Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
17 views24 pages

Eba Notes - Shreyash

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 24

E - BUSINESS APPLICATION NOTES - SHREYASH (SEM 2)

introduction of E-Business and E- Commerce


Concepts

Introduction to E-Business and E-Commerce:

E-Business and E-Commerce are two closely related concepts that have transformed the way
businesses operate and interact with customers, suppliers, and partners. They involve the use of
technology, particularly the internet, to conduct various business activities, transactions, and interactions
electronically. While they share similarities, they have distinct focuses and applications within the
business world.

E-Business:

E-Business, short for Electronic Business, refers to the integration of digital technology into various
aspects of business operations. It encompasses a wide range of activities beyond just buying and
selling products or services online. E-Business leverages technology to streamline processes, enhance
customer experiences, improve communication, and create new business models. It includes functions
such as marketing, supply chain management, customer relationship management (CRM), human
resources, and more, all of which are transformed through digital tools and platforms.

Key Concepts of E-Business:

Digital Transformation: E-Business involves transforming traditional business processes into digital
ones, enabling greater efficiency, speed, and accuracy.

Process Automation: E-Business automates tasks and processes to reduce manual intervention,
minimize errors, and improve consistency.

Online Presence: Establishing an online presence through websites, social media, and other digital
channels is a core component of E-Business.

Customer Interaction: E-Business enhances customer engagement through online support,


personalized experiences, and direct communication.

Data Analytics: E-Business utilizes data analytics to gain insights into customer behavior, preferences,
and market trends.

E-Commerce:

E-Commerce, short for Electronic Commerce, is a subset of E-Business that specifically focuses on the
buying and selling of goods and services over the internet. It involves online transactions, payments,
and the entire process of purchasing products or services electronically. E-Commerce has evolved into
a significant part of the global economy, with businesses ranging from small startups to large
corporations engaging in online sales and distribution.

Key Concepts of E-Commerce:

Online Transactions: E-Commerce enables customers to browse, select, and purchase products or
services online, often with secure payment gateways.

Digital Storefronts: E-Commerce businesses create digital storefronts through websites and mobile
apps to showcase their products and services.

Mobile Commerce (M-Commerce): E-Commerce extends to mobile devices, allowing customers to


shop and make purchases via smartphones and tablets.

Marketplaces: E-Commerce platforms often host marketplaces where multiple vendors can list and sell
their products, expanding customer choice.

Supply Chain Integration: E-Commerce requires seamless integration of inventory management, order
processing, and logistics to ensure timely delivery.

Advantages of E-Business:

Global Reach: E-Business allows companies to reach a worldwide customer base without the
limitations of physical location.
E - BUSINESS APPLICATION NOTES - SHREYASH (SEM 2)
Reduced Costs: E-Business reduces expenses related to physical stores, rent, utilities, and personnel,
resulting in cost savings.

24/7 Availability: Online operations enable businesses to operate around the clock, accommodating
different time zones and customer preferences.

Convenience: Customers can shop, interact, and transact from anywhere at any time, enhancing their
overall experience.

Personalization: E-Business platforms can tailor recommendations and offerings based on customer
preferences and behavior.

Efficient Inventory Management: Real-time tracking and automation of inventory help in better
management of stock levels.

Data Analytics: E-Business generates data that can be analyzed to gain insights into customer
behavior, trends, and preferences.

Direct Customer Interaction: Businesses can directly engage with customers, gather feedback, and
build lasting relationships.

Disadvantages of E-Business:

Security Concerns: E-Business transactions are vulnerable to hacking, data breaches, and
cyberattacks, risking customer data.

Technical Challenges: Maintaining and updating online platforms requires technical expertise, which
some businesses might lack.

Lack of Personal Touch: Online transactions lack the personal interaction that traditional brick-and-
mortar stores offer.

Digital Divide: Not all customers have equal access to the internet, devices, or digital literacy, limiting
their engagement.

Competition: The accessibility of E-Business can lead to fierce competition, requiring unique strategies
to stand out.

Privacy Issues: Collecting customer data raises concerns about privacy and regulatory compliance.

Objectives of E-Business:

Increase Sales and Revenue: E-Business aims to expand market reach and increase sales by tapping
into a global audience.

Improve Customer Experience: Enhancing user experience and providing convenience are key
objectives of E-Business.

Efficiency Enhancement: E-Business seeks to streamline operations, automate processes, and


reduce manual intervention.

Cost Reduction: E-Business can help cut costs related to physical infrastructure, logistics, and
distribution.

Enhance Data Utilization: E-Business objectives include using data insights for better decision-making
and marketing strategies.

Types of E-Business:

Online Retailing (E-Tailing): Businesses sell products directly to consumers through online stores.

Service-Based E-Business: Companies provide services online, such as consulting, freelancing,


education, and more.

Online Marketplaces: Platforms where multiple vendors list their products or services for sale, like
Amazon and eBay.
E - BUSINESS APPLICATION NOTES - SHREYASH (SEM 2)
Digital Products E-Business: Selling digital products like e-books, software, online courses, and
downloadable content.

Subscription-Based E-Business: Offering products or services on a subscription basis, such as


streaming services or subscription boxes.

Lead Generation Websites: Websites designed to capture potential customers' information and
generate leads for businesses.

Affiliate Marketing: Promoting products or services of other businesses and earning a commission on
sales.

Online Advertising and Marketing: Providing digital advertising and marketing services to businesses.

Online Auctions: Platforms where products or services are auctioned to the highest bidder, like eBay.

Crowdfunding Platforms: Platforms where businesses and individuals can raise funds for projects and
initiatives.

Advantages of e-commerce

Global reach: E-commerce businesses can reach a global audience, 24/7.


Cost savings: E-commerce businesses can save money on overhead costs, such as rent and staffing.
Efficiency: E-commerce businesses can automate many tasks, such as order processing and inventory
management.
Personalization: E-commerce businesses can collect data about their customers and use it to
personalize their marketing and product offerings.
Convenience: E-commerce businesses offer customers the convenience of shopping from home or on
the go.

Disadvantages of e-commerce

Security risks: E-commerce businesses need to take precautions to protect customer data from
cyberattacks.
Return policies: E-commerce businesses can have higher return rates than traditional brick-and-mortar
businesses.
Shipping costs: E-commerce businesses can incur shipping costs, which can be passed on to
customers.
Customer service: E-commerce businesses may have difficulty providing the same level of customer
service as traditional brick-and-mortar businesses.

Objectives of e-commerce

The objectives of e-commerce can vary depending on the business, but some common objectives
include:

Increased sales: E-commerce businesses can use e-commerce to increase sales by reaching a wider
audience and providing a more convenient shopping experience.
Reduced costs: E-commerce businesses can use e-commerce to reduce costs by automating tasks
and eliminating the need for a physical store.
Improved customer service: E-commerce businesses can use e-commerce to improve customer
service by providing 24/7 support and personalized recommendations.
Brand awareness: E-commerce businesses can use e-commerce to build brand awareness by creating
a strong online presence and engaging with customers on social media.

Types of e-commerce

There are many different types of e-commerce, but some of the most common include:

B2C (business-to-consumer): This is the most common type of e-commerce, where businesses sell
products or services directly to consumers.
B2B (business-to-business): This type of e-commerce involves businesses selling products or
services to other businesses.
C2C (consumer-to-consumer): This type of e-commerce involves consumers selling products or
services to other consumers.
M2C (marketplace): This type of e-commerce involves a marketplace that brings together buyers and
sellers.
E - BUSINESS APPLICATION NOTES - SHREYASH (SEM 2)
G2C (government-to-consumer): This type of e-commerce involves governments selling products or
services directly to consumers.

Business on internet

"Business on the Internet" refers to the practice of conducting various business activities, transactions,
and operations using digital platforms and the internet as a medium. The internet has revolutionized the
way businesses operate, connect with customers, and interact with partners and suppliers. Businesses
leverage the internet to reach a wider audience, streamline processes, enhance customer experiences,
and create new opportunities. Here's an overview of key aspects related to conducting business on the
internet:

1. Online Presence:
Establishing an online presence is essential for modern businesses. This includes having a website that
showcases products, services, and company information. An effective website serves as a digital
storefront and a hub for customer interactions.

