Beruflich Dokumente
Kultur Dokumente
➢ Marketing is an organizational function and set of processes for creating, communicating, and
delivering value to customers and for managing customer relationships in ways that benefit the
organization and its stakeholders.
➢ Electronic Market
➢ Online forums: space where businesses, customers, suppliers, and buyers meet.
➢ In electronic markets, information technology is applied to traditional marketing. thus a marketing
strategy based on organization’s information technology refers to an e-marketing strategy.
➢ Personalization: Precise needs of the customers.
➢ E-markets offer a global reach and hence have changed the competitive environment.
➢ E-marketing includes email marketing, online advertising, search engine marketing, etc.
➢ Better platform for gathering information.
➢ Ability to draw customers to one’s website and turn this visit into business, and further ensure
revisit and business.
Contextual E-Marketing
Strategic E-Marketing
The goals of strategic e-marketing include lead generation with the target in mind, maximizing the lead
conversion rate, precise analytics, and continuous learning.
E-Marketing Commumication
➢ Planned: e-advertising
➢ Unplanned: word of mouth, customer communications, customer feedback. Cannot be controlled
directly but indirectly through the improvement in product experiences, product quality, and
services.
Internet Advertising
➢ First step: keywords for actual product or service (eg. Blood sugar measurement kit)
➢ Second step: problem whose solution lies with the product (eg. Obesity related problems)
➢ Third step: search engine optimization- alteration of websites titles, hiding or highlighting few
words in keywords, etc.
E-Shops
➢ Combined with traditional business models in order to obtain the best of both worlds.
➢ Easy and low cost route for huge market presence.
➢ Customers get reduced price, greater choice, and rich information.
➢ Example: ticketing shops, flower delivery portals, etc.
E-Malls
➢ Many sellers may sell their products services using a standard online mall’s seller’s account or
merchant account by paying some additional monthly subscription fee to that e-mall.
➢ Example, Amzon.com, Best Buy, Sears, Walmart.
➢ Customers buy those items directly from the third party sellers using the infrastructure of
Amazon.com. Amazon.com also allows customers to use payment gateways. It forwards these
payments to the third party sellers.
Transactions at e-markets
E-procurement
➢ Online bidding; Quality, delivery, and price are key factors; Multiple re-submissions possible;
perfect competitive market; true market price of a product; supplier starts with basic price and
buyers need to quote higher than this base price in order to buy the product; highest price before
the due date wins the bid; fair chance to one and all.
➢ First step- selection of suitable commodities
➢ Second step- specifying requirements accurately, understanding the competitiveness of the
market with reference to selected commodities, and sufficient value to attract competition.
➢ Third step- bid is announced or opened and tenders invited.
➢ Fourth step- bid is submitted; tenders are evaluated to determine qualified candidates.
➢ Fifth step- auction begins amongst the qualified candidates; buyer awards the contract to the
supplier who wins the bid.
➢ Savings in e-auctions sometimes may be as high as eighty percent.
Business Advertising
Email Marketing
Internet Distribution
Online promotions
➢ Discount messages
➢ Trials of free software
➢ Providing a website as the home page
➢ Promotional message could also be delivered through partner websites, websites of related
products, advertising websites, and search engines.
Virtual Communities
➢ All the resources that aid in marketing online and help to reach out to the customers.
➢ Internet connections, emails, CRM, front and back end communicating networks, etc.
➢ Limitations- limited infra, dependence on readiness of market, brand driven. In case of new
products and companies it is difficult to convince customers.
Virtual stores
Example: Amazon.com
Do not rely on actual stocking of a product, but remain in touch with the suppliers and keep track of the
stock availability with them.
Disadvantages
➢ This model doesn’t work very well for products like food items or other such items which customer
likes to see before buying.
➢ Technological readiness is an issue.
➢ Secured system for financial transactions.
Legal Aspects
➢ Accurate description of marketed products.
➢ Terms and conditions mentioned clearly and followed diligently.
➢ Respecting privacy of customers.
➢ Copyrights protect the original works of literary, musical, audio visual works, etc, preventing
unauthorized reproduction, distribution, performance, etc.
➢ Licensing of products like softwares is meant to prevent unauthorized duplication and
distribution.
Security
➢ E-business organizations found that consolidating various functional databases allows users to
obtain better information and derive more benefits, making the same information more valuable.
➢ However, the internet allows easy access to valuable information not only to genuine users and
employees but also to hackers, criminals, and corporate spies.
