0% found this document useful (0 votes)
87 views16 pages

Project Work ON E-Services

The document discusses e-mail and how it works. It describes how e-mail addresses are formatted and how messages are sent from one computer to another via networks and message transfer agents. It also discusses some of the impacts of e-mail, both positive in enabling quick communication, and negative through issues like spam. Laws have attempted to curb spam and protect users' privacy in e-mail.

Uploaded by

Arch Mods
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
87 views16 pages

Project Work ON E-Services

The document discusses e-mail and how it works. It describes how e-mail addresses are formatted and how messages are sent from one computer to another via networks and message transfer agents. It also discusses some of the impacts of e-mail, both positive in enabling quick communication, and negative through issues like spam. Laws have attempted to curb spam and protect users' privacy in e-mail.

Uploaded by

Arch Mods
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 16

Project work ON E-

SERVICES
 Group members: CALLINGHEE, CHONOU, JAHALLY,
NOORMAHMED.
 Group leader: CALLINGHEE.
 Class: 3 YELLOW.

E-BOOKS
E-Book
The concept of the paperless e-book became a reality in the late 1990s with the marketing of several devices. These machines allow users to
download texts from the Internet and read them on a portable, handheld display. The RCA REB1100 model e-book shown here is about the size
of a paperback. It lasts 20 to 40 hours between battery charges, holds a minimum of 8,000 pages of text, and includes an internal modem for
downloading books.
Thomson Multimedia

E-MAIL
E-Mail
I INTRODUCTION
E-Mail, in computer science, abbreviation of the term electronic mail, method of transmitting data, text files, digital photos, or
audio and video files from one computer to another over an intranet or the Internet. E-mail enables computer users to send
messages and data quickly through a local area network or beyond through the Internet. E-mail came into widespread use in the
1990s and has become a major development in business and personal communications.

II HOW E-MAIL WORKS

E-mail users create and send messages from individual computers using commercial e-mail programs or mail-user agents
(MUAs). Most of these programs have a text editor for composing messages. The user sends a message to one or more recipients
by specifying destination addresses. When a user sends an e-mail message to several recipients at once, it is sometimes called
broadcasting.

The address of an e-mail message includes the source and destination of the message. Different addressing conventions are used
depending upon the e-mail destination. An interoffice message distributed over an intranet, or internal computer network, may
have a simple scheme, such as the employee’s name, for the e-mail address. E-mail messages sent outside of an intranet are
addressed according to the following convention: The first part of the address contains the user’s name, followed by the symbol
@, the domain name, the institution’s or organization’s name, and finally the country name.

A typical e-mail address might be [email protected]. In this example sally is the user’s name; abc is the domain name—the specific
company, organization, or institution that the e-mail message is sent to or from; and the suffix com indicates the type of
organization that abc belongs to—com for commercial, org for organization, edu for educational, mil for military, and gov for
governmental. An e-mail message that originates outside the United States or is sent from the United States to other countries has
a supplementary suffix that indicates the country of origin or destination. Examples include uk for the United Kingdom, fr for
France, and au for Australia.

E-mail data travels from the sender’s computer to a network tool called a message transfer agent (MTA) that, depending on the
address, either delivers the message within that network of computers or sends it to another MTA for distribution over the
Internet (see Network). The data file is eventually delivered to the private mailbox of the recipient, who retrieves and reads it
using an e-mail program or MUA. The recipient may delete the message, store it, reply to it, or forward it to others.

E-mail messages display technical information called headers and footers above and below the main message body. In part,
headers and footers record the sender’s and recipient’s names and e-mail addresses, the times and dates of message transmission
and receipt, and the subject of the message.

In addition to the plain text contained in the body of regular e-mail messages, most e-mail programs allow the user to send
separate files attached to e-mail transmissions. This enables the user to append large text- or graphics-based files, including audio
and video files and digital photographs, to e-mail messages.

III IMPACT OF E-MAIL

E-mail has had a great impact on the amount of information sent worldwide. It has become an important method of transmitting
information previously relayed via regular mail, telephone, courier, fax, television, or radio.
E-mail, however, has also been abused by certain businesses that send unsolicited commercial e-mail messages known as spam.
To address this problem, the U.S. Congress in 2003 passed legislation designed to curb spam. The law makes it illegal to send e-
mail messages that use deceptive subject lines and false return addresses, providing fines as high as $6 million and possible
prison terms for violators. Senders of pornographic or adult-related content must clearly identify such content in the subject line.
The law requires all commercial e-mail messages, solicited or unsolicited, to include a valid postal address and an opt-out
mechanism within the body of the text so that recipients can prevent future e-mail solicitations.