2. E-Commerce:
E-Commerce involves buying and selling products or services online. Businesses set up E-Commerce
platforms to enable customers to browse, select, and purchase items electronically. E-Commerce
streamlines transactions and provides convenience for customers.

3. Digital Marketing:
Internet-based marketing strategies include search engine optimization (SEO), social media marketing,
email marketing, content marketing, and online advertising. These approaches help businesses attract,
engage, and convert online audiences.

4. Social Media Engagement:


Social media platforms provide opportunities for businesses to engage with customers, build brand
awareness, and create a community. Businesses use social media for customer support, marketing
campaigns, and sharing valuable content.

5. Data Analytics:
Businesses gather and analyze data from online interactions to understand customer behavior,
preferences, and trends. Data analytics helps in making informed decisions and refining strategies.

6. Online Advertising:
Businesses use various forms of online advertising, including pay-per-click (PPC), display ads, and
sponsored content, to reach their target audience effectively.

7. Remote Work and Collaboration:


The internet enables remote work and collaboration through tools like video conferencing, cloud-based
project management, and virtual communication platforms.

8. Customer Relationship Management (CRM):


Online CRM systems allow businesses to manage customer interactions, track leads, and provide
personalized customer experiences.

9. Mobile Compatibility:
With the proliferation of smartphones, businesses ensure their online presence and E-Commerce
platforms are mobile-friendly for a seamless user experience.

10. Security and Privacy:


Security measures, including encryption and secure payment gateways, are crucial to protect customer
data and build trust.

11. Market Research:


The internet provides access to a wealth of information for market research, helping businesses
understand their target audience, competitors, and industry trends.

12. Online Support and Chatbots:


Businesses offer online customer support through chatbots and live chat features, enhancing customer
service and engagement.

13. Content Creation:


E - BUSINESS APPLICATION NOTES - SHREYASH (SEM 2)
Creating valuable and relevant online content, such as blogs, articles, videos, and infographics, helps
position businesses as industry experts and attracts audiences.

14. Virtual Events and Webinars:


Businesses can host virtual events, webinars, and workshops to engage customers, educate them
about products or services, and foster relationships.

Benefits of Doing Business on the Internet:

Global Reach: Reach a worldwide audience, breaking geographical barriers.


Cost Efficiency: Reduce costs associated with physical infrastructure and operations.
Convenience: Provide customers with 24/7 access and convenient shopping.
Personalization: Tailor offerings based on customer preferences and behavior.

Data Insights: Gather data to make informed decisions and improve strategies.
Direct Interaction: Engage directly with customers for feedback and relationship-building.

Drawbacks of Doing Business on the Internet:

Security Concerns: Risk of data breaches and cyberattacks, affecting customer trust.
Technical Challenges: Need for technical expertise to manage and secure online platforms.
Lack of Personal Touch: Lack of in-person interaction can impact customer experience.
Digital Divide: Some customers may lack access to the internet and digital devices.
Intense Competition: High accessibility can lead to fierce competition among businesses.

Objectives of Doing Business on the Internet:

Increased Sales: Expand market reach and boost sales through a global audience.
Enhanced Customer Experience: Provide convenient and personalized interactions.
Operational Efficiency: Streamline processes, automate tasks, and reduce manual efforts.
Cost Reduction: Cut costs related to physical infrastructure and distribution.
Data Utilization: Leverage data insights for better decision-making and targeted marketing.

Framework of E-Business

A framework of e-business is a set of components that work together to support electronic business
transactions. The framework typically includes the following components:

Front-end: This is the part of the framework that interacts with customers and partners. It includes the
website, customer relationship management (CRM) system, and e-commerce platform.
Back-end: This is the part of the framework that supports the front-end. It includes the inventory
management system, order processing system, and accounting system.
Technology: This is the infrastructure that supports the framework. It includes the hardware, software,
and network.
People: This is the human element of the framework. It includes the employees who design, develop,
and maintain the framework.

The framework of e-business can be used to support a variety of business processes, such as:

Sales and marketing: The framework can be used to promote products and services, generate leads,
and close sales.
Customer service: The framework can be used to provide customer support, track orders, and resolve
issues.
Procurement: The framework can be used to source products and services, negotiate contracts, and
manage inventory.
Logistics: The framework can be used to track shipments, manage inventory, and deliver products to
customers.
Finance: The framework can be used to manage payments, track expenses, and generate reports.
The framework of e-business can be customized to meet the specific needs of a business. The size of
the business, the industry it operates in, and the specific business processes it needs to support will all
affect the design of the framework.

Here are some of the benefits of using a framework of e-business:

Improved efficiency: The framework can help businesses to improve efficiency by automating tasks
and streamlining processes.
E - BUSINESS APPLICATION NOTES - SHREYASH (SEM 2)
Increased agility: The framework can help businesses to be more agile by making it easier to adapt to
changes in the market.
Reduced costs: The framework can help businesses to reduce costs by eliminating the need for
manual processes and by improving efficiency.
Improved customer service: The framework can help businesses to improve customer service by
providing customers with a more convenient and efficient way to interact with the business.
Increased security: The framework can help businesses to increase security by providing a secure
platform for conducting electronic business transactions.

If you are considering implementing e-business, it is important to choose a framework that is right for
your business. There are many different frameworks available, so it is important to compare them and
choose one that meets your specific needs.

* Technical Standards
* Legal Framework
* Supply Chain Framework

The framework of E-Business involves several interconnected components that guide the establishment,
operation, and success of online business activities. Here's how the three specified components fit into
the broader framework of E-Business:

1. Technical Standards:

Technical standards are essential in E-Business to ensure interoperability, security, and seamless
communication among various digital systems and platforms. These standards provide a common
foundation for technology integration, data exchange, and user experiences. In the context of E-
Business, technical standards encompass:

Web Development Standards: Guidelines for designing and developing user-friendly websites,
ensuring responsive design, optimal page loading, and compatibility across devices and browsers.

Data Exchange Standards: Protocols for exchanging data between different systems, ensuring
accurate and secure information flow. Examples include APIs (Application Programming Interfaces) and
XML (eXtensible Markup Language).

Security Standards: Measures to protect sensitive data and maintain secure transactions, including
encryption protocols, SSL/TLS certificates, and compliance with cybersecurity frameworks.

E-Commerce Platform Standards: Guidelines for building E-Commerce platforms that support secure
payment gateways, inventory management, order processing, and customer engagement.

Mobile Compatibility Standards: Guidelines for optimizing websites and applications for mobile
devices, ensuring a consistent user experience across different screen sizes.

2. Legal Framework:

The legal framework in E-Business is crucial to ensure compliance with applicable laws and regulations,
protect consumer rights, and establish trust between businesses and customers. Key elements of the
legal framework include:

Privacy and Data Protection Laws: Compliance with data protection regulations, such as GDPR
(General Data Protection Regulation) in the European Union, to safeguard customer data and privacy.

Consumer Protection Laws: Adherence to consumer rights, including accurate product information,
transparent pricing, and effective dispute resolution mechanisms.

Intellectual Property Rights: Protection of trademarks, copyrights, patents, and other intellectual
property assets related to online products and content.

Terms of Service and Privacy Policies: Clearly defining terms of use, data collection practices, and
customer rights through comprehensive terms of service and privacy policies.

Digital Contracts: Establishment of legally binding agreements for online transactions, including
purchase agreements and subscription terms.

3. Supply Chain Framework:


E - BUSINESS APPLICATION NOTES - SHREYASH (SEM 2)
The supply chain framework in E-Business focuses on optimizing the flow of goods, services, and
information to meet customer demands efficiently. In E-Business, the supply chain encompasses
various stages, including:

Sourcing and Procurement: Identifying reliable suppliers, negotiating contracts, and procuring
products or services for online sale.

Inventory Management: Implementing systems to monitor and manage inventory levels, ensuring
timely availability of products and avoiding stockouts.