➢ How can an organization be confident about the security build in the product? This could be done
by comparing the independent security evaluations against internationally established security
criteria that can offer assurance of the vendors’ security claims.
➢ Even if the users are traced it would be very difficult to prevent many others from accessing the
important and sensitive information.
Scalability
➢ Scalability is the ability to handle increased workload or accommodate a larger number of users
without crashing.
➢ Larger websites not only contain large amounts of data, but also more content related aspects
and different graphical user interface/multimedia, etc. Hence it is more challenging for the bigger
websites.
Availability
➢ Disruption of services has to be minimized especially during maintenance and system upgrades.
Constant availability is extremely crucial for online services involving banks and other financial
organizations.
➢ Unavailability leads to impatience among customers, affecting the business from the perspective
of both customer satisfaction and loss of sales.
Adaptability
Manageability
➢ When available resources are already being allocated to various applications, the manageability
aspect helps one to arrange resources to support unexpected loads.
Maintainability
The maintainability of an e-business system can be described as the total time taken by the system to
indentify and fix a problem within that system. For example, one may say that not more than three hours
should be spent in identifying and solving any type of problem.
Assurance
e-businesses can assure technology products that they buy and deploy by getting them evaluated by
proper organizations. For example, Centre for internet security (CIS) is an organization that helps other e-
business and e-commerce organizations in reducing their risk of disturbance due to poor technical security
controls
Interoperability
E-business has to work in accordance with the systems owned and controlled by others, such as suppliers,
dealers, partners, customers, and so on. The various operations involved, primarily security mechanisms
in an e-business system, should be flexible, standard based, and interoperable. This assures that all
components of the integrated e-business system work with each other in an efficient and flawless manner.
Load Balancing
A sudden popularity of certain information may result in a large number of requests to that particular
server.
Common method to balance loads is to have many servers running the same application with access to
the same content. The server load balancing module distributes client request across servers. Thus,
multiple redundant servers help scale the capability of the website while ensuring its availability. If a
server fails or is taken out for maintenance, the other servers can continue serving the clients’ requests
without disturbing the availability.
Internet
Packet Switching
➢ It is a method by which a digital message is sliced into discrete units known as packets and are
sent to receiver. The various packets may traverse through different communication links
between the sender and the receiver as an when they become available. These packets are then
reassembled at the receiver’s end in order to build the original message.
➢ Each packet is appended with some additional information such as source address (IP),
destination address, length of packet, sequencing information, error control information.
➢ Router is a special purpose computer that connects different computer networks and routes the
packets towards their ultimate destination. Good routing algorithms help trace the best paths for
the packets as they travel, thus utilizing the communication path and capacity most efficiently.
➢ Circuit switching utilizes leased, dedicated telephone circuits to communicate with other
computers in the network. The best example is telephone systems in which a complete, point to
point circuit is put together between the caller and receiver to allow communication.
Internet Protocol
➢ It is a set of rules and standards to be adopted by a system for data transmission on the network.
➢ The protocol divides the network functionality into seven layers with the application layer at the
top and physical layer at the bottom.
➢ As a result, a connection over the internet can be easily established by any internet application,
without knowledge about the hardware that is used to transfer data on the internet.
TCP/IP Protocol
➢ IP provides the addressing scheme for the nodes on the internet. It is responsible for the actual
delivery of the packet to the destination.
➢ TCP establishes a connection between the sender and the receiver nodes and also ensures that
the packets that are transmitted by the sender computer are received in the same sequence by
the receiver computer without missing any intermediate packets during the journey.
Network Interface Layer: responsible for placing the packets on the network on behalf of the sender and
receiving them from the network on behalf of the receiver.
Internet Layer: responsible for addressing the nodes, packaging the messages, and routing them on the
internet.
Transport Layer: provides communication with the application by sequencing the packets to and from the
application.
Application Layer: it provides a wide variety of applications with the ability of accessing the services of
the lower layers.
IP Address
Client/Server Computing
If one server goes down, the other servers distribute the tasks of that server. This is also known as graceful
degradation.
➢ HTTP: Hypertext transfer protocol was developed in 1991 by IETF and the WWW Consortium.
➢ The HTTP creates one GET(object) message for every object situated on the web page of the
server and transfers this object from the server screen to the client screen. One web page may
have many objects such as text, graphics, images, or audio/video files. The POST method is used
to request as well as send some information to the server. It is mainly used to send a big chunk of
data to the server.
