Electronic Commerce

On-line mercantile models from customer perspective

On-line mercantile models from customer perspective The on-line consumer expects quality,convenience,value,low price and control.To meet these expectations and understand the behaviour of the online shopper,there is a need for a business process model that provides a standard product/services purchasing process from an interactive services and merchandising point of view. Consumer mercantile activities canbe grouped into […]

Mobile Commerce

Mobile Commerce   The phrase mobile commerce was originally coined in 1997 by Kevin Duffey at the launch of the Global Mobile Commerce Forum, to mean “the delivery of electronic commerce capabilities directly into the consumer’s hand, anywhere, via wireless technology. M-commerce (mobile commerce) is the buying and selling of goods and services through wireless handheld devices such as cellular telephone and personal […]

Digital Commerce

Digital Commerce Digital commerce (D-commerce) is a type of e-commerce used by an organization that delivers and sells products online. D-commerce is used by companies that sell news, subscriptions, documents or any form of electronic content, and the digital commerce company collects payments, handles customer refunds and billing and manages other accounting functions for online […]


e-Governance Electronic governance or e-governance is the application of information and communication technology (ICT) for delivering government services, exchange of information communication transactions, integration of various stand-alone systems and services between government-to-customer (G2C), government-to-business (G2B), government-to-government (G2G) as well as back office processes and interactions within the entire government framework. Objectives of E-Governance The object of E-Governance is to provide a SMARRT Government. […]

Public Key Infrastructure (PKI)

Public Key Infrastructure (PKI)   Public Key Infrastructure (PKI) is a system that validates a user’s digital identity over a public or private network. It does so by associating a pair of public and private keys with the individual’s identity credentials. These keys are created with a cryptographic algorithm and shared by a certificate authority […]


Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system. A firewall is a hardware or software system that prevents unauthorized access to or from a network. It can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet […]

Secure Socket Layer(SSL)

Secure Socket Layer(SSL)   SSL stands for Secure Socket Layer. SSL was designed to permit web browsers and web servers to exchange sensitive information and prevent programs that could view the network traffic from reading the sensitive data. The SSL protocol was developed by Netscape Communications in the 1990s. The company wanted to encrypt data in transit between its […]

Hypertext Transfer Protocol(HTTP)

Hypertext Transfer Protocol(HTTP)   Hypertext transfer Protocol is a communication protocol.HTTP is used for the transfer of imformation on intranets and the World Wide Web.The applicaton level protocol of TCP/IP suite  the makes the WWW workable is Hypertext Transfer protocol.HTTP is now the standard Web service protocol.It enables transfers of files on Internet that may […]

Scroll to top
You cannot copy content of this page. The content on this website is NOT for redistribution