Order Fulfillment: Streamlining the process of receiving, processing, and fulfilling customer orders,
including picking, packing, and shipping.

Logistics and Distribution: Coordinating transportation, warehousing, and delivery to ensure products
reach customers on time and in good condition.

Reverse Logistics: Managing returns, exchanges, and refunds, and effectively handling customer
service requests related to product returns.

Supplier Collaboration: Establishing digital communication channels with suppliers to share


information, forecasts, and demand data for effective collaboration.

The integration of technical standards, legal compliance, and supply chain optimization forms a
comprehensive framework for successful E-Business operations. This framework ensures a secure,
efficient, and customer-focused approach to conducting business in the digital age.

Infrastructure for E-Business.

E-business infrastructure refers to the underlying systems and technologies that support electronic
business transactions. It includes the hardware, software, network, and people that are needed to run
an e-business.

The following are the key components of e-business infrastructure:

Hardware: The hardware is the physical components of an e-business, such as computers, servers,
and routers.
Software: The software is the programs that run on the hardware and control the e-business.
Network: The network is the infrastructure that connects the hardware and software together.
People: The people are the employees who design, develop, and maintain the e-business infrastructure.

The e-business infrastructure must be reliable, secure, and scalable to meet the needs of the business.
It must also be able to support the different types of e-business transactions that the business needs to
conduct.

Here are some of the challenges of e-business infrastructure:

Complexity: The e-business infrastructure can be complex and difficult to manage.


Security: The e-business infrastructure must be secure to protect sensitive data.
Scalability: The e-business infrastructure must be able to scale to meet the needs of the business as it
grows.
Cost: The e-business infrastructure can be expensive to set up and maintain.
Despite the challenges, e-business infrastructure is essential for the success of any e-business. By
investing in a reliable, secure, and scalable e-business infrastructure, businesses can improve their
efficiency, effectiveness, and competitive advantage.

Here are some of the benefits of having a good e-business infrastructure:

Improved efficiency: A good e-business infrastructure can help businesses to improve efficiency by
automating tasks and streamlining processes.
Increased agility: A good e-business infrastructure can help businesses to be more agile by making it
easier to adapt to changes in the market.
Reduced costs: A good e-business infrastructure can help businesses to reduce costs by eliminating
the need for manual processes and by improving efficiency.
Improved customer service: A good e-business infrastructure can help businesses to improve
customer service by providing customers with a more convenient and efficient way to interact with the
business.
E - BUSINESS APPLICATION NOTES - SHREYASH (SEM 2)
Increased security: A good e-business infrastructure can help businesses to increase security by
providing a secure platform for conducting electronic business transactions.

Consumer Access Equipment

Consumer access equipment (also known as customer premise equipment) is the hardware that is used
by consumers to access the internet. It includes devices such as computers, laptops, smartphones,
tablets, and e-readers.

Consumer access equipment is essential for e-business because it allows consumers to interact with
businesses online. Businesses can use consumer access equipment to provide customers with a variety
of services, such as:

E-commerce: Businesses can sell products and services online.


E-marketing: Businesses can promote their products and services online.
E-payment: Businesses can accept payments online.
E-customer service: Businesses can provide customer service online.
E-collaboration: Businesses can collaborate with partners and customers online.

The type of consumer access equipment that is used for e-business depends on the needs of the
business and the customers. For example, a business that sells products online may need to provide
customers with a way to make payments online. In this case, the business would need to provide
customers with a device that can be used to make payments online, such as a credit card reader or a
smartphone.

The consumer access equipment market is constantly evolving as new technologies are developed.
Businesses need to keep up with these changes to ensure that they are providing customers with the
best possible experience.

Here are some of the most common types of consumer access equipment for e-business:

Computers: Computers are the most common type of consumer access equipment for e-business.
They are used for a variety of tasks, such as browsing the internet, shopping online, and checking email.
Laptops: Laptops are portable computers that can be used anywhere with an internet connection. They
are popular for e-business because they allow customers to access their accounts and make purchases
from anywhere.
Smartphones: Smartphones are mobile devices that can be used to access the internet, make calls,
and send text messages. They are becoming increasingly popular for e-business because they allow
customers to access their accounts and make purchases on the go.
Tablets: Tablets are portable devices that are similar to laptops, but they are smaller and have a
touchscreen display. They are popular for e-business because they allow customers to access the
internet and make purchases in a more convenient way.
E-readers: E-readers are devices that are used to read electronic books. They are becoming
increasingly popular for e-business because they allow customers to purchase and read books online.

The type of consumer access equipment that is used for e-business depends on the needs of the
business and the customers. Businesses need to choose the type of consumer access equipment that
will best meet the needs of their customers and provide them with the best possible experience.

Local on-Ramps

Local on-ramps are a type of infrastructure that is used to connect businesses to the internet. They are
typically located in or near major cities and provide businesses with a high-speed connection to the
internet.

Local on-ramps are essential for e-business because they allow businesses to connect to the internet
quickly and easily. This is important for businesses that need to transfer large amounts of data or that
need to provide their customers with a high-quality online experience.

There are a number of different types of local on-ramps, including:

DSL: Digital subscriber line is a type of connection that uses the existing telephone lines to provide
businesses with a high-speed connection to the internet.
Cable: Cable is a type of connection that uses the existing cable television lines to provide businesses
with a high-speed connection to the internet.
E - BUSINESS APPLICATION NOTES - SHREYASH (SEM 2)
Fiber optic: Fiber optic is a type of connection that uses fiber optic cables to provide businesses with a
very high-speed connection to the internet.

The type of local on-ramp that is used depends on the needs of the business and the availability of
infrastructure in the area. Businesses need to choose the type of local on-ramp that will best meet their
needs and provide them with the best possible connection to the internet.

Local on-ramps are an important part of the e-business infrastructure. They allow businesses to connect
to the internet quickly and easily, which is essential for businesses that need to transfer large amounts
of data or that need to provide their customers with a high-quality online experience.

Here are some of the benefits of using local on-ramps for e-business:

Faster speeds: Local on-ramps provide businesses with faster speeds than other types of connections,
such as dial-up or satellite.
More reliable: Local on-ramps are more reliable than other types of connections, such as dial-up or
satellite.
Scalable: Local on-ramps can be scaled to meet the needs of growing businesses.
Secure: Local on-ramps can be secured to protect sensitive data.

Global Information Distribution Network

A global information distribution network (GIDN) is a network of interconnected networks that allows for
the global distribution of information. It is essential for e-business because it allows businesses to reach
customers all over the world.

The GIDN is made up of a number of different components, including:

The internet: The internet is the backbone of the GIDN. It provides a global infrastructure for the
exchange of information.
Telecommunications networks: Telecommunications networks, such as telephone lines and fiber
optic cables, connect different parts of the internet together.
Servers: Servers are computers that store and distribute information over the internet.
Routers: Routers are devices that direct traffic on the internet.
Protocols: Protocols are rules that govern the exchange of information over the internet.

The GIDN is a complex and ever-evolving system. It is constantly being upgraded and improved to meet
the needs of businesses and consumers.

Here are some of the benefits of using the GIDN for e-business:

Reach: The GIDN allows businesses to reach customers all over the world.
Speed: The GIDN allows businesses to transfer information quickly and easily.
Cost-effectiveness: The GIDN is a cost-effective way to reach a global audience.
Scalability: The GIDN can be scaled to meet the needs of growing businesses.
Security: The GIDN can be secured to protect sensitive data.

If you are considering implementing e-business, it is important to consider using the GIDN. The GIDN
can help your business to reach new customers, improve its efficiency, and reduce its costs.

Here are some of the challenges of using the GIDN for e-business:

Security: The GIDN is a potential target for cyberattacks. Businesses need to take steps to protect their
data from cyberattacks.
Compliance: Businesses need to comply with a variety of laws and regulations when using the GIDN.
Localization: Businesses need to localize their websites and marketing materials for different countries.
Language: Businesses need to translate their websites and marketing materials into different
languages.

