SlideShare uma empresa Scribd logo
1 de 20
Chapter 7
E-Business
Models
Learning Objectives
• What is e-commerce and e-business?
• Why organisations need to develop e-business
  models?
• What are different e-business models?
• What are different e-business technologies?
• How secure is the technology?
• What are the Legal complexities of e-business
  models?
E-Commerce
• Electronic commerce (E-commerce) can be defined as
  any business transaction conducted using electronic
  means.
• E-commerce is usually associated with buying and
  selling over the Internet, or through a computer-
  mediated network.
• A more complete definition is: E-commerce is the use
  of electronic communications and digital information
  processing technology in business transactions to
  create, transform, and redefine relationships for value
  creation between or among organizations, and
  between organizations and individuals.
E-Business
• E-Business does not mean only buying or
  selling products on-line, it will lead to
  significant changes in the way products are
  customized, distributed and exchanged and
  the way consumers search and bargain for the
  products and services and consume them.
• E-business focus more on enhancement of the
  Customer process, production process and
  employee processes.
Goal of E-Business
• The goal of any E-Business solution is to create
  value, which can be created in the following
  manner:
  – Increased Profitability
  – More Satisfied Customer
  – Increased Employee Motivation
  – Better Supplier Relationships
Categories of E-Business Solutions
•   Business-to-Business (B2B)
•   Business-to-Consumer (B2C)
•   Consumer-to-Consumer (C2C)
•   Consumer-to-Business (C2B)
•   Mobile Commerce
Building E-Business Models
•   Market Opportunity Analysis
•   Value Proposition
•   Online Strategy
•   Resource Management
•   Source of Revenue
Revenue Models
• There are many revenue models that exists on
  the internet, but some of the most popular
  ones are:
  – Advertising
  – Affiliation
  – Licensing
  – Sales
  – Subscription
E-Business Models
•   Broker Models
•   Auction Models
•   Reverse Auction
•   Advertising Model
•   Portal
•   Info-mediary Models
•   Merchant Models
•   Community Models
•   E-Procurement
M-Commerce
• M-commerce allows integration of the traditional
  e-business models on the mobile networks.
• Number of applications of m-commerce includes:
  –   Mobile Ticketing
  –   Mobile Coupons
  –   Mobile Content
  –   Local Services
  –   Mobile Banking
  –   Mobile Marketing
E-Business Security
• There are two broader levels of threats that are
  common. One is the network level of threat and
  the other is the data level threat.
• Network Level threat deals with the security of
  the complete network, including the LANs,
  WANs, Internet, Intranet and Extranets. Enforces
  that only the right users or the authorized users
  are accessing the network.
• Data Level threat in which one needs to ensure
  the security of data when it is on the move from
  one computer to another.
E-Business Security

Network level
• Ensuring only the right people are accessing
  the network
• Password, encrypted smart cards, firewalls
Data Level
• Ensuring the privacy & confidentiality of data
• Data encryption
Data Pipeline/Grid
                        12
Network Security
   Hacking
      hacker is an individual who intends to gain
       unauthorized access to a computer system
      cracker is the term typically used within the
       hacking community to demote a hacker with
       criminal intent
      Three type of hackers - white, black and grey hat
       hackers.
 Firewalls
 Proxy Servers

                                                       13
Common Security Attacks
• Interruption, in terms of delay, denial of receipt or denial of
   service
• Snooping or Interception - Unauthorized party gaining access
   to information by browsing through files.
• Spoofing or Masquerading - Spurious information is inserted
   into the system or network by making it appears as if it is from a legitimate entity
• Non-Repudiation - False denial that an entity created something
• Modification or alteration - Unauthorized party changes
   information in transit or information stored for subsequent access
• Malicious code / Applet (MalWare) - Malicious code or
   Applets includes a variety of threats such as viruses, worms and Trojan horses.