The federal law supplants all previous state laws and requires some change in behavior on the part of e-mail users. Previously, e-
mail users were advised not to respond to spam because such a response would merely verify the validity of the e-mail address.
For the new law to work, however, e-mail recipients must notify the sender that their solicitations are no longer wanted. The
Federal Trade Commission (FTC) is compiling a database of spam violators. People who receive deceptive e-mail messages or
who continue to receive unsolicited messages after notification should forward the solicitations to [email protected] to lodge a
complaint with the FTC.

E-COMMERCE
Electronic Commerce

I INTRODUCTION

Electronic Commerce or e-commerce, the exchange of goods and services by means of the Internet or other computer networks.
E-commerce follows the same basic principles as traditional commerce—that is, buyers and sellers come together to exchange
goods for money. But rather than conducting business in the traditional way—in stores and other “brick and mortar” buildings or
through mail order catalogs and telephone operators—in e-commerce buyers and sellers transact business over networked
computers.

E-commerce offers buyers convenience. They can visit the World Wide Web sites of multiple vendors 24 hours a day and seven
days a week to compare prices and make purchases, without having to leave their homes or offices. In some cases, consumers can
immediately obtain a product or service, such as an electronic book, a music file, or computer software, by downloading it over
the Internet.

For sellers, e-commerce offers a way to cut costs and expand their markets. They do not need to build, staff, or maintain a store
or print and distribute mail order catalogs. Automated order tracking and billing systems cut additional labor costs, and if the
product or service can be downloaded, e-commerce firms have no distribution costs. Because they sell over the global Internet,
sellers have the potential to market their products or services globally and are not limited by the physical location of a store.
Internet technologies also permit sellers to track the interests and preferences of their customers with the customer’s permission
and then use this information to build an ongoing relationship with the customer by customizing products and services to meet
the customer’s needs.
E-commerce also has some disadvantages, however. Consumers are reluctant to buy some products online. Online furniture
businesses, for example, have failed for the most part because customers want to test the comfort of an expensive item such as a
sofa before they purchase it. Many people also consider shopping a social experience. For instance, they may enjoy going to a
store or a shopping mall with friends or family, an experience that they cannot duplicate online. Consumers also need to be
reassured that credit card transactions are secure and that their privacy is respected.

II TYPES OF E-COMMERCE

A variety of businesses are conducted online, including retail businesses that sell products to consumers, service providers that
sell services to consumers, auctioneers that create a marketplace for products and services, and business-to-business commerce.
Retail transactions make up the largest part of e-commerce. Consumers can find computers, automobiles, clothing, books, music,
airline and event tickets, food, and just about anything else for sale on the Internet.

A Product Transactions

Retail Web sites typically include electronic catalogs that describe and display products for sale. Consumers can search for
individual items or randomly browse electronic catalogs, some much larger than their mail order print counterparts. An Internet
book retailer, for example, can offer millions of different book titles for sale on its Web site, far more titles than could fit into a
store or that could be included cost-effectively in a print catalog.

Many online retailers allow customers to order products and then track the shipment of their order. Some computer
manufacturers also allow consumers to choose different combinations of computer components, selecting the combination that
best suits their budget and needs. Customers can then visit the company’s Web site to track the progress of their computer
purchase as it is being built and shipped. Many online retailers also automatically notify their customers by e-mail when the
product has been shipped.

B Service Transactions

Other e-commerce businesses offer services. Financial services represent a large segment of e-commerce. For a small fee, online
investment brokerages trade stocks on behalf of their clients. Online stock brokerages typically charge customers lower fees than
traditional stock brokerages. Other sites provide consumers with a way to research and obtain mortgages and other loans online.

Travel sites offer a method of scheduling airline flights, renting cars, and booking hotel rooms. Travelers can plan all the details
of their vacation or business trip, make reservations, and purchase tickets at the same site. Such sites also offer maps, travel
literature, and booking information for travelers.

C Auctions

Some e-commerce sites specialize in bringing buyers and sellers together, rather than selling products from their own inventories.
Online auctioneers provide sellers a way to list and display items for sale and take bids from interested buyers. An online
auctioneer may bring together millions of users and feature more than 700,000 items at any given time. In exchange for the
auctioneer’s services, sellers pay the auctioneer a small fixed fee and a portion of the proceeds from the sale. Other sites invert
this model. These sites enable bidders to name the price they are willing to pay for a particular product or service and then try to
find a seller who is willing to meet that price.

