SlideShare a Scribd company logo
1 of 11
Chapter 9 – E - Commerce
   Electronic commerce (e-commerce) is defined as
    sharing business information, maintaining business
    relationships, and conducting business transactions
    through the use of telecommunication networks.
    What is referred to as traditional e-commerce has
    been conducted using EDI, enterprise-wide
    messaging systems, fax communication, bar coding,
    and other private local area network and wide area
    network systems. E-commerce is also about
    reorganizing internal business processes and
    external business alliances and creating new
    consumer-oriented products and services globally.
    The term e-business is sometimes used
    interchangeably with the term e-commerce to
    refer to this broader concept.
   Internet-based electronic commerce is
    developing at an astounding rate. It’s estimated
    that e-commerce will account for 8.6 percent of
    worldwide sales of goods and services within just
    a few years. The expected benefits of e-
    commerce for a company are enormous. A
    company can create a competitive advantage by
    dramatically expanding its market from local to
    national, to international, and to global.
    Ultimately, the company may be able to reduce
    infrastructure costs by closing down physical
    shops in favour of a pure e-commerce business
    model.
   The phases of learning how to use the Internet
    an organization can go through are as follows:
   Phase 1—when a company decides to use e-mail
    as a communication tool.
   Phase 2—when a company decides to create a
    public Web site.
   Phase 3—when a company decides to develop a
    private intranet (a self-contained
    intraorganizational network designed using
    Internet technology and TCP/IP protocols).
   Phase 4—when a company learns to use the
    Internet to actually conduct business
    transactions with its customers, suppliers, and
    other organizations.
   There are several forms of e-commerce, or e-
    commerce models, based on who is involved in the
    transaction:
   Business-to-business (B2B). The business-to-business
    (B2B) model represents inter-organizational
    information systems in which a company handles
    transactions within its own value chain or with
    other businesses and organizations.
   Business-to-consumer (B2C). The business-to-
    consumer (B2C) model represents retailing
    transactions between a company and individual
    customers.
   Consumer-to-consumer (C2C). The consumer-to-
    consumer (C2C) model represents individuals who
    are selling and buying directly with each other via
    a Web site.
   9.2.1 Characteristics of an Intranet
   An intranet is made up of physical technology
    and information content. The communication
    software for an intranet includes middleware
    and TCP/IP. Middleware is software that
    handles the actual physical communication
    connections between the computers, scanners,
    printers, and other devices on the network.
   A firewall protects the intranet against
    unauthorized access by users on a network
    external to the organization. The information
    The information content of an intranet is
    designed just as a public Web site on the
    Internet.
   An extranet, or extended intranet, is a
    private inter-organizational information
    system connecting the intranets of two or
    more companies in a business alliance. An
    extranet extends the cross-functional
    activities between trusted business
    partners and facilitates their working
    relationships.
   There are three types of extranets:
   An extranet can be set up as a secure private
    network by physically attaching the intranets
    with private, leased telephone lines.
   An extranet can be set up as a public network
    by using a public communications network,
    such as a public utility telecommunication
    network or the Internet.
   An extranet can be set up as a virtual private
    network (VPN) by using a public network with
    special protocols that provide a very secure,
    private “tunnel” across the network between
    the business partners’ intranets. An extranet
    is called an Internet VPN when the public
    network used is the Internet.
   Top managers, particularly in large companies, are
    challenged ethically when they consider using e-
    commerce, especially to gain competitive advantage. A
    major e-commerce ethical issue is top managers’
    responsibility for their organizations to develop a code of
    ethics and professional conduct, especially in the area of
    the Internet.
   Incorporating the following areas into the company’s
    information code of ethics ensures that users of the Web
    site will be aware of the company’s electronic commerce
    policies:
   A clear, explicit statement of the
   organization’s privacy policy.
   • A policy statement addressing situations in which a
    person’s permission must be secured before his or her ID,
    photo, ideas, or communications are used or transmitted.
   A clear policy stating how the company will
    inform customers of the intended uses of
    personal information gathered during an on-line
    transaction and how to secure permission from
    customers for those uses.
   • A statement that addresses issues of ownership
    with respect to network postings and
    communications.
   • A policy of how the company monitors, or
    tracks, user behaviours on the Web site.
    Currently, a Webmaster can tell which files,
    pictures, and other resources you are most
    interested in based on how long you examine a
    particular page, image, or file.
Cibm  workshop2 chapter nine