                                                                                          14
Data Level Security Concerns

– Authenticity - the sender (either client or server) of a
  message - who he/she is or it claims to be
– Privacy - the contents of a message are secret and only
  known to the sender and receiver
– Integrity - the contents of a message are not modified
  (intentionally or accidentally) during transmission
– Non-repudiation - the sender of a message cannot deny that
  he, she or it actually sent the message
– Confidentiality - refers to the ability to ensure that messages
  and data are available only to those who are authorized to
  view them
– Availability - refers to the ability to ensure that an e-
  commerce site continues to function as intended

                                                               15
Cryptography
• Cryptography is a means of providing
  information security. Cryptography is the study
  of mathematical techniques related to aspects
  of information security such as confidentiality,
  integrity, authentication, and non-repudiation
  which form the main goals of cryptography.
• Cryptographic techniques :
  –   Symmetric-key Cryptography
  –   Public-key Cryptography
  –   Digital Signature
  –   Digital Certificate
                                               16
Secure Socket Layer (SSL)
• A protocol that operates at the TCP/IP layer
• Encrypts communications between browsers and
  servers
• Supports a variety of encryption algorithms and
  authentication methods
• Secure negotiated session is a client-server
  session in which the URL of the requested
  document, along with the contents, the contents
  of forms, and the cookies exchanged, are
  encrypted.
• Session key is a unique symmetric encryption key
  chosen for a single secure session
                                                 17
E-Business – A Competitive Tool
• Improved customer service gives customers tangible
  benefits, i.e. faster delivery times, and a better
  understanding of needs.
• An increase in business opportunities is another one of the
  greatest benefits of E-Business; that can result in improved
  brand image and enhance a company's stock market
  valuation.
• Greater efficiency enables shorter product development
  cycles and enhanced inventory turnover, thus freeing up
  capital by receiving payment earlier in the purchase process.
• Greater profitability: as companies exist to make money, by
  utilizing the E-Business methodologies explained, companies
  could improve overall effectiveness and directly increase
  profitability.
Summary
•   E-business is a method of doing business using technology.
•   Electronic commerce (E-commerce) can be defined as any business transaction conducted
    using electronic means. E-commerce is usually associated with buying and selling over the
    Internet, or through a computer-mediated network.
•   Whereas, E-Business does not mean only buying or selling products on-line, it will lead to
    significant changes in the way products are customized, distributed and exchanged and the
    way consumers search and bargain for the products and services and consume them.
•   The major categories of e-business solutions that have been implemented by the different
    organization worldwide are: Business-to-business (B2B); Business-to-Consumer (B2C);
    Consumer-to-consumer (C2C) and Consumer-to-Business (C2B).
•   Mobile Commerce (M-Commerce) is the buying and selling of goods and services through
    wireless technology, such as, handheld devices such as cellular telephones and personal
    digital assistants (PDAs).
•   M-commerce is quite popular in financial services including mobile banking. Customers are
    using their mobile phones to access their accounts and pay their bills. Customer is also using
    this for utility services, information services and entertainment.
•   The E-Business model is like any business model, which describes how an organiszation
    functions, how it offer its products or services, how it generates revenue, and how it will
    create and adapt to new markets and technologies. It has five traditional components
    market opportunity analysis, value proposition, on-line strategy, resource management and
    sources of revenue.
•   The models that were discussed in the chapter include, broker model, auction brokers,
    reverse auction, advertising model, portals, info-mediaries, merchant models, e-
    procurement and community models.
Summary
•   An organisation that is implementing e-business models needs to secure their models from
    multiple levels of threats – from hackers, insiders, pirates and thieves. One of the biggest
    potential security problems in an E-Business is of human, rather than electronic, origin.
•   There are two broader levels of threats that are common. One is the network level of threat
    and the other is the data level threat.
•   In a network level threat, one needs to ensure the security of the complete network,
    including the LANs, WANs, Internet, Intranet and Extranets. This will enforce that only the
    right users or the authorized users are accessing the network. The basic threat is from the
    Hackers who try to hack the network to get an unauthorized access.
•   In data level threat one needs to ensure the security of data when it is on the move from
    one computer to another. Here the basic threat is either from the hackers or even from the
    insiders.
•   Hacker is an individual who intends to gain unauthorized access to a computer system,
    whereas Cracker is the term typically used within the hacking community to demote a
    hacker with criminal intent. There are three types of hackers, white-hat, grey-hat and black-
    hat hackers. Hackers use different kind of techniques that may include Denial of Service,
    Spoofing, Sniffing and password cracking.
•   A firewall is hardware or software solution that insulates a private network from a public
    network using carefully established controls on the types of request they will route through
    to the private network for processing and fulfillment.
•   The another level of security threat is the data level security. Data when is communicated
    between two parties for business purpose needs to meet the challenge like confidentiality,
    authenticity, integrity, non-repudiation, privacy, authorization and validation.