Despite the challenges, the GIDN is an essential part of the e-business infrastructure. It allows
businesses to reach customers all over the world and to improve their efficiency and effectiveness.

Models of E-Business
* B2B, B2C, C2C, C2B, G2B, B2G, and G2C models
E - BUSINESS APPLICATION NOTES - SHREYASH (SEM 2)
The different models of E-Business represent various types of transactions and interactions that occur in
the digital realm. Each model has a distinct focus and involves different parties, whether they are
businesses, consumers, governments, or combinations thereof. Let's delve into each of these E-
Business models in depth:

1. B2B (Business-to-Business):
In the B2B model, transactions occur between two or more businesses. This model involves the
exchange of products, services, information, and resources among companies. B2B E-Business often
includes:

Procurement: Businesses source raw materials, components, and supplies from other businesses.

Supply Chain Management: Collaboration between businesses to optimize supply chain processes,
logistics, and inventory management.

E-Marketplaces: Online platforms where multiple suppliers and buyers connect, negotiate, and conduct
transactions.

2. B2C (Business-to-Consumer):
The B2C model involves transactions between businesses and individual consumers. This is the most
common E-Business model and includes:

Online Retail: Businesses sell products directly to consumers through E-Commerce platforms, websites,
and online marketplaces.

Digital Products: Selling digital goods such as e-books, music, software, and online courses to
consumers.

Subscription Services: Offering services on a subscription basis, such as streaming platforms and
subscription boxes.

3. C2C (Consumer-to-Consumer):
In the C2C model, individual consumers engage in transactions with other consumers. Online
marketplaces and auction sites are common platforms for C2C E-Business, allowing individuals to buy
and sell products:

Online Auctions: Consumers list items for auction, and other consumers bid on them.

Online Marketplaces: Platforms where individuals can list products for sale, facilitating peer-to-peer
transactions.

4. C2B (Consumer-to-Business):
C2B E-Business involves consumers offering products or services to businesses. This model is
becoming more relevant in the gig economy:

Freelancing and Consulting: Individuals offer their skills, services, or expertise to businesses on a
project basis.

Crowdsourcing: Businesses leverage the collective intelligence and skills of individuals for tasks like
design, content creation, and problem-solving.

5. G2B (Government-to-Business):
In the G2B model, government entities interact with businesses online for various purposes:

E-Procurement: Governments invite bids from businesses to provide goods and services for
government projects.

Business Registration: Businesses can register, renew licenses, and interact with government
agencies online.

6. B2G (Business-to-Government):
B2G E-Business involves businesses providing goods and services to government agencies:

Tenders and Bidding: Businesses bid for government contracts through online platforms.

Compliance and Reporting: Businesses submit necessary documents and information to government
agencies digitally.
E - BUSINESS APPLICATION NOTES - SHREYASH (SEM 2)

7. G2C (Government-to-Consumer):
The G2C model focuses on government interactions with individual consumers:

Online Services: Citizens can access government services, pay taxes, renew licenses, and apply for
permits online.

Information Dissemination: Governments share information, announcements, and public services


through digital channels.

Each E-Business model caters to specific interactions and transactions between different parties.
Organizations need to choose the model(s) that align with their offerings, target audience, and business
objectives. The flexibility of these models showcases the diverse ways in which E-Business can be
leveraged to create value and facilitate efficient transactions in the digital age.

Storefront Model

the storefront model is a type of e-business model in which businesses sell products or services directly
to consumers through a website. It is the most common type of e-business model.

The storefront model is similar to a traditional brick-and-mortar store, but it takes place online.
Businesses that use the storefront model typically have a website that displays their products or
services. Customers can browse the website and select the products or services they want to purchase.
They can then checkout and pay for their purchases online.

The storefront model offers a number of advantages for businesses. It allows businesses to reach a
wider audience than they would with a traditional brick-and-mortar store. It also allows businesses to
operate 24/7, which can be helpful for businesses that sell products or services that are in high demand.

The storefront model also offers a number of advantages for consumers. It allows consumers to shop
from the comfort of their own homes. It also allows consumers to compare prices from different
businesses before making a purchase.

Here are some of the benefits of the storefront model:

Reach: The storefront model allows businesses to reach a wider audience than they would with a
traditional brick-and-mortar store.
Convenience: The storefront model allows consumers to shop from the comfort of their own homes.
Comparison shopping: The storefront model allows consumers to compare prices from different
businesses before making a purchase.
24/7 availability: The storefront model allows businesses to operate 24/7, which can be helpful for
businesses that sell products or services that are in high demand.
Cost-effectiveness: The storefront model can be a cost-effective way for businesses to reach a wider
audience.

However, there are also some challenges associated with the storefront model. These include:

Competition: The storefront model is a competitive market, so businesses need to find ways to
differentiate themselves from their competitors.
Security: Businesses need to take steps to protect their customers' data from cyberattacks.
Returns: Businesses need to be prepared to handle returns and refunds.
Shipping: Businesses need to factor in the cost of shipping when setting their prices.
Customer service: Businesses need to provide good customer service to keep their customers happy.

Overall, the storefront model is a viable option for businesses that want to sell products or services
directly to consumers. It offers a number of advantages for businesses and consumers, but it also
comes with some challenges.

Auction Model

the auction model is a type of e-business model in which businesses or individuals sell products or
services to the highest bidder. It is a popular model for selling unique or one-of-a-kind items, such as art
or antiques.

There are two main types of auction models:


E - BUSINESS APPLICATION NOTES - SHREYASH (SEM 2)
English auction: In an English auction, the bidding starts at a low price and bidders increase their bids
until there is only one bidder left. The highest bidder wins the auction.
Dutch auction: In a Dutch auction, the price starts high and decreases over time. The first bidder to
click the "buy" button at the current price wins the auction.

The auction model offers a number of advantages for businesses. It allows businesses to sell products
or services that they might not be able to sell through other channels. It also allows businesses to set a
reserve price, which is the minimum price that they are willing to accept for the item.

The auction model also offers a number of advantages for consumers. It allows consumers to get a
good deal on unique or one-of-a-kind items. It also allows consumers to compete with other bidders for
the item, which can drive down the price.

Here are some of the benefits of the auction model:

Reach: The auction model can reach a wide audience of potential buyers.
Competition: The auction model encourages competition among buyers, which can drive down prices.
Unique items: The auction model is a good way to sell unique or one-of-a-kind items.
Reserve price: Businesses can set a reserve price, which is the minimum price that they are willing to
accept for the item.
Convenience: The auction model can be a convenient way to sell products or services.

However, there are also some challenges associated with the auction model. These include:

Risk: Businesses and individuals risk not selling the item if there are no bids.
Fraud: There is a risk of fraud, such as fake bids or bids from bots.
Shipping: Businesses and individuals need to factor in the cost of shipping when setting their prices.
Customer service: Businesses and individuals need to provide good customer service to keep their
customers happy.

Dynamic-pricing Model

the dynamic pricing model is a type of e-business model in which businesses change their prices based
on a variety of factors, such as demand, supply, and competition. It is a popular model for businesses
that sell products or services that are in high demand or that are subject to frequent changes in price.

There are two main types of dynamic pricing models:

Demand-based pricing: In demand-based pricing, businesses adjust prices based on the demand for
their products or services. If demand is high, businesses may raise prices. If demand is low, businesses
may lower prices.
Time-based pricing: In time-based pricing, businesses adjust prices based on the time of day or the
day of the week. For example, businesses may charge higher prices during peak hours or on weekends.

The dynamic pricing model offers a number of advantages for businesses. It allows businesses to
maximize their profits by charging the highest price that customers are willing to pay. It also allows
businesses to adapt to changes in demand and competition.

The dynamic pricing model also offers a number of advantages for consumers. It allows consumers to
get a good deal on products or services by shopping around and comparing prices. It also allows
consumers to find the best price for the product or service they need.

Here are some of the benefits of the dynamic pricing model:

Profit maximization: Businesses can maximize their profits by charging the highest price that
customers are willing to pay.
Adaptability: Businesses can adapt to changes in demand and competition by adjusting their prices.
Convenience: Customers can find the best price for the product or service they need by shopping
around.
Transparency: Customers can see the prices of products or services in real time.

