Management challenges in on-line retailing While changes in retailing may b e driven by technology ,managerial vision is required for successful implementation. Traditionally,retailing has been a low-tech environment in which retailing executives often relegated technology issues to back-room operators.These managers are most at risk as they do not have a clue that a major […]
On-line mercantile models from customer perspective
On-line mercantile models from customer perspective The on-line consumer expects quality,convenience,value,low price and control.To meet these expectations and understand the behaviour of the online shopper,there is a need for a business process model that provides a standard product/services purchasing process from an interactive services and merchandising point of view. Consumer mercantile activities canbe grouped into […]
Internet based Business Models
Internet based Business Models In the most basic sense, a business model is the method of doing business by which a company can sustain itself — that is, generate revenue. The business model spells-out how a company makes money by specifying where it is positioned in the value chain. Business models have been defined […]
Mobile Commerce
Mobile Commerce The phrase mobile commerce was originally coined in 1997 by Kevin Duffey at the launch of the Global Mobile Commerce Forum, to mean “the delivery of electronic commerce capabilities directly into the consumer’s hand, anywhere, via wireless technology. M-commerce (mobile commerce) is the buying and selling of goods and services through wireless handheld devices such as cellular telephone and personal […]
Digital Commerce
Digital Commerce Digital commerce (D-commerce) is a type of e-commerce used by an organization that delivers and sells products online. D-commerce is used by companies that sell news, subscriptions, documents or any form of electronic content, and the digital commerce company collects payments, handles customer refunds and billing and manages other accounting functions for online […]
e-Governance
e-Governance Electronic governance or e-governance is the application of information and communication technology (ICT) for delivering government services, exchange of information communication transactions, integration of various stand-alone systems and services between government-to-customer (G2C), government-to-business (G2B), government-to-government (G2G) as well as back office processes and interactions within the entire government framework. Objectives of E-Governance The object of E-Governance is to provide a SMARRT Government. […]
Emerging Trends in e –Business
Emerging Trends in e –Business E-commerce has helped expand industries and telecommunications enabling small-scale businesses to flourish and spread internationally. This new form of interaction has brought along many new trends, a few of which are given below: 1. Deals Offline deals and coupons were always a trend, but have not been taken up online. Depending on […]
Public Key Infrastructure (PKI)
Public Key Infrastructure (PKI) Public Key Infrastructure (PKI) is a system that validates a user’s digital identity over a public or private network. It does so by associating a pair of public and private keys with the individual’s identity credentials. These keys are created with a cryptographic algorithm and shared by a certificate authority […]
Firewalls
Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system. A firewall is a hardware or software system that prevents unauthorized access to or from a network. It can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet […]
Secure Socket Layer(SSL)
Secure Socket Layer(SSL) SSL stands for Secure Socket Layer. SSL was designed to permit web browsers and web servers to exchange sensitive information and prevent programs that could view the network traffic from reading the sensitive data. The SSL protocol was developed by Netscape Communications in the 1990s. The company wanted to encrypt data in transit between its […]