Tuesday, 12 April 2016

Roles of EDI application in business

Roles of EDI application in business:



EDI has been extensively used in showing the relationship between the buyer and seller. Auto manufacturer use EDI to transmit large, complex engineering design created on specialized computers. Large multinational firms use EDI  to send on-line price catalogs to customers listing their products, price discounts and terms. EDI capable business are able. to compare prices and terms and they are able to make direct orders by EDI  we take a small example for explaining role of EDI  application in business as follows.

1. Buyers computer passes purchase order to seller's computer
2. Seller's computer receives the purchase order and again it sends or passes purchase order confirmation to buyers computer
3. Sellers computer sends booking request to transport company's computer
4. Transport company's computer sends booking confirmation to sellers computer
5. Sellers computer sends advance slip notice to buyer's computer

Here we see that by using  EDI application the transaction had been taken place between buyer, seller and transport company within few minutes of time.

Risks associated with e-payments:

In e-commerce we have three risks which are associated with e-payment. Risk management is one of the challenging task to the e-commerce. To handle the risk management the e-payment application should be prepared to prevent mistakes and take necessary actions for further eradication's of the mistakes. In general we have three types of risks associated with e-payments.

They are :

1 Fraud or mistake 

2 Privacy issues 

3 Credit risk

Credit cards

Credit cards:

Credit card is a card provided by different banks to the consumer and these banks lend money to the consumer or users. The credit card system is a type of retail transaction settlement and credit system. It is a plastic card issued to the users by the banks. The credit card and debit card are same in appearance but in debit card amount is removed from each transaction where as credit card money is lent by the banks. Recently we found a technology where we can even store amount in the accounts with the help of debit cards but this facility is unavailable in credit card system. Most of the credit cards of the same shape and size as specified by the ISO 78 10 standard. The credit card was first used in 1920's in U.S.A specifically to sell fuel to many automobile owners. On this card we find some numbering scheme. In earlier days of credit card due to low security feature the card presented countless opportunities for fraud. This opportunity has created a huge black market in stolen credit card numbers which are quickly used before they are reported stolen.

Smart cards or debit cards:

Which are capable of holding much information than that of magnetic tapes. These are of two types.

1. Relationship based smart cards and 2) Electronic purses the best example is non index electronic currency card.

Visa:

EDI stands for electronic data interchange. It is the computer to computer exchange of structured information by agreed message standard from one computer application to  another by means and with a minimum of human intervention. In common usage EDI is understood to mean specific interchange methods agreed upon by national or international standard bodies for the transfer of business transaction data, with one typical application being the automated purchase of goods and services. EDI  documents contain the same data that would normally be found in a paper document used for the same organizational function. EDI helps in time saving it reduces the paper cost. It simplifies inter department communication it saves the costs for company helps in quick and efficient communication.

Electronic cash

Electronic cash:

Where the entire amount is in form of electronic media which can also be known as e-cash which presents some interesting characteristics that makes it attractive for payment over the internet. These are the fundamental payment systems in consumer oriented electronic payment systems. But in this type of system cash remains the claimants form of payment only for three reasons which are:

1. Lack of trust in banking system.
2. Inefficient clearing and settlement of non cash transactions.
3. Negative real interest rate which shall be paid on bank deposits.

Electronic checks:

Which are another form of electronic tokens preferring to pay on credit or through some mechanism other than cash. These have many advantages like

1. They simplify customer education as they are ease of use
2. Reliability and scalability is provided by multiple accounting servers.
3. These are well suited for clearing micro payment which use the concept of public key cryptography. Credit card based payment systems encrypted credit cards

Which uses the concept of cipher text form with secret key or privacy key. The best example is world wide web form based encryption. Third party authorization numbers

Where consumers can register with a third party on the internet to verify electronic micro transaction and electronic tokens are issued to the respective consumers which differ from existing financial instruments, on-line involvement measures which provides extra security.