However, there are also some challenges associated with the dynamic pricing model. These
include:

Complexity: The dynamic pricing model can be complex to implement and manage.
Customer backlash: Customers may be unhappy if they feel like they are being overcharged.
Regulatory compliance: Businesses need to comply with regulations that govern dynamic pricing.
E - BUSINESS APPLICATION NOTES - SHREYASH (SEM 2)

Overall, the dynamic pricing model is a viable option for businesses that want to maximize their profits. It
offers a number of advantages, but it also comes with some challenges.

B2B E-commerce and EDI

B2B e-commerce and EDI are two different but complementary technologies that are used in business-
to-business (B2B) transactions.

B2B e-commerce is the electronic exchange of goods and services between businesses. It can be used
to automate a variety of tasks, such as ordering, shipping, and payment processing.

EDI stands for electronic data interchange. It is a set of standards for exchanging business documents
electronically. EDI can be used to automate a wider range of tasks than B2B e-commerce, including
purchase orders, invoices, and shipping manifests.

B2B e-commerce and EDI are often used together. B2B e-commerce can be used to automate the initial
stages of a transaction, such as placing an order. EDI can then be used to automate the later stages of
the transaction, such as sending an invoice and tracking the shipment.

Here are some of the benefits of using B2B e-commerce and EDI:

Increased efficiency: B2B e-commerce and EDI can help businesses to automate tasks and reduce
paperwork. This can save businesses time and money.
Improved accuracy: B2B e-commerce and EDI can help to reduce errors in data entry. This can
improve the accuracy of financial records and inventory levels.
Enhanced communication: B2B e-commerce and EDI can help businesses to improve communication
with their partners. This can lead to faster decision-making and better collaboration.
Improved customer service: B2B e-commerce and EDI can help businesses to provide better
customer service. This can lead to increased customer satisfaction and loyalty.

However, there are also some challenges associated with using B2B e-commerce and EDI:

Cost: B2B e-commerce and EDI can be expensive to implement and maintain.
Security: B2B e-commerce and EDI can be vulnerable to security breaches.
Compliance: Businesses need to comply with regulations that govern B2B e-commerce and EDI.

Overall, B2B e-commerce and EDI are valuable tools that can help businesses to improve their
efficiency, accuracy, communication, and customer service. However, businesses need to carefully
consider the costs and challenges before implementing these technologies.

Click-and-Mortar Business

A Click-and-Mortar business, also known as a "Brick-and-Click" business, is a type of business model


that combines both physical (brick-and-mortar) and online (click) operations. In this model, a company
operates both traditional physical storefronts and digital E-Commerce platforms. The goal is to leverage
the strengths of both online and offline channels to provide customers with a seamless and integrated
shopping experience. Here's an in-depth explanation of the Click-and-Mortar business model:

Key Characteristics of Click-and-Mortar Business:

Physical Presence: Click-and-Mortar businesses have physical brick-and-mortar stores, which


customers can visit to view products, try them out, and make purchases in person.

E-Commerce Platform: These businesses also maintain a strong online presence through E-
Commerce websites, allowing customers to browse, shop, and make purchases online.

Integration: Click-and-Mortar businesses integrate their online and offline operations to provide a
consistent experience. For example, customers can order online and pick up in-store or return online
purchases to physical stores.

Omnichannel Strategy: An omnichannel approach ensures that customers can interact with the
business seamlessly across multiple channels, including physical stores, websites, mobile apps, and
social media.

Inventory Integration: The inventory systems are often integrated, so customers can check product
availability online and in-store.
E - BUSINESS APPLICATION NOTES - SHREYASH (SEM 2)

Customer Experience: The focus is on delivering a cohesive and convenient customer experience,
allowing customers to choose their preferred way of shopping.

Advantages of Click-and-Mortar Business:

Broader Reach: The combination of physical and online presence allows businesses to reach a wider
audience, catering to both local and global customers.

Convenience: Customers have the flexibility to shop online or visit physical stores, depending on their
preferences and circumstances.

Enhanced Customer Experience: Customers can research products online and then visit the store to
see, touch, or try them out before making a purchase decision.

Multiple Touchpoints: Businesses can engage customers through multiple touchpoints, such as social
media, email marketing, and personalized recommendations.

Faster Fulfillment: Click-and-Mortar businesses can offer options like in-store pickup, enabling quicker
delivery and reducing shipping costs.

Brand Building: The physical presence helps in brand recognition and building trust, while the online
presence expands brand visibility.

Challenges of Click-and-Mortar Business:

Integration Complexity: Managing both physical and online operations requires effective integration of
systems, inventory, and customer data.

Logistics: Managing inventory across both channels can be challenging, ensuring products are
available both online and in-store.

Competition: Click-and-Mortar businesses face competition from purely online retailers and traditional
brick-and-mortar stores.

Technology Investments: Businesses need to invest in E-Commerce platforms, digital marketing, and
other technology solutions.

Consistency: Maintaining a consistent brand image and customer experience across both online and
offline channels is essential.

Electronic Payment Sytems


* Concepts, Types of E-payment Systems related to Banking & Financial, Retailing, and Online
Business Transaction

Electronic Payment Systems (EPS) refer to the technology and infrastructure that enable financial
transactions to be conducted electronically over digital networks. These systems provide a secure and
convenient way for individuals and businesses to transfer money, make purchases, and settle financial
obligations without using physical cash. EPS have become increasingly popular with the rise of E-
Commerce and the digitization of financial processes. Here are the key concepts related to Electronic
Payment Systems:

1. Digital Transactions:
Electronic Payment Systems facilitate digital transactions, where monetary values are exchanged
electronically between parties. This includes payments for goods, services, bills, and more.

2. Payment Gateways:
Payment gateways are platforms or systems that connect E-Commerce websites to financial networks.
They facilitate the processing of online payments by securely transmitting payment information between
the customer, the merchant, and the financial institution.

3. Types of Electronic Payments:


EPS encompass various types of electronic payment methods, including:

Credit and Debit Cards: Consumers can make payments using their credit or debit card information.
This is one of the most common online payment methods.
E - BUSINESS APPLICATION NOTES - SHREYASH (SEM 2)

Mobile Wallets: Mobile wallet apps store payment card information securely, allowing users to make
payments using their smartphones.

Bank Transfers: Direct bank transfers involve transferring funds from the payer's bank account to the
recipient's bank account.

E-Checks: Electronic checks are digital versions of traditional paper checks, allowing online payments
to be made directly from a bank account.

Digital Currencies: Cryptocurrencies like Bitcoin and Ethereum provide an alternative form of electronic
payment using decentralized digital currencies.

4. Security Measures:
Security is a critical aspect of EPS to protect sensitive payment information from unauthorized access
and fraud. Security measures include encryption, tokenization, two-factor authentication, and secure
socket layer (SSL) protocols.

5. Online Authentication:
Authentication methods, such as Verified by Visa and Mastercard SecureCode, provide an additional
layer of security for online credit card transactions by requiring users to enter a unique code.

6. Contactless Payments:
Contactless payments use Near Field Communication (NFC) technology to enable quick transactions by
waving or tapping a payment card or mobile device near a compatible point-of-sale terminal.

7. Mobile Payments:
Mobile payment solutions, like Apple Pay, Google Pay, and Samsung Pay, allow users to make
payments using their smartphones, leveraging biometric authentication (e.g., fingerprint or facial
recognition).

8. Peer-to-Peer (P2P) Payments:


P2P payment services enable individuals to transfer money directly to one another using mobile apps or
online platforms. Examples include Venmo, PayPal, and Zelle.

9. Real-Time Payments:
Some EPS support real-time payments, enabling immediate transfer of funds between accounts,
facilitating instant transactions.

10. Cross-Border Payments:


EPS facilitate cross-border transactions, allowing individuals and businesses to send and receive
payments internationally.

11. API Integration:


Businesses can integrate EPS into their websites, applications, or systems using APIs (Application
Programming Interfaces) provided by payment service providers.

