E - Commerce
E - Commerce
E – COMMERCE
E-commerce is the process of buying and selling tangible products and services online. It involves more
than one party along with the exchange of data or currency to process a transaction.
SCOPE IN E-COMMERCE
2. Technology-enabled:
E-Commerce is about technology-enabled transactions. Web browsers are
perhaps the best Know of these technology-enabled customer interfaces. However, other
interfaces including automated teller machines (ATMs) also fall in the general category of e-
commerce.
3. Customer’s retention:
E-Commerce enables organizations to get classified and customized market
information that helps in retaining customers through fast order fulfilment and effective
customers relationship management (CRM).
4. Accounting:
Financial accounting, treasury management and asset management are best possible
in e-commerce because of integrated database. Financial planning and strategy determination
become more convenient in e-commerce.
FEATURES OF E – COMMERCE
Online Transactions: Facilitates buying and selling of goods and services through digital platforms,
enabling transactions to be completed over the internet.
Product Listings and Search: Provides detailed product descriptions, images, and search functionality
to help users find and compare products easily.
Payment Integration: Supports various online payment methods such as credit/debit cards, digital
wallets, and online banking for secure and convenient transactions.
Customer Reviews and Ratings: Enables customers to leave feedback and rate products, helping others
make informed purchasing decisions and providing sellers with valuable insights.
BENEFITS OF E – COMMERCE
✓ Convenience: Allows customers to shop 24/7 from anywhere with an internet connection,
eliminating the need for physical store visits and long queues.
✓ Global Reach: Provides access to a worldwide customer base, enabling businesses to expand
beyond local markets and increase their potential sales.
✓ Cost Efficiency: Reduces operational costs related to physical storefronts, such as rent, utilities,
and staffing, leading to potentially lower prices for consumers.
✓ Personalization: Utilizes data analytics to offer personalized recommendations, targeted
promotions, and tailored shopping experiences based on user behaviour and preferences.
✓ Scalability: Allows businesses to easily scale operations by adding new products, reaching new
markets, and handling increased transaction volumes without significant infrastructure changes.
LIMITATIONS/DISSDVANTAGES OF E – COMMERCE
Lack of Physical Inspection: Customers cannot physically inspect or try products before
purchasing, which can lead to dissatisfaction or returns if the product does not meet expectations.
Security Risks: Potential for online fraud, data breaches, and identity theft, as sensitive personal
and payment information is transmitted over the internet.
Shipping Costs and Delays: Additional costs for shipping and potential delays in delivery can
affect customer satisfaction and increase overall expenses for both consumers and sellers.
Technical Issues: Dependence on technology means that website downtimes, technical glitches,
or internet connectivity problems can disrupt transactions and affect user experience.
Limited Personal Interaction: Reduced face-to-face customer service and interaction may lead
to a lack of personalized assistance and support, affecting the overall shopping experience.
The architectural framework of electronic commerce (e-commerce) refers to the structural design and
organization of components that work together to facilitate online transactions. This framework
encompasses various layers and components, each responsible for different aspects of e-commerce.
Here’s an overview of the key elements in a typical e-commerce architecture:
• Front-end: This is the visible part of an e-commerce system that interacts directly with users. It
includes the website or mobile app where customers browse products, add items to their cart, and
complete transactions. The user interface is designed for usability and accessibility.
2. APPLICATION LAYER
• Order Processing: Manages shopping cart functions, order creation, and fulfilment processes.
• Inventory Management: Tracks product availability and updates stock levels in real-time.
• Customer Relationship Management (CRM): Manages customer data, interactions, and
support. It helps in personalized marketing and customer service.
4. DATA LAYER
• Database Management System (DBMS): Stores and manages data related to products,
customers, orders, and transactions. This includes relational databases (e.g., MySQL,
PostgreSQL) or NoSQL databases (e.g., MongoDB).
• Data Warehouse: Aggregates and analyses data from various sources to support business
intelligence and reporting.
5. INTEGRATION LAYER
• Payment Gateway: Facilitates secure payment processing and transactions. It connects with
financial institutions to handle credit card transactions, electronic funds transfers, and other
payment methods.
• Third-Party Services: Includes integrations with external systems such as shipping providers,
tax calculation services, and customer authentication services.
Web-based E-commerce is one of the fastest-growing segments of the technology that defines the
business strategy. Web-based E-commerce provides easy and better communication between
geographically separated buyers and sellers. E-commerce is a way of doing business by enabling better
interaction among customers, business partners and business relationship managers using electronic tools.
• Recording the links of the transaction details of the business in a database. The transaction details
contain information such as transition type, purchased item information, i.e., price, item identification and
stock information.
• Specifying the trust model for the system: Every system must have at least an implicit trust model that
helps maintain the security of the system by providing the details of the relationships between the
component
E-commerce, or electronic commerce, involves transactions conducted over the internet. There are
several types of e-commerce, each catering to different market segments and business models. Here are
the primary types:
1. BUSINESS-TO-CONSUMER (B2C)
2. BUSINESS-TO-BUSINESS (B2B)
3. CONSUMER-TO-CONSUMER (C2C)
4. CONSUMER-TO-BUSINESS (C2B)
5. BUSINESS-TO-GOVERNMENT (B2G)
6. GOVERNMENT-TO-BUSINESS (G2B)
7. GOVERNMENT-TO-CONSUMER (G2C)
Traditional Retailing refers to the process of selling goods and services to consumers
through physical stores or outlets. This form of retailing involves direct, face-to-face interaction between
customers and sales staff and allows customers to see, touch, and try products before making a purchase.
