Skip to main content

E-COMMERCE

E-COMMERCE

Electronic Commerce (E-commerce) refers to buying and selling of goods or services over electronic system such as internet and other computer networks.
Electronic commerce that takes place between businesses is refereed to as business-to-business or B2B.
Electronic commerce that takes place between business and consumers is referred to as business-to-consumer or B2C.
Online shopping is a form of e-commerce where the buyer can visit the seller’s website, browse through the various products available and chose the one that best suits him/her. No intermediary is involved in this and the purchase process is completely electronic i.e., online.

4 PILLARS OF E-COMMERCE
For conducting e-commerce one must be aware of its 4 pillars that make e-commerce strong, these are:

1)      Authentication
2)      Integrity
3)      Privacy
4)      Non-Repudiation

1)      Authentication
Authentication means that both the sender and receiver must be able to identify each other i.e., identifying whether the person is himself or pretending to be someone.
It is required so that the receiver confirms to identify each other.
E.g.:  buying of goods online requires making the payment online as well. With the internet being such a popular and easy source of sitting at home and getting the goods delivered at home, people trust the online transactions and believe that their money is going in right hands. For buying goods online people have to provide their credit/debit card details to the merchant, so the person must be satisfied and assured that the information is going in the correct hands.
Likewise, the merchant should be sure that the owner of the credit card is using it.

2)      Integrity
One has to be sure that whatever the sender is sending, receiver is receiving the exact same content/message.
Integrity thus implies that the data has not been tampered by any intruder.
E.g.: if A is sending some information to B, then the information should be read only by B and intruder, say C, should not have any access to that information, and should not tamper the information.

3) Privacy
Privacy refers to that no intruder is able to see the content being sent. It is required so that the information has not been read and intercepted by any intruder.
E.G: if A and B are two persons who are exchanging some important message then another person C should not see that information.

5)      Non-Repudiation
Non-Repudiation is done to ensure that no party refuses sending or receiving of a message.
E.G: if A has sent some information to B, but later on denies sending any message, then how will one find out whether the information was sent by that person or not. To ensure that such a thing does not happen, non-repudiation is done.

So, in order to ensure that information exchanged done through e-commerce is safe, trustworthy and correct these 4 pillars must be known to the users of the e-commerce and understood well…

Comments

yash sharma said…
nice content
tarushi said…
well done!!! good content
shreeja said…
i liked it...:) nice work
geetanjali said…
great stuff!
shreeja said…
This comment has been removed by the author.
shagun sethi said…
Nyc work done garima...
Unknown said…
nice!!
Sanjay said…
gud work. keep it up
kajol said…
quite useful information
Ayush Agrawal said…
very well written :)
Seni varghese said…
eetynice work...
Developer said…
This comment has been removed by the author.
Developer said…
I have been lookin for such perfect info all over google but found it here , Thank you so much author for the data
Anonymous said…
Awesome work!
sohail said…
Gud job keep it up
sohail said…
gud job keep it up
sakshi garg said…
very well written..good work!
sakshi garg said…
very well written..good work!
parul said…
very informative!!
shilpa said…
useful information..
KanishK said…
gooood work
really need it
sakshi said…
great job...nice work
Excellent Garima ..!!

Doing Very Well.

Super Like:)
jerin abraham said…
nice contents......it refreshed my E-COMMERCE concepts.......
shubhali pathak said…
niiiiiiiiicee :)))))
shubhali pathak said…
naiiiice :)
arinjay said…
nyc work...
mukul chopra said…
nysh job ,,__ Mukul chopra lyks iT ,,__ <3
mukul chopra said…
nysh job ,,__ Mukul Chopra lyks iT ,,_ <3
MT said…
u hv explained it quite well...gud work indeed!!
Anonymous said…
ohh nyc yaar...thnx !!
ss said…
good work..:)
aniket0306 said…
very well done !!!! gr8 work :)
Akash said…
This comment has been removed by the author.
Akash said…
This content is very useful...
kriti said…
great work.. this is very useful content..:)
Navonil Nag said…
good contents......
BAAN said…
good job nice piece of work appreaciated!!!!
ankit said…
Great Tutorial!!
Unknown said…
well done garima....i had e-comm aas my subject...n ds info s jst too useful n to d point...
god bless...

Popular posts from this blog

Advantages and Disadvantages of EIS Advantages of EIS Easy for upper-level executives to use, extensive computer experience is not required in operations Provides timely delivery of company summary information Information that is provided is better understood Filters data for management Improves to tracking information Offers efficiency to decision makers Disadvantages of EIS System dependent Limited functionality, by design Information overload for some managers Benefits hard to quantify High implementation costs System may become slow, large, and hard to manage Need good internal processes for data management May lead to less reliable and less secure data

Inter-Organizational Value Chain

The value chain of   a company is part of over all value chain. The over all competitive advantage of an organization is not just dependent on the quality and efficiency of the company and quality of products but also upon the that of its suppliers and wholesalers and retailers it may use. The analysis of overall supply chain is called the value system. Different parts of the value chain 1.  Supplier     2.  Firm       3.   Channel 4 .   Buyer

Big-M Method and Two-Phase Method

Big-M Method The Big-M method of handling instances with artificial  variables is the “commonsense approach”. Essentially, the notion is to make the artificial variables, through their coefficients in the objective function, so costly or unprofitable that any feasible solution to the real problem would be preferred, unless the original instance possessed no feasible solutions at all. But this means that we need to assign, in the objective function, coefficients to the artificial variables that are either very small (maximization problem) or very large (minimization problem); whatever this value,let us call it Big M . In fact, this notion is an old trick in optimization in general; we  simply associate a penalty value with variables that we do not want to be part of an ultimate solution(unless such an outcome is unavoidable). Indeed, the penalty is so costly that unless any of the  respective variables' inclusion is warranted algorithmically, such variables will never be p