Mais conteúdo relacionado

Mais procurados

Industry framework of e commerce
Industry framework of e commerceIndustry framework of e commerce
Industry framework of e commerce
ANOOPA NARAYANAN
 
Security consideration with e commerce
Security consideration with e commerceSecurity consideration with e commerce
Security consideration with e commerce
StudsPlanet.com
 

Mais procurados (20)

IT_8005_Electronic Commerce_Unit_I
IT_8005_Electronic Commerce_Unit_IIT_8005_Electronic Commerce_Unit_I
IT_8005_Electronic Commerce_Unit_I
 
E-Commerce Infrastructures
E-Commerce InfrastructuresE-Commerce Infrastructures
E-Commerce Infrastructures
 
Industry framework of e commerce
Industry framework of e commerceIndustry framework of e commerce
Industry framework of e commerce
 
E commerce security 4
E commerce security 4E commerce security 4
E commerce security 4
 
E commerce unit 2
E commerce unit 2E commerce unit 2
E commerce unit 2
 
E commerce technologies 3
E commerce technologies 3E commerce technologies 3
E commerce technologies 3
 
IT8005_EC_Unit_II_Building_ECommerce
IT8005_EC_Unit_II_Building_ECommerceIT8005_EC_Unit_II_Building_ECommerce
IT8005_EC_Unit_II_Building_ECommerce
 
E commerce technologies
E commerce technologiesE commerce technologies
E commerce technologies
 
E-Commerce (ITSP501 course)
E-Commerce (ITSP501 course)E-Commerce (ITSP501 course)
E-Commerce (ITSP501 course)
 
IT8005_EC_Unit_V_Features_Of_E_Commerce_Technology
IT8005_EC_Unit_V_Features_Of_E_Commerce_TechnologyIT8005_EC_Unit_V_Features_Of_E_Commerce_Technology
IT8005_EC_Unit_V_Features_Of_E_Commerce_Technology
 
Information 2nd lesson
Information 2nd lessonInformation 2nd lesson
Information 2nd lesson
 
A deep walk on the dark side of information security
A deep walk on the dark side of information securityA deep walk on the dark side of information security
A deep walk on the dark side of information security
 
Ecommerce
EcommerceEcommerce
Ecommerce
 
Security consideration with e commerce
Security consideration with e commerceSecurity consideration with e commerce
Security consideration with e commerce
 
Introduction to electronic commerces
Introduction to electronic commercesIntroduction to electronic commerces
Introduction to electronic commerces
 
Unit 2 e commerce applications
Unit 2 e commerce applicationsUnit 2 e commerce applications
Unit 2 e commerce applications
 
Ecommerce
EcommerceEcommerce
Ecommerce
 
E business
E businessE business
E business
 
Introduction to e
Introduction to eIntroduction to e
Introduction to e
 
Business technology of internet and e commerce businesses
Business technology of internet and e commerce businessesBusiness technology of internet and e commerce businesses
Business technology of internet and e commerce businesses
 

Semelhante a Chapter7

protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...
Rishav Gupta
 
Chapter 9 section i
Chapter 9 section iChapter 9 section i
Chapter 9 section i
mail4me
 
E commerce - Elective 4
E commerce - Elective 4E commerce - Elective 4
E commerce - Elective 4
nellyportado
 

Semelhante a Chapter7 (20)

Introduction to e commerce
Introduction to e commerceIntroduction to e commerce
Introduction to e commerce
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...
 
