SlideShare a Scribd company logo
1 of 25
ITSP5.01
Information Systems Principles
 E-Commerce is generally associated with buying
  and selling over the Internet.
 It is also associated with conducting any transaction
  involving the transfer of ownership or rights to use
  goods or services through a computer-mediated
  network
 A full definition is that "E-commerce is the use of
 electronic communications and digital information
 processing technology in business transactions to
 create, transform, and redefine relationships for
 value creation between or among organizations, and
 between organizations and individuals" – Andam
 (2003)
 Offline Commerce:
   Brick-and-mortar store to conduct trades
   Products displayed on shelves, services explained by
    sales personnel
   Product orders are built by taking the product off the
    shelf, and often placing in a shopping cart
   Payments are generally made through an electronic
    card reader, or by handing over cash
   Products are usually available to take from the store
    immediately following payment
 E-Commerce:
   Online website to conduct trades
   Images and descriptions display products and services
   Orders are built through ‘shopping cart’ software
   Payments are made through secure merchant
    gateways
   Product trades are completed by shipping or download
(see Rubman, 2010)
 B2B – e-commerce between businesses
 B2C – e-commerce between a business and a
  customer, where the business is the supplier
 B2G – e-commerce between a business and a
  government entity, where the business is the supplier
 C2C - e-commerce between customers
 C2B - e-commerce between a business and a
  customer, where the customer is the supplier
 Intel sells computer parts to computer sellers like Dell
 http://www.intel.com/
 Computer Lounge sells PC components and
  systems to customers
 http://www.computerlounge.co.nz/
 KBR provides defence, security and other services
  to government entities around the world
 http://www.kbr.com/
 Trade Me provides an online auction space for
  trading goods, which can include trades between 2
  customers, and a customer selling to a business
 http://www.trademe.co.nz/
 Need a product or service to trade
 Need a website that enables trading
 Need to attract web-surfers to the website
 Need to be able to accept orders and payments
 Need to be able to fill orders
 Need to be able to accept returns and handle
  warranties
 Need to be able to provide customer service
 Needs to be secure
(see Brain, n.d.)
 A website area to display products and services
 Shopping cart software to allow an order to be made
 Link to a merchant gateway, so payments can be
  made
 A download facility, if products are available for
  download
 A means to communicate with customers (e.g. online
  forms, email, account facility)
(see Brain, n.d.; Rubman, 2010)
 Potential threats include:
   Hackers / crackers
   Denial of service attacks
   Network snooping attacks
   Viruses and other malicious software / code
   Social engineering attacks (e.g. phishing)
   Dishonest customers
 Mitigating these threats include:
   Using firewalls
   Using antivirus software
   Using Secure Socket Layer (SSL) when exchanging
      order and payment data between sellers and buyers
     Encrypt sensitive customer information stored
     Apply software security patches when available
     Use an external security consultant to analyse your
      system
     Use intrusion detection software
     Educate customers to keep their details private
(see Khusial & McKegney, 2005)
 An open source web application content
  management system that can be used as a basis for
  creating an e-commerce website
 Free download from
  http://www.oscommerce.com/solutions/downloads
 Includes a shopping cart system
 Additional features can be downloaded from
  http://addons.oscommerce.com/ and added to an
  osCommerce website. These include security,
  payment and content structure features.
 Default osCommerce home page
 Default product information page
 Default product ordering page
 Default login page
 Default delivery information page
 Default payment information page
 Default order confirmation page
 E-Commerce is commonly associated with trading
  goods and services using electronic communications
  and digital information processing technology
 E-Commerce typically uses a website to conduct
  trades, where ‘shopping cart’ software is used to
  build orders, a secure merchant gateway is used to
  handle payments, and ordered goods are either
  shipped or downloaded
 Types of E-Commerce include B2B, B2C, B2G, C2C
  and C2B
 Potential threats can include hackers, crackers,
  denial of service attacks, network snooping attacks,
  malicious software or code, and social engineering
  attacks, dishonest customers
 Ways to mitigate these threats include firewalls,
  antivirus software, SSL, encryption, software security
  patches, external security consultants, intrusion
  detection software, educate customers
 osCommerce can be used as a basis for developing
  an e-commerce website
 Andam, Z.R. (2003). E-Commerce and E-Business.
  Retrieved 14 May, 2012, from:
  http://en.wikibooks.org/wiki/E-Commerce_and_E-
  Business
 Brain, M. (n.d.). How e-commerce works. Retrieved 21
  May, 2012, from:
  http://money.howstuffworks.com/ecommerce.htm
 Khusial, D.; McKegney, R. (2005). e-Commerce security:
  attacks and preventive strategies. Retrieved 21 May,
  2012, from:
  http://www.ibm.com/developerworks/websphere/library/te
  charticles/0504_mckegney/0504_mckegney.html
 Rubman, A. (2010). 4 key elements of e-commerce.
  Retrieved 21 May, 2012, from:
  http://www.marissaberger.com/blog/2010/05/26/4-key-
  elements-of-e-commerce