➢ FTP: File transfer protocol is the original and one of the oldest and fastest way of transmitting
large files.
➢ Telenet: Telenet is used to login remotely on another computer on the internet. Once attached
with the remote computer, one can download files or run several required programs.
➢ SSL: Secured sockets layer is a protocol that secures the communication taking place between
the client and the server. It helps secure communication of e-commerce data and e-business
payment information using various techniques such as message encryption, digital signature, etc.
Utility Programs
➢ Ping: Packet internet groper is a program that is used to check the physical connection between
two computers on a TCP/IP network. Ping also displays information, such as time to respond and
the current speed of the server on the internet.
➢ Tracert: It helps to trace the path of a message that is sent from one computer to a remote
computer on the internet.
➢ Path Ping: It combines the functions that are provided by Ping and Tracert. It provides information
of the path from the source node to the destination node and also the statistics for each node on
the way.
Internet Software
Internet software is the basic software that runs on every computer/node, end node, or intermediate
node that needs to connect to the internet.
Browsers
➢ Application programs that are written for e-business generally use Java. For e-banking and e-
shopping the entire shopping application program has to be installed on client’s computer.
➢ Client side script is executed in the web browser of the client computer thus allowing the web
browser to interact with the user as well as the web server.
➢ A client side script can simply be used to check the user’s input before submitting it to the server
➢ Server side programming allows all programs to exist in one single machine generally known as
server. The objective is to manage, centrally, all the programs related to a specific application,
such as online shopping or banking.
➢ Server side scripting offers a major advantage to web applications in terms of the capability to
tailor the response. If a new functionality needs to be added or one intends to switch to newer
versions or databases it can be performed on the server side and clients derive the advantage
regardless of the client software and hardware capabilities. Real time issues like security,
performance etc can be managed better by server side application programs.
➢ Server programs allow clients to enjoy the power and performance of a typical server
configuration with minimum requirements like a Pentium computer, a web browser, and an
internet connection.
➢ System administration should monitor every part of network and make correction centrally
or locally as needed.
➢ It should support multiple vendors and organizations in a value chain. It needs to handle
different types of hardware, software, operating systems, platforms, and also network
protocols. Organizations may also need to change their hardware and software over a period
of time.
➢ A system administration should be open ended in the sense that it should be able to add new
organizations and their infrastructure into the overall infrastructure.
E-BUSINESS APPLICATIONS
Characteristics of E-Business Applications
➢ Facilitates organizations
➢ Allows working closely with outsiders
➢ Creates value chain
➢ Helps increase efficiency
➢ Analyses customers’requirements
➢ Competitive in nature
➢ Reduces amount of programming
➢ Reduces time
➢ Allows to manage changes
Outbound Logistics: refer to the activities that help in storage and distribution of final, finished products.
Actual Operations: actual operations or processes that are performed on the raw material to produce
final products or services.
Sales and Marketing: involve discovering potential markets and customer needs, and formulating sales
plans accordingly in order to sell a product.
Human Resource Development: description of job profile, employment policy information, online
submission of employment application, handbooks, manuals, training and downloadable documents,
training software, employee directory, and maintenance related data.
Organisation Infrastructure: infrastructure does not comprise only technology, but the dynamic
interaction and supervision of business strategy, trained people, tools and practices, and the very culture
of the organization.
Technology Development: the activities involved can be collection of customer preference data and
demographic information, access tracking, data on competitors products, pricing, promotion strategies,
etc.
Procurement Management: research for new suppliers, suppliers’ stock list and pricing information,
conducting online bidding, order transmission, order confirmation, and processing of online payment.
Planning
➢ In developing an e-business application system firstly one has to establish the vision behind the
business application and the website it will support, considering parameters such as time
management, human resources, financial resources, and risks involved.
➢ Electronic data exchange among customers and various business parties through the internet,
security of transmission of these data, and the graphical user interface (GUI). GUI makes the
business websites user friendly and more accessible to end users.
➢ Selection of the most appropriate technology amongst the alternatives available.
Requirement Analysis
Interviewing end users, having questionnaires completed by them, and representing these observations
with flow charts and data flow diagrams.
Development
A back end database and a server side scripting language have to be selected which may also depend on
the platform being used.
For example: if the file extension is .jpg or .htm , the server understands that no further action will be
required as it is a simple HTML file. However, if the extension is .php it understands that there will be
additional PHP instructions which are generally embedded into a set of HTML instructions. It sends the
resource to a PHP engine on the server which reads the PHP instructions and takes action accordingly. It
strips out the PHP instructions and finally sends the HTML file back to the server. The server then transmits
this as any other simple file to the client.