E- Retailing –
E-Retailing, also known as electronic retailing or online retailing, refers to the process of
selling goods and services over the internet. This modern form of retailing allows consumers to shop
online through websites, mobile apps, and other digital platforms without needing to visit a physical
store.
FEATURES OF E – RETAILING
Digital Platforms:
• Websites: The primary platform for e-retailing, accessible via web browsers.
• Mobile Apps: Dedicated applications for smartphones and tablets, providing a more streamlined
shopping experience.
• Online Marketplaces: Platforms like Amazon, eBay, and Alibaba where multiple sellers can list
and sell their products.
24/7 Accessibility:
• Anytime Shopping: E-retail stores are open 24/7, allowing customers to shop at any time that
suits them, regardless of time zones or business hours.
Global Reach:
• Wide Audience: E-retailers can reach a global customer base, transcending geographical
boundaries.
• International Shipping: Ability to ship products internationally, expanding market reach.
Convenience:
• Home Shopping: Customers can shop from the comfort of their homes or on the go using mobile
devices.
• No Travel Needed: Eliminates the need to travel to a physical store.
• Extensive Catalogs: E-retailers often have vast inventories, offering a broader range of products
than traditional stores.
• Easy Browsing: Advanced search and filtering options to easily find products.
• Multiple Payment Methods: Options include credit/debit cards, digital wallets (e.g., PayPal,
Apple Pay), bank transfers, and cryptocurrencies.
• Buy Now, Pay Later: Payment plans such as After pay, Klarna, and Affirm.
BENEFITS OF E – RETAILING
➢ Global reach - because e-tailing uses the internet, it overcomes the geographical barriers
involved in traditional retailing
➢ 24/7 availability - online stores have no set business hours, meaning customers can shop at their
convenience
➢ Cost efficiency - with e-tailing, you don’t need a brick-and-mortar store and you can leverage
drop shipping to keep order fulfilment costs down
➢ Data analytics - make it easier to understand user behaviour, anticipate seasonal demand,
optimise customer experience and, ultimately, increase online sales
➢ Expanded product variety - because you don’t need to stock physical products as an etailer,
you can offer a wide range of products
➢ Targeted marketing - using customer data analytics, you can understand your target
demographics and create marketing campaigns personalised to them
1. Brand name:
Create a memorable brand name: Like Amazon, eBay, Flipkart, etc., your business
name and domain name should be simple (maybe just one word) and catchy. It should be easy to
remember and pronounce. The reason is, most of the customers want to shop the things in brand
stores. Therefore, choosing a memorable brand name is the key first step in starting the
ecommerce business.
2. Design of the store Attractive design:
When it comes to the look and appearance of the storefront, the design should
entice the customers. You have to build the stores with the latest features and display the array of
products in an aesthetically pleasing manner.
Create an easy-to-use interface: The user interface is the amazing thing that draws the visitors’
attention. You can design the store in such a way that makes customers find products easily and
complete the purchase in a short period of time.
Content marketing: Content marketing is one type of ecommerce strategy where you can
acquire new buyers. Creating content about products and publishing them on your web page is an
added advantage to your site. Also, making a YouTube video about the product review helps in
getting more traffic to your online store.
75.6% is the average rate of shopping cart abandonment. To avoid this, you can
provide multiple payment options in your store.
Online payment: The online money transactions are becoming popular now and buyers are
familiar with the net banking payment method. You can provide options like credit card and debit
card transaction along with the net banking to don’t lose out any customers. You can even offer
your store’s wallet to pay the amount.
7. Easy check-out process Add save list buttons: ‘Add to Cart’ and ‘Add to Wishlist’ buttons are
primary features in your store. These buttons aid customers to add their desired products. You
can make them mostly red colour to make it attractive. Single page check-out: To save the
Transactions are conducted via different categories of websites, including the following:
• Company websites : This is the most straightforward model of B2B transactions. A company uses its
own website to sell goods and services directly to its business clients. Sometimes, a company website
uses a secure extranet to provide clients with exclusive access to product catalogues or price lists.
• Product supply and procurement exchanges: These online exchanges allow a company's purchasing
agent to shop for supplies or raw materials from multiple vendors, submit requests for proposals (RFPs)
and, in some cases, bid on products. Also known as e-procurement sites, these exchanges can serve a
range of industries and be tailored to niche markets.
• Specialized or vertical industry portals: These portal sites provide specialized and vertical markets
with a more targeted approach than procurement sites. They might also support buying and selling, and
provide information, product listings, discussion groups and other features for industries such as
healthcare, banking and transportation.
• Brokering sites: These sites act as an intermediary between service providers and potential customers
that need their services, such as leasing equipment or services.
• Information sites: Sometimes known as infomediaries, these sites provide information about a
particular industry to companies and their employees. Information sites include specialized search sites
and those of trade and industry standards organization
E-retailing encompasses various business models, each catering to different consumer needs and
operational strategies. Here’s a breakdown of the primary models of e-retailing:
1. BUSINESS-TO-CONSUMER (B2C)
2. BUSINESS-TO-BUSINESS (B2B)
• Description: Transactions between businesses, where one business sells products or services to
another.
• Examples:
o Alibaba: Connects manufacturers with businesses for bulk purchasing.
o Grainger: Supplies industrial and maintenance products to businesses.
• Features:
o Bulk Orders: Often involves larger quantities and negotiated pricing.
o Long-Term Relationships: Focuses on building long-term business relationships.
3. CONSUMER-TO-CONSUMER (C2C)
4. CONSUMER-TO-BUSINESS (C2B)
5. BUSINESS-TO-GOVERNMENT (B2G)
6. SUBSCRIPTION-BASED MODEL
• Description: Customers pay a recurring fee to access products or services on a regular basis.