Overall electronic payment systems save the time of respective users where the transaction done are accurate giving chance for different users and these electronic payment system or electronic fund transfer measures contain various advantages like.

1. Various detailed payments can be done through credit cards, charge cards etc in a very easy manner in the absence of paper money only keeping in view to pay some amount of interest to the concerned authorities.

2. Financial payments can be done to different sectors like large scales or small scales or retailers with the help of automated teller machines.

3. Bank to bank transaction i.e from central bank to subordinates is done in large scale.

4. Different online payments can be done with ecahs, debit cards, smart cards etc.

Various types of electronic payment systems (EFT)

Various types of electronic payment systems (EFT):

In the early 1970's the developing electronic payment technology was given the name as electronic technology was given the name as electronic funds(EFT) where it lead to the concept of EFT  which stands for electronic fund transfer and it can be defined as any transfer of funds which can take place through an electronic terminal, telephonic instrument, computer or any other device like magnetic tapes to carry the transactions like debit or credit an account. In EFT  both the computer and telephonic components are utilized for proper supply of money or financial assets. Electronic funds transfer can be broadly categorized into three segments

Banking and financial payments:


This type of segment contains transaction as large scale or wholesale payment or bulk payment where the payments are done in huge sectors. The best suitable example is of bank to bank transfer where crores millions of amount is transferred from central transaction level to the subordinate levels of different banks. We also consider the examples like small scale or retail payments which are a part of large scale banks where the limited amount is dumped into different ATM  counters and automated teller machines. In this the last and the least type of transaction's home banking where different bills are collected like electronic power, property etc.

Retailing payments:

This type of segment consists of transactions with the usage of credit cards like VISA card or master cards where different transactions can be made even under the absence of paper money or coin money and latter the amount can be handed over to the respective concerned authorities. We also use the concept of private label card/debit cards, charge cards which are like the plastic money where different transaction can be done pertaining to a particular limit.

Example:

If we consider debit card the maximum limit is only up to rs.15,000 for 24 hours and we also consider an example like J.C penny cared and american express. The third segment what we find here is on line electronic commerce payments taken based payment systems

Where the payment is done on the system of tokens where all the transaction can be done at same time with respects to the tokens issued by the authorities.Here electronic tokens are issued which are equivalent to cash which is backed by bank. These tokens are of three types:

1. Cash or real time which involves the paper cash or coin cash.
2. Debit or prepaid where the amount can be paid in advance eg. reservation of flight or train. The best examples are smart cards and electronic purchase which store electronic money.
3.Credit or postpaid where the amount can be paid later with certain interest rate.

Symmetric cryptography

Symmetric cryptography:

This is an encryption technique where all entities share a common secret key. In this process the key used to encrypt and decry pt a message must be kept a secret. We should note that in symmetric and asymmetric encryption forms the strength of cryptographer is measured by length of key in bits. The confidentiality service of cryptography depends on number of variable associated with encryption function same of these are.

1. The security protocol or application used o invoke the encryption function.
2. The trust in the platform executing the protocol or application
3. The cryptography algorithm
4. The length of keys used for encryption/decryption
5. The storage of secret keys.

As the key length increases the strength of a system also increases. Any key length less than 64 bits is no longer considered to be secure. In symmetric key systems both the sender the receiver of the message must have access to the same key. This key is a secret key and is used to both encrypt and decry pt the message.

Asymmetric cryptography:

In this process it uses public key which is quite opposite to secret key. The public key method allows a sender and a receiver to generate a shared secret key over an insecure telecommunications line. This process uses an algorithm based on the sender's and receiver's public and private information. In this the secret key is shared which avoids problem of transmitting it over an in secure telecommunications line.