Introducing new modules into an existing e-business application or changing and enhancing the
functionality in a complex and highly integrated web environment shortens the time available to carry
out the changes. This has a direct effect on the business factors such as profitability, customer satisfaction
and several other front and back office systems.
A change management solution that uses a proper infrastructure must have the following capabilities:
➢ A change management solution should be able to trace, combine, and execute the desired
changes across multiple platforms, applications, and machines.
➢ It should have a thorough understanding of all the heterogeneous business processes that a
change may effect.
➢ It should be able to acquire all the critical, important dependencies among various modules of the
integrated e-business application
➢ To ensure that the changes made are consistent, it will also need to create an integrated business
process that is capable of tracking the changes as they flow from one component of the system
to other.
➢ The solution needs to consider the changes with respect to the customers, production systems
and deployment.
➢ It should also be able to understand how the data, content, and program code create
dependencies across each area.
A good change management solution that provides all the aforementioned capabilities should pursue the
following step by step process:
Requirement gathering and analysis: the developer of a change management system should first
understand the company’s working environment, the actual requirement of change, the entities to be
effected, and the short term and long term objectives.
Technology solution suggestion: organization can suggest a suitable technology and process the solution
to accommodate the change.
Evaluation of technology and tools: evaluated by the organization against the requirements.
Educating: a training program may be designed and implemented subsequently to make the users aware
of the process.
➢ Cash
➢ Cheque
➢ Stored Value/Debit Cards
➢ Credit Cards
➢ Digital Cash
➢ Digital Wallet
➢ Pay Pal
➢ Smart card
➢ Acceptability
➢ Anonymity
➢ Authentication
➢ Convertibility
➢ Efficiency
➢ Flexibility
➢ Security
➢ Reliability
➢ Scalability
➢ Usability
Business payment- generally B2B type where amounts are greater than Rs. 5000
Instant payment: seller receives the money immediately after processing the order
UNIT 4
➢ A secure state is one where the system is protected from any unauthorized access. A non-secure
state refers to a state where the system is vulnerable to attacks and no controls are present.
➢ Integrity: information displayed on the web or transferred as a message has not been altered in
any way by unauthorized persons or parties.
➢ Authenticity: genuineness of the identity of a person with whom a transaction or communication
is taking place.
➢ Non-repudiation: participants involved in an online transaction do not deny their role in a given
transaction.
➢ Privacy: information provided by a customer will be used in a controlled way.
➢ Availability: the site is available for use all the time.
➢ Confidentiality: only the authorized person can view the information or data.
➢ Front end security refers to the security that is offered while the customer is connecting to a site.
This security is provided through the following means:
• SSL/TLS
• Firewalls
• Cryptographic protocols
• Web based security servers
• Intrusion detection systems
• Integrity verification tools
➢ Authentication, authorization, availability, and confidentiality are the important issues that are
dealt with in front end security.
➢ Trusted Operating systems, component based security, and secured data handling is a part of mid
tier security.
➢ Back end security mainly deals with database security and storage level and information handling
related security.
Example: If a customer is interacting through a portal, front end technological security measures are used
for the purpose of protecting data, financial transactions, and credit card details. Mid tier security ensures
that this information is not lost during a transaction and the appropriate action is taken. The information
and the back end processing of information are protected through back end security.
Risk Analysis
➢ Identification and documentation of all the information assets along with the owners of the
assets.
➢ Rank systems and assets, in terms of the criticality of the system to the organization.
➢ Listing of threats for each of these identified assets. A threat is a perceived possibility of an event
that may result in attack, loss of information, or failure of the system.
➢ Identify the vulnerabilities of each of the assets for every identified threat. Vulnerabilities suggest
the weaknesses of the system with reference to a particular threat. For example: weak password.
➢ Impact that the exploitation of a weakness may have on the assets availability, confidentiality, or
integrity.
➢ The probability of an event that may result in a threat needs to be assessed. For eg. There is a
very low probability that a tsunami may impact the availability of a system that is not located on
a sea shore.
➢ Complete analysis an pragmatic numbers help in determining the level of risk.
Information Classification
➢ Public Information: refers to the data or information that can be freely made available to the
masses without any implications.
➢ Internal Information: is meant only for internal use and external access to this information is
blocked. However, there are no serious consequences of this information being leaked.