More Related Content

What's hot

Industry framework of e commerce
Industry framework of e commerceIndustry framework of e commerce
Industry framework of e commerce
ANOOPA NARAYANAN
 
Chapter 9 section i
Chapter 9 section iChapter 9 section i
Chapter 9 section i
mail4me
 
Planning and implementation issues
Planning and implementation issuesPlanning and implementation issues
Planning and implementation issues
Peter Sammons
 
Ecommerce(3)
Ecommerce(3)Ecommerce(3)
Ecommerce(3)
ecommerce
 

What's hot (20)

Some E-commerce Applications
Some E-commerce ApplicationsSome E-commerce Applications
Some E-commerce Applications
 
E commerce technologies 3
E commerce technologies 3E commerce technologies 3
E commerce technologies 3
 
Web technology and commerce unit 4
Web technology and commerce unit 4Web technology and commerce unit 4
Web technology and commerce unit 4
 
E Commerce
E  CommerceE  Commerce
E Commerce
 
Ecommerce
EcommerceEcommerce
Ecommerce
 
E commerce PPT
E commerce PPTE commerce PPT
E commerce PPT
 
Introductory Lecture 1:e-Banking
Introductory Lecture 1:e-BankingIntroductory Lecture 1:e-Banking
Introductory Lecture 1:e-Banking
 
Industry framework of e commerce
Industry framework of e commerceIndustry framework of e commerce
Industry framework of e commerce
 
Chapter 9 section i
Chapter 9 section iChapter 9 section i
Chapter 9 section i
 
Int Lecture 4
Int Lecture 4Int Lecture 4
Int Lecture 4
 
Planning and implementation issues
Planning and implementation issuesPlanning and implementation issues
Planning and implementation issues
 
Basics of ecommerce part2
Basics of ecommerce part2Basics of ecommerce part2
Basics of ecommerce part2
 
Ecommerce(3)
Ecommerce(3)Ecommerce(3)
Ecommerce(3)
 
ECommerce & Cyber Laws Lecture Notes
ECommerce & Cyber Laws Lecture NotesECommerce & Cyber Laws Lecture Notes
ECommerce & Cyber Laws Lecture Notes
 
Electronic commerce
Electronic commerceElectronic commerce
Electronic commerce
 
Consumer Oriented E commerce Application
Consumer Oriented E commerce ApplicationConsumer Oriented E commerce Application
Consumer Oriented E commerce Application
 
Basics of ecommerce part1
Basics of ecommerce part1Basics of ecommerce part1
Basics of ecommerce part1
 
E commerce
E commerceE commerce
E commerce
 
Edi new
Edi newEdi new
Edi new
 
Ankita
AnkitaAnkita
Ankita
 

Viewers also liked (9)

P073 osm
P073 osmP073 osm
P073 osm
 
E-commerce Checkout Design: Principles, Guidelines & Case Studies
E-commerce Checkout Design: Principles, Guidelines & Case StudiesE-commerce Checkout Design: Principles, Guidelines & Case Studies
E-commerce Checkout Design: Principles, Guidelines & Case Studies
 
Introduction to eCommerce
Introduction to eCommerceIntroduction to eCommerce
Introduction to eCommerce
 
05 Business Models for E-commerce slides
05 Business Models for E-commerce slides05 Business Models for E-commerce slides
05 Business Models for E-commerce slides
 