D Business-to-Business Transactions

Business-to-business commerce represents one of the fastest growing segments of e-commerce. Businesses order supplies and
coordinate complicated projects electronically. For example, construction companies use e-commerce to order construction
materials and coordinate the work of subcontractors. Before e-commerce, this work was conducted via telephone, facsimile, and
regular mail. Subcontractors often lost time waiting for necessary parts to arrive or for another part of the project to be
completed. With e-commerce, however, software can automatically track the inventories of manufacturers and suppliers so that
both have adequate supplies on hand and no longer need to have excess inventories. Reducing inventories enables both
manufacturers and suppliers to lower costs. The labor-intensive method of printing and then faxing or mailing purchase orders
can also be avoided because software can create purchase orders and send them electronically.

E-commerce helps trucking and shipping companies match shipments with shippers. Before e-commerce, it was not uncommon
for trucks or ships to drop off a shipment and then return to their base of operations empty. This practice was inefficient and cost
the trucking or shipping company money. Specialized e-commerce software, along with the Global Positioning System (GPS),
enables trucking firms to track the whereabouts of their trucks at all times and make better decisions as to how their trucks are
routed so they can respond efficiently and cost-effectively to companies that need their services, dramatically reducing the
number of trucks returning empty.

III ISSUES AFFECTING THE DEVELOPMENT OF E-COMMERCE

Internet sales and transactions in the retail and services sectors increased significantly from 1999 to 2002. According to the
United States Bureau of the Census, retail e-commerce sales increased from $15 billion in 1999 to $44 billion in 2002. The
Census Bureau noted that in 2002 retail e-commerce sales represented only 1.5 percent of total retail sales. However, studies have
shown that e-commerce has become very significant in certain product categories. For example, in 2002, 32 percent of computer
hardware and software sales were transacted online, 17 percent of ticket sales were done over the Internet, and 12 percent of book
sales were completed electronically, according to a study by the National Retail Federation and Forrester Research.

A number of unresolved issues have unfolded as e-commerce transactions have grown in number and value. Among these issues
are taxation, security, privacy, and profitability.

A Taxation

Because the Internet transcends national boundaries and also state or provincial boundaries within a nation, the issue of sales
taxes on goods or services purchased over the Internet poses a problem for many governments that rely on sales tax revenue to
fund government programs and services. The Internet is a largely tax-free zone. One study reported in 2001 found that state and
local governments in the United States lost an estimated $13.3 billion in uncollected sales taxes on Internet purchases made that
year. State and local governments have been lobbying the U.S. Congress to impose some kind of uniform sales tax that all e-
commerce businesses would be required to pay. E-commerce businesses, however, have lobbied against such measures, arguing
that it would impose a heavy burden on them. The European Union (EU) is also considering a proposal to impose sales taxes on
Internet purchases by consumers. The EU already has a method for taxing business-to-business transactions over the Internet.

B Security

Established encryption methods such as Secure Sockets Layer (SSL), a protocol developed by Netscape Communications
Corporation, encode credit card numbers and other information to foil would-be thieves. Shoppers can determine if the site they
are using is secure by noting the “secure” icon at the bottom of their browser window. Also, the address bar of Internet browsers
will carry the “https” prefix instead of the standard “http” prefix when the site is secured. Nevertheless, some consumers are
reluctant to divulge credit card information over the Internet, and this reluctance has hindered the growth of e-commerce.

An alternative to credit card information is digital cash, or e-cash. In this arrangement, shoppers pay for a number of virtual
credits through a single source, then use those credits as dollars when shopping. After checkout, the online retailer ships the
goods to the buyer and adds shipping costs to the purchase price. Few e-commerce sites, however, offer e-cash.

C Privacy

In addition to credit card security, many shoppers worry about privacy. To put them at ease, many Internet stores post “privacy
statements” that explain their policy of sharing or not sharing customer information with other businesses. This privacy policy
may include refusing to give the customer’s name and e-mail address to companies that send unsolicited and unwanted
commercial e-mail messages, often known as junk mail or spam.

In 2003 the U.S. Congress passed legislation designed to curb spam. The new law made it illegal for senders of unsolicited
commercial e-mail to disguise their identity by using false return addresses or misleading subject lines. Violators were subject to
steep fines and possible prison terms. The law also prohibited the gathering of e-mail addresses from Web sites. Sponsors of the
legislation estimated that the incredible growth in spam, representing about half of all e-mails, cost Internet access providers $9
billion annually in technology-related expenses necessary to handle the increased volume of mail. Clogged in-boxes also annoyed
consumers and made it difficult to distinguish between solicited and unsolicited commercial e-mail messages.