➢ Confidential Information: is to be retained strictly within the company and there can be serious
consequences in case such information is leaked. Often it leads to financial losses.
➢ Secret Information: is suppose to be accessed only by authorized internal users and the secrecy
of this information is very critical for the organization.
➢ Restricted information: refers to the data that is meant only for certain individuals.
➢ Protected information: is not to be released to the masses while public information is the data
made available to everyone.
➢ Computer systems, especially systems on a network, have multiple entry points, such as virtual
private network (VPN), wireless access points, etc. This exposes the computer system to various
threats because of the possible use or copying of unknown software or accessing the system by
unprotected connections.
➢ A computer virus is a piece of code that replicated itself and infects/modifies other programs,
resulting in a change in the behavior that may be harmful to the overall system.
➢ Native email worms: associated with email messages
➢ Parasitic email worms: leverage transport the capabilities of emails.
➢ Self launching worms: capable of spreading to new systems and actively running systems.
➢ User launched worms: need user intervention.
➢ Hybrid worms: having more than one capability.
➢ Trojan: non replicating malware. It seems to perform a desirable function for the user but instead
it facilitates unauthorized access.
Other Threats
➢ Computer hacking refers to the unauthorized access of a system with the intention of stealing
information, fraud, or sabotage.
➢ Phishing is a fraudulent process to access sensitive information such as user name, credit card
details, password, etc.
➢ E-businesses should inform the users about their security policies and guidelines while using
classified information during any transaction or disclosure.
➢ Patents, copyrights, etc are used to protect intellectual property and innovations.
➢ KM helps in the building and ensuring optimum usage of knowledge within and outside an
organization. IT enables knowledge codification, storage, and reuse.
Document Management
Document management systems allow one to store documents, index them, and search through
them. Advanced document management systems also allow searches within the information, storage
in different formats, conversions, and optical character recognition.
It allows the flow of business information and knowledge intelligently to facilitate decision making in
business.
Work Flow
This is related to the business processes that are responsible for implementing the defined tasks in
the proper sequence, setting limits, reporting, and decision making for efficiency and to meet the
targets.
Systems that are based on historical or past data and provide quantitative analysis to come up with
the guidelines for decision making.
Data warehouses are data repositories that help companies to mine the required data like sale in last
quarter, increase in sale over last five years, customers retained in last three years, etc and discover
patterns that help to forecast the business opportunities in terms of product associations, likings,
customer behavior, etc.
Intranet
A network that connects different departments and individuals machines in an organization, for
communication, knowledge transfer, and sharing.
Communication Platforms
Bulletin boards, chatting tools and packages, brainstorming enablers, messaging enablers to capture
tacit knowledge, shared workspaces, and web conferencing.
Mathematical modeling tools which help to create intelligent systems and build knowledge, based on
past experiences, repetitive patterns, and anomalies.
Collaboration tools
➢ Actual knowledge is generated through the experience that has been gained. Knowledge that
is mutually shared among different processes or departments help in improving product and
services.
➢ In IT companies the developers, architects, researchers, and designers learn from
maintenance experience. Maintenance team learns from developers, architects, researchers,
and designers and sends its feedback.
There are three ways in which the information in an organization can be controlled:
2. All departments in an organization create their own information source and use it for themselves.
3. This method is applicable to all e-business organizations, where information is available to everyone
in an organization but in a supervised manner. Regardless, of the organization or the operation using
e-business intelligence, the key facilitator is the Web. Information need not end at the company’s
network firewall (using intranet). Using the extranet or internet, e-business intelligence can be
extended to customers, business partners, and suppliers.
Evaluation and Audit of E-Business
Auditing an E-Business
E-business organizations have complex software systems, with hundreds of program running, and
hundreds of files with complex databases, which makes it impossible for auditors to check the system
in detail. Hence, an audit is generally performed based on a sample data, in order to meet the auditing
objectives, with reference to the interviews of a few users of the system.
Auditing Guidelines
They are composed of recommended course of action needed to perform a quality audit as follows:
At a very high level, e-business auditing guidelines can be mapped to four heads:
12. A blue print of the system is necessary for a clear understanding of the expected system behavior.
General business overview: An e-business auditor will need to understand the analysis of different
business components, the workings of the overall business system, scope of the business, and the
value delivered with reference to the expected value creation.
IT Infrastructure and architecture: Modern computer systems are designed and built using one of
several network architectures such as 2 tier, 3 tier, etc. Also the internet connectivity level.