• Examples:
o Netflix: Offers streaming services through a subscription.
o Dollar Shave Club: Provides razors and grooming products on a subscription basis.
• Features:
o Recurring Revenue: Consistent income through regular subscriptions.
o Customer Retention: Focus on maintaining long-term customer relationships.
7. DROPSHIPPING
• Description: E-retailers sell products without holding inventory. When a customer places an
order, the retailer purchases the item from a third party, which ships it directly to the customer.
• Examples:
o Oberlo: Connects e-retailers with suppliers for drop shipping.
o AliExpress: Offers products for drop shipping businesses.
E-SERVICES
• Account Management: Allows users to view account balances, transaction history, and manage
accounts online.
• Fund Transfers: Facilitates transferring money between accounts or to other individuals, both
domestically and internationally.
• Bill Payments: Enables users to pay bills such as utilities, mortgages, and credit cards directly
from their accounts.
2. E-COMMERCE
• Product Listings and Catalogs: Displays a wide range of products with descriptions, prices, and
images.
• Secure Payment Processing: Supports various payment methods including credit/debit cards,
digital wallets, and bank transfers with encryption for security.
• Order Tracking: Provides real-time updates on the status of orders, including shipping and
delivery information.
• Customer Reviews and Ratings: Allows customers to leave feedback on products and services,
which helps inform other buyers.
• Virtual Consultations: Enables patients to consult with healthcare professionals via video calls,
reducing the need for in-person visits.
• Remote Health Monitoring: Utilizes wearable devices and apps to monitor health metrics such
as heart rate, blood sugar levels, and activity.
• Medical Records Access: Provides secure online access to personal medical records, test results,
and treatment history.
• Appointment Scheduling: Offers online tools for scheduling and managing medical
appointments.
• Online Courses and Tutorials: Provides access to a variety of educational materials, including
video lectures, readings, and exercises.
• Interactive Learning: Includes features like quizzes, discussion forums, and interactive
simulations to enhance learning.
• Certifications and Degrees: Offers opportunities to earn certifications, diplomas, and degrees
from accredited institutions through online programs.
• Virtual Classrooms: Facilitates live, instructor-led classes and webinars, enabling real-time
interaction between students and educators.
5. E-GOVERNMENT SERVICES
• Streaming Services: Provides on-demand access to video content (movies, TV shows) and audio
content (music, podcasts) via streaming.
• Digital Downloads: Allows users to purchase and download digital content such as e-books,
music files, and software.
• Subscription Models: Offers access to media content through subscription plans, often with
tiered pricing and exclusive content.
• Recommendations and Personalization: Uses algorithms to suggest content based on user
preferences and viewing history.
7. CLOUD SERVICES
• Storage Solutions: Provides scalable and secure storage for data and files, accessible from any
internet-connected device.
• Computing Resources: Offers on-demand access to virtual machines, computing power, and
processing capabilities for various applications.
• Software as a Service (SaaS): Delivers software applications over the internet, including tools
for productivity, collaboration, and customer relationship management (CRM).
• Data Backup and Recovery: Ensures data protection through automated backups and recovery
solutions.
• Live Chat: Provides real-time support and assistance through chat interfaces on websites and
apps.
• Help Desks: Includes ticketing systems and knowledge bases for managing and resolving
customer issues.
• Chatbots: Uses artificial intelligence to automate responses to frequently asked questions and
common problems.
• Email and Phone Support: Offers traditional support channels for customer inquiries and
problem resolution.
• Self-Service Portals: Provides users with tools to manage their accounts, track orders, and
access support resources independently
Accessibility Limited by store operating hours and Offers 24/7 accessibility from anywhere with an
geographic location, requiring customers internet connection, allowing customers to shop
to travel to the store. at their convenience.
Product
Assortment Limited by physical space, offering a Can offer a wide range of products across
narrower selection of products compared diverse categories due to virtual inventory and
to e-retailers. digital catalogs.
Customer Provides face-to-face interaction with Offers convenience and flexibility but lacks
Experience sales associates, allowing for personalized physical interaction, relying on digital tools for
assistance and immediate product product discovery and customer support.
availability.
Transaction
Process Involves immediate gratification, with Requires shipping or delivery of products,
customers taking possession of purchased resulting in a delay between purchase and
items immediately after payment receipt of goods.
Costs and
Overheads Incurs higher overhead costs such as rent, Can operate with lower overhead costs as it
utilities, and staff wages due to the does not require physical storefronts, reducing
operation of physical stores. expenses related to rent and utilities.
EDI which stands for electronic data interchange, is the intercompany communication of business
documents in a standard format. The simple definition of EDI is that it is a standard electronic format that
replaces paper-based documents such as purchase orders or invoices.
BENEFITS OF EDI
EDI transactions are essential to B2B processes and continue to be the preferred means to exchange
documents and transactions between businesses both small and large. EDI technology delivers five key
business benefits through automation and B2B integration:
• EDI technology saves time and money through the automation of a process that was previously
manually run with paper documents.
• EDI solutions improve efficiency and productivity because more business documents are shared and
processed in less time with greater accuracy.
• EDI data transfer reduces errors through rigid standardization, which helps to ensure that information
and data are correctly formatted before they enter business processes or applications.
• Efficient EDI automation enables reliable product and service delivery for a positive customer
experience.
IMPLEMENTING EDI
Step 1: Develop the organisational structure Your first action is to ensure that you have access to the
correct skills. Develop EDI coordinators and teams that will drive the programme through your
organisation.
Step 2: Undertake a strategic review The business areas that benefit most from EDI deployment vary by
organisation. A strategic review identifies where EDI has greatest potential in your business.