EDI is not a successful technology for the small business:

EDI stands for electronic data interchange which can be defined as inter crosses communication of the business, information between different computers which is in a standardized electronic form. Every aspect of business like placing purchase orders, sending acknowledgements, and even booking is also done by EDI now a days. With the help of EDI different businesses can cut an the costs involved in postage and carriers as well the paper cost is also eliminated to a large extent. Event the payments can be made electronically with the help of EDI. One of the important benefit of EDI is that it reduce the transaction cost which is done through speed and efficiency of filling orders. EDI  can be used in various business sectors like.

1. SUPPLY CHAIN MANAGEMENTS (SCM)
2. ELECTRONIC FUND TRANSFER (EFT)
3. JUST IN TIME INVENTORY (JIT) ETC.

In spite of many advantages EDI is not so much popular only due to the reasons like high initial setup cost, absence of any legal frame work in case of any disputes and main reason is that it needs to follow standardized formats world wide which is quite a difficult task. EDI is quite expensive and it is difficult to implement which has some pitfalls which might be considered in any business. It is also having different reasons like lack of single good standard, every business need to came forward to accept all the business standards which is really not done. EDI  facility is available only in the by businesses which form a link only between the for by organizations as it is too expensive. But in the coming future we shall expect EDI to take over all the large scale and small scale businesses.

Ftp

Ftp:

It stands for file transfer protocol. It provides the basic elements of file sharing between hosts. It uses TCP to create a virtual connection for central information and then create a separate TCP connection for data transfer.

Http:

It is an application level protocol with the lightness and speed necessary for distributed, collaborative, hypermedia information system. Here messages are passed in similar to internet mail model.

Shttp:

It stands for secure hyper text transfer protocol. It provides secure communication mechanism between Http client, server pair in order to enable regular commercial transactions for wide range of application.

Tcp/ip:

It stands for transmission control protocol or internet protocol. It helps in internet transmission between different system. These protocol are generally used in Van (Vast area network) Ex.internet.

Encryption and different types of encryption techniques:

Encryption is a process in which data is converted into a form called cipher text is converted completely into different cipher text form. To covert cipher text form or encrypted data back into its original form is called decryption. Thus encryption and decryption and decryption are two quite transformable forms.

The use of encryption/decryption is as old as art of communications. A cipher often incorrectly called as code examples Morse code and ASCII. More complex ciphers network according to sophisticated computer algorithms that rearrange the data bits in digital signals.

Encryption/decryption is especially important in wireless communications. This is because wireless circuits are easier to tap than their hard-wired circuits.

If the cipher is much harder for unauthorized people to break it thus encryption can also be defined as the transformation of data through a cryptographic mathematical process into a form that is unreadable by anyone who does not posses the appropriate secret key.

In general there are two types of Encryption techniques. They are:

1. SYMMETRIC CRYPTOGRAPHY
2.ASYMMETRIC CRYPTOGRAPHY

Hypertext publishing

Hypertext publishing:

Hypertext is an approach to information management where the data is stored in network of documents and these documents are connected by links. Here the documents are taken as nodes and links represent the relationship between the documents and nodes. As the documents are known as nodes similarly the links are known as the pointers. The nodes or documents may contain text, graphic, animation, audio video, images or programs. In same system the nodes and system network itself is viewed through browsers and are manipulated, edited with the help of structure editor. We see that different nodes are connected by links or pointers. The node from which the link gets started is known as reference or anchor and the node at which it ends is called referent. The movement between bodes is made possible by activating links which connect related concepts or nodes. Links can be of bi directional providing backward traversals, referential, hierarchical. In some browsers hypertext is a very simple context lies in its ability to produce large, complex, richly connected and cross referenced bodies of information.

Protocols:

protocols are defined as agreed upon rules to be followed upon between two applications. These can also be defined as agreed upon format for transmitting data between two devices. The protocol determines the following.

a. The type of error checking to be used.

b. Data compression method if any.

c. How the sender device indicate that it is sending the data.

d. How the receiver device indicate that it is receiving the data.

The protocol cab be implemented either in hardware or in software.The different types of protocols.