More Related Content

What's hot

The Internet, Intranet and Extranet
The Internet, Intranet and ExtranetThe Internet, Intranet and Extranet
The Internet, Intranet and ExtranetFellowBuddy.com
 
Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...
Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...
Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...Tim Hsieh
 
Internet vs intranet vs extranet
Internet vs intranet vs extranetInternet vs intranet vs extranet
Internet vs intranet vs extranetMohsinHusenManasiya
 
O Leary2010 Comp Ppt Ch02 Rev
O Leary2010 Comp Ppt Ch02 RevO Leary2010 Comp Ppt Ch02 Rev
O Leary2010 Comp Ppt Ch02 Revguest5ebaae9
 
Intranet And Extranet
Intranet And ExtranetIntranet And Extranet
Intranet And Extranetrobert11112
 
Difference Between Intranet And Extranet
Difference  Between  Intranet And  ExtranetDifference  Between  Intranet And  Extranet
Difference Between Intranet And Extranetcalix_ricia
 
Advantage And disadvantage of internet ! BATRA COMPUTER CENTRE
Advantage And disadvantage of internet ! BATRA COMPUTER CENTREAdvantage And disadvantage of internet ! BATRA COMPUTER CENTRE
Advantage And disadvantage of internet ! BATRA COMPUTER CENTREjatin batra
 
CHAP 3 - NETWORK, INTRANET & INTERNET
CHAP 3 - NETWORK, INTRANET & INTERNETCHAP 3 - NETWORK, INTRANET & INTERNET
CHAP 3 - NETWORK, INTRANET & INTERNETCikgu Johan Johari
 
Exe mba10 q1-mis_netw. & comm. tech._sarjeevan&sudeep
Exe mba10 q1-mis_netw. & comm. tech._sarjeevan&sudeepExe mba10 q1-mis_netw. & comm. tech._sarjeevan&sudeep
Exe mba10 q1-mis_netw. & comm. tech._sarjeevan&sudeepSarjeevan Sainbhi
 
Chap07 The internet , Intranets and Extranets
Chap07  The internet , Intranets and ExtranetsChap07  The internet , Intranets and Extranets
Chap07 The internet , Intranets and ExtranetsTuru Turuu
 
The Identity of Things: Privacy & Security Concerns
The Identity of Things: Privacy & Security ConcernsThe Identity of Things: Privacy & Security Concerns
The Identity of Things: Privacy & Security ConcernsSimon Moffatt
 
Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...
Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...
Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...FIA2010
 
Internet, Intranet & Extranet & IP and MAC
Internet, Intranet & Extranet & IP and MACInternet, Intranet & Extranet & IP and MAC
Internet, Intranet & Extranet & IP and MACAsmita Singh
 

What's hot (20)

internet intranet and extranet
internet intranet and extranetinternet intranet and extranet
internet intranet and extranet
 
The Internet, Intranet and Extranet
The Internet, Intranet and ExtranetThe Internet, Intranet and Extranet
The Internet, Intranet and Extranet
 
Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...
Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...
Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...
 