Payment Process:

Authorization: The payer initiates a payment by providing their payment details and confirming the
transaction.

Authentication: Depending on the system, additional authentication steps may be required, such as
entering a PIN, using biometric data, or receiving a one-time password.

Transaction Processing: The payment information is securely transmitted to the payment gateway,
which processes the transaction by verifying the details and ensuring there are sufficient funds.

Funds Transfer: Once the transaction is authorized, funds are transferred from the payer's account to
the recipient's account.

Notification: Both parties typically receive notifications confirming the successful transaction.

3. Benefits of Electronic Payment Systems:

Convenience: Users can make payments anytime, anywhere, without the need for physical cash.
E - BUSINESS APPLICATION NOTES - SHREYASH (SEM 2)
Speed: Transactions are processed in real-time or near-real-time, reducing waiting times.

Security: Encryption, tokenization, and authentication methods enhance security and protect sensitive
information.

Record Keeping: Digital transactions leave a traceable trail, making record-keeping and reconciliation
easier.

Cost Efficiency: Electronic transactions often have lower processing costs compared to traditional
methods.

Global Transactions: Many electronic payment systems facilitate cross-border transactions without the
need for currency conversion.

Security Measures:

Encryption: Data encryption ensures that sensitive information is secure during transmission.

Tokenization: Card details are replaced with tokens, reducing the risk of card information theft.

Biometric Authentication: Fingerprint, facial recognition, and other biometric methods enhance user
authentication.

Two-Factor Authentication (2FA): Requiring two forms of verification for added security.

Secure Socket Layer (SSL): Ensures secure communication between the user's device and the
payment gateway.

Business Integration:

API Integration: Businesses can integrate EPS into their websites and applications using APIs provided
by payment service providers.

Point-of-Sale (POS) Systems: For physical retailers, POS systems are equipped with technology to
accept electronic payments.

Challenges:

Fraud: While EPS offer security measures, cybercriminals continually evolve tactics to exploit
vulnerabilities.

Digital Divide: Not all individuals have access to electronic payment methods or the necessary
technology.

Technical Issues: System downtime, glitches, or connectivity problems can hinder electronic payment
processes.

Types of E-payment Systems related to Banking & Financial, Retailing, and Online Business
Transactions

Types of E-Payment Systems:

Electronic payment systems cater to various sectors, including banking and financial services, retailing,
and online business transactions. Here are some types of e-payment systems relevant to each of these
sectors:

1. Banking & Financial:

Online Banking: Customers can access their bank accounts online to transfer funds, pay bills, and
manage their finances.

Mobile Banking: Mobile apps allow users to perform banking transactions on their smartphones,
including account transfers, mobile check deposits, and bill payments.

ACH (Automated Clearing House) Payments: A secure way to electronically transfer funds between
bank accounts for various purposes, such as direct deposit and bill payments.
E - BUSINESS APPLICATION NOTES - SHREYASH (SEM 2)
Wire Transfers: Facilitates the quick transfer of funds between different financial institutions across
borders.

Digital Wallets: Banks offer digital wallets that store payment card information and enable contactless
payments using mobile devices.

Peer-to-Peer (P2P) Payments: Apps like Venmo, Zelle, and Cash App allow individuals to send money
to friends and family members using their mobile devices.

2. Retailing:

POS Systems: Retailers use electronic Point of Sale (POS) systems to accept card payments from
customers at physical stores.

Mobile Payment Apps: Retailers offer their own mobile payment apps for loyalty programs, discounts,
and convenient in-store payments.

Contactless Payments: Payment cards and mobile devices equipped with Near Field Communication
(NFC) technology enable customers to make quick and secure contactless payments.

QR Code Payments: Retailers generate QR codes that customers can scan using their mobile devices
to make payments.

Online Payment Gateways: E-Commerce platforms integrate payment gateways to accept online
payments for products and services.

3. Online Business Transactions:

Credit and Debit Card Payments: The most common form of online payment, where customers enter
card information during checkout.

Digital Wallets: Popular digital wallet services like PayPal, Apple Pay, and Google Pay are used for
seamless online payments.

Cryptocurrency Payments: Some businesses accept cryptocurrencies like Bitcoin and Ethereum for
online purchases.

Subscription Services: Businesses offer subscription models for access to digital content, software,
and services.

Microtransactions: Small payments for digital goods, services, or content, often seen in mobile apps
and online gaming.

Online Marketplaces: Platforms like Amazon and eBay facilitate transactions between buyers and
sellers, including payment processing.

Designing of E-payment System,

some of the important considerations in designing an e-payment system:

Security: The e-payment system must be secure to protect the customer's data. This can be achieved
by using encryption, firewalls, and other security measures.
Compliance: The e-payment system must comply with the relevant regulations. This can vary
depending on the country or region where the system is being used.
Scalability: The e-payment system must be scalable to handle a large volume of transactions. This is
important for businesses that expect to grow their customer base or process a large number of
transactions.
Cost-effectiveness: The e-payment system must be cost-effective to operate. This is important for
businesses that want to minimize their costs.
Usability: The e-payment system must be easy to use for both the customer and the business. This can
be achieved by using a user-friendly interface and clear instructions.
Acceptance: The e-payment system must be accepted by a wide range of businesses and customers.
This can be achieved by partnering with major payment processors and banks.

Here are some of the steps involved in designing an e-payment system:


E - BUSINESS APPLICATION NOTES - SHREYASH (SEM 2)
Define the requirements: The first step is to define the requirements for the e-payment system. This
includes the type of transactions that will be supported, the security requirements, and the scalability
requirements.
Select the payment processors: The next step is to select the payment processors that will be used
by the e-payment system. Payment processors are companies that facilitate the processing of payments.
Design the architecture: The next step is to design the architecture of the e-payment system. This
includes the design of the database, the user interface, and the security infrastructure.
Develop the software: The next step is to develop the software for the e-payment system. This
includes the development of the web application, the mobile app, and the back-end software.
Test the system: The next step is to test the e-payment system to ensure that it meets the
requirements. This includes testing the security of the system and the performance of the system.
Deploy the system: The final step is to deploy the e-payment system. This includes making the system
available to customers and businesses.

The design of an e-payment system is a complex process that requires careful consideration of the
various factors involved. By following these steps, businesses can design an e-payment system that is
secure, compliant, scalable, cost-effective, and user-friendly.

Risk on E-payment
* Customer Perspective
* Merchant's Perspective
* Financial Service Provider Perspective

Electronic payment systems offer convenience and efficiency, but they also introduce certain risks that
need to be managed. Here's a breakdown of the risks associated with e-payment from the perspectives
of customers, merchants, and financial service providers:

Customer Perspective:

Security Breaches: Customers are at risk of having their payment information, personal data, and
financial details compromised in the event of a data breach or cyberattack on the payment system.

Fraudulent Transactions: Unauthorized access to customer accounts can lead to fraudulent


transactions and unauthorized charges, causing financial losses to customers.

Phishing and Social Engineering: Customers might fall victim to phishing emails, text messages, or
phone calls that trick them into revealing their sensitive information to malicious actors.

Identity Theft: Weak security measures can expose customers to identity theft, where their personal
information is used for illegal activities.

Lack of Privacy: Customers may be concerned about the collection and use of their personal
information by companies or third parties for targeted marketing.

Technical Glitches: Technical issues within the e-payment system could lead to failed transactions,
double charges, or delays, inconveniencing customers.

Merchant's Perspective:

Chargebacks: Merchants may face chargebacks due to disputes, fraud, or dissatisfaction with products
or services. Chargebacks can result in revenue loss and additional administrative efforts.

Fraudulent Orders: Merchants are vulnerable to receiving orders with stolen payment information,
leading to losses if the goods are shipped before fraud is detected.

Payment Gateway Issues: Technical glitches within the payment gateway can result in failed
transactions, affecting the merchant's ability to process payments.

Data Breaches: If a merchant's payment system is compromised, customers' payment data could be
exposed, damaging the merchant's reputation and resulting in legal consequences.

Payment Processing Fees: Merchants may incur fees associated with processing electronic payments,
impacting their profitability.