Electronic Commerce
Electronic CommerceElectronic Commerce
Electronic Commerce
 
Introduction to E commerce
Introduction to E commerceIntroduction to E commerce
Introduction to E commerce
 
E-commerce and Internet Marketing
E-commerce and Internet MarketingE-commerce and Internet Marketing
E-commerce and Internet Marketing
 
Chapter 9 section i
Chapter 9 section iChapter 9 section i
Chapter 9 section i
 
E-commerce.pptx
E-commerce.pptxE-commerce.pptx
E-commerce.pptx
 
E commerce - Elective 4
E commerce - Elective 4E commerce - Elective 4
E commerce - Elective 4
 
Unit 1 Introduction to E-Commerce -Basic Concepts
Unit 1 Introduction to E-Commerce -Basic ConceptsUnit 1 Introduction to E-Commerce -Basic Concepts
Unit 1 Introduction to E-Commerce -Basic Concepts
 
E commerce
E commerceE commerce
E commerce
 
E-commerce
E-commerceE-commerce
E-commerce
 
academic model.docx
academic model.docxacademic model.docx
academic model.docx
 
E commerce(report)
E commerce(report)E commerce(report)
E commerce(report)
 
E comerce calonia
E comerce caloniaE comerce calonia
E comerce calonia
 
E Commerce -Security Threats and Challenges
E Commerce -Security Threats and ChallengesE Commerce -Security Threats and Challenges
E Commerce -Security Threats and Challenges
 
Security issues in E-commerce
Security issues in E-commerceSecurity issues in E-commerce
Security issues in E-commerce
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
 
E Commerce Basics
E Commerce BasicsE Commerce Basics
E Commerce Basics
 
Cyber security best practices power point presentation
Cyber security best practices power point presentationCyber security best practices power point presentation
Cyber security best practices power point presentation
 

Mais de Knowlittle Matharu (20)

Hospital management
Hospital managementHospital management
Hospital management
 
Tqm
TqmTqm
Tqm
 
Dialysis unit
Dialysis unitDialysis unit
Dialysis unit
 
Advertisingagencyanditsfunctions 110214051140-phpapp02
Advertisingagencyanditsfunctions 110214051140-phpapp02Advertisingagencyanditsfunctions 110214051140-phpapp02
Advertisingagencyanditsfunctions 110214051140-phpapp02
 
Green hospitals
Green hospitalsGreen hospitals
Green hospitals
 
Green hospitals
Green hospitalsGreen hospitals
Green hospitals
 
Role of it in scm
Role of it in scmRole of it in scm
Role of it in scm
 
Attachments (1)
Attachments (1)Attachments (1)
Attachments (1)
 
Dermatology
DermatologyDermatology
Dermatology
 
Dermatology 2008 trial
Dermatology 2008 trialDermatology 2008 trial
Dermatology 2008 trial
 
Cranial cavity
Cranial cavityCranial cavity
Cranial cavity
 
Diabetes update
Diabetes updateDiabetes update
Diabetes update
 
Chemical safety bio-medical_waste_management_self_learning_document_for_docto...
Chemical safety bio-medical_waste_management_self_learning_document_for_docto...Chemical safety bio-medical_waste_management_self_learning_document_for_docto...
Chemical safety bio-medical_waste_management_self_learning_document_for_docto...
 