Internet vs intranet vs extranet
Internet vs intranet vs extranetInternet vs intranet vs extranet
Internet vs intranet vs extranet
 
O Leary2010 Comp Ppt Ch02 Rev
O Leary2010 Comp Ppt Ch02 RevO Leary2010 Comp Ppt Ch02 Rev
O Leary2010 Comp Ppt Ch02 Rev
 
Intranet And Extranet
Intranet And ExtranetIntranet And Extranet
Intranet And Extranet
 
Difference Between Intranet And Extranet
Difference  Between  Intranet And  ExtranetDifference  Between  Intranet And  Extranet
Difference Between Intranet And Extranet
 
Advantage And disadvantage of internet ! BATRA COMPUTER CENTRE
Advantage And disadvantage of internet ! BATRA COMPUTER CENTREAdvantage And disadvantage of internet ! BATRA COMPUTER CENTRE
Advantage And disadvantage of internet ! BATRA COMPUTER CENTRE
 
CHAP 3 - NETWORK, INTRANET & INTERNET
CHAP 3 - NETWORK, INTRANET & INTERNETCHAP 3 - NETWORK, INTRANET & INTERNET
CHAP 3 - NETWORK, INTRANET & INTERNET
 
Exe mba10 q1-mis_netw. & comm. tech._sarjeevan&sudeep
Exe mba10 q1-mis_netw. & comm. tech._sarjeevan&sudeepExe mba10 q1-mis_netw. & comm. tech._sarjeevan&sudeep
Exe mba10 q1-mis_netw. & comm. tech._sarjeevan&sudeep
 
Chap07 The internet , Intranets and Extranets
Chap07  The internet , Intranets and ExtranetsChap07  The internet , Intranets and Extranets
Chap07 The internet , Intranets and Extranets
 
Intranet & Extranet
Intranet & ExtranetIntranet & Extranet
Intranet & Extranet
 
Ch07 the internet intranets and extranets
Ch07 the internet  intranets and extranetsCh07 the internet  intranets and extranets
Ch07 the internet intranets and extranets
 
The Identity of Things: Privacy & Security Concerns
The Identity of Things: Privacy & Security ConcernsThe Identity of Things: Privacy & Security Concerns
The Identity of Things: Privacy & Security Concerns
 
Intranet and extranet
Intranet and extranetIntranet and extranet
Intranet and extranet
 
Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...
Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...
Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Intranets and Extranets
Intranets and ExtranetsIntranets and Extranets
Intranets and Extranets
 
Internet
InternetInternet
Internet
 
Internet, Intranet & Extranet & IP and MAC
Internet, Intranet & Extranet & IP and MACInternet, Intranet & Extranet & IP and MAC
Internet, Intranet & Extranet & IP and MAC
 

Viewers also liked

Viewers also liked (8)

Cibm ch 02
Cibm ch 02Cibm ch 02
Cibm ch 02
 
Bbbbb
BbbbbBbbbb
Bbbbb
 
Is202 ch03 and ch04
Is202   ch03 and ch04Is202   ch03 and ch04
Is202 ch03 and ch04
 
Is 202ch2 week 1 02 march 2012
Is 202ch2  week 1 02 march 2012Is 202ch2  week 1 02 march 2012
Is 202ch2 week 1 02 march 2012
 
Cibm ch01
Cibm ch01Cibm ch01
Cibm ch01
 
List of nat examinees
List of nat examineesList of nat examinees
List of nat examinees
 
デブサミ20130215
デブサミ20130215デブサミ20130215
デブサミ20130215
 
E. s. l. methods
E. s. l. methodsE. s. l. methods
E. s. l. methods
 

Similar to Cibm workshop2 chapter nine

Cois20024 lec06 2002w_ic
Cois20024 lec06 2002w_icCois20024 lec06 2002w_ic
Cois20024 lec06 2002w_icRexon Calub
 
IRM GROUP 2 CHAPTER 3
IRM GROUP 2 CHAPTER 3IRM GROUP 2 CHAPTER 3
IRM GROUP 2 CHAPTER 3Rexon Calub
 
Internetintranetandextranet..
Internetintranetandextranet..Internetintranetandextranet..
Internetintranetandextranet..Paulo Sambo
 
