Professional Documents
Culture Documents
E-Business – It refers to the conduct of business processes over the internet. In other words, it is the
administration of business process via the internet which includes the buying and selling of goods and
services along with providing technical or customer support on the internet.
Internet – It is the network of networks as it links various computers. It refers to the network
connection which links and transports information within various client computers and web servers.
Features of E-Business
Global reach – Worldwide
Universal standards
Reduces paper work – Paperless transactions
Easy accessibility – 24/7
Facilitates interaction – Reviews, Chat rooms, etc.
Reduces cost – Setting up, maintenance, etc.
Easy to advertise
Personalization – Easy changes to the webpages
Customization – As per business requirements
Social technology – Uses internet and computer technology
Large mass communication – Use of internet and telecom services
Advantages of E-Business
Physical store not required
Low operating cost – No physical store
Reduces errors
Access to remote areas
Facilitates comparison – Between products
Time saving – No standing in queues
Flexibility
Adaption to changing laws
Easy to audit
Market for resale
Disadvantages of E-Business
Absence of technological infrastructure – Electricity, computers, etc.
Lack of security
Network problem – Poor internet infrastructure
Difficult to integrate
High initial cost
Lack of feel of products
Under research stage
Difficult to rural masses
No demonstration
Regular up-gradation
E-Commerce – Also known as electronic commerce, it is the buying and selling of goods and services,
or the transmitting of funds or data over an electronic network like the internet.
Electronic Fund Transfer – EFT is a modern innovation in the banking sector where funds or amounts
are transferred from one bank account to another bank account with the help of the internet without
the physical movement of cash from one place to another.
Electronic Data Interchange – EDI is the electronic interchange of business information using a
standardized format; a process which allows one company to send information to another company
electronically rather than with the use of paper.
Types of E-Commerce
1. B2B - Business to Business (B2B) refers to transactions taking place between two businesses.
It is a model where the products and services are sold to the business by another business.
2. B2C - Business to Consumer (B2C) refers to the transactions conducted directly between a
company and consumers who are the end-users of its products or services.
3. C2B – Consumer to Business (C2B) is a unique E-Business model in which consumers create
value and demand for a company’s products and services in exchange for flexible payments
or free or reduced prices for the company’s products and services.
4. C2C - Consumer to Consumer (C2C) refers to sale of products from one customer to another
customer. It is a model where the goods once sold are resold by the customer to another
customer.
5. B2G – Business to Government (B2G) refers to the model where the business sells its products
to the government agencies. In simple words all the transactions between the business and
government is referred to under this model
6. G2B – Government to Business (G2B) refers to the electronic exchange of any information
between a business and the government, usually using the internet so that there is
cooperation and efficient communication between them.
7. P2P – Peer to Peer (P2P) refers to the model where employees in the same organization
interact with each other without affecting the main server. It is a process of sharing computer
files and programs without interacting with main servers.
Web/Online Auctions - Online Auction involves the selling and buying of goods by offering them up
for bids and consequently selling them to the highest bidder on the internet.
Virtual Communities – A virtual community is a social network of individuals who interact through
specific social media potentially crossing geographical and political boundaries in order to pursue
mutual interest or goals. It is a community of people sharing common interests, opinions, feelings over
the internet or other collaborative networks.
Advantages
Worldwide exposure
Sharing of knowledge
Builds relationship
Can form groups for specific purpose
Facilitates personal and business information
Advertisement opportunities
Disadvantages
Dangerous
Scope for corrections not available
Difficult to choose reliable sources
Posted information can be viewed easily
Web Portals - A web portal is a specially designed website that often serves as the single point of
access for information. It can also be considered a library of personalized and categorized content. A
web portal helps in search navigation, personalization, notification and information integration, etc.