Different processes and standards followed: Auditors need to understand security and risk
assessment standards followed.
Staff and management: Staff hierarchy, direct reporting structures, roles and responsibilities, etc.
Extended organization, service providers, and external devices used: Suppliers, intermediaries, etc.
Control: Control refers to a system that prevents, detects, and corrects unwanted events.
Implementation of reliable controls is required to keep things in place and make sure processes,
people and management are working effectively towards the business goal. Controls can be classified
into preventive controls, detective controls, and corrective controls. The following steps are taken
under this:
4. Review procedures
Functionality: the extent to which a software performs a function that is needed to satisfy the user
needs.
Reliability: the sustainability of software that provides a defined level of performance under stated
conditions for a specific time period.
Usability: the amount of effort needed to exploit the full functionality of software.
IBM came up with the concept of RAS which focuses on reliability, availability, and serviceability.
Risk Assessment
➢ There are security standards and risk assessment standards like ISO 17799, Information
Technology Infrastructure Library (ITIL), British Standards (BS 15000), etc.
➢ The standards used and general guidelines followed by an organization are considered by
auditors while forming an audit program.
Reporting
➢ An e-business audit report should cover IT functionality report, IT process auditing report, and
e-business process audit.
➢ The report must be organized under relevant heads such as customer interaction processes,
information gathering and analysis processes, delegation of authority, internal reporting,
escalation processes, financial processes, contracting processes, controls, etc.
➢ Audit reports help organizations identify the gaps and develop guidelines for bridging the
gaps observed during audit.
Kaplan and Norton(1996) proposed the balanced scorecard (BSC) method to measure the
performance and success of a business and also to overcome the weaknesses of traditional
measurement systems. It comprises of the following parameters:
Value Creation: It includes creating value through IT, processes and process innovations, and
creation of opportunities. Direct value creation is possible by making information available, providing
decision support, and improving pace. Indirect value creation is achieved through impacting some
part of value chain or through cascade effect.
Customer and user satisfaction perspective: Measured using customer feedback, customer
retention, customer visits to the website, comparative use of the website, etc.
Internal perspective: Internal process efficiencies, knowledge management within the organization.
Learning and growth perspective: business growth analysis, infrastructure growth, financial growth,
resource growth, learning from incidence, history, and historical patterns.
FUTURE OF E-BUSINESS
New World of Enterprise E-Business
Next Generation of Enterprise E-Business
➢ ERP helps an organization to attain the intended efficiency, quickness, and responsiveness
needed to succeed in a competitive business environment.
➢ SCM or Value Chain Management is an inter-enterprise, cross functional system, which
integrates and automates business processes and relationships, among the organisation’s
suppliers, distributors, business partners, and customers. It helps an organization to build and
sell its products/services using a low cost, fast, and efficient network of business partners and
customers.
➢ A collaborative customer relationship management system is a future e-business process
which will prop up the collaboration of business partners, employees as well as the customers
in enhancing the customer relationship with the organization.
➢ More and more businesses are moving towards e-business in US, Europe, and in Asia with the
latter still being a major untapped marketplace for e-business.
➢ The foremost task will be to delineate the standards to make all these work together. The
responsibility of every business will be to define the infrastructure requirements on the basis
of right architecture and interfaces, to deal with continuing evolution of the next generation
of e-businesses.
➢ The infrastructure also has to ensure the compatibility with ongoing development of Internet
standards, interoperability with business partners and the customers.
➢ It should be able to present well-ordered system management with optimized performance
to handle the requirement of varying workloads.
➢ Technically, e-business application servers should also be able to provide ample choice in
selecting, building and deploying a variety of e-business applications to match with the
affordable cost, and extreme performance in reliability, security, and scalability.
➢ It will require a complete new level of connectivity which should support extraordinary level
of integration across an e-business organization’s value chain.
➢ Human Resources are another major concern. Getting experts in IT will not be easy and cost
effective.
NEW TECHNOLOGIES
➢ Prominent challenges are intellectual property related issues, regulatory policies, taxation
policies, and restriction of information access and censorship.
➢ The electronic acceptance of agreements still has numerous issues and IT Acts need to be
enhanced to deal with technological advancements.
➢ As per Narayan Murthy, “Technology will solve many social issues and irregularities in days
to come”.
Ethical and Regulatory Issues
➢ The protection of intellectual property through security mechanisms and legal infrastructure
remains a challenge for e-business.
➢ The management of electronic wastes and other waste material and the impact of huge data
centres on the environment.