The global information infrastructureSectionGETTING ON BO.docx
The global information infrastructureSectionGETTING ON BO.docxThe global information infrastructureSectionGETTING ON BO.docx
The global information infrastructureSectionGETTING ON BO.docxcherry686017
 
Electronic Commerce
Electronic CommerceElectronic Commerce
Electronic Commerceellamee27
 
Using Information Technology to Engage in Electronic Commerce
Using Information Technology to Engage in Electronic CommerceUsing Information Technology to Engage in Electronic Commerce
Using Information Technology to Engage in Electronic CommerceElla Mae Ayen
 
MIS-EBusiness.pptx
MIS-EBusiness.pptxMIS-EBusiness.pptx
MIS-EBusiness.pptxNafisAlZamee
 
E commerce 2018 and history of E-commerce
E commerce 2018 and history of E-commerce E commerce 2018 and history of E-commerce
E commerce 2018 and history of E-commerce harsh rana
 
Bba ii cam u iv-information systems application & computer security
Bba ii cam  u iv-information systems application & computer securityBba ii cam  u iv-information systems application & computer security
Bba ii cam u iv-information systems application & computer securityRai University
 
Chapter Three
Chapter ThreeChapter Three
Chapter ThreeVideoguy
 
E Commerce Basics
E Commerce BasicsE Commerce Basics
E Commerce Basicsmcatahir947
 
ECommerce & Cyber Laws Lecture Notes
ECommerce & Cyber Laws Lecture NotesECommerce & Cyber Laws Lecture Notes
ECommerce & Cyber Laws Lecture NotesFellowBuddy.com
 

Similar to Cibm workshop2 chapter nine (20)

Cois20024 lec06 2002w_ic
Cois20024 lec06 2002w_icCois20024 lec06 2002w_ic
Cois20024 lec06 2002w_ic
 
IRM GROUP 2 CHAPTER 3
IRM GROUP 2 CHAPTER 3IRM GROUP 2 CHAPTER 3
IRM GROUP 2 CHAPTER 3
 
K018146372
K018146372K018146372
K018146372
 
ch 4.pptx
ch 4.pptxch 4.pptx
ch 4.pptx
 
Internetintranetandextranet..
Internetintranetandextranet..Internetintranetandextranet..
Internetintranetandextranet..
 
E-commerce
E-commerceE-commerce
E-commerce
 
E commerce
E commerceE commerce
E commerce
 
The global information infrastructureSectionGETTING ON BO.docx
The global information infrastructureSectionGETTING ON BO.docxThe global information infrastructureSectionGETTING ON BO.docx
The global information infrastructureSectionGETTING ON BO.docx
 
Electronic Commerce
Electronic CommerceElectronic Commerce
Electronic Commerce
 
Using Information Technology to Engage in Electronic Commerce
Using Information Technology to Engage in Electronic CommerceUsing Information Technology to Engage in Electronic Commerce
Using Information Technology to Engage in Electronic Commerce
 
Week 6
Week 6Week 6
Week 6
 
MIS-EBusiness.pptx
MIS-EBusiness.pptxMIS-EBusiness.pptx
MIS-EBusiness.pptx
 
E commerce 2018 and history of E-commerce
E commerce 2018 and history of E-commerce E commerce 2018 and history of E-commerce
E commerce 2018 and history of E-commerce
 
E commerce
E commerceE commerce
E commerce
 
E commerce
E commerceE commerce
E commerce
 
Bba ii cam u iv-information systems application & computer security
Bba ii cam  u iv-information systems application & computer securityBba ii cam  u iv-information systems application & computer security
Bba ii cam u iv-information systems application & computer security
 
Chapter Three
Chapter ThreeChapter Three
Chapter Three
 
E Commerce Basics
E Commerce BasicsE Commerce Basics
E Commerce Basics
 
lecture1428551057.pdf
lecture1428551057.pdflecture1428551057.pdf
lecture1428551057.pdf
 
