If we need to explore the Economical and social implications of electronic commerce then we must define the E-Commerce first. This is not a simple matter with a verity of new services as definitions are given by different sources. In the e-commerce it is totally base on internet that costumers will buy of their needs on the internet and also they will pay through internet by credit card or what ever they have. So electronic commerce is the best and fastest way to communicate with the costumers in a faster running environment. There are lots of examples of Economical and social implications like if we need some thing or we need to bought to some thing in that case we have to go to the market and check the products of our need and also check that product pay for it some times there is a large quee so we have to wait of our turn it consume our time very much which create a lots of implications for us in this situation we need to save our time which is very important for all of us. And we can save our time by e-commerce because it is fast way to get all things.
Get your grade
or your money back
using our Essay Writing Service!
Benefits & drawback:
We have lots of benefits of E-commerce because it save our time which is very very important for us it is very fast process. It is a very safe way to shop any thing we can claim for our product if it is not good according to our requirement. There are also some drawbacks of E-commerce which we face some times there is an example of this that there are many third parties In the market which are making theafing or hacking accounts of peoples and extracts their money from their accounts.
B) Describe three different and current e commerce entitiies relationships.
There are three different and current types of E-Commerce entities relationships in the market as under:
Business to costumer
Business to business
Customer to customer
Business to costumer:
This is a relationship between the business and the costumers and it has very importance for the business to make a very good and sensible relationship with the costumers because costumers has a great value for the business and it is when came into built when a costumer come to the company and purchase some thing from the company then this relation came into being.
Business to business:
Business to business relationships is that relationship which is made between the two companies or the two business parteners this relationship is called the business relationship. It is very imprtant for the peoples who are running the business because it can profit the both companies there are also some rivals compnies in the market which are against or you can say the competition between the two companies.
Customer to customer:
Customer to customer is the relationship between the two customer some time customer wants to sell second hand or you can say used items to other customers so when they deal with eachother it becomes an relation this relation is called the customer to customer relation.
Describe the hardware, software and networking technologies involved in E-Commerce.
In e commerce they are every thing involved like hardware, software and networking because its all basics of e commerce when any thing supose to be done for example some one customer wants to buy any thing they need something for it they should need computer or a laptop, internet conection some software through they can shop of thier need.
In this system hardware is could be your internet device like a dsl or router and in software is your internet explorer or some thing else software these all things are involved in e commerce.
In E commerce the companies have a lot of software as every company has a specific type of software for there need. They use different types of till machines which had an specific software system.
Expalin the potential risks to organization to committing to E-commerce?
Always on Time
Marked to Standard
There are many risks potential risks in other words we can say that are the transactions risks we will discuss here only three potentials risk which are as under
Most busniesses are going to towards an online persence which have expierenced some kind of security threat to their busniess so thier busniess could be safe. Since the internet is a publc system in which every transaction can be tracked, logged, monitered and stored in many locations, it is imprtant for businesses to undrstand possible chances of security threats to their business. There are lot of risks in the e commerce but the big thing is our documentation information our credit cards report or information like this kind of information are very important for us to keep it safe.
When we do shopping online over the internet we have to pay for this and we can pay by our credit cards so when we make any payment we have to make sure that the company recived the price of our shopping because there are lot of chances of payment risks because if we pay and if the company didint recive the payment then we can loss our money and this could be happen by any third party company so we have to make sure that is it is a safe shopping because every secure website has a sign of secure payment on the website so we shold check this and we can be safe. For this purpose we get help from a trusted third man who proceed and responsibe for our money we give our money to that third man who then give that payment to the company untill we recive the our needed things if in any situation we didnt recive our anything the third man will stop making payment to the company. Now a days the paypal is the highly trusted and motivated company for this perpose.
Fulfillment risks are that risks when we buy some thing and we order for a home delivery and the company deliver the items at our door step and we recive that thing after that we came to know that we didnt recive our demanding things or these things are defective so this is risk for us that company send the proper thing for us but it was not perfact so when we recive the delivery we should make sure that we had recived the correct items of our needs.
Evaluate the use of E-commerce in ââ‚¬Å“brick and clickââ‚¬Â organization that balances E-commerce with the continued high street presence. D1
The bricks and clicks are very imprtant and benficial for the E commerce buniess of needs because it has a great vlue because it covers the customers time and also make it easir for the customers to do a asafe shopping online. Now we can do shopping and reserve our shopping and can pick our ordered things from the company nearest store it can safe our times.
The bricks and clicks model has typically been used by traditional retailers who have extensive logistics and supply chains. Part of the reason for its success is that it is far easier for a traditional retailer to establish an online presence than it is for a start-up company to employ a successful pure "dot com" strategy, or for an online retailer to establish a traditional presence. Bricks and clicks are usually called the buildings and outlets of the companies because they are locate nation wide with a lots of branches for the ease of customers.
Justify the choice of security theniqes used to protect an e commerce system?
Common e-commerce secrity controls are
We should introduce sufficiant controls to reduce risks to e-commerce system.however these controls should not be restrictive that damge the employes performqnce.
Some of the common security controls are listed below.
There are several techniques that can identify and verify someone seeking to access an e-commerce system. These include:
This Essay is
a Student's Work
This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.Examples of our work
A user name and password combination, where the password can vary in length and include numbers and characters. Remember to include a system prompts emplyeses to change their password at regular intervals.
Two factors authentication reruiring something the user has and something the user knows(a personal identification number).
A digital certificate that enables auntication through the use of an individualââ‚¬â„¢s unique signig key.
Network restriction to prevent access to other computer system and networks.
Application controls to ensure individuals are limited in the data or service they can access.