Integration Challenges: Integrating different payment methods and systems can be complex and may
lead to operational challenges if not implemented properly.
E - BUSINESS APPLICATION NOTES - SHREYASH (SEM 2)
Financial Service Provider Perspective:

Fraud Prevention: Financial service providers must invest in robust fraud prevention mechanisms to
detect and prevent unauthorized transactions.

Security Infrastructure: Developing and maintaining a secure infrastructure to protect customer data
and payment information is essential.

Regulatory Compliance: Financial service providers need to comply with various financial regulations
and data protection laws, which can be complex and costly.

Data Breaches: A breach within the financial service provider's systems can lead to significant financial
and reputational damage.

Disruptions: Technical outages or system failures can disrupt payment services, causing
inconvenience to customers and merchants.

Liability Concerns: Providers could face liability in cases of fraudulent transactions or disputes
between customers and merchants.

Addressing these risks requires a combination of robust cybersecurity measures, fraud prevention
strategies, ongoing monitoring, compliance with regulations, and effective communication with all
stakeholders involved. E-payment stakeholders need to work collaboratively to mitigate these risks and
create a secure and reliable payment ecosystem

Electronic Data Interchange: Introduction ofEDI and its Applications in Business

Electronic data interchange (EDI) is the electronic transfer of business documents between
organizations. It is a standardized way of exchanging data that eliminates the need for paper documents.
EDI can be used to exchange a wide variety of business documents, including purchase orders,
invoices, shipping manifests, and payment information.

EDI has a number of benefits for businesses, including:

Increased efficiency: EDI can help businesses to automate their business processes and reduce
paperwork. This can save businesses time and money.
Improved accuracy: EDI can help to reduce errors in data entry. This can improve the accuracy of
financial records and inventory levels.
Enhanced communication: EDI can help businesses to improve communication with their trading
partners. This can lead to faster decision-making and better collaboration.
Improved customer service: EDI can help businesses to provide better customer service. This can
lead to increased customer satisfaction and loyalty.

EDI is used in a variety of industries, including:

Manufacturing: EDI is used to exchange purchase orders, invoices, and shipping manifests.
Retail: EDI is used to exchange purchase orders, invoices, and shipping manifests.
Transportation: EDI is used to exchange shipping manifests and freight bills.
Healthcare: EDI is used to exchange patient records and insurance claims.
Financial services: EDI is used to exchange financial data, such as account statements and securities
transactions.

EDI is a valuable tool that can help businesses to improve their efficiency, accuracy, communication,
and customer service. However, EDI can be complex to implement and manage. Businesses need to
carefully consider the costs and benefits of EDI before implementing it.

Here are some of the applications of EDI in business:

Order processing: EDI can be used to automate the order processing process. This can help
businesses to reduce errors and improve efficiency.
Inventory management: EDI can be used to automate the inventory management process. This can
help businesses to improve accuracy and reduce costs.
Payment processing: EDI can be used to automate the payment processing process. This can help
businesses to reduce costs and improve efficiency.
Fraud prevention: EDI can be used to prevent fraud by verifying the identity of trading partners.
Compliance: EDI can help businesses to comply with regulations, such as those related to anti-money
laundering and Know Your Customer (KYC).
E - BUSINESS APPLICATION NOTES - SHREYASH (SEM 2)

Layered Architecture of EDI

The layered architecture of EDI is a model that divides the EDI process into four layers:

Semantic layer: The semantic layer defines the meaning of the data that is being exchanged. This layer
ensures that the data is interpreted correctly by both parties.
Standards layer: The standards layer defines the format of the data that is being exchanged. This layer
ensures that the data is compatible with the systems of both parties.
Transport layer: The transport layer defines the way that the data is transferred between the two
parties. This layer ensures that the data is delivered reliably and securely.
Physical layer: The physical layer defines the physical medium that is used to transfer the data. This
layer ensures that the data is transmitted accurately.

The layered architecture of EDI allows businesses to exchange data regardless of their systems or
platforms. This makes it a valuable tool for businesses that want to improve their efficiency and
communication.

Here is a more detailed explanation of each layer:

Semantic layer: The semantic layer defines the meaning of the data that is being exchanged. This layer
ensures that the data is interpreted correctly by both parties. The semantic layer is often based on
industry standards, such as the UN/EDIFACT standard.
Standards layer: The standards layer defines the format of the data that is being exchanged. This layer
ensures that the data is compatible with the systems of both parties. The standards layer is often based
on industry standards, such as the ANSI ASC X12 standard.
Transport layer: The transport layer defines the way that the data is transferred between the two
parties. This layer ensures that the data is delivered reliably and securely. The transport layer can use a
variety of protocols, such as FTP, HTTP, or AS2.
Physical layer: The physical layer defines the physical medium that is used to transfer the data. This
layer ensures that the data is transmitted accurately. The physical layer can use a variety of media, such
as the internet, a private network, or a value-added network (VAN).

The layered architecture of EDI is a complex but flexible model that can be adapted to meet the needs
of different businesses. By understanding the different layers, businesses can make informed decisions
about how to implement EDI in their organization.

Benefits:

Flexibility: The layered architecture is flexible and can be adapted to meet the needs of different
businesses.
Scalability: The layered architecture is scalable and can be used to support a large volume of data.
Security: The layered architecture can be secured using a variety of techniques, such as encryption
and authentication.
Interoperability: The layered architecture allows businesses to exchange data regardless of their
systems or platforms.
Efficiency: The layered architecture can help businesses to improve their efficiency by automating their
business processes.

Drawbacks:

Complexity: The layered architecture can be complex to implement and manage.


Cost: The layered architecture can be expensive to implement and maintain.
Vendor lock-in: Businesses may become locked into a particular vendor's implementation of the
layered architecture.

Objectives:

The objectives of the layered architecture of EDI are to:

Ensure the semantic consistency of data: The semantic layer ensures that the data that is being
exchanged has the same meaning for both parties. This is important to ensure that the data is
interpreted correctly and that errors are avoided.
Standardize the format of data: The standards layer ensures that the data that is being exchanged is
in a format that is compatible with the systems of both parties. This is important to ensure that the data
can be processed efficiently and accurately.
E - BUSINESS APPLICATION NOTES - SHREYASH (SEM 2)
Provide a reliable and secure transport mechanism: The transport layer ensures that the data that is
being exchanged is delivered reliably and securely. This is important to protect the data from
unauthorized access or modification.
Define the physical medium for data transmission: The physical layer defines the physical medium
that is used to transmit the data. This is important to ensure that the data is transmitted accurately and
efficiently.

VANs (Value Added Network)

a value-added network (VAN) is a private network that provides services to businesses that need to
exchange data electronically. VANs are often used for electronic data interchange (EDI), but they can
also be used for other purposes, such as file transfer and remote access.

A Value Added Network (VAN) is a third-party service provider that facilitates the secure exchange of
electronic business documents, such as EDI transactions, between trading partners. VANs play a crucial
role in the Electronic Data Interchange (EDI) process by providing a secure and reliable platform for
transmitting data and ensuring that business documents are delivered accurately and promptly. Here's
an overview of VANs and their significance in EDI:

VANs offer a number of advantages over other methods of data exchange, such as direct
connections and the internet. These advantages include:

Security: VANs typically have strong security measures in place to protect data from unauthorized
access or modification.
Compliance: VANs can help businesses to comply with regulations, such as those related to electronic
signatures and data protection.
Scalability: VANs can be scaled to meet the needs of businesses of all sizes.
Support: VANs typically offer support to help businesses get started with EDI and to troubleshoot
problems.

VANs also have some disadvantages, such as:

Cost: VANs can be expensive to use, especially for businesses that exchange a lot of data.
Complexity: VANs can be complex to set up and use, especially for businesses that are not familiar
with EDI.
Vendor lock-in: Businesses may become locked into a particular VAN provider, which can make it
difficult to switch providers if necessary.

Overall, VANs can be a valuable tool for businesses that need to exchange data electronically. However,
businesses need to carefully consider the costs and benefits of using a VAN before making a decision.