E business models
E business modelsE business models
E business models
 
E commerce business models
E commerce business modelsE commerce business models
E commerce business models
 
E-Commerce PPT
E-Commerce PPTE-Commerce PPT
E-Commerce PPT
 
E commerce
E commerceE commerce
E commerce
 
E commerce
E commerceE commerce
E commerce
 

Similar to E-Commerce (ITSP501 course)

A case study of amazon
A case study of amazonA case study of amazon
A case study of amazon
robinbarney
 
E commerce terminology and definitions
E commerce terminology and definitionsE commerce terminology and definitions
E commerce terminology and definitions
biniyamyirsaw1
 
Future trends and legal aspects (111 kb)
Future trends and legal aspects (111 kb)Future trends and legal aspects (111 kb)
Future trends and legal aspects (111 kb)
IMRAN KHAN
 
Business to Consumer E-Commerce
Business to Consumer E-CommerceBusiness to Consumer E-Commerce
Business to Consumer E-Commerce
webhostingguy
 

Similar to E-Commerce (ITSP501 course) (20)

A case study of amazon
A case study of amazonA case study of amazon
A case study of amazon
 
Introduction to E-Commerce.pdf
Introduction to E-Commerce.pdfIntroduction to E-Commerce.pdf
Introduction to E-Commerce.pdf
 
Bba ii cam u iv-information systems application & computer security
Bba ii cam  u iv-information systems application & computer securityBba ii cam  u iv-information systems application & computer security
Bba ii cam u iv-information systems application & computer security
 
K018146372
K018146372K018146372
K018146372
 
Mid Term Exam
Mid Term ExamMid Term Exam
Mid Term Exam
 
E commerce terminology and definitions
E commerce terminology and definitionsE commerce terminology and definitions
E commerce terminology and definitions
 
Amazon Online E Commerce Course Nerd Geek Lab
Amazon Online E Commerce Course Nerd Geek LabAmazon Online E Commerce Course Nerd Geek Lab
Amazon Online E Commerce Course Nerd Geek Lab
 
Future trends and legal aspects (111 kb)
Future trends and legal aspects (111 kb)Future trends and legal aspects (111 kb)
Future trends and legal aspects (111 kb)
 
E commerce
E commerce E commerce
E commerce
 
E commerce
E commerceE commerce
E commerce
 
e commerce
e commercee commerce
e commerce
 
The Design and Implementation of E-Commerce Management System.
The Design and Implementation of E-Commerce Management System.The Design and Implementation of E-Commerce Management System.
The Design and Implementation of E-Commerce Management System.
 
lecture1428551057.pdf
lecture1428551057.pdflecture1428551057.pdf
lecture1428551057.pdf
 
ecommerce online buying and selling prodpdf
ecommerce online buying and selling prodpdfecommerce online buying and selling prodpdf
ecommerce online buying and selling prodpdf
 
Electronic and mobile commerce and enterprise systems
Electronic and mobile commerce and enterprise systemsElectronic and mobile commerce and enterprise systems
Electronic and mobile commerce and enterprise systems
 
E commerce
E commerce E commerce
E commerce
 
Business to Consumer E-Commerce
Business to Consumer E-CommerceBusiness to Consumer E-Commerce
Business to Consumer E-Commerce
 
E business & e-commerce contrasted
E business & e-commerce contrastedE business & e-commerce contrasted
E business & e-commerce contrasted
 
E commerce
E commerceE commerce
E commerce
 
E-commerce Security and Threats
E-commerce Security and ThreatsE-commerce Security and Threats
E-commerce Security and Threats
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 

E-Commerce (ITSP501 course)