Step 3: Conduct in-depth analysis an accurate analysis of costs and projected payback when
implementing EDI is essential.
Step 4: Develop a business-focused EDI solution Selecting the correct EDI solution for your business
requires an in-depth understanding of both the technical and business issues – for you and your trading
partners.
Step 5: Select the correct EDI network provider (VAN) Most organisations find using an EDI provider
makes the best business and financial sense. Selecting the correct provider for your business is
imperative.
Step 6: Integrate EDI with the business How an EDI system is designed and developed depends on the
amount of custom work required and the amount of internal systems with which it needs to share data.
Step 8: Undertake data mapping to ensure the smooth flow of information between internal applications
and trading partners, documents need to be mapped to allow effective data transmission.
Step 9: Establish a pilot project Before your EDI system goes live within your entire trading community,
it is important to select a small number of partners to test the system in ‘near live’ conditions.
Step 10: Roll out EDI to trading partners The last action is to implement EDI across your trading
partners. This should be achieved in a staged manner that reflects your current business priorities
An Electronic Payment System (EPS) is a method of making transactions or paying for goods and
services through an electronic medium, without the use of physical cash or checks. This system is a
critical component of modern financial infrastructure, facilitating the seamless transfer of funds between
parties through digital means.
2. Globalization: With businesses and individuals operating on a global scale, electronic payment
systems facilitate transactions across borders seamlessly, eliminating the need for currency conversions
and reducing transaction costs.
3. Speed: Electronic payments are processed much faster compared to traditional payment methods such
as checks. This speed is crucial for businesses that require quick access to funds or for individuals
making time-sensitive payments.
4. Security: While security concerns exist, electronic payment systems often employ encryption and
other security measures to protect users' financial information. Additionally, electronic transactions leave
a digital trail, which can help track and prevent fraudulent activities.
5. Cost-Effectiveness: Electronic payment systems can be more cost-effective for both businesses and
consumers. For businesses, they can reduce the costs associated with handling cash, such as counting and
transporting it. For consumers, electronic payments can eliminate fees associated with traditional banking
services, such as ATM withdrawals.
6. Accessibility: Electronic payment systems provide access to financial services for individuals who
may not have easy access to traditional banking services. This accessibility is particularly important in
underserved or remote areas.
7. Facilitation of Online Commerce: With the rise of e-commerce, electronic payment systems are
indispensable for facilitating online transactions. They allow consumers to purchase goods and services
from anywhere in the world with ease.
9. Streamlined Accounting and Reporting: Electronic payment systems often come with features that
streamline accounting processes for businesses, such as automated transaction tracking and reporting.
This can save time and reduce the likelihood of errors. Overall, electronic payment systems play a crucial
role in modern economies by providing efficient, secure, and convenient means of conducting financial
transactions.
1. Convenience
o Ease of Use: Users can make transactions from anywhere at any time, without the need
to visit a physical location.
o Accessibility: Available 24/7, allowing users to conduct transactions outside of
traditional banking hours.
2. Speed and Efficiency
o Instant Transactions: Payments are processed quickly, often in real-time, reducing the
waiting period for transaction completion.
o Automated Processes: Reduces manual handling and paperwork, speeding up
transaction processing and reducing errors.
3. Security
o Advanced Encryption: Uses sophisticated encryption technologies to protect sensitive
financial information.
o Authentication Protocols: Employs multi-factor authentication (MFA) and other
security measures to prevent unauthorized access and fraud.
4. Cost-Effectiveness
o Reduced Transaction Costs: Lowers costs associated with physical cash handling,
printing checks, and manual processing.
o Operational Efficiency: Minimizes the need for physical infrastructure and
administrative staff, leading to cost savings for businesses.
5. Record Keeping and Management
o Automated Records: Automatically generates detailed transaction records, aiding in
financial management and reporting.
o Audit Trails: Provides comprehensive audit trails, making it easier to track and verify
transactions.
6. Global Reach
o Cross-Border Transactions: Facilitates international trade and commerce by enabling
cross-border payments.
o Currency Conversion: Often includes integrated currency conversion services,
simplifying international transactions.
7. Enhanced Customer Experience
o User-Friendly Interfaces: Often features intuitive and user-friendly interfaces,
improving the overall customer experience.
o Multiple Payment Options: Offers various payment methods, including credit/debit
cards, digital wallets, and bank transfers, catering to diverse customer preferences.
8. Economic Growth
o Increased Commerce: Promotes e-commerce and digital marketplaces, contributing to
economic growth.
o Financial Inclusion: Provides access to financial services for unbanked and
underbanked populations, supporting economic inclusion and development.
Electronic payments encompass a variety of methods that allow users to transfer funds and make
transactions digitally. Here are the main types of electronic payments:
• Credit Cards:
o Allow users to borrow funds up to a certain limit for purchases or cash withdrawals.
o Examples: Visa, MasterCard, American Express.
• Debit Cards:
o Directly withdraw funds from the user’s bank account for transactions.
o Examples: Visa Debit, MasterCard Debit.
• Description:
o Secure, virtual wallets that store payment information and funds.
• Examples:
o PayPal, Apple Pay, Google Wallet, Samsung Pay.
3. BANK TRANSFERS
4. MOBILE PAYMENTS
• Description:
o Payments made through mobile devices, often via apps.
• Examples:
o Venmo, Gpay, Phone pay, Paytm, Amazon pay
5. ONLINE BANKING
• Description:
o Banking services accessed via the internet, allowing for transfers, payments, and account
management.
• Examples:
6. CRYPTOCURRENCY PAYMENTS
• Description:
o Digital currencies that use cryptographic methods to secure transactions and control the
creation of new units.
