bis10_06new

Upload: shivam-shah

Post on 05-Apr-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/31/2019 bis10_06new

    1/37

    1

    E-Commerce:Digital

    Markets,Digital GoodsofBusiness Information System

  • 7/31/2019 bis10_06new

    2/37

    2

    Major Features of E-Commerce

    E-Commerce includes commercial

    transaction between and organization and

    individuals. E-Commerce technology is available every

    where,it has global reach any one can

    connect to internet to access e-commerce.

  • 7/31/2019 bis10_06new

    3/37

    3

    Major Features of E-Commerce

    It operates with respect to universal

    standards every where,it is cost effectivethen traditional commerce.

    It allows two way communication betweentwo different parties.It facilitate exchange of

    online Information,audio,visual and Text

  • 7/31/2019 bis10_06new

    4/37

    4

    It permits customization and personalization of

    Information.It facilitate merchants and vendor totarget market segments.

    It has created digital market place which is more

    transparent than traditional market place.

    Major Features of E-Commerce

  • 7/31/2019 bis10_06new

    5/37

    5

    Major Features of E-Commerce

    Digital Markets are more flexible and efficient

    with reduced transaction cost and ability to

    change prices dynamically

    New Business models of E-Commerce have

    come up such as B2B,B2C,C2C,C2B,G2C,M2C

    It allows SMES to capture important

    information,Data and Global branding.

  • 7/31/2019 bis10_06new

    6/37

    6

    Describe the Role of Emerging Digital Firm & E-Business

  • 7/31/2019 bis10_06new

    7/37

    7

    What are the categories of electroniccommerce and associated business models?

    The three Major categories of electronic

    commerce and associated Businessmodels are,B2B,B2C,C2C,G2C,M2C.

    B2C:- Involves retailing product and

    services to individual shoppers egamazon.com

  • 7/31/2019 bis10_06new

    8/37

    8

    What are the categories of electroniccommerce and associated business models?

    B2B:- involves sales of goods and services

    among businesses eg:-

    www.sailindia.com,where manufacturingunits buys and sale core iron.

    C2C:- Involves consumer selling directly

    from consumer. Eg ebay.com,auction site

    such as makemybit.com

  • 7/31/2019 bis10_06new

    9/37

    9

    What are the categories of electroniccommerce and associated business models?

    G2C:-It involves exchange of information

    between govt web based portals and its

    citizen for example incomtax.com where a

    citizen can fill in their returns,RTI.com right

    to information ,which contains detail

    description about govt policies that hasbeen framed with constitutional bills and

    amendments.

  • 7/31/2019 bis10_06new

    10/37

    10

    What are the categories of electroniccommerce and associated business models?

    M2C MOBILE COMMERCE Now mobile phones and other hand held

    appliances are Internet enabled to sendtext messages and email access websiteand make purchase.

    The use of hand held wireless device for

    purchasing goods and services from anylocation has been termed as mobilecommerce

  • 7/31/2019 bis10_06new

    11/37

    11

    What are the categories of electroniccommerce and associated business models?

    Collaborative Commerce

    Intranets provide a rich set of tools for

    creating collaborative environment in whichmembers of an organization can share

    information and exchange ideas on

    common or related assignments.

  • 7/31/2019 bis10_06new

    12/37

    12

    What are the types of PaymentSystem

    Digital credit cards payment system

    extends the functionality of existing credit

    card payment system.so that they can beused for online shopping payments.

    A digital wallet that securely stores credit

    card and owner identification information

    and provides that information at an

    electronic commerce site.

  • 7/31/2019 bis10_06new

    13/37

    13

    What are the types of PaymentSystem

    Micro payment system have been

    developed for purchase of less than 1000

    Rs.Accumulated balance digital paymentsystem are useful for such purpose.

    Accumulated Balance digital payment

    system enables the user to make micro

    payments and purchase on the web.

  • 7/31/2019 bis10_06new

    14/37

    14

    What are the types of PaymentSystem

    Stored Value Payments System.

    Smart cards are another type of stored

    value system for micro payments.It is aplastic cards the size of credit cards that

    stores digital information.It can store health

    record,identification data,or telephone

    number as an electronic purse.it is used to

    make Instant online Payment.

  • 7/31/2019 bis10_06new

    15/37

    15

    What are the types of Payment

    System Digital Cash or electronic cash is a currency

    represented in electronic form that works

    outside the normal network of moneytransfer. User are supplied with client

    software and can exchange money with one

    another.

  • 7/31/2019 bis10_06new

    16/37

    16

    What are the types of PaymentSystem

    Peer-to-Peer Payment System

    Such as Pay pal serve people who want to

    send money to vendor or individuals whoare not set up to accept credit cards .

    The party sending money uses his or her

    credit card to create an account with thedesignated payment at a website dedicated

    to peer-to peer Payments.

  • 7/31/2019 bis10_06new

    17/37

    17

    Virtual store Fronts Sell physical product directly to consumer or to

    individual business.eg amazon.com,redenvelope.com.

    Information broker :- Provides product,pricing and availability

    information to individuals andbusinesses.Generates revenue from advertisingor from direct buyer or seller. Egmagicbricks.com

    What are Internet Business models explain with

    example?

  • 7/31/2019 bis10_06new

    18/37

    18

    Transaction Broker:-saves user money and time

    by processing online sales transaction and

    generating a fee each time a transaction occurs.

    e.g. :-etrade.com,expedia.com

    Online Marketplace:-Provides a digital

    environment where buyer and seller can meet

    search for products,display products andestablish prices for those products, eg ebay.com

    What are Internet Business models explainwith example?