  • 2.  E-Commerce is generally associated with buying and selling over the Internet.  It is also associated with conducting any transaction involving the transfer of ownership or rights to use goods or services through a computer-mediated network
  • 3.  A full definition is that "E-commerce is the use of electronic communications and digital information processing technology in business transactions to create, transform, and redefine relationships for value creation between or among organizations, and between organizations and individuals" – Andam (2003)
  • 4.  Offline Commerce:  Brick-and-mortar store to conduct trades  Products displayed on shelves, services explained by sales personnel  Product orders are built by taking the product off the shelf, and often placing in a shopping cart  Payments are generally made through an electronic card reader, or by handing over cash  Products are usually available to take from the store immediately following payment
  • 5.  E-Commerce:  Online website to conduct trades  Images and descriptions display products and services  Orders are built through ‘shopping cart’ software  Payments are made through secure merchant gateways  Product trades are completed by shipping or download (see Rubman, 2010)
  • 6.  B2B – e-commerce between businesses  B2C – e-commerce between a business and a customer, where the business is the supplier  B2G – e-commerce between a business and a government entity, where the business is the supplier  C2C - e-commerce between customers  C2B - e-commerce between a business and a customer, where the customer is the supplier
  • 7.  Intel sells computer parts to computer sellers like Dell  http://www.intel.com/
  • 8.  Computer Lounge sells PC components and systems to customers  http://www.computerlounge.co.nz/
  • 9.  KBR provides defence, security and other services to government entities around the world  http://www.kbr.com/
  • 10.  Trade Me provides an online auction space for trading goods, which can include trades between 2 customers, and a customer selling to a business  http://www.trademe.co.nz/
  • 11.  Need a product or service to trade  Need a website that enables trading  Need to attract web-surfers to the website  Need to be able to accept orders and payments  Need to be able to fill orders  Need to be able to accept returns and handle warranties  Need to be able to provide customer service  Needs to be secure (see Brain, n.d.)
  • 12.  A website area to display products and services  Shopping cart software to allow an order to be made  Link to a merchant gateway, so payments can be made  A download facility, if products are available for download  A means to communicate with customers (e.g. online forms, email, account facility) (see Brain, n.d.; Rubman, 2010)
  • 13.  Potential threats include:  Hackers / crackers  Denial of service attacks  Network snooping attacks  Viruses and other malicious software / code  Social engineering attacks (e.g. phishing)  Dishonest customers
  • 14.  Mitigating these threats include:  Using firewalls  Using antivirus software  Using Secure Socket Layer (SSL) when exchanging order and payment data between sellers and buyers  Encrypt sensitive customer information stored  Apply software security patches when available  Use an external security consultant to analyse your system  Use intrusion detection software  Educate customers to keep their details private (see Khusial & McKegney, 2005)
  • 15.  An open source web application content management system that can be used as a basis for creating an e-commerce website  Free download from http://www.oscommerce.com/solutions/downloads  Includes a shopping cart system  Additional features can be downloaded from http://addons.oscommerce.com/ and added to an osCommerce website. These include security, payment and content structure features.
  • 17.  Default product information page
  • 18.  Default product ordering page
  • 20.  Default delivery information page
  • 21.  Default payment information page
  • 22.  Default order confirmation page
  • 23.  E-Commerce is commonly associated with trading goods and services using electronic communications and digital information processing technology  E-Commerce typically uses a website to conduct trades, where ‘shopping cart’ software is used to build orders, a secure merchant gateway is used to handle payments, and ordered goods are either shipped or downloaded  Types of E-Commerce include B2B, B2C, B2G, C2C and C2B
  • 24.  Potential threats can include hackers, crackers, denial of service attacks, network snooping attacks, malicious software or code, and social engineering attacks, dishonest customers  Ways to mitigate these threats include firewalls, antivirus software, SSL, encryption, software security patches, external security consultants, intrusion detection software, educate customers  osCommerce can be used as a basis for developing an e-commerce website
  • 25.  Andam, Z.R. (2003). E-Commerce and E-Business. Retrieved 14 May, 2012, from: http://en.wikibooks.org/wiki/E-Commerce_and_E- Business  Brain, M. (n.d.). How e-commerce works. Retrieved 21 May, 2012, from: http://money.howstuffworks.com/ecommerce.htm  Khusial, D.; McKegney, R. (2005). e-Commerce security: attacks and preventive strategies. Retrieved 21 May, 2012, from: http://www.ibm.com/developerworks/websphere/library/te charticles/0504_mckegney/0504_mckegney.html  Rubman, A. (2010). 4 key elements of e-commerce. Retrieved 21 May, 2012, from: http://www.marissaberger.com/blog/2010/05/26/4-key- elements-of-e-commerce