ECommerce & Cyber Laws Lecture Notes
ECommerce & Cyber Laws Lecture NotesECommerce & Cyber Laws Lecture Notes
ECommerce & Cyber Laws Lecture Notes
 

More from Shaheen Khan

Introduction to entrepreneurship africa perspective
Introduction to entrepreneurship  africa perspectiveIntroduction to entrepreneurship  africa perspective
Introduction to entrepreneurship africa perspectiveShaheen Khan
 
Business managent Importance of Leadership
Business managent Importance of Leadership Business managent Importance of Leadership
Business managent Importance of Leadership Shaheen Khan
 
Is202 – week 1 02 march 2012
Is202 – week 1 02 march 2012Is202 – week 1 02 march 2012
Is202 – week 1 02 march 2012Shaheen Khan
 
Cibm workshop2 chapter ten
Cibm  workshop2 chapter tenCibm  workshop2 chapter ten
Cibm workshop2 chapter tenShaheen Khan
 
Cibm workshop2 chapter eight
Cibm  workshop2 chapter eightCibm  workshop2 chapter eight
Cibm workshop2 chapter eightShaheen Khan
 
Cibm work shop 2chapter six
Cibm  work shop 2chapter sixCibm  work shop 2chapter six
Cibm work shop 2chapter sixShaheen Khan
 
Cibm bis work shop 2 chapter five
Cibm bis   work shop 2 chapter fiveCibm bis   work shop 2 chapter five
Cibm bis work shop 2 chapter fiveShaheen Khan
 
Cibm worhop 2 chapter seven
Cibm   worhop 2 chapter sevenCibm   worhop 2 chapter seven
Cibm worhop 2 chapter sevenShaheen Khan
 
Cibm ch03 and ch04
Cibm   ch03 and ch04Cibm   ch03 and ch04
Cibm ch03 and ch04Shaheen Khan
 
Is202 – workshop 1
Is202 – workshop 1Is202 – workshop 1
Is202 – workshop 1Shaheen Khan
 
Economics 1 workshop1
Economics 1  workshop1Economics 1  workshop1
Economics 1 workshop1Shaheen Khan
 

More from Shaheen Khan (12)

Introduction to entrepreneurship africa perspective
Introduction to entrepreneurship  africa perspectiveIntroduction to entrepreneurship  africa perspective
Introduction to entrepreneurship africa perspective
 
Business managent Importance of Leadership
Business managent Importance of Leadership Business managent Importance of Leadership
Business managent Importance of Leadership
 
Is202 ch 03
Is202 ch 03Is202 ch 03
Is202 ch 03
 
Is202 – week 1 02 march 2012
Is202 – week 1 02 march 2012Is202 – week 1 02 march 2012
Is202 – week 1 02 march 2012
 
Cibm workshop2 chapter ten
Cibm  workshop2 chapter tenCibm  workshop2 chapter ten
Cibm workshop2 chapter ten
 
Cibm workshop2 chapter eight
Cibm  workshop2 chapter eightCibm  workshop2 chapter eight
Cibm workshop2 chapter eight
 
Cibm work shop 2chapter six
Cibm  work shop 2chapter sixCibm  work shop 2chapter six
Cibm work shop 2chapter six
 
Cibm bis work shop 2 chapter five
Cibm bis   work shop 2 chapter fiveCibm bis   work shop 2 chapter five
Cibm bis work shop 2 chapter five
 
Cibm worhop 2 chapter seven
Cibm   worhop 2 chapter sevenCibm   worhop 2 chapter seven
Cibm worhop 2 chapter seven
 
Cibm ch03 and ch04
Cibm   ch03 and ch04Cibm   ch03 and ch04
Cibm ch03 and ch04
 
Is202 – workshop 1
Is202 – workshop 1Is202 – workshop 1
Is202 – workshop 1
 
Economics 1 workshop1
Economics 1  workshop1Economics 1  workshop1
Economics 1 workshop1
 