• Examples:
o Bitcoin, Ethereum, Litecoin.
7. PREPAID CARDS
• Description:
o Cards preloaded with a set amount of money, which can be used for transactions until the
balance is depleted.
• Examples:
o Gift cards, prepaid debit cards like Visa or MasterCard prepaid cards.
• Description:
o Digital version of traditional paper checks, transferring funds electronically from the
payer’s bank account.
• Examples:
o ACH payments, e-check services provided by banks.
9. CONTACTLESS PAYMENTS
• Description:
o Payments made by tapping a contactless card or mobile device near a point-of-sale
terminal.
• Examples:
o Contactless credit/debit cards, NFC-enabled mobile payments (e.g., Apple Pay, Google
Pay).
• Description:
o Services that authorize and process payments for e-commerce sites and online retailers.
• Examples:
o Stripe, Square, PayPal
Secure Electronic Transaction (SET) is a protocol developed to ensure secure credit card transactions
over the internet.
It was designed by Visa and MasterCard, with support from other major players in the industry, including
IBM, Microsoft, and Netscape.
1. Confidentiality of Information
o Encryption: SET uses encryption to ensure that the credit card information and
transaction details are only accessible to the intended recipient.
o Secure Channel: A secure channel is established between the parties involved to prevent
eavesdropping.
2. Integrity of Data
o Digital Signatures: Ensures that the transaction data has not been altered in transit. Both
the cardholder and merchant use digital signatures to validate the integrity of the data.
3. Authentication
o Cardholder Authentication: Verifies the identity of the cardholder using digital
certificates issued by a trusted Certificate Authority (CA).
o Merchant Authentication: Confirms the legitimacy of the merchant to the cardholder,
also using digital certificates.
4. Non-Repudiation
o Proof of Transaction: Provides proof of the transaction to both parties, ensuring that
neither the cardholder nor the merchant can deny involvement in the transaction.
1. Initialization
o Cardholder and Merchant Registration: Both the cardholder and merchant must
register with a Certificate Authority (CA) to obtain digital certificates.
o Certificate Issuance: The CA issues a pair of digital certificates to both the cardholder
and the merchant. One certificate is for digital signatures, and the other is for key
exchange.
2. Purchase Request
o Order Information Encryption: The cardholder sends the order information to the
merchant encrypted with the merchant’s public key.
o Payment Information Encryption: The payment information (credit card details) is
encrypted separately with the payment gateway’s public key.
3. Purchase Response
o Order and Payment Confirmation: The merchant sends a confirmation message to the
payment gateway. The payment gateway decrypts the payment information and
processes the transaction.
o Digital Signature Verification: The payment gateway verifies the cardholder’s and
merchant’s digital signatures.
4. Authorization and Capture
o Authorization Request: The payment gateway sends an authorization request to the
cardholder’s issuing bank.
o Transaction Approval: The issuing bank approves the transaction and sends an
authorization response back to the payment gateway, which then forwards it to the
merchant.
5. Completion
o Transaction Completion Message: The merchant sends a transaction completion
message to the cardholder, confirming the successful processing of the order and
payment
2. Two-Factor Authentication
▪ Two-factor authentication (2FA) adds an extra layer of security by requiring users to provide two
forms of identification before completing a transaction.
▪ This typically involves a combination of something the user knows (e.g., a password) and
something the user possesses (e.g., a unique code sent to their mobile device).
VIRUS
A computer virus is a type of malicious software designed to replicate itself and spread from one
computer to another, causing harm such as data corruption, unauthorized access, or system damage.
1. Function:
o A computer virus attaches itself to legitimate programs or files. When the infected
program or file is executed, the virus is activated, allowing it to replicate and spread.
2. Effects:
CYBER CRIME
Cybercrime refers to illegal activities that are carried out using computers or the internet. These crimes
can target individuals, businesses, or government institutions, and often involve the theft of data,
financial information, or causing harm to computer systems. Cybercrimes can be committed by
individuals, organized groups, or even state-sponsored actors.
NETWORK SECURITY
Network security refers to the strategies, policies, and technologies used to protect the integrity,
confidentiality, and availability of data and resources within a computer network. Effective network
security involves multiple layers of defences at the edge and within the network.
1. FIREWALL SECURITY
Definition: Firewalls are hardware or software-based systems that control incoming and outgoing
network traffic based on predetermined security rules.
Types:
Stateful Inspection Firewalls: Monitor the state of active connections and make decisions based on the
context of the traffic.
Proxy Firewalls: Act as intermediaries between users and the internet, filtering traffic at the application
level.
Types:
Network-Based IDS/IPS (NIDS/NIPS): Monitor the entire network for malicious activity.
Functionality: IDS alert administrators to potential threats, while IPS can take proactive measures to
block or mitigate these threats.
Functionality: Provides real-time protection by scanning files and system activities for malicious
behaviour, and regularly updating virus definitions.
Types:
Remote-Access VPNs: Allow individual users to connect to a private network from a remote location.
Site-to-Site VPNs: Connect entire networks to each other, such as a corporate network to branch
offices.
5. ENCRYPTION
• Definition: The process of converting data into a coded format to prevent unauthorized access.
• Types:
o Data-at-Rest Encryption: Protects stored data (e.g., on hard drives, USBs).
o Data-in-Transit Encryption: Protects data as it moves across networks (e.g., SSL/TLS
for web traffic).
• Benefits: Ensures that even if data is intercepted, it cannot be read without the decryption key.
• Definition: Mechanisms that restrict access to network resources based on user credentials and
roles.
• Types:
o Role-Based Access Control (RBAC): Grants access based on user roles within an
organization.
o Mandatory Access Control (MAC): Enforces strict policies determined by a central
authority.
o Discretionary Access Control (DAC): Allows resource owners to set access
permissions.