D Profitability

A large percentage of e-commerce businesses went bankrupt in 2000 and 2001, mostly due to inadequate business plans and
excessive spending on advertising and marketing to attract customers to their Web sites. The dot-com boom of the late 1990s had
largely turned into a dot-com bust as the 21st century began. An estimated 520 e-commerce businesses either ceased operation or
declared bankruptcy from 1999 to 2001, resulting in the layoffs of nearly 100,000 employees, according to Fortune Magazine.
However, a number of e-commerce sites began to report profits in 2001 and 2002. Notable among them were Amazon.com, Inc.,
based in Seattle, Washington, which pioneered many of the tools and procedures now commonplace in online retailing, Expedia,
an online travel site, and eBay, a popular auction site.
E-BANKING

Online banking (or Internet banking) allows customers to conduct financial transactions on a secure


website op Features
Online banking solutions have many features and capabilities in common, but traditionally also have
some that are application specific.

The common features fall broadly into several categories

 Transactional (e.g., performing a financial transaction such as an account to account transfer,


paying a bill, wire transfer, apply for a loan, new account, etc.)
 Payments to third parties, including bill payments and telegraphic/wire transfers
 Funds transfers between a customer's own transactional account and savings accounts
 Investment purchase or sale
 Loan applications and transactions, such as repayments of enrollments

 Non-transactional (e.g., online statements, cheque links, cobrowsing, chat)


 Viewing recent transactions
 Downloading bank statements, for example in PDF format
 Viewing images of paid cheques
 Financial Institution Administration
 Management of multiple users having varying levels of authority
 Transaction approval process
Features commonly unique to Internet banking include

 Personal financial management support, such as importing data into personal accounting


software. Some online banking platforms support account aggregation to allow the customers to
monitor all of their accounts in one place whether they are with their main bank or with other
institutions.
erated by their r History
The precursor for the modern home online banking services were the distance banking services over
electronic media from the early 1980s. The term online became popular in the late '80s and referred to
the use of a terminal, keyboard and TV (or monitor) to access the banking system using a phone line.
‘Home banking’ can also refer to the use of a numeric keypad to send tones down a phone line with
instructions to the bank. Online services started in New York in 1981 when four of the city’s major banks
(Citibank, Chase Manhattan, Chemical andManufacturers Hanover) offered home banking
services[1] using the videotex system. Because of the commercial failure of videotex these banking
services never became popular except in France where the use of videotex (Minitel) was subsidised by
the telecom provider and the UK, where the Prestel system was used.

The UK's first home online banking services[2] was set up by Bank of Scotland for customers of
the Nottingham Building Society (NBS) in 1983.[3] The system used was based on the
UK's Prestel system and used a computer, such as the BBC Micro, or keyboard (Tandata Td1400)
connected to the telephone system and television set. The system (known as 'Homelink') allowed on-line
viewing of statements, bank transfers and bill payments. In order to make bank transfers and bill
payments, a written instruction giving details of the intended recipient had to be sent to the NBS who set
the details up on the Homelink system. Typical recipients were gas, electricity and telephone companies
and accounts with other banks. Details of payments to be made were input into the NBS system by the
account holder via Prestel. A cheque was then sent by NBS to the payee and an advice giving details of
the payment was sent to the account holder. BACSwas later used to transfer the payment directly.

Stanford Federal Credit Union was the first financial institution to offer online internet banking services to
all of its members in October 1994.[citation needed]
Today, many banks are internet only banks. Unlike their predecessors, these internet only banks do not
maintain brick and mortar bank branches. Instead, they typically differentiate themselves by offering
better interest rates and online banking features.

Security

Security token devices

Protection through single password authentication, as is the case in most secure Internet shopping sites,
is not considered secure enough for personal online banking applications in some countries. Basically
there exist two different security methods for online banking.

 The PIN/TAN system where the PIN represents a password, used for the login and TANs
representing one-time passwords to authenticate transactions. TANs can be distributed in different
ways; the most popular one is to send a list of TANs to the online banking user by postal letter. The
most secure way of using TANs is to generate them by need using a security. These token generated
TANs depend on the time and a unique secret, stored in the security token (this is called two-factor
authentication or 2FA). Usually online banking with PIN/TAN is done via a web browser using SSL
secured connections, so that there is no additional encryption needed.

Another way to provide TANs to an online banking user is to send the TAN of the current bank transaction
to the user's (GSM) mobile phone via SMS. The SMS text usually quotes the transaction amount and
details; the TAN is only valid for a short period of time. Especially in Germany and Austria, many banks
have adopted this "SMS TAN" service as it is considered very secure.

 Signature based online banking where all transactions are signed and encrypted digitally. The
Keys for the signature generation and encryption can be stored on smartcards or any memory
medium, depending on the concrete implementation.