Chapter10
Chapter10Chapter10
Chapter10
 
Chapter9
Chapter9Chapter9
Chapter9
 
Chapter8
Chapter8Chapter8
Chapter8
 
Chapter4
Chapter4Chapter4
Chapter4
 
Chapter3
Chapter3Chapter3
Chapter3
 
Chapter2
Chapter2Chapter2
Chapter2
 
Chapter1
Chapter1Chapter1
Chapter1
 

Último

FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
dollysharma2066
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
dlhescort
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
amitlee9823
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
amitlee9823
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
amitlee9823
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Sheetaleventcompany
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
daisycvs
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
lizamodels9
 

Último (20)

Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLJAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
 

Chapter7

  • 2. Learning Objectives • What is e-commerce and e-business? • Why organisations need to develop e-business models? • What are different e-business models? • What are different e-business technologies? • How secure is the technology? • What are the Legal complexities of e-business models?
  • 3. E-Commerce • Electronic commerce (E-commerce) can be defined as any business transaction conducted using electronic means. • E-commerce is usually associated with buying and selling over the Internet, or through a computer- mediated network. • A more complete definition is: E-commerce is the use of electronic communications and digital information processing technology in business transactions to create, transform, and redefine relationships for value creation between or among organizations, and between organizations and individuals.
  • 4. E-Business • E-Business does not mean only buying or selling products on-line, it will lead to significant changes in the way products are customized, distributed and exchanged and the way consumers search and bargain for the products and services and consume them. • E-business focus more on enhancement of the Customer process, production process and employee processes.
  • 5. Goal of E-Business • The goal of any E-Business solution is to create value, which can be created in the following manner: – Increased Profitability – More Satisfied Customer – Increased Employee Motivation – Better Supplier Relationships
  • 6. Categories of E-Business Solutions • Business-to-Business (B2B) • Business-to-Consumer (B2C) • Consumer-to-Consumer (C2C) • Consumer-to-Business (C2B) • Mobile Commerce
  • 7. Building E-Business Models • Market Opportunity Analysis • Value Proposition • Online Strategy • Resource Management • Source of Revenue
  • 8. Revenue Models • There are many revenue models that exists on the internet, but some of the most popular ones are: – Advertising – Affiliation – Licensing – Sales – Subscription
  • 9. E-Business Models • Broker Models • Auction Models • Reverse Auction • Advertising Model • Portal • Info-mediary Models • Merchant Models • Community Models • E-Procurement
  • 10. M-Commerce • M-commerce allows integration of the traditional e-business models on the mobile networks. • Number of applications of m-commerce includes: – Mobile Ticketing – Mobile Coupons – Mobile Content – Local Services – Mobile Banking – Mobile Marketing
  • 11. E-Business Security • There are two broader levels of threats that are common. One is the network level of threat and the other is the data level threat. • Network Level threat deals with the security of the complete network, including the LANs, WANs, Internet, Intranet and Extranets. Enforces that only the right users or the authorized users are accessing the network. • Data Level threat in which one needs to ensure the security of data when it is on the move from one computer to another.
  • 12. E-Business Security Network level • Ensuring only the right people are accessing the network • Password, encrypted smart cards, firewalls Data Level • Ensuring the privacy & confidentiality of data • Data encryption Data Pipeline/Grid 12
  • 13. Network Security  Hacking  hacker is an individual who intends to gain unauthorized access to a computer system  cracker is the term typically used within the hacking community to demote a hacker with criminal intent  Three type of hackers - white, black and grey hat hackers.  Firewalls  Proxy Servers 13
  • 14. Common Security Attacks • Interruption, in terms of delay, denial of receipt or denial of service • Snooping or Interception - Unauthorized party gaining access to information by browsing through files. • Spoofing or Masquerading - Spurious information is inserted into the system or network by making it appears as if it is from a legitimate entity • Non-Repudiation - False denial that an entity created something • Modification or alteration - Unauthorized party changes information in transit or information stored for subsequent access • Malicious code / Applet (MalWare) - Malicious code or Applets includes a variety of threats such as viruses, worms and Trojan horses. 14
  • 15. Data Level Security Concerns – Authenticity - the sender (either client or server) of a message - who he/she is or it claims to be – Privacy - the contents of a message are secret and only known to the sender and receiver – Integrity - the contents of a message are not modified (intentionally or accidentally) during transmission – Non-repudiation - the sender of a message cannot deny that he, she or it actually sent the message – Confidentiality - refers to the ability to ensure that messages and data are available only to those who are authorized to view them – Availability - refers to the ability to ensure that an e- commerce site continues to function as intended 15