• Definition: Systems that provide real-time analysis of security alerts generated by network
hardware and applications.
• Functionality: Aggregates and analyses logs from various sources to detect and respond to
security incidents.
• Examples: Splunk, IBM QRadar.
8. NETWORK SEGMENTATION
• Definition: Dividing a network into smaller, isolated segments to enhance security and
manageability.
• Benefits: Limits the spread of malware and makes it easier to control and monitor traffic.
• Types:
o Physical Segmentation: Using different physical devices to create separate network
segments.
o Logical Segmentation: Using VLANs and subnets to create separate segments within
the same physical network.
9. PATCH MANAGEMENT
• Definition: The process of regularly updating and applying patches to software and hardware to
fix vulnerabilities and improve security.
• Benefits: Reduces the risk of exploitation by ensuring systems are up to date with the latest
security fixes.
FIREWALL
A firewall is a security device or software designed to monitor and control incoming and outgoing
network traffic based on predetermined security rules. The primary function of a firewall is to establish a
barrier between a trusted internal network and untrusted external networks, such as the internet. Firewalls
TYPES OF FIREWALLS
Firewalls come in various types, each offering different levels of security, functionality, and performance
to meet the needs of different network environments. Here are the main types of firewalls:
1. PACKET-FILTERING FIREWALLS
• Function: Inspect packets at the network layer (Layer 3 of the OSI model) and allow or deny
them based on source and destination IP addresses, ports, and protocols.
• Operation: These firewalls use a set of rules to examine the headers of packets and decide
whether to forward or drop them.
• Function: Monitor the state of active connections and make filtering decisions based on the
context of the traffic (Layer 4 of the OSI model).
• Operation: These firewalls maintain a state table that tracks the state and context of each active
connection, allowing them to make more informed filtering decisions.
• Function: Act as intermediaries between users and the internet, filtering traffic at the application
layer (Layer 7 of the OSI model).
• Operation: These firewalls proxy requests from clients to the destination server and vice versa,
inspecting the application data to make filtering decisions.
• Function: Combine traditional firewall features with advanced capabilities such as intrusion
prevention, deep packet inspection, application awareness, and cloud-delivered threat
intelligence.
• Operation: These firewalls go beyond basic packet filtering and stateful inspection by analysing
the payload and using advanced threat detection techniques.
• Function: Integrate multiple security features into a single device, including firewall, antivirus,
intrusion detection/prevention, content filtering, and VPN.
• Operation: These firewalls provide a broad range of security services in a unified platform,
simplifying deployment and management.
• Function: Provide firewall capabilities as a cloud-based service, offering protection for cloud
infrastructure and services.
• Operation: These firewalls are deployed in the cloud and managed by a service provider,
offering scalability and flexibility.
• Function: Physical devices that protect an organization's network perimeter by filtering traffic
entering or leaving the network.
• Operation: These firewalls are installed at network gateways and operate independently of other
network devices.
8. SOFTWARE FIREWALLS
• Function: Software applications installed on individual devices or servers to protect them from
unauthorized access and attacks.
• Operation: These firewalls filter traffic to and from the device, providing protection at the
endpoint level.
PROXY SERVER
A proxy server is an intermediary server that sits between client devices and the internet. It functions by
forwarding client requests to other servers and returning the responses to the clients. Proxy servers can
provide various benefits, including improved security, privacy, and network performance.
1. Forward Proxy:
o Definition: A forward proxy sits in front of clients and forwards their requests to the
internet. It is commonly used in corporate networks to control and monitor internet
access.
o Use Cases: Content filtering, access control, web caching, and anonymity.
2. Reverse Proxy:
o Definition: A reverse proxy sits in front of web servers and forwards client requests to
the appropriate server. It is used to protect, optimize, and load balance requests for
servers.
o Use Cases: Load balancing, web acceleration, SSL encryption, and protection against
DDoS attacks.
3. Transparent Proxy:
o Definition: A transparent proxy intercepts client requests without requiring any
configuration on the client side. Clients are often unaware of the proxy's presence.
o Use Cases: Content filtering and caching without client configuration.
4. Anonymous Proxy:
o Definition: An anonymous proxy hides the client’s IP address, providing privacy and
anonymity for users.
o Use Cases: Protecting user identity, bypassing geo-restrictions, and avoiding tracking.
5. High Anonymity (Elite) Proxy:
o Definition: A high anonymity proxy not only hides the client’s IP address but also
disguises itself as a regular client, making it difficult to detect as a proxy.
o Use Cases: High-level privacy and security, avoiding sophisticated tracking systems.
6. SOCKS Proxy:
o Definition: A SOCKS proxy operates at the transport layer and can handle any type of
traffic, including HTTP, HTTPS, and FTP.
o Use Cases: Handling diverse traffic types, bypassing firewalls, and supporting peer-to-
peer connections.
1. ENHANCED SECURITY
• Caching:
o Proxy servers can cache frequently accessed web pages and resources. When a user
requests a cached resource, the proxy delivers it directly, reducing load times and saving
bandwidth.
• Load Balancing:
o Distributing client requests across multiple servers helps balance the load, ensuring
efficient use of server resources and maintaining high performance during peak traffic
times.
• IP Address Masking:
o Proxy servers hide the client’s IP address by replacing it with their own, protecting user
identity and location from external servers and trackers.
• Anonymity:
o By using anonymous or high anonymity proxies, users can browse the internet without
revealing their identity, helping to avoid tracking and surveillance.
• Reduced Latency:
o Cached content can be delivered more quickly than retrieving it from the original server,
reducing latency and improving user experience.