Characteristics
Displays information
Facilitates adding and deleting information
Some domains may be restricted
May offer additional services
Multiple applications and database
Fingertip information
Cloud Computing – It is the delivery of computing services like servers, storage, databases,
networking, software, analytics, etc. over the Internet (the cloud). Companies offering these
computing services are called cloud providers and typically charge for cloud computing services. Ex:
Azure, AWS, etc.
Encryption – In computing, encryption is the method by which plain text or any other type of data is
converted from a readable form to an encoded version that can only be decoded by another entity if
they have access to a decryption key.
The process of Encryption - Unencrypted data, often referred to as plaintext, is encrypted using an
encryption algorithm and an encryption key. This process generates ciphertext that can only be viewed
in its original form if decrypted with the correct key. Decryption is simply the inverse of encryption,
following the same steps but reversing the order in which the keys are applied.
Types of Encryption
Symmetric - Symmetric-key ciphers, also referred to as "secret key," use a single key,
sometimes referred to as a shared secret because the system doing the encryption must share
it with any entity it intends to be able to decrypt the encrypted data. The most widely used
symmetric-key cipher is the Advanced Encryption Standard (AES), which was designed to
protect government classified information.
Asymmetric - Asymmetric cryptography, also known as public key cryptography, uses two
different but mathematically linked keys, one public and one private. The public key can be
shared with everyone, whereas the private key must be kept secret. The RSA encryption
algorithm is the most widely used public key algorithm, partly because both the public and
the private keys can encrypt a message; the opposite key from the one used to encrypt a
message is used to decrypt it.
Decryption – It is the process of converting encrypted text or data back into its original form, so that
it can be understood.
Digital Signatures –
Transfer of HF, Decodes the
Hash Function Message Runs the msg
Plain Text (PT) MsgD and the msg with a
(HF) Digest (MsgD) through the HF
Encrypted PT Private Key
Firewall – It is a network security system that monitors and controls incoming and outgoing network
traffic based on predetermined security rules.
Features of Firewalls
Hardware or software device
It is a filter
Control websites
Control over people using network
Protects from intruders and hackers
Block traffic
Automatic alarms
Graphical user interface (GUI)
Virtual Private Network (VPN) – It is a secured network that uses the internet as its main backbone
network, but relies on firewalls and other security features of its internet and intranet connections
and those of participating organizations.
Cookies - Cookies are small files which are stored on a user's computer. They are designed to hold a
modest amount of data specific to a particular client and website, and can be accessed either by the
web server or the client computer.
Types of Cookies
1. Session cookie – A session cookie for a website only exists whilst the user is reading or
navigating the website. When the user closes their web browser these cookies are usually
removed.
2. Persistent cookie – A persistent cookie for a website exists on a user’s computer until a future
date. For example the cookie expiry date could be set as 1 year, and each time a website is
accessed over this period the website could access the cookie.
3. Http cookie – An Http cookie can only be used via HTTP or HTTPS, and therefore cannot be
accessed by JavaScript.
4. Secure cookie – A secure cookie can only be used via HTTPS. This ensures the cookie data is
encrypted, reducing the expose to cookie theft via eavesdropping.
5. Third-party cookie – First-party cookies are cookies set with the same domain (or its
subdomain) as your browser's address bar. Third-party cookies are cookies set with domains
different from the one shown on the address bar.
Client computer – It is a computer that is connected to a network that is not a server or a router.
These computers are connected to a network of other computers.
Web server – As a hardware it refers to a server such as personal computers which facilitates the
storage of data available on the web pages. The requirements depend on the traffic and the number
users of the website.
Web server – As a software it refers to the servers that facilitate access to the various websites. It
manages location and communication of all the requests and communications through the web server
hardware. Ex: Apache, Microsoft Internet Information Services.
Characteristics of E-Payment
Simple
Secured
Reliable
Trust
Convertible
Efficient
Authorization
Scalability
Interoperate ability
E-Marketing – It is a process of planning and executing the conception, distribution, promotion, and
pricing of products and services in a computerized, networked environment, such as the Internet and
the World Wide Web, to facilitate exchanges and satisfy customer demands.
