibitions, makers of phonograms in their accounts, and telecasters in their radio and TV programs. 
    The four lawfully characterized classifications of licensed innovation for which robbery can be indicted are: 
    1. Trade Secrets
    2. Trademarks
    3. Copyrights, and
    4. Patent
    Patents grant the legal right award the lawful option to avoid any other person from assembling or showcasing your interesting substantial things. They can likewise be enlisted in remote nations to help shield worldwide contenders from discovering what your organization is doing. When you hold a patent, others can apply to permit your item. Licenses can keep going for a long time. 
    Trademarks are names, expressions, sounds or images utilized in relationship with administrations or items. A trademark regularly interfaces a brand with a degree of value on which organizations construct notoriety. Trademark security goes on for a long time after enrollment and can be recharged in ceaselessness. 
    Copyright ensures composed or imaginative articulations fixed in a substantial medium — books, sonnets, melodies or films. Copyright ensures the declaration of thought, however not simply the thought. The proprietor of a copyrighted work has the option to duplicate it, to make subsidiary works from it, (for example, a film dependent on a book), or to sell, perform or show the work to general society. You don't have to enlist your material to hold a copyright, however, enrollment is essential on the off chance that you choose to sue for copyright encroachment. Copyright goes on for the life of the creator in addition to an additional 50 years. 
    Trade secrets, for example, gadget or aggregation of information that gives the client a bit of leeway over contenders is a competitive advantage. They are secured by state, instead of government, law. To secure the mystery, a business must demonstrate that it increases the value of the organization — that it is, truth be told, a mystery — and that fitting measures have been taken inside the organization to shield the mystery, for example, confining information to a select bunch of administrators

    कोई टिप्पणी नहीं:

    एक टिप्पणी भेजें