Ecommerce 2
Ecommerce 2
8)Logistics: The logistics system manages the shipping and delivery of Supply chain management (SCM) refers to the management of the flow
products to customers. This may include partnerships with shipping of goods and services, from the sourcing of raw materials to the delivery
companies, order tracking, and automated shipping notifications. of finished products to the end customer. Effective supply chain
management is essential for businesses to meet customer demand,
9)Analytics: Analytics tools track the performance of the e-commerce reduce costs, and maximize profitability.
business, such as sales data, website traffic, and customer behavior. This
information can be used to improve the customer experience and Here are some of the key components of supply chain management:
optimize business operations.
1)Planning: This involves forecasting demand, creating production
schedules, and determining the optimal inventory levels.
FEAUTURES E-commerce E-business 2)Sourcing: This involves selecting and managing suppliers, negotiating
Meaning Trading of Running business on contracts, and ensuring the timely delivery of raw materials.
merchandise over the internet is
internet is called e- known as e-business 3)Manufacturing: This involves producing goods, managing the
commerce production process, and maintaining quality control standards.
What is it Subset: e-commerce Superset: e business
is a part of ebusiness includes ecommerce 4)Logistics: This involves managing the transportation and distribution of
goods, including warehousing, shipping, and delivery.
Is it limited by Yes No
monetary 5)Return: this is the problem part of supply chain a network is created
transactions for receiving defective and excessive products back and supporting
Type of transaction Commercial Business transaction customers who have problem with their delivered products.
transaction
approach Extroverted (often Ambiverted (often 6)Customer service: This involves managing customer orders, resolving
B2C) B2B) issues, and ensuring customer satisfaction.
Requires website Website, CRM, ERP
etc. Effective supply chain management requires collaboration and
Types of networks Internet Internet, intranet, communication across all stages of the supply chain, from suppliers to
used extranet customers. Technology can play a critical role in enabling effective supply
chain management, such as the use of software for inventory
management, transportation planning, and order tracking.
IT infrastructure refers to the underlying technology systems and Intranet is owned by a single organization and is a tool for sharing
components that support the operations of an organization's information information throughout the organization. It is the type of Internet that is
technology environment. This includes hardware, software, networks, used privately. Since, intranet is a private network so no one can use the
data storage, servers, and other components that are required for the intranet whose have not valid username and password. In intranet, there
processing, storage, and transmission of data and information. are a limited number of connected devices as compared to internet.
Intranet is highly secure and has a small number of visitors. It is used in
The IT infrastructure is critical to the success of an organization, as it order to get employee information, telephone directory etc.
supports the delivery of services, applications, and data to end-users. A
well-designed and maintained IT infrastructure can help organizations to Advantages of an intranet
improve efficiency, reduce costs, and enhance security.
1. Easy storage of files and information-Every organization has
Some key components of an IT infrastructure may include: hundreds, if not thousands, of differently formatted files floating among
email threads, Google Drive, or hard drives on laptops or desktops.
1)Hardware: This includes physical components such as servers, desktop Having a company intranet makes it easy to store and access all your files
computers, laptops, tablets, smartphones, and other devices that are in one central location. Any communication that happens on an intranet
used to access or manage information. is also saved for as long as the intranet is up. This makes it easier for
individuals to search for past posts from their company intranet.
2)Software: This includes operating systems, applications, and other
software tools that are used to manage and manipulate data. 2. Easy ways to communicate among employees -Intranets usually
feature user profiles similar to your LinkedIn profile. They contain a
3)Networking: This includes the hardware and software components photo, job title and description, and contact information. Any employee
that are used to connect devices and transmit data between them, such with access to the intranet can discover new colleagues and message
as routers, switches, and firewalls. them through the intranet. This facilitates increased collaboration and
helps establish a workforce network.
4)Data storage: This includes the hardware and software components
that are used to store and manage data, such as hard drives, solid-state 3. A good Content Management System (CMS) -Intranets started off in
drives, and cloud storage solutions. the 1990s as a simple welcome page with sparse information about an
enterprise. Since then, they have evolved to include discussion forums,
5)Security: This includes the hardware and software components that
blogs, and social features. This has enabled internal communicators to be
are used to protect IT infrastructure and data from unauthorized access,
able to use their intranet to share key messages and organizational
theft, and other security threats.
updates. CMS intranet enables internal communicators to easily create
and share content across the system.