1. tcp/ip transmission control protocol or internet protocol

2. Http Hyper text transfer protocol

3. Smtp Simple mail transport protocol

4. Pop Post office protocol

5. Espp Encapsulating security pay protocol

6. Saip security association identifier protocol

7. Tlsp Transport layer support protocol

8. Egp Exterior gateway protocol

9. Eigrp Enhanced interior gateway routing protocol

10. Grep Generic routing encapsulation protocol

11. Hsrp Hot standby router protocol

12. Igrp Interior gateway routing protocol

13. Ftp file transfer protocol 


14. Shttp Security hyper text transfer protocol

Non-Repudiation

Non-Repudiation:

Which eliminates the concept of inconsistency and supplication of data keeping the original data transmission in the right track. 

We also used different measures like electronic wallet which is having perfect security feature from the merchant and consumer concept. We also have certain locking facilities which help in storing the information of the appropriate users with the help of secret keys like primary key, private key and public keys etc. We follow certain important techniques to safeguard the E-commerce transactions such as.

1. We should not move away from the transaction unless we complete the overall transaction.
2. We need to use browsers which is of 128 bit encryption able to conduct secure financial transactions on internet.
3. We should keep our online password as a secret key which is not known by any one except you.
4. Once the online transaction is completed we need to sign off from the particular computer or from particular internet site.
5. Keep the necessary data available removing all the wasted data from your transaction.

We also need to follow certain privacy measures like:

1. Use the concept of encryption for protecting the data from unauthorized users or hackers.

2. Be well prepared before submitting the personal information over the internet.

3. Keep, the track of the name which is trying to utilize your name.

4. Keep your personal mail transaction away from your official or confidential aspects. YOu should also be able to put queries upon you like

5. What privacy policies shall i follow?

6. How can i regain the privacy information



In spite of several features provided by internet like free speech delivery where each and every citizen has got right to speak out his information or pass out his information, intellectual property which is difficult as it is easy and inexpensive, taxation which shows about the different rules to be followed in pointing out the tax rates, every individual or ever user should maintain certain security issues or privacy issues to carry out hi e-commerce transactions in a proper way. Thus these legal issues, security privacy issues are very much needed for proper E-commerce transactions.
Educational training

Educational training:

This application provides information about different universities available through out the world and they also provide information about different causes offered with respective course fees in each university. This application gives a benefit of knowledge sharing where different queries are solved for capturing information about different queries are solved for capturing information about different studies. For example let us take an example of search engines like google, dog pile, Alta vista etc which help in gaining information about different things. These search engines are also helpful in providing information about different financial issues, business measures, economic development implements etc. Thus consumer orient applications have great impact or influence on customer or consumer with the help of E-commerce which give the different features like low cost for utilization, faster fun, accurate, case of use, where each and every and every user is feeling comfortable to utilize all these applications, it gives facility for different banking transactions etc. So it can be declared that it has great influence over different applications which get focused with the concept of E-commerce.

Security issues involving e-commerce transaction:

When we speak about security issues involving E-commerce transactions, protocols play a major role where they are defined as the set of rules to be followed when an application is obeying the concepts of network. some of the protocols which give support to network. some of the protocols which give support to network transactions are like tcp/ip. http, telnet ,pop, smtp, we also have set protocol, which was designed in the year 1997 and has four security features like.

Authentication:

Which checks for the proper digital signatures or proper valid logins like correct username and password.

Encryption:

Which coverts the original text into cipher text to safeguard the original data from unauthorized users and again this cipher text is encrypted at the destination or receiver level integrity which combines the various aspects required for the proper flow of information in network. This aspects is helpful in combining different packets of data for proper data transmission.

