bis10_06new
TRANSCRIPT
-
7/31/2019 bis10_06new
1/37
1
E-Commerce:Digital
Markets,Digital GoodsofBusiness Information System
-
7/31/2019 bis10_06new
2/37
2
Major Features of E-Commerce
E-Commerce includes commercial
transaction between and organization and
individuals. E-Commerce technology is available every
where,it has global reach any one can
connect to internet to access e-commerce.
-
7/31/2019 bis10_06new
3/37
3
Major Features of E-Commerce
It operates with respect to universal
standards every where,it is cost effectivethen traditional commerce.
It allows two way communication betweentwo different parties.It facilitate exchange of
online Information,audio,visual and Text
-
7/31/2019 bis10_06new
4/37
4
It permits customization and personalization of
Information.It facilitate merchants and vendor totarget market segments.
It has created digital market place which is more
transparent than traditional market place.
Major Features of E-Commerce
-
7/31/2019 bis10_06new
5/37
5
Major Features of E-Commerce
Digital Markets are more flexible and efficient
with reduced transaction cost and ability to
change prices dynamically
New Business models of E-Commerce have
come up such as B2B,B2C,C2C,C2B,G2C,M2C
It allows SMES to capture important
information,Data and Global branding.
-
7/31/2019 bis10_06new
6/37
6
Describe the Role of Emerging Digital Firm & E-Business
-
7/31/2019 bis10_06new
7/37
7
What are the categories of electroniccommerce and associated business models?
The three Major categories of electronic
commerce and associated Businessmodels are,B2B,B2C,C2C,G2C,M2C.
B2C:- Involves retailing product and
services to individual shoppers egamazon.com
-
7/31/2019 bis10_06new
8/37
8
What are the categories of electroniccommerce and associated business models?
B2B:- involves sales of goods and services
among businesses eg:-
www.sailindia.com,where manufacturingunits buys and sale core iron.
C2C:- Involves consumer selling directly
from consumer. Eg ebay.com,auction site
such as makemybit.com
-
7/31/2019 bis10_06new
9/37
9
What are the categories of electroniccommerce and associated business models?
G2C:-It involves exchange of information
between govt web based portals and its
citizen for example incomtax.com where a
citizen can fill in their returns,RTI.com right
to information ,which contains detail
description about govt policies that hasbeen framed with constitutional bills and
amendments.
-
7/31/2019 bis10_06new
10/37
10
What are the categories of electroniccommerce and associated business models?
M2C MOBILE COMMERCE Now mobile phones and other hand held
appliances are Internet enabled to sendtext messages and email access websiteand make purchase.
The use of hand held wireless device for
purchasing goods and services from anylocation has been termed as mobilecommerce
-
7/31/2019 bis10_06new
11/37
11
What are the categories of electroniccommerce and associated business models?
Collaborative Commerce
Intranets provide a rich set of tools for
creating collaborative environment in whichmembers of an organization can share
information and exchange ideas on
common or related assignments.
-
7/31/2019 bis10_06new
12/37
12
What are the types of PaymentSystem
Digital credit cards payment system
extends the functionality of existing credit
card payment system.so that they can beused for online shopping payments.
A digital wallet that securely stores credit
card and owner identification information
and provides that information at an
electronic commerce site.
-
7/31/2019 bis10_06new
13/37
13
What are the types of PaymentSystem
Micro payment system have been
developed for purchase of less than 1000
Rs.Accumulated balance digital paymentsystem are useful for such purpose.
Accumulated Balance digital payment
system enables the user to make micro
payments and purchase on the web.
-
7/31/2019 bis10_06new
14/37
14
What are the types of PaymentSystem
Stored Value Payments System.
Smart cards are another type of stored
value system for micro payments.It is aplastic cards the size of credit cards that
stores digital information.It can store health
record,identification data,or telephone
number as an electronic purse.it is used to
make Instant online Payment.
-
7/31/2019 bis10_06new
15/37
15
What are the types of Payment
System Digital Cash or electronic cash is a currency
represented in electronic form that works
outside the normal network of moneytransfer. User are supplied with client
software and can exchange money with one
another.
-
7/31/2019 bis10_06new
16/37
16
What are the types of PaymentSystem
Peer-to-Peer Payment System
Such as Pay pal serve people who want to
send money to vendor or individuals whoare not set up to accept credit cards .
The party sending money uses his or her
credit card to create an account with thedesignated payment at a website dedicated
to peer-to peer Payments.
-
7/31/2019 bis10_06new
17/37
17
Virtual store Fronts Sell physical product directly to consumer or to
individual business.eg amazon.com,redenvelope.com.
Information broker :- Provides product,pricing and availability
information to individuals andbusinesses.Generates revenue from advertisingor from direct buyer or seller. Egmagicbricks.com
What are Internet Business models explain with
example?
-
7/31/2019 bis10_06new
18/37
18
Transaction Broker:-saves user money and time
by processing online sales transaction and
generating a fee each time a transaction occurs.
e.g. :-etrade.com,expedia.com
Online Marketplace:-Provides a digital
environment where buyer and seller can meet
search for products,display products andestablish prices for those products, eg ebay.com
What are Internet Business models explainwith example?