• Optimized Routing:
o Proxy servers can optimize routing of internet requests, potentially reducing the number
of hops and improving access speed.
The rise of e-commerce has brought about numerous benefits, including convenience, broader market
access, and increased business opportunities. However, it also raises several ethical, social, and political
issues that need to be addressed to ensure fair, safe, and equitable use of online platforms.
1. Digital Divide:
o Concern: Unequal access to the internet and digital technologies creates disparities in
who can participate in e-commerce.
o Social Impact: Marginalized groups and communities may be excluded from the
benefits of e-commerce.
o Action Required: Promoting digital literacy, expanding internet access, and creating
inclusive platforms.
2. Employment and Labour Practices:
o Concern: E-commerce can lead to job displacement in traditional retail sectors and
exploitative labour practices in logistics and delivery services.
o Social Impact: Economic instability for affected workers and poor working conditions
in e-commerce supply chains.
o Action Required: Supporting retraining programs, enforcing fair labour standards, and
ensuring ethical supply chain practices.
In the context of e-commerce and digital interactions, privacy and information rights are critical ethical
principles that guide the collection, use, and dissemination of personal data. These principles ensure that
individuals’ rights are protected and respected in an increasingly data-driven world.
PRIVACY
Privacy refers to the right of individuals to control access to their personal information and to be free
from unwarranted intrusion. It encompasses the protection of personal data from misuse and unauthorized
access.
1. Consent:
o Individuals should have the right to give or withhold consent regarding the collection and
use of their personal data.
o Consent should be informed, meaning individuals understand what data is being
collected, how it will be used, and with whom it will be shared.
2. Confidentiality:
o Personal data should be kept confidential and not disclosed to unauthorized parties
without the individual’s consent.
o Organizations must implement measures to protect data from breaches and leaks.
3. Data Minimization:
o Only the minimum amount of personal data necessary for a specific purpose should be
collected.
o Unnecessary data collection increases the risk of misuse and breaches.
4. Access and Control:
o Individuals should have the right to access their personal data and correct any
inaccuracies.
o They should also be able to control how their data is used and request its deletion when it
is no longer needed.
5. Transparency:
o Organizations should be transparent about their data collection practices, providing clear
and accessible privacy policies.
o Individuals should be informed about how their data is being used and for what purposes.
INFORMATION RIGHTS
Information rights pertain to the entitlements individuals have regarding their personal information and
its protection. These rights are often enshrined in laws and regulations to ensure that individuals can
exercise control over their data.
1. Right to Be Informed:
o Individuals have the right to be informed about the collection and use of their personal
data.
o This includes clear information on what data is collected, how it is used, and the legal
basis for processing.
2. Right of Access:
o Individuals can request access to their personal data held by organizations.
o They have the right to obtain a copy of the data and understand how it is being
processed.
3. Right to Rectification:
o Individuals have the right to have inaccurate or incomplete personal data corrected.
o Organizations must address rectification requests promptly.
4. Right to Erasure (Right to Be Forgotten):
o Individuals can request the deletion of their personal data when it is no longer necessary
for the purpose for which it was collected, or if they withdraw their consent.
o Organizations must comply unless there are compelling legal grounds for retaining the
data.
5. Right to Restrict Processing:
o Individuals can request that their data be restricted from processing under certain
conditions, such as when the accuracy of the data is contested.
To uphold privacy and information rights, organizations should adopt the following practices:
ISSUES OF E-COMMERCE
E-commerce has revolutionized the way businesses operate and how consumers shop. However, it also
presents several challenges that need to be addressed to ensure sustainable growth and trust in digital
marketplaces. Here are some of the key issues in e-commerce, discussed in detail.
SECURITY CONCERNS:
• Cyberattacks: E-commerce platforms are prime targets for cyberattacks, including hacking,
phishing, and Distributed Denial of Service (DDoS) attacks. These can lead to data breaches and
significant financial losses.
• Payment Security: Ensuring the security of online payment systems is critical. Vulnerabilities in
payment processing can lead to fraud and identity theft.
• Data Protection: E-commerce companies collect vast amounts of personal data. Protecting this
data from unauthorized access is paramount.
• User Consent: Obtaining informed consent from users for data collection and ensuring
transparency about how their data will be used is essential.
COMPLIANCE:
TAXATION:
• Sales Tax: Determining how and where to collect sales tax for online transactions can be
challenging, especially for international sales.
• Regulatory Variations: Different regions have varying tax laws, creating a complex landscape
for e-commerce businesses.
CHALLENGES:
• Timely Delivery: Ensuring timely and accurate delivery of products is a major challenge,
especially for international shipments.
• Inventory Management: Managing inventory efficiently to avoid overstocking or stockouts is
critical for maintaining profitability.
SOLUTIONS:
• Advanced Technologies: Implementing technologies like AI and blockchain can improve supply
chain transparency and efficiency.
• Partnerships: Collaborating with reliable logistics partners can help streamline the delivery
process.
TRUST ISSUES:
• Product Quality: Ensuring that products meet the quality expectations set by online descriptions
and images is essential to build trust.
• Fake Reviews: Addressing the problem of fake reviews and testimonials is crucial for
maintaining credibility.
• Customer Service: Providing excellent customer service, including easy return processes and
responsive support, is vital for customer satisfaction.
• User Experience: Ensuring a seamless and user-friendly website or app experience is key to
retaining customers.
DIGITAL DIVIDE:
• Access to Technology: Not all consumers have access to the technology or internet needed to
participate in e-commerce.
• Literacy and Skills: Digital literacy and skills vary widely, affecting individuals' ability to
engage in online shopping.