Attacks

Most of the attacks on online banking used today are based on deceiving the user to steal login data and
valid TANs. Two well known examples for those attacks are phishing and pharming. Cross-site
scripting and key logger/Trojan horses can also be used to steal login information.

A method to attack signature based online banking methods is to manipulate the used software in a way,
that correct transactions are shown on the screen and faked transactions are signed in the background.

A recent FDIC Technology Incident Report, compiled from suspicious activity reports banks file quarterly,
lists 536 cases of computer intrusion, with an average loss per incident of $30,000. That adds up to a
nearly $16-million loss in the second quarter of 2007. Computer intrusions increased by 150 percent
between the first quarter of 2007 and the second. In 80 percent of the cases, the source of the intrusion is
unknown but it occurred during online banking, the report states. [4]

The most recent kind of attack is the so-called Man in the Browser attack, where a Trojan horses permits
a remote attacker to modify the destination account number and also the amount.

Countermeasures

There exist several countermeasures which try to avoid attacks. Digital certificates are used against
phishing and pharming, the use of class-3 card readers is a measure to avoid manipulation of
transactions by the software in signature based online banking variants. To protect their systems against
Trojan horses, users should use virus scanners and be careful with downloaded software or e-mail
attachments.

In 2001 the FFIEC issued guidance for multifactor authentication (MFA) and then required to be in place
by the end of 2006.[5
etail or virtual bank, credit union or building society.
E-learning
E-learning
From Wikipedia, the free encyclopedia
For the term online learning as used in  machine learning, see  Online machine learning.

E-learning comprises all forms of electronically supported learning and teaching.


The information and communication systems, whether networked or not, serve as specific media to implement
the learning process.[1] The term will still most likely be utilized to reference out-of-classroom and in-classroom
educational experiences via technology, even as advances continue in regard to devices and curriculum.

E-learning is essentially the computer and network-enabled transfer of skills and knowledge. E-learning
applications and processes include Web-based learning, computer-based learning, virtual classroom
opportunities and digital collaboration. Content is delivered via the Internet, intranet/extranet, audio or video
tape, satellite TV, and CD-ROM. It can be self-paced or instructor-led and includes media in the form of text,
image, animation, streaming video and audio.
Abbreviations like CBT (Computer-Based Training), IBT (Internet-Based Training) or WBT (Web-Based
Training) have been used as synonyms to e-learning. Today one can still find these terms being used,
alongwith variations of e-learning such as eLearning, ELearning, and eLearning. The terms will be utilized
throughout this article to indicate their validity under the broader terminology of E-learning.
E-voting
Electronic Voting, a balloting system that allows votes to be entered and recorded in an
electronic form. These balloting systems are also referred to as e-voting or direct-recording
electronic systems (DREs). The voter uses a direct entry device to register vote selections, and
the entries are transferred (via circuitry) to electronic recording media, such as a computer hard
drive or a memory card. The direct entry device may be electronic, as with a touch-screen, or
electromechanical, such as a panel of push buttons.The set of selections made by an individual
voter comprises a ballot. Electronic voting systems typically record the entire ballot as an
electronic “image” although there is no real picture of the ballot, just data that represent the
voter’s choices. After the polls close, the contents of the ballots are tabulated and reported by the
voting system as vote totals. These totals are typically provided in a printed paper format that can
be read by the workers at the individual precinct (or polling) locations. The totals can also be
provided in an electronic form that can be transferred to a central system where the various
precinct totals are consolidated at the municipal, county, or state level. See also
Election.Balloting systems in which the voter makes selections on paper that are subsequently
recorded electronically by using optical scanning or punch-card readers are considered to be
electronic tabulation and are not truly electronic voting methods. The votes were not originally
made electronically and so are not considered a form of electronic voting. However, vote-by-
phone and Internet voting systems would be considered types of electronic voting because the
original votes are made electronically.
Electronic Voting Machine
An electronic voting machine awaits a voter during balloting in Florida in 2004. The machines have raised concerns among some who argue that the software
operating the machines could be manipulated. Critics call for a paper backup to ensure the reliability of electronic voting machines .

E-newspaper or e-
magazines.

Online Magazine
As the popularity of the World Wide Web exploded in the mid-1990s, online magazines emerged as a new form of periodical. These publications
contained traditional magazine elements—stories, photographs, and advertising—along with technology-driven features such as Web links, audio
and video clips, chat rooms, and continual updating. Some online magazines were offshoots of major print publications, including Sports
Illustrated and Forbes, but others were Internet-only ventures, such as Slate (pictured) and Salon.

You might also like