Cookies - Cookies are small files which are stored on a user's computer. They are designed to hold a
modest amount of data specific to a particular client and website, and can be accessed either by the
web server or the client computer.
Types of Cookies
1. Session cookie – A session cookie for a website only exists whilst the user is reading or
navigating the website. When the user closes their web browser these cookies are usually
removed.
2. Persistent cookie – A persistent cookie for a website exists on a user’s computer until a future
date. For example the cookie expiry date could be set as 1 year, and each time a website is
accessed over this period the website could access the cookie.
3. Zombie cookie – A zombie cookie is an HTTP cookie that returns to life automatically after
being deleted by the user.
4. Secure cookie – A secure cookie can only be used via HTTPS. This ensures the cookie data is
encrypted, reducing the expose to cookie theft via eavesdropping.
5. Http only cookie – An Http only cookie can only be used via HTTP or HTTPS, and therefore
cannot be accessed by JavaScript.
6. Same site cookie – It is also known as a First-party cookie. It is a cookie set with the same
domain (or its subdomain) as your browser's address bar.
7. Third-party cookie – Third-party cookies are cookies set with domains different from the one
shown on the address bar.
8. Super cookie - A super cookie is a type of browser cookie that is designed to be permanently
stored on a user's computer. Super cookies are generally more difficult for users to detect and
remove from their devices because they cannot be deleted in the same fashion as regular
cookies.
Features of Cookies
It is a text file
Store small data
Accessible by the client computer
Accessible by the web server
Data contains customer preferences
Shopping carts - In online marketing, a shopping cart is a piece of E-Commerce software on a web
server that allows the visitors of a website to select items for eventual purchase. In other words, they
are software programs that keep a record of the choices made by a client during an online buying
session.
Features of DBMS
Minimum redundancy
Minimum duplication
Isolation of data and application
Saves storage space
Large database maintenance
High security
Consistency
Structured Query Language (SQL) – It is a standard high level fourth generation language that is
designed to provide the users of Relational Database Systems (RDBMS) an easy and powerful way to
enter, manipulate and retrieve data from the database.
Data Mining – It is the process of sorting through large data sets to identify patterns and establish
relationships to solve problems through data analysis. Data mining tools allow enterprises to predict
future trends.
Data warehousing – It is the electronic storage of a large amount of information by a business. Data
warehousing is a vital component of business intelligence that employs analytical techniques on
business data.
E-marketing strategies
1. Micromarketing – It is a marketing strategy in which advertising efforts are focused on a small
group of highly targeted consumers. Micromarketing requires a company to narrowly define
an audience by a specific characteristic, such as ZIP code or job title, and tailor campaigns for
that particular segment.
2. Target Marketing – It involves breaking a market into segments and then concentrating
marketing efforts on one or a more key segments consisting of the customers whose needs
and desires most closely match your product or service offerings.
3. Permission marketing – It is an approach to selling goods and services in which a prospect
explicitly agrees in advance to receive marketing information. Opt-in e-mail, where Internet
users sign up in advance for information about certain product categories, is a good example
of permission marketing.
4. Product or Service bundling – Bundling is a classic market strategy where two or more
complementary products and/or services are offered as a package at a discounted price.
5. One-to-one marketing – It is a strategy that relies on getting to know the individual choices
made by a customer, and then tailoring marketing outreach to each customer differently
based on those choices.
6. Affiliate marketing – An affiliate is a business you want to partner with in order to gain benefit
for your own business. It is a type of performance-based marketing in which a business
rewards one or more affiliates for each visitor or customer brought by the affiliate's own
marketing efforts.
7. Viral marketing – It is a marketing technique that uses pre-existing social networking services
and other technologies to produce increases in brand awareness or to achieve other
marketing objectives through self-replicating viral processes.