ACCESSIBILITY:
6. ETHICAL ISSUES
FAIR PRACTICES:
• Labour Practices: Ensuring fair labour practices in the supply chain, including addressing issues
like sweatshop labour, is an ethical imperative.
• Environmental Impact: E-commerce businesses need to consider the environmental impact of
packaging and shipping.
TRANSPARENCY:
• Advertising: Ethical advertising practices, including honest product descriptions and clear terms
of service, are essential.
• Data Use: Transparent data use policies and practices help build consumer trust and avoid ethical
pitfalls.
PRIVACY POLICY
A privacy policy is a document through which a company makes available to its clients (and any other
person who visits its website) information on how their personal data will be used, the purpose for which
this data will be used, whether it will be shared with third parties and other aspects that might be pertinent
to reach an adequate level of transparency.
Inventors, designers, developers and authors can protect the ideas they have developed,
for instance by means of copyright or patents. The aim is to prevent others from wrongly profiting from
their creations or inventions. It also gives them an opportunity to earn back the money they invested in
1. Patents: In India, patents are governed by the Patents Act, 1970, and the Patents Rules, 2003. The
Indian Patent Office (IPO) administers the patent system in the country. Patent protection is granted for
inventions that are new, involve an inventive step, and are capable of industrial application. The term of a
patent in India is 20 years from the date of filing the application.
2. Trademarks: The Trade Marks Act, 1999, and the Trade Marks Rules, 2017, regulate trademarks in
India. The Controller General of Patents, Designs, and Trademarks, under the Department for Promotion
of Industry and Internal Trade (DPIIT), is responsible for trademark registration and administration.
Trademark protection is granted for distinctive signs, logos, symbols, etc., used to distinguish goods or
services of one entity from another.
3. Copyrights: Copyright protection in India is governed by the Copyright Act, 1957, and the Copyright
Rules, 2013. The Copyright Office, under the Ministry of Education, is responsible for copyright
registration and enforcement. Copyright protection is granted for original literary, dramatic, musical, and
artistic works, as well as cinematographic films and sound recordings. The term of copyright protection
varies depending on the type of work but generally lasts for the lifetime of the author plus 60 years.
4. Designs: Designs in India are protected under the Designs Act, 2000, and the Designs Rules, 2001.
The Controller General of Patents, Designs, and Trademarks administers the design registration system.
Design protection is granted for new or original designs applied to articles of industrial application.
5. Geographical Indications (GI): The Geographical Indications of Goods (Registration and Protection)
Act, 1999, and the Geographical Indications of Goods (Registration and Protection) Rules, 2002, govern
the protection of geographical indications in India. The Geographical Indications Registry, under the
Ministry of Commerce and Industry, handles the registration and protection of GIs.
6. Trade Secrets: Although India does not have specific legislation for trade secret protection, trade
secrets are protected under common law principles and through contractual agreements, such as non-
disclosure agreements (NDAs) and confidentiality clauses. Enforcement of IPR in India involves both
civil and criminal remedies, including injunctions, damages, fines, and imprisonment for infringement.
Additionally, India is a member of various international agreements related to intellectual property, such
as the Agreement on Trade Related Aspects of Intellectual Property Rights (TRIPS), administered by the
World Trade Organization (WTO).
E-GOVERNANCE
E-Governance, or electronic governance, refers to the use of digital technologies, particularly the internet,
to deliver government services, engage citizens, and improve the efficiency and effectiveness of
governmental processes. It encompasses a wide range of activities aimed at transforming the traditional
governance model into a more transparent, accountable, and inclusive one.
OBJECTIVES OF E-GOVERNANCE
1. Government-to-Citizen (G2C):
o Services provided by the government to the citizens.
o Examples: Online tax filing, e-visa applications, digital health records.
2. Government-to-Business (G2B):
o Interactions between the government and the business community.
o Examples: Online business registration, e-procurement systems, digital compliance and
reporting.
3. Government-to-Government (G2G):
o Cooperation and information sharing between different government entities.
o Examples: Inter-departmental data sharing, integrated public service platforms.
4. Government-to-Employee (G2E):
o Services and information provided by the government to its employees.
o Examples: Online payroll management, employee training portals, digital HR services.
BENEFITS OF E-GOVERNANCE
1. Increased Efficiency:
o Automating and digitizing processes reduces paperwork and administrative burdens.
o Speeds up service delivery and reduces wait times for citizens.
2. Cost Savings:
o Reduces the cost of delivering services by minimizing physical infrastructure and
resources.
o Enhances resource management and budget allocation.
3. Improved Transparency:
o Digital records and online access to information make government actions more visible
to the public.
o Reduces opportunities for corruption and fosters trust in government institutions.
4. Better Accessibility:
o Ensures services are accessible to all citizens, including those in remote areas.
o Provides 24/7 access to government services through online platforms.
5. Enhanced Citizen Engagement:
o Encourages public participation in governance through online forums, surveys, and
social media.
o Facilitates a two-way communication channel between citizens and the government.
6. Data-Driven Decision Making:
o Enables governments to collect and analyse data to inform policy and decision-making.
o Helps in identifying trends, addressing issues, and improving public services.
➢ AMAZON
➢ WALMART
➢ ALIBABA
➢ NETFLIX
➢ OLA
➢ SWIGGY
✓ Global reach
✓ 24/7 Availability
✓ Lower operational costs
✓ Convenience
✓ Better Inventory Management
✓ Enhanced Customer Insights
LIST ANY SIX PROTECTIONS GIVEN UNDER IPR FOR E - COMMERCE FIRMS
❖ Patents
❖ Trademarks
❖ Copyright
❖ Industrial design
❖ Domain names
❖ Trade secrets
❖ Design rights