Consumer Oriented E-commerce Application

Consumer Oriented E-commerce Application:


The different applications which are available in E-commerce are mainly utilized in different ways for entertainment, financial services educational training, information capturing, business development aspects. To maintain all these features in E-commerce we undergo the concept of consumer oriented E-commerce which helps in satisfaction of the customer. These applications have a great influence in E-commerce as they are used by many people in the  world day by day utilization of all these applications is increasing rapidly in the entire world. It has various advantages like every individual is free to access all these applications. It is low cost, it save the time to greater extent, more over many individual (or) users (or) consumers (or) customers are busy in capturing or gathering information with the help of these application if they utilize all these application in appropriate manner. The operational factor of these applications is very easy and simple where large number of users can utilize the same application at same time.

These applications are faster, low cost transmission of the data is very fast as it is in digital mode, convenient to all the users. It contains various advantages over different Applications. Let us explain in brief about the different applications and their role E-commerce.

Entertainment:

Every user has got the right to freedom where he can get total entertainment by watching the selected movies or by playing games in their application device. He can also change the mode from one application to other application. The entertainment which is gained is of very low cost but it gives a great enjoyment or fun to the user by the utilization of these features.

Financial services:

The services provided by these application are very fast which save the time to a greater extent and the services are very accurate. For example now a days we take an example of same ATM sectors which help in withdrawal of money and even in depositing the amount into the account through same special cheques. These ATM'S  are very fast and they provide accurate outputs about the different transaction which are done at the regulator class intervals of time.

Monday, 11 April 2016

Global information distribution networks

Global information distribution networks:


There are two major technologies in global information distribution network. They are:

1. Fibre optic long-distance network 

2.satellites

Fibre optic long-distance network:

The long distance network connectivity is mainly done through guided media cables which are like fibre optic cables. These cables are responsible for carrying large packets of data from long distance within few seconds of time. The data which is passed through these cables is covered with full fledged security and accuracy. These cables provide better quality service for interactive applications. These provide attractive economic advantage for selected routes fulfilling the required communication. Now a days the major long distance carriers are keeping their focus on wireless technologies and are making plans to work with different companies on wireless technology. This technology helps increase of communication with accuracy.

Satellite network:

These have advantages over different networks. They are accessible from any spot on the globe and able to provide broad band digital services, including voice, data and video to many points without the cost of wire installation and other costs. The role of satellite in communication industry has changed the communication environment since from many years giving support to transport of long distance Tele-communication and one-way video broadcasts. In 1980's industry introduced a new class of satellites. These VAST  satellites require small ground antennas for point to point network services. Now a days VAST networks are being utilized by large corporation to link hundreds of retail sites.

E-commerce on business models

E-commerce on business models:


E-Commerce has focused a vital role in various business models now we see that e-commerce is playing great importance in business models which seems to have touched every aspects of daily life. in first short period of time both the individual or customers and businessmen or merchants have embraced internet based e-business approaches which are enhancing the productivity, improving the communications globally. from banking to shopping e-commerce applications have become integral to daily activities. For examples 23 years ago or 25 years ago most individuals or customers went into a financial institution and spoke with bank officials to carry out their bank transactions. ten years later people have gained the knowledge of ATM  and nearly 50% of people are carrying their bank transactions with the help of ATM. This ATM   technology made banking activities more convenient. right now or today millions of individuals rely on on-line banking services which is helping them in successful completion of banking transactions. today the challenge of e-commerce on business models is an integration. There are many industries leading companies which have solved the difficult task of developing individual e-commerce based product and services which handle many of the issues surrounding customer and supplier interactions. It is not a secret that today's e-business has the potential to transform the business landscape. In the past a company's business model was the primary determination of its value but today by the influence of e-commerce on business models a company is valued on its strategy, business model and ability  to market.a disciplined  approach to evaluating the business opportunity and correctly using the competitive advantage can be achieved using internet technologies with the combination of existing investment which is a successful key for e-business and e-commerce. but by the e-commerce the relationship between the customer and the supplier expectations are  rising. One of the main strength of e-commerce is its ability ot bring together people, government, business and is able to facilitate the flow of information among them.this is the reason why all the business models are succeeding with the help of e-commerce. it always uses solid strategies, knowledge management techniques, effective e-business processes. For successful business process in different business models-E-commerce also uses the concept of supply chain management which is an integration of business process from the view point of endures and supplier. it also supports from the view point of endures and supplier. it also supports the concepts like demand management which include the product and services for customer order fulfilment. finally we can declare that e-commerce has great impact on organizations of all sizes, different infrastructure. However the challenge of the organizations is to turn the vision and the market opportunity into a sustainable e-business.