Here are some of the services that VANs typically offer:

Message routing: VANs route messages between trading partners.


Data translation: VANs translate messages from one format to another.
Security: VANs provide security for messages, such as encryption and authentication.
Auditing: VANs audit messages to ensure that they are processed correctly.
Reporting: VANs provide reports on message traffic and other activities.

E-Business Security : Introduction of Cyber Crimes and Frauds and Preventions from them.

E-business security refers to the measures taken to protect electronic business transactions and data
from unauthorized access, use, disclosure, disruption, modification, or destruction. It is important for
businesses that conduct transactions online to protect their customers' data and their own business
information.

Cybercrime is a crime that involves a computer or a network. It can be committed by individuals or


organizations, and it can range from hacking and data theft to fraud and identity theft.

Here are some of the most common cybercrimes and frauds:

Phishing: Phishing is a type of cybercrime in which criminals send emails that appear to be from
legitimate businesses. The emails often contain links that, when clicked, take the victim to a fake
website that looks like the real website. Once the victim enters their personal information on the fake
website, the criminals can steal it.
E - BUSINESS APPLICATION NOTES - SHREYASH (SEM 2)
Malware: Malware is software that is designed to harm a computer system. It can be spread through
email attachments, infected websites, or other means. Malware can steal data, damage files, or even
take control of a computer system.
Data breaches: A data breach is an incident in which sensitive data is exposed to unauthorized
individuals. This can happen through hacking, human error, or other means. Data breaches can have a
significant impact on businesses, as they can lead to financial losses, reputational damage, and legal
liability.
DDoS attacks: A DDoS attack is an attack in which a large number of computers are used to flood a
website or other online service with traffic. This can cause the service to become unavailable to
legitimate users.
Cybersquatting: Cybersquatting is the practice of registering a domain name that is similar to the name
of a trademark or service mark owned by another person or organization. Cybersquatters often use
these domain names to redirect traffic to their own websites or to sell the domain names to the
trademark or service mark owner.

There are a number of things that businesses can do to protect themselves from cybercrime and
fraud, including:

Use strong passwords and keep them secret.


 Be careful about what links you click on in emails.
 Keep your software up to date.
 Use a firewall and antivirus software.
 Back up your data regularly.
 Educate your employees about cybercrime and fraud.
By taking these steps, businesses can help to protect themselves from cybercrime and fraud.

Here are some additional tips to help prevent cybercrimes and frauds:

 Be wary of unsolicited emails, especially those that ask for personal information.
 Only shop on secure websites that have a valid SSL certificate.
 Never give out your credit card number over the phone unless you are sure of the caller's identity.
 Be careful about what information you share on social media.
 Keep your operating system and software up to date with the latest security patches.
 Use a strong password manager to create and store strong passwords for all of your online
accounts.
 Be aware of the latest cybercrime and fraud trends.

Client-server Security, Data and Message Security, Digital Documents Security

Client-server security refers to the measures taken to protect data and applications that are shared
between a client and a server. The client is the computer or device that requests a service from the
server, while the server is the computer or device that provides the service.

There are a number of security measures that can be taken to protect client-server security,
including:

Authentication: Authentication is the process of verifying the identity of a user or device. This can be
done using passwords, biometrics, or other methods.
Authorization: Authorization is the process of granting users or devices access to resources. This can
be done based on the user's or device's identity, role, or other factors.
Encryption: Encryption is the process of converting data into a form that cannot be read without a key.
This can help to protect data from unauthorized access.
Firewalls: Firewalls are security devices that control the traffic between a network and the internet.
They can help to prevent unauthorized access to a network.
Intrusion detection systems: Intrusion detection systems (IDSs) monitor a network for suspicious
activity. They can help to identify and prevent attacks on a network.

Data and message security refers to the measures taken to protect data and messages from
unauthorized access, use, disclosure, disruption, modification, or destruction. Data and message
security is important for businesses of all sizes, as it can help to protect their sensitive data and ensure
the confidentiality, integrity, and availability of their data and messages.

There are a number of security measures that can be taken to protect data and message security,
including:

Encryption: Encryption is the process of converting data into a form that cannot be read without a key.
This can help to protect data from unauthorized access.
E - BUSINESS APPLICATION NOTES - SHREYASH (SEM 2)
Access control: Access control is the process of restricting access to data and messages to authorized
users only. This can be done using passwords, biometrics, or other methods.
Data backup: Data backup is the process of creating copies of data. This can help to protect data from
loss or corruption.
Data loss prevention (DLP): DLP is a set of technologies and processes that are used to prevent the
unauthorized disclosure of data.
Security awareness training: Security awareness training educates employees about security risks
and how to protect themselves and the company from these risks.

Digital documents security refers to the measures taken to protect digital documents from
unauthorized access, use, disclosure, disruption, modification, or destruction. Digital documents security
is important for businesses of all sizes, as it can help to protect their sensitive documents and ensure
the confidentiality, integrity, and availability of their documents.

There are a number of security measures that can be taken to protect digital documents security,
including:

Encryption: Encryption is the process of converting data into a form that cannot be read without a key.
This can help to protect documents from unauthorized access.
Access control: Access control is the process of restricting access to documents to authorized users
only. This can be done using passwords, biometrics, or other methods.
Document management systems: Document management systems (DMSs) are software applications
that are used to store, manage, and track documents. DMSs can help to protect documents from
unauthorized access and ensure the integrity of documents.
Document retention policies: Document retention policies are policies that define how long documents
should be kept. This can help to ensure that documents are not destroyed before they are needed.
Security awareness training: Security awareness training educates employees about security risks
and how to protect themselves and the company from these risks.

By taking these security measures, businesses can help to protect their data, applications, and
documents from unauthorized access, use, disclosure, disruption, modification, or destruction.

Fundamentals of Business and Wireless Computing

fundamentals of business and wireless computing:

Wireless computing is the use of computers and other devices that are not connected to a network by
wires. Wireless devices can communicate with each other using radio waves, infrared light, or other
technologies.
Business computing is the use of computers and other information technology (IT) in businesses.
Business computing can be used to automate tasks, improve communication, and make better
decisions.

The fundamentals of business and wireless computing include:

Wireless networking: Wireless networking is the use of wireless technology to connect computers and
other devices to a network. Wireless networks can be used to connect devices within a building or over
a wider area.
Wireless security: Wireless security is the practice of protecting wireless networks from unauthorized
access. Wireless security can be implemented using a variety of techniques, such as encryption and
authentication.
Wireless applications: Wireless applications are software applications that are designed to be used on
wireless devices. Wireless applications can be used for a variety of purposes, such as email, web
browsing, and gaming.
Wireless devices: Wireless devices are computers and other devices that are not connected to a
network by wires. Wireless devices can use a variety of wireless technologies, such as Wi-Fi, Bluetooth,
and cellular.
Business applications: Business applications are software applications that are designed to be used in
businesses. Business applications can be used for a variety of purposes, such as accounting, customer
relationship management (CRM), and supply chain management (SCM).

By understanding the fundamentals of business and wireless computing, businesses can use these
technologies to improve their operations and efficiency.

Here are some of the benefits of using wireless computing in businesses:


E - BUSINESS APPLICATION NOTES - SHREYASH (SEM 2)
Increased mobility: Wireless computing allows employees to be more mobile and productive.
Employees can access information and applications from anywhere, which can improve their
productivity.
Reduced costs: Wireless computing can help businesses to reduce costs by eliminating the need for
cables and wires. Wireless networks can also be easier to install and maintain than wired networks.
Improved security: Wireless security can be implemented using a variety of techniques, such as
encryption and authentication. This can help to protect businesses from unauthorized access to their
data.
Enhanced collaboration: Wireless computing can help businesses to collaborate more effectively.
Employees can share information and work on projects together, regardless of their location.
Improved customer service: Wireless computing can help businesses to improve customer service.
Employees can access customer information from anywhere, which can help them to provide better
service to customers.

By understanding the benefits of using wireless computing, businesses can make informed decisions
about whether or not to implement these technologies.

You might also like