Cibm workshop2 chapter nine

  • 1. Chapter 9 – E - Commerce
  • 2. Electronic commerce (e-commerce) is defined as sharing business information, maintaining business relationships, and conducting business transactions through the use of telecommunication networks. What is referred to as traditional e-commerce has been conducted using EDI, enterprise-wide messaging systems, fax communication, bar coding, and other private local area network and wide area network systems. E-commerce is also about reorganizing internal business processes and external business alliances and creating new consumer-oriented products and services globally. The term e-business is sometimes used interchangeably with the term e-commerce to refer to this broader concept.
  • 3. Internet-based electronic commerce is developing at an astounding rate. It’s estimated that e-commerce will account for 8.6 percent of worldwide sales of goods and services within just a few years. The expected benefits of e- commerce for a company are enormous. A company can create a competitive advantage by dramatically expanding its market from local to national, to international, and to global. Ultimately, the company may be able to reduce infrastructure costs by closing down physical shops in favour of a pure e-commerce business model.
  • 4. The phases of learning how to use the Internet an organization can go through are as follows:  Phase 1—when a company decides to use e-mail as a communication tool.  Phase 2—when a company decides to create a public Web site.  Phase 3—when a company decides to develop a private intranet (a self-contained intraorganizational network designed using Internet technology and TCP/IP protocols).  Phase 4—when a company learns to use the Internet to actually conduct business transactions with its customers, suppliers, and other organizations.
  • 5. There are several forms of e-commerce, or e- commerce models, based on who is involved in the transaction:  Business-to-business (B2B). The business-to-business (B2B) model represents inter-organizational information systems in which a company handles transactions within its own value chain or with other businesses and organizations.  Business-to-consumer (B2C). The business-to- consumer (B2C) model represents retailing transactions between a company and individual customers.  Consumer-to-consumer (C2C). The consumer-to- consumer (C2C) model represents individuals who are selling and buying directly with each other via a Web site.
  • 6. 9.2.1 Characteristics of an Intranet  An intranet is made up of physical technology and information content. The communication software for an intranet includes middleware and TCP/IP. Middleware is software that handles the actual physical communication connections between the computers, scanners, printers, and other devices on the network.  A firewall protects the intranet against unauthorized access by users on a network external to the organization. The information The information content of an intranet is designed just as a public Web site on the Internet.
  • 7. An extranet, or extended intranet, is a private inter-organizational information system connecting the intranets of two or more companies in a business alliance. An extranet extends the cross-functional activities between trusted business partners and facilitates their working relationships.
  • 8. There are three types of extranets:  An extranet can be set up as a secure private network by physically attaching the intranets with private, leased telephone lines.  An extranet can be set up as a public network by using a public communications network, such as a public utility telecommunication network or the Internet.  An extranet can be set up as a virtual private network (VPN) by using a public network with special protocols that provide a very secure, private “tunnel” across the network between the business partners’ intranets. An extranet is called an Internet VPN when the public network used is the Internet.
  • 9. Top managers, particularly in large companies, are challenged ethically when they consider using e- commerce, especially to gain competitive advantage. A major e-commerce ethical issue is top managers’ responsibility for their organizations to develop a code of ethics and professional conduct, especially in the area of the Internet.  Incorporating the following areas into the company’s information code of ethics ensures that users of the Web site will be aware of the company’s electronic commerce policies:  A clear, explicit statement of the  organization’s privacy policy.  • A policy statement addressing situations in which a person’s permission must be secured before his or her ID, photo, ideas, or communications are used or transmitted.
  • 10. A clear policy stating how the company will inform customers of the intended uses of personal information gathered during an on-line transaction and how to secure permission from customers for those uses.  • A statement that addresses issues of ownership with respect to network postings and communications.  • A policy of how the company monitors, or tracks, user behaviours on the Web site. Currently, a Webmaster can tell which files, pictures, and other resources you are most interested in based on how long you examine a particular page, image, or file.