Sunday, 10 April 2016

Ingredients of e-commerce

Ingredients of e-commerce:



Which helps us in showing the methods to attract the customers? this ingredient can also be considered as a plan which a businessman or merchant takes up for declaring the details exactly how the businessmen intended to enter a new market and attract new customers.

Management team:

Which is responsible for making the business model work.

Value proposition:

Which can be defined as how a company's product or service ful-fills the need of customers.

Revenue model:


Which describes how firm will be able to earn revenue, produce profits and can also produces a superior  return on invested capital.

Market opportunity:

Which refers to the company's intended market space and the overall potential financial opportunities which are available to the firm in that market space.

Competitive Advantage:

this refer to the achievements of the firm when a superiority product is released by it and this product is brought to the market at lowest price than the most or as compared to the other competitors in the market competitive environment and organizational development which  refers to the competitors available and the steps taken for the development of the firm.

Limitations of e-commerce

Limitations of e-commerce:


1.Lack of system security, reliability, standards and some communication protocols.

2.Insufficient bandwidth.

3.Rapidly changing software development tools.

4.Difficulty in integrating the internet e-commerce software with same existing applications and data bases.

5.Incompatibility of some software, same hardware or operating system or other components.

WWW:


WWW stands for world wide web. it is a part of internet. it is a global read-write information space. Here text document images,multimedia and many other items of information referred to as resources are identified by short, unique global identifier called uniform resource identifiers. so that each can be found accessed and cross referenced in the simplest possible way. many people use techs terms internet and world wide web as interchangeable. but in fact the two terms are not synonyms. the internet and WWW or simply web is away of accessing information over that is built on top of internet.the web uses http protocol WWW also utilizes browsers like internet explorer nest cape navigator to access web documents called web pages.


E-Commerce

E-Commerce:

E-Commerce is a developing concept that describes the process of buying and selling or exchanging of products, services and information through computer networks including the internet. it is the use of internet and the web to transact business. in e-commerce commercial transactions involve the exchange of value across organizational or individual boundaries in return for product or services e-commerce applications started in early 1970's with the concept of electronic fund transfer (eft). but the application of eft was limited to large, corporations, financial institutions and few upcoming, daring small business. then it came and few upcoming, daring small business. then it came under the concept of electronic data interchange(edi)

By the year 2000 tech e-commerce market place represented access to millions of consumers world wide who used the internet a set of marketing communication technologies like e-mail and web pages which were universal, inexpensive and powerful.

Electronic business:

The term e-business is the digital replacement of transactions and processes within a firm, involving information systems under the control of the firm. the term electronic business refers to the broader of e-commerce not just buying and selling but also servicing customers and collaborating with business partners and conducting electronic transactions with in a organization. today electronic commerce is considered in its broadest scope equivalent to e-business.

Advantages of e-commerce:

1.It expands the market place in national and international markets.

2.Decreases the cost of creating processing, distributing, storing and retrieving paper 

3.It helps in creating highly specialized businesses.

4.It allows reduced inventories and overheads.

5.It reduces the time between outlay of capital and the receipt of products and services.

6.It allow tele-communication cost.

7.Provides competitive advantage to its implementers.

8.Enables customers to shop or do other transactions 24 hours a day all year round, from almost any location.

9.Provides customers with more choices, they can select from many vendors and from more products.

10.Provides less expensive products and services by allowing them to shop in many places and conduct quick comparison.

11.Allows quick delivers

12. customers can receive relevant and detailed information in seconds rather than days or week.