Eccomerce Revision
Eccomerce Revision
3. Explain how SSL protocol is used for secure transaction. Explain the advantages of e-
commerce.
The SSL protocol is used for secure transactions in e-commerce by combining the Hypertext Transfer
Protocol (HTTP) with SSL/TLS encryption to provide secure identification of servers. The advantages of e-
commerce include cost-effectiveness, reduction in data entry errors, shorter processing cycles,
automated data entry, expedited transmission, and standardized communication.
4. What role does SCM play in Business to Business model i.e. B2B e-Commerce?
Supply Chain Management (SCM) plays a crucial role in Business to Business (B2B) e-commerce by
optimizing the flow of goods, services, and information between businesses. It ensures efficient
procurement, production, and distribution processes, enhancing collaboration and reducing costs in the
supply chain.
6. Discuss in brief virtual auction.Explain the differences between virtual auction and reverse auction.
Virtual auctions are online platforms where goods or services are auctioned to the highest bidder. The
key difference between virtual auctions and reverse auctions is that in virtual auctions, buyers bid to
purchase items, while in reverse auctions, sellers compete to win business from buyers by offering the
lowest price.
Firewall is a security system that monitors and controls incoming and outgoing network traffic based on
predetermined security rules. In e-commerce, firewalls protect sensitive data, prevent unauthorized
access, and ensure secure transactions by acting as a barrier between internal systems and external
threats.
Based on the provided sources, here are the answers to the questions related to e-commerce:
- Advantages include reduced overhead costs, global marketing reach, lower operating costs,
convenience, scalability. Disadvantages may involve initial setup costs, security risks, and potential
technical issues.
- E-commerce applications include online retailing, electronic payments, online auctions, internet
banking, online ticketing, and digital downloads.
5. **Infrastructure of e-commerce**:
- The infrastructure of e-commerce includes websites, secure payment gateways, databases, servers,
internet connectivity, and logistics for product delivery.
- E-commerce services encompass online shopping, electronic payments, customer support, order
tracking, digital marketing, and secure transactions.
7. **Meaning of e-commerce**:
- E-commerce refers to the buying and selling of goods and services over the internet, involving online
transactions and digital platforms.
8. **Explanation of e-commerce**:
cybersecurity threats,
competition,
data privacy concerns,
logistics
Supply chain issues,
adapting to rapidly evolving technology.
global reach,
reduced operating costs,
convenience, scalability,
increased selection,
Easier management of customer data and sales processes.
Based on the provided sources, here are the answers to the questions related to Electronic Data
Interchange (EDI):
3. **Features of EDI:**
- Some key features of EDI include increased efficiency through automation, improved
accuracy by eliminating manual errors, enhanced communication with standardized formats,
real-time inventory updates, improved order fulfillment, cost savings by reducing manual
processing, and competitive advantage through operational efficiency.
Based on the provided sources, here are the answers to the questions related to Electronic Data
Interchange (EDI), e-banking, and electronic payment systems:
c) The characteristics of internet-based EDI include lower operating costs, improved business
cycle speeds, reduced human errors, enhanced business efficiency, enhanced transaction
security, paperless transactions, environmental friendliness, and improved customer and
partner relationships[5].
d) The classifications of the e-commerce field by the nature of transactions include Business-to-
Business (B2B), Business-to-Consumer (B2C), and Consumer-to-Consumer (C2C). Each
classification represents different types of transactions and target audiences within the e-
commerce landscape.
e) Companies usually choose to implement SAP (Systems, Applications, and Products) for its
comprehensive enterprise resource planning (ERP) software that integrates various business
functions, streamlines processes, enhances data visibility, improves decision-making, and
provides a scalable solution for business growth and efficiency.
f) The need for collaborative computing arises from the requirement for real-time collaboration,
communication, and information sharing among individuals or teams within an organization. It
facilitates teamwork, enhances productivity, fosters innovation, and enables efficient decision-
making processes by leveraging technology for seamless collaboration[3].
g) The three different types of transitions and mobility within a wireless network include
Business to Business (B2B), Business to Consumer (B2C), and Consumer to Consumer (C2C).
These types represent different transactional relationships and interactions within the e-
commerce environment[3].
h) The Supply Chain Execution Framework refers to the set of processes, technologies, and
systems that manage and optimize the flow of goods, information, and finances across the
supply chain. It encompasses activities like order fulfillment, inventory management, warehouse
management, transportation management, and distribution to ensure efficient supply chain
operations[5].
i) The major methods used for advertisement include digital marketing strategies like SEO, social
commerce, content marketing, and personalized interactions with customers on websites. These
methods help businesses grow their online presence, attract visitors, and convert potential
customers into buyers[3].
j) Data Encryption Standard (DES) is a symmetric-key algorithm used for encrypting and
decrypting electronic data. It ensures data security by converting plaintext data into ciphertext,
making it unreadable without the appropriate decryption key. DES is a widely used encryption
standard for securing sensitive information during electronic transactions and
communications[5].