-
7/31/2019 bis10_06new
19/37
19
What are Internet Business models explainwith example?
WEBPORTALS:- Provides initial point ofentry to the web along with specializedcontents and other services.egyahoo.com,msn.com
Virtual Community:-Provides an onlinemeeting place where people with similar
interest can communicate and find usefulinformation.youtube.com,myspace.com,
ivillage.com
-
7/31/2019 bis10_06new
20/37
20
What are Internet Business models explainwith example?
CONTENT PROVIDER:-creates revenue byproviding digital content such as digitalimage ,news,music or videos over the
web.consumer may pay to access the contente.g. itunes.com,games.com
ONLINE SERVICE PROVIDER:- providesonline service generates revenue from
subscription or transaction fee,from advertisingor from collecting marketing information fromuser.eg:-sales force.com,streamload.com
-
7/31/2019 bis10_06new
21/37
21
Features of Firewalls
Protection from Spam: Spam is anunsolicited commercial email messagesand are not created with the same
malicious intent as threats like viruses, butare now having a negative economicimpact on the same order of magnitude.Spam clogs networks, hogs disk space andwastes countless hours of user timereading and dealing with the messages.
-
7/31/2019 bis10_06new
22/37
22
System Vulnerability and Abuse
Automated data are more susceptible to
destruction, fraud, error and misuse
Todays organization is highly dependent of
automated data for their business
processes. Disaster due to informationsystem failure is bound to create havoc
-
7/31/2019 bis10_06new
23/37
23
Threats to Information System
Hardware Failure
Software Failure
Attacks by malicious software
Sabotage
Theft of data, services, or equipments
-
7/31/2019 bis10_06new
24/37
24
Threats to Information System
Accidents / Natural Disaster
User Error
Bugs in the program
Telecommunication failure
-
7/31/2019 bis10_06new
25/37
25
Concern for The System Ownersand Developers
Disaster Recovery Plan Plan for running the business in the event of a
system disaster
Security Policy Policies, procedures & technical measures
used to prevent unauthorized access,
alteration, theft or physical damage.
-
7/31/2019 bis10_06new
26/37
26
Concern for The System Owners andDevelopers
Software Quality Assurance Rules & Policy for Validation, Verification and
Certification
System Development Methodology
Data Quality Policies regarding source, authorization, and
auto-checking by the software
-
7/31/2019 bis10_06new
27/37
27
Control
All of the methods, Policies, and
procedures that ensure protection of
organizations assets, accuracy andreliability of its records and operational
adherence to management standards
-
7/31/2019 bis10_06new
28/37
28
Types of Control
General Control: Overall controls that
establish a framework for controlling the
design, security and use of computerprograms
Application Control: Specific controlunique to each computerized application
-
7/31/2019 bis10_06new
29/37
29
General Control Implementation Control: It is a review of
development and implementation
methodologies and adherence to the
standards. This is mainly for software
quality assurance.
Software Control: Controls the various
categories of software, versions ofsoftware, unauthorized access of software
programs.
-
7/31/2019 bis10_06new
30/37
30
General Control
Hardware Control: Ensures physical
security of the hardware, Preventive
maintenance audit. etc
Computer Operation Control: User
control, System administrator procedures,network access rules etc
-
7/31/2019 bis10_06new
31/37
31
General Control
Data Security & Control: Backup control,
system audit for password security,
capability lists and data access permissions
Administrative Control: Formalized
standard rules, procedures and disciplinesto ensure that organization,s control are
properly executed
-
7/31/2019 bis10_06new
32/37
32
Application Control
Input Control: The procedure to checkdata for accuracy and completeness ValidationAuthorization Control totals
Processing Control: The routines for
establishing that data are complete andaccurate during updating
-
7/31/2019 bis10_06new
33/37
33
Application Control
Capability Control: Measures to restrict
the capability of a user to use the system
Output Control: Measures that ensure that
the results of a computer processing are
accurate, complete and properly distributed
-
7/31/2019 bis10_06new
34/37
34
Disaster Recovery Plan
The disaster recovery plan is to make a planand strategy so as to Control the damage Reconstruction of data and information in
case a disaster occurs, as well as measuresto be taken for prevention of disaster.
In order to control the damages due to adisaster, a disaster recovery strategy must beformed beforehand
-
7/31/2019 bis10_06new
35/37
35
While designing a disaster recoverystrategy following are considered:
Criticality of the non availability of thesystems Cost of data reconstruction Cost of preventive measures Tangible and non tangible losses due to
non availability of the system
Disaster Recovery Plan
-
7/31/2019 bis10_06new
36/37
36
Disaster recovery plan must include policies
for
Backup procedures and frequency System Security and Control Procedures
System Audit Procedures and frequency of audit
Chronological actions and steps to be taken incase of a disaster
Specific Roles and responsibility of individual
personnel during maritime and during disaster
recovery
-
7/31/2019 bis10_06new
37/37
37
For organizations which are highly dependent on
computerized system must have documented
Disaster Recovery Plan
The copies of plan document should be circulated
to all concern people
Once the plan is circulated, it should be ensuredthat all concern personnel is fully aware and
understood their roles and there is no ambiguity
Frequent review of the plan is also necessary Any change in the plan must be informed to all
concern