  • 16. Cryptography • Cryptography is a means of providing information security. Cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, integrity, authentication, and non-repudiation which form the main goals of cryptography. • Cryptographic techniques : – Symmetric-key Cryptography – Public-key Cryptography – Digital Signature – Digital Certificate 16
  • 17. Secure Socket Layer (SSL) • A protocol that operates at the TCP/IP layer • Encrypts communications between browsers and servers • Supports a variety of encryption algorithms and authentication methods • Secure negotiated session is a client-server session in which the URL of the requested document, along with the contents, the contents of forms, and the cookies exchanged, are encrypted. • Session key is a unique symmetric encryption key chosen for a single secure session 17
  • 18. E-Business – A Competitive Tool • Improved customer service gives customers tangible benefits, i.e. faster delivery times, and a better understanding of needs. • An increase in business opportunities is another one of the greatest benefits of E-Business; that can result in improved brand image and enhance a company's stock market valuation. • Greater efficiency enables shorter product development cycles and enhanced inventory turnover, thus freeing up capital by receiving payment earlier in the purchase process. • Greater profitability: as companies exist to make money, by utilizing the E-Business methodologies explained, companies could improve overall effectiveness and directly increase profitability.
  • 19. Summary • E-business is a method of doing business using technology. • Electronic commerce (E-commerce) can be defined as any business transaction conducted using electronic means. E-commerce is usually associated with buying and selling over the Internet, or through a computer-mediated network. • Whereas, E-Business does not mean only buying or selling products on-line, it will lead to significant changes in the way products are customized, distributed and exchanged and the way consumers search and bargain for the products and services and consume them. • The major categories of e-business solutions that have been implemented by the different organization worldwide are: Business-to-business (B2B); Business-to-Consumer (B2C); Consumer-to-consumer (C2C) and Consumer-to-Business (C2B). • Mobile Commerce (M-Commerce) is the buying and selling of goods and services through wireless technology, such as, handheld devices such as cellular telephones and personal digital assistants (PDAs). • M-commerce is quite popular in financial services including mobile banking. Customers are using their mobile phones to access their accounts and pay their bills. Customer is also using this for utility services, information services and entertainment. • The E-Business model is like any business model, which describes how an organiszation functions, how it offer its products or services, how it generates revenue, and how it will create and adapt to new markets and technologies. It has five traditional components market opportunity analysis, value proposition, on-line strategy, resource management and sources of revenue. • The models that were discussed in the chapter include, broker model, auction brokers, reverse auction, advertising model, portals, info-mediaries, merchant models, e- procurement and community models.
  • 20. Summary • An organisation that is implementing e-business models needs to secure their models from multiple levels of threats – from hackers, insiders, pirates and thieves. One of the biggest potential security problems in an E-Business is of human, rather than electronic, origin. • There are two broader levels of threats that are common. One is the network level of threat and the other is the data level threat. • In a network level threat, one needs to ensure the security of the complete network, including the LANs, WANs, Internet, Intranet and Extranets. This will enforce that only the right users or the authorized users are accessing the network. The basic threat is from the Hackers who try to hack the network to get an unauthorized access. • In data level threat one needs to ensure the security of data when it is on the move from one computer to another. Here the basic threat is either from the hackers or even from the insiders. • Hacker is an individual who intends to gain unauthorized access to a computer system, whereas Cracker is the term typically used within the hacking community to demote a hacker with criminal intent. There are three types of hackers, white-hat, grey-hat and black- hat hackers. Hackers use different kind of techniques that may include Denial of Service, Spoofing, Sniffing and password cracking. • A firewall is hardware or software solution that insulates a private network from a public network using carefully established controls on the types of request they will route through to the private network for processing and fulfillment. • The another level of security threat is the data level security. Data when is communicated between two parties for business purpose needs to meet the challenge like confidentiality, authenticity, integrity, non-repudiation, privacy, authorization and validation.