**TERMS IN E-BUSINESS:**
i. **Brick and Mortar Organizations:** Traditional physical businesses that operate offline.
ii. **Virtual Organizations:** Businesses that operate entirely online without physical locations.
iii. **Click and Mortar Organizations:** Businesses that combine online and offline operations.
- **E-commerce Applications:** Examples include online retail platforms like Amazon and
Flipkart.
- **E-commerce Support Services:** Services like online payment gateways and customer
support systems.
- **E-commerce Infrastructure:** Includes internet connectivity, servers, and security protocols.
Advantages:
1. Increased reach and accessibility to a global market.
2. Lower operational costs due to reduced need for physical infrastructure.
Disadvantages:
1. Security risks like data breaches and fraud.
2. Lack of personal interaction leading to potential customer trust issues.
These points provide a comprehensive overview of the distinctions between e-commerce and e-
business, key terms in e-business, components of an e-commerce framework, technologies
driving e-commerce evolution, advantages and disadvantages of e-commerce, and security
threats in electronic commerce systems.
Regulatory and legal issues in electronic commerce are crucial for ensuring fair and secure
online transactions. Some key issues include:
1. **Data Privacy:** Regulations like GDPR govern how businesses collect, store, and use
customer data to protect privacy.
2. **Consumer Protection:** Laws ensure fair practices, accurate product information, and
transparent pricing to safeguard consumer rights.
3. **Cybersecurity:** Regulations mandate measures to protect sensitive data from cyber
threats and ensure secure online transactions.
4. **Intellectual Property Rights:** Laws protect trademarks, copyrights, and patents,
preventing infringement and piracy in e-commerce.
These regulatory and legal issues play a vital role in maintaining trust, security, and fairness in
the digital marketplace[1][3][5].
1. **Subscription Model:** Customers pay a recurring fee for access to products or services.
2. **Advertising Model:** Revenue generated through displaying ads on the platform.
3. **Transaction Fee Model:** Charging a fee for each transaction conducted on the platform.
4. **Freemium Model:** Offering basic services for free and charging for premium features.
1. **Pricing Strategy:** Balancing competitive pricing with profitability and customer value.
2. **Customer Acquisition Costs:** Managing costs associated with acquiring new customers
while ensuring profitability.
These websites use databases to dynamically generate content based on user interactions,
ensuring personalized and real-time experiences for customers.
1. **Responsive Website Design:** Ensuring compatibility across devices for a seamless user
experience.
2. **Search Engine Optimization (SEO):** Optimizing content to improve visibility and ranking
on search engines.
3. **Social Media Integration:** Leveraging social platforms to engage with customers and drive
traffic.
4. **Content Marketing:** Providing valuable and relevant content to attract and retain
customers.
1. **Omnichannel Sales:** Leveraging both online and offline channels to provide customers
with a seamless shopping experience, allowing them to research online and purchase in-store or
vice versa.
2. **Inventory Management:** Integrating e-commerce platforms with physical stores for real-
time inventory updates and order fulfillment, combining the convenience of online shopping
with immediate product availability in physical stores.
1. **Invest in SEO:** Enhance online visibility and organic traffic by optimizing product pages for
search engines.
2. **Run Influencer Marketing Campaigns:** Collaborate with influencers to reach a wider
audience and drive sales.
3. **Sell on Marketplaces:** Expand reach by listing products on popular online marketplaces
like Amazon or eBay.
4. **Create a TikTok Marketing Strategy:** Utilize TikTok's engaging platform to showcase
products and connect with a younger demographic.
Credit Card
Debit Card
Smart Card
E-Wallet
In the context of electronic money, a block chain is a decentralized, distributed digital ledger
that records transactions across multiple computers. It is a technology that enables secure and
transparent transactions without the need for a central authority like a bank. Each transaction is
recorded in a block, which is linked to the previous block using cryptography, creating a chain of
blocks. This system ensures the integrity and security of transactions by making them tamper-
proof and transparent.
In Bitcoin, a block chain is used to record all transactions made with the crypto currency. It
serves as a public ledger that tracks the flow of Bitcoin from one user to another. The block
chain in Bitcoin is essential because it ensures the security, transparency, and decentralization
of the crypto currency. By recording every transaction in a block that is linked to the previous
one, the block chain prevents double-spending, fraud, and manipulation of transaction records.