Overall, the IT infrastructure is a critical component of any organization's
technology ecosystem, and requires careful planning, design, and
Disadvantages of an intranet
management in order to effectively support business operations and
achieve organizational goals. 1. Information is difficult to find-Intranets have traditionally been
structured in an outdated format that forces employees to search
components of internet information technology structure
through thousands of pages or folders to find the information that they
need
The internet information technology (IT) structure comprises various
components that work together to facilitate the flow of data and
2. Desk less workers can’t access intranets easily-Intranets are limited in
information across the internet. These components include:
their ability to reach all employees as they are sometimes only accessible
on the desktop. Remote workers, such as retail workers, nurses,
1)Transmission Control Protocol/Internet Protocol (TCP/IP): TCP/IP is
warehouse staff, and truck drivers, may not have the ability to access
the primary protocol used to transmit data across the internet. It defines
intranets
the rules for how data is sent and received over the internet.
3. Mobile isn’t supported-Many intranets do not support mobile or need
2)Domain Name System (DNS): DNS is a distributed naming system that
to be updated with the next mobile release. If you already have an
translates human-readable domain names into IP addresses that
intranet, it can be tempting to wait until the next update that has a
computers can understand. It allows users to access websites using easy-
mobile feature instead of committing to a communications makeover.
to-remember domain names instead of having to remember the IP
addresses of the websites they want to visit.
4. Updates to intranets can take a long time - Communication technology
and software are constantly improving and evolving. We are accustomed
3)Web servers: Web servers are software applications that run on
to regularly scheduled software updates, new releases, and exciting new
computers and provide access to web pages and other web content.
features.
They respond to requests from web browsers and deliver web content in
the form of text, images, videos, and other media.
3)Cost: Implementing and maintaining an extranet can be expensive, Overall, online payment mechanisms have revolutionized the way we
especially if you need to invest in additional hardware or software. conduct financial transactions, making it easier, faster, and more secure
to buy and sell goods and services over the internet.
4)Complexity: Extranets can be complex to set up and manage, requiring
specialized knowledge and expertise.
Payment gateways are online platforms that enable secure and efficient The Information Technology (IT) Act, 2000 is an Indian law that governs
transactions between a buyer and a seller. They facilitate online payment the use of information technology in India. It has been amended several
processing by securely transmitting payment data between the customer times since its inception. Some of the relevant provisions of the IT Act
and the merchant's bank or financial institution. are:
The working of payment gateway is a five-step process- 1)Section 43: This section deals with the penalties for damage to a
computer system or computer network, hacking, and unauthorized
1)Customer inputs credit card information in an online shop access to computer systems.
2)the payment gateway encrypts data and send it securely to internet 2)Section 66: This section deals with the punishment for computer-
merchant account related offenses like hacking, data theft, and virus attacks.
3)the transaction is reviewed for authorisation by the customer’s issuing 3)Section 66A: This section dealt with sending offensive messages
bank. through communication services but was struck down by the Supreme
Court of India in 2015.
4)the result is encrypted and then send back through the gateway.
4)Section 69A: This section deals with the power of the central
5)merchants gets the result and decides whether or not to fulfil the government to block public access to any information through any
order computer resource.
There are several types of payment gateways, including: 5)Section 79: This section provides safe harbour to intermediaries like
social media platforms from third-party content posted on their
1)Hosted payment gateways
platforms.
2)Self-hosted payment gateways
6)Section 84A: This section deals with the punishment for publishing or
transmitting sexually explicit content.
3)API hosted payment gateways.
7)Section 85: This section provides for the punishment of a company's
4)Local payment gateways
managing director, manager, secretary, or any other officer in charge if
5)Mobile payment gateways the company is found guilty of committing an offense under the Act.
These are just a few of the provisions of the IT Act, and there are several
others that deal with various aspects of the use of information
risk management options for e-payment technology in India.
7)Understanding your risk and train your staff- Your staff should know
clearly what risks your e-commerce business may have to deal with.
Everyone in your business structure needs to understand the types of
risks inherent in online payments. Then, establish a procedure on
avoiding and solving risks, which is a must for all staff to follow.
secure electronic records and digital signature
5)Audit Trails and Logging: Maintain comprehensive audit trails and logs
of activities related to electronic records and digital signatures. This
includes capturing information such as user actions, access attempts,
modifications, and digital signature operations. Monitoring and analyzing
these logs can help identify any security breaches or suspicious activities.
Payment gateways
M commerce