  • 7/31/2019 bis10_06new

    19/37

    19

    What are Internet Business models explainwith example?

    WEBPORTALS:- Provides initial point ofentry to the web along with specializedcontents and other services.egyahoo.com,msn.com

    Virtual Community:-Provides an onlinemeeting place where people with similar

    interest can communicate and find usefulinformation.youtube.com,myspace.com,

    ivillage.com

  • 7/31/2019 bis10_06new

    20/37

    20

    What are Internet Business models explainwith example?

    CONTENT PROVIDER:-creates revenue byproviding digital content such as digitalimage ,news,music or videos over the

    web.consumer may pay to access the contente.g. itunes.com,games.com

    ONLINE SERVICE PROVIDER:- providesonline service generates revenue from

    subscription or transaction fee,from advertisingor from collecting marketing information fromuser.eg:-sales force.com,streamload.com

  • 7/31/2019 bis10_06new

    21/37

    21

    Features of Firewalls

    Protection from Spam: Spam is anunsolicited commercial email messagesand are not created with the same

    malicious intent as threats like viruses, butare now having a negative economicimpact on the same order of magnitude.Spam clogs networks, hogs disk space andwastes countless hours of user timereading and dealing with the messages.

  • 7/31/2019 bis10_06new

    22/37

    22

    System Vulnerability and Abuse

    Automated data are more susceptible to

    destruction, fraud, error and misuse

    Todays organization is highly dependent of

    automated data for their business

    processes. Disaster due to informationsystem failure is bound to create havoc

  • 7/31/2019 bis10_06new

    23/37

    23

    Threats to Information System

    Hardware Failure

    Software Failure

    Attacks by malicious software

    Sabotage

    Theft of data, services, or equipments

  • 7/31/2019 bis10_06new

    24/37

    24

    Threats to Information System

    Accidents / Natural Disaster

    User Error

    Bugs in the program

    Telecommunication failure

  • 7/31/2019 bis10_06new

    25/37

    25

    Concern for The System Ownersand Developers

    Disaster Recovery Plan Plan for running the business in the event of a

    system disaster

    Security Policy Policies, procedures & technical measures

    used to prevent unauthorized access,

    alteration, theft or physical damage.

  • 7/31/2019 bis10_06new

    26/37

    26

    Concern for The System Owners andDevelopers

    Software Quality Assurance Rules & Policy for Validation, Verification and

    Certification

    System Development Methodology

    Data Quality Policies regarding source, authorization, and

    auto-checking by the software

  • 7/31/2019 bis10_06new

    27/37

    27

    Control

    All of the methods, Policies, and

    procedures that ensure protection of

    organizations assets, accuracy andreliability of its records and operational

    adherence to management standards

  • 7/31/2019 bis10_06new

    28/37

    28

    Types of Control

    General Control: Overall controls that

    establish a framework for controlling the

    design, security and use of computerprograms

    Application Control: Specific controlunique to each computerized application

  • 7/31/2019 bis10_06new

    29/37

    29

    General Control Implementation Control: It is a review of

    development and implementation

    methodologies and adherence to the

    standards. This is mainly for software

    quality assurance.

    Software Control: Controls the various

    categories of software, versions ofsoftware, unauthorized access of software

    programs.

  • 7/31/2019 bis10_06new

    30/37

    30

    General Control

    Hardware Control: Ensures physical

    security of the hardware, Preventive

    maintenance audit. etc

    Computer Operation Control: User

    control, System administrator procedures,network access rules etc

  • 7/31/2019 bis10_06new

    31/37

    31

    General Control

    Data Security & Control: Backup control,

    system audit for password security,

    capability lists and data access permissions

    Administrative Control: Formalized

    standard rules, procedures and disciplinesto ensure that organization,s control are

    properly executed

  • 7/31/2019 bis10_06new

    32/37

    32

    Application Control

    Input Control: The procedure to checkdata for accuracy and completeness ValidationAuthorization Control totals

    Processing Control: The routines for

    establishing that data are complete andaccurate during updating

  • 7/31/2019 bis10_06new

    33/37

    33

    Application Control

    Capability Control: Measures to restrict

    the capability of a user to use the system

    Output Control: Measures that ensure that

    the results of a computer processing are

    accurate, complete and properly distributed

  • 7/31/2019 bis10_06new

    34/37

    34

    Disaster Recovery Plan

    The disaster recovery plan is to make a planand strategy so as to Control the damage Reconstruction of data and information in

    case a disaster occurs, as well as measuresto be taken for prevention of disaster.

    In order to control the damages due to adisaster, a disaster recovery strategy must beformed beforehand

  • 7/31/2019 bis10_06new

    35/37

    35

    While designing a disaster recoverystrategy following are considered:

    Criticality of the non availability of thesystems Cost of data reconstruction Cost of preventive measures Tangible and non tangible losses due to

    non availability of the system

    Disaster Recovery Plan

  • 7/31/2019 bis10_06new

    36/37

    36

    Disaster recovery plan must include policies

    for

    Backup procedures and frequency System Security and Control Procedures

    System Audit Procedures and frequency of audit

    Chronological actions and steps to be taken incase of a disaster

    Specific Roles and responsibility of individual

    personnel during maritime and during disaster

    recovery

  • 7/31/2019 bis10_06new

    37/37

    37

    For organizations which are highly dependent on

    computerized system must have documented

    Disaster Recovery Plan

    The copies of plan document should be circulated

    to all concern people

    Once the plan is circulated, it should be ensuredthat all concern personnel is fully aware and

    understood their roles and there is no ambiguity

    Frequent review of the plan is also necessary Any change in the plan must be informed to all

    concern