It is required to maintain the trust and integrity of the Bitcoin network.
Bitcoin is often referred to as a crypto currency, which is a type of digital or virtual currency. So
yes it’s a currency since it’s an asset or commodity due to its volatile nature.
c) Describe the following terms as they are applied in the e-commerce environment
i) Teleworking
ii) Industry value chain
iii) Shipping profile
iv) Electronic markets
**Teleworking in E-commerce:**
Teleworking in the e-commerce environment refers to the practice of working remotely using
digital technologies to perform tasks related to online business operations. It allows employees
to work from locations outside the traditional office setting, leveraging communication tools
and internet connectivity to collaborate with colleagues, manage orders, handle customer
inquiries, and oversee various aspects of the e-commerce value chain[1][3].
**E-governance Models:**
1. **Transactional Model:** This model focuses on providing online services to citizens,
businesses, and government entities, enabling transactions such as tax payments, license
renewals, and permit applications to be conducted electronically.
2. **Participatory Model:** In this model, e-governance emphasizes citizen engagement and
participation in decision-making processes through digital platforms, social media, and online
forums, fostering transparency, accountability, and collaboration between the government and
the public.
3. Transformative Model: The transformative model aims to leverage digital technologies to
transform governance structures, policies, and service delivery mechanisms. It involves
innovative approaches to enhance efficiency, responsiveness, and inclusivity in government
operations and public service delivery.
**Definition:** Web application servers are software frameworks or platforms that provide an
environment for hosting, managing, and executing web applications. They handle the processing
of dynamic content, manage user requests, and interact with databases to deliver web-based
services.
**SLEPT Analysis:** SLEPT analysis is a strategic framework that evaluates the external macro-
environmental factors influencing an organization. It considers five key factors: Social, Legal,
Economic, Political, and Technological. By examining these factors, businesses can identify
opportunities and threats, enabling informed decision-making and strategic planning.
a) E-commerce refers to the process of buying and selling goods and services over the internet.
It involves online transactions, electronic funds transfers, and payment gateway integration,
catering to various business models like B2B, B2C, C2C, and C2B[1][4].
e) In E-commerce applications:
i. Search engines: Used for optimizing product visibility and attracting traffic to e-commerce
websites through search engine optimization (SEO).
ii. E-mail: Utilized for customer communication, marketing campaigns, order notifications, and
personalized promotions.
iii. Shopping cart: Enables customers to select and store items for purchase, facilitating a smooth
checkout process and enhancing user experience.
**QUESTION TW0**
a) Infrastructural Attacks:
i. Denial of Service (DoS): Denial of Service attacks aim to disrupt the normal functioning of a
network or system by overwhelming it with a flood of traffic, rendering it inaccessible to
legitimate users.
ii. Worms: Worms are self-replicating malware that spread across networks, exploiting
vulnerabilities to infect multiple devices and cause damage or steal data.
QESTION THREE
**QUESTION FOUR**
a) Models of E-commerce:
i. B2G (Business-to-Government): Involves businesses providing goods or services to
government entities.
ii. B2C (Business-to-Consumer): Direct sales from businesses to individual consumers.
iii. C2C (Consumer-to-Consumer): Transactions between individual consumers through online
platforms.
Question 1
[UNCTAD][3]
E-Learning as EC
E-Learning is considered a form of e-Commerce due to:
- Digital Transactions: E-Learning involves the online exchange of educational materials and
services for a fee.
- Global Reach: E-Learning platforms can cater to a global audience, transcending geographical
boundaries.
[LinkedIn][2]
### Question 2
b) Explain why Mpesa has become a very common form of e-payment in Kenya (5 Marks)
The popularity of M-Pesa as an e-payment method in Kenya stems from its convenience and
role in promoting financial inclusion:
Convenience
M-Pesa offers a straightforward and user-friendly way for individuals to conduct transactions
using their mobile phones. This ease of use has contributed significantly to its widespread
adoption in Kenya. Users can make payments, transfer money, and access various financial
services conveniently through the M-Pesa platform.
Financial Inclusion
One of the key drivers of M-Pesa's popularity is its role in promoting financial inclusion. By
providing a platform for the unbanked population to engage in financial transactions, M-Pesa
has empowered individuals who previously had limited access to traditional banking services.
This inclusion of the unbanked population has been instrumental in bridging the gap and
allowing more people to participate in the digital economy.
Security: Safaricom, the company that developed M-Pesa, invested heavily in security and
privacy.
Support for Business: M-Pesa services have been integrated into businesses, with many shops
offering M-Pesa services.
a) Jumia online-store, