Beruflich Dokumente
Kultur Dokumente
The buying and selling of products and services by businesses and consumers through an
electronic medium,
ADVANTAGES AND DISADVANTAGES OF ECOMMERCE
The invention of faster internet connectivity and powerful online tools has resulted in a new
commerce arena Ecommerce. Ecommerce offered many advantages to companies and customers
but it also caused many problems.
ADVANTAGES OF ECOMMERCE
Buying/selling 24/7.
More reach to customers, there is no theoretical geographic limitations.
DISADVANTAGES OF ECOMMERCE
Any one, good or bad, can easily start a business. And there are many bad sites which eat
up customers money.
There is no guarantee of product quality.
Mechanical failures can cause unpredictable effects on the total processes.
always on a check.
There are many hackers who look for opportunities, and thus an ecommerce site, service,
Types of ecommerce
B2B (Business-to-Business)
Companies doing business with each other such as manufacturers selling to
distributors and wholesalers selling to retailers. Pricing is based on quantity of order
and is often negotiable.
B2C (Business-to-Consumer)
Businesses selling to the general public typically through catalogs utilizing shopping
cart software. By dollar volume, B2B takes the prize, however B2C is really what the
average Joe has in mind with regards to ecommerce as a whole.
Having a hard time finding a book? Need to purchase a custom, high-end computer
system? How about a first class, all-inclusive trip to a tropical island? With the advent
ecommerce, all three things can be purchased literally in minutes without human
interaction. Oh how far we've come!
C2B (Consumer-to-Business)
A consumer posts his project with a set budget online and within hours companies
review the consumer's requirements and bid on the project. The consumer reviews
the bids and selects the company that will complete the project. Enlace empowers
consumers around the world by providing the meeting ground and platform for such
transactions.
C2C (Consumer-to-Consumer)
There are many sites offering free classifieds, auctions, and forums where individuals
can buy and sell thanks to online payment systems like PayPal where people can
send and receive money online with ease. eBay's auction service is a great example
of where person-to-person transactions take place every day since 1995.
Cybercrimes can involve criminal activities that are traditional in nature, such as theft, fraud, forgery,
defamation and mischief, all of which are subject to the Indian Penal Code. The abuse of computers
has also given birth to a gamut of new age crimes that are addressed by the Information Technology
Act, 2000.
We can categorize Cybercrimes in two ways
The Computer as a Target:-using a computer to attack other computers.
E.g. Hacking, Virus/Worm attacks, DOS attack etc.
The computer as a weapon:-using a computer to commit real world crimes.
E.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds, Pornography etc.
Cyber Crime regulated by Cyber Laws or Internet Laws.
Technical Aspects
Technological advancements have created new possibilities for criminal activity, in particular the criminal misuse
of information technologies such as
a. Unauthorized access & Hacking:Access means gaining entry into, instructing or communicating with the logical, arithmetical, or memory function
resources of a computer, computer system or computer network.
Unauthorized access would therefore mean any kind of access without the permission of either the rightful owner
or the person in charge of a computer, computer system or computer network.
Every act committed towards breaking into a computer and/or network is hacking. Hackers write or use readymade computer programs to attack the target computer. They possess the desire to destruct and they get the kick
out of such destruction. Some hackers hack for personal monetary gains, such as to stealing the credit card
information, transferring money from various bank accounts to their own account followed by withdrawal of
money.
By hacking web server taking control on another persons website called as web hijacking
b. Trojan Attack:The program that act like something useful but do the things that are quiet damping. The programs of this kind are
called as Trojans.
The name Trojan horse is popular.
Trojans come in two parts, a Client part and a Server part. When the victim (unknowingly) runs the server on its
machine, the attacker will then use the Client to connect to the Server and start using the trojan.
TCP/IP protocol is the usual protocol type used for communications, but some functions of the trojans use the UDP
protocol as well.
c. Virus and Worm attack:A program that has capability to infect other programs and make copies of itself and spread into other programs is
called virus.
Programs that multiply like viruses but spread from computer to computer are called as worms.
d. E-mail & IRC related crimes:1. Email spoofing
Email spoofing refers to email that appears to have been originated from one source when it was actually sent
from another source. Please Read
2. Email Spamming
Email "spamming" refers to sending email to thousands and thousands of users - similar to a chain letter.
3 Sending malicious codes through email
E-mails are used to send viruses, Trojans etc through emails as an attachment or by sending a link of website which
on visiting downloads malicious code.
4. Email bombing
E-mail "bombing" is characterized by abusers repeatedly sending an identical email message to a particular
address.
5. Sending threatening emails
6. Defamatory emails
7. Email frauds
8. IRC related
Three main ways to attack IRC are: "verbal8218;?#8220; attacks, clone attacks, and flood attacks.
e. Denial of Service attacks:Flooding a computer resource with more requests than it can handle. This causes the resource to crash thereby
denying access of service to authorized users.
Examples include
Attempts to "flood" a network, thereby preventing legitimate network traffic
Attempts to disrupt connections between two machines, thereby preventing access to a service
Computer-to-computer EDI replaces postal mail, fax and email. While email is
also an electronic approach, the documents exchanged via email must still be
handled by people rather than computers. Having people involved slows down the
processing of the documents and also introduces errors. Instead, EDI documents
can flow straight through to the appropriate application on the receivers computer
(e.g., the Order Management System) and processing can begin immediately.
A typical manual process looks like this, with lots of paper and people involvement:
Business documents These are any of the documents that are typically
exchanged between businesses. The most common documents exchanged via EDI
are purchase orders, invoices and advance ship notices. But there are many, many
others such as bill of lading, customs documents, inventory documents, shipping
status documents and payment documents.
There are several EDI standards in use today, including ANSI, EDIFACT, TRADACOMS and ebXML.
And, for each standard there are many different versions, e.g., ANSI 5010 or EDIFACT version D12,
Release A. When two businesses decide to exchange EDI documents, they must agree on the
specific EDI standard and version.
Businesses typically use an EDI translator either as in-house software or via an EDI service
provider to translate the EDI format so the data can be used by their internal applications and thus
enable straight through processing of documents.
Server side state management, in contrast to client side, keeps all the information in
user memory. The downside of this is more memory usage on server and the benefit is
that users' confidential and sensitive information is secure.
The interaction between Web clients and servers is complex, with many messages
passed between the two.
However, most of the time we only need to work with one part of this complex
interaction, for example a cookie sent by a user's browser to our Web server.
One of the goals of ASP, and object-oriented programming in general, is to hide
unneeded complexity from the developer.
The designers of ASP have built a model of this complex interaction in the ASP object
model. As we work with ASP, we will do so through the five "built-in" objects of ASP:
1.Application,
2.Request,
3.Response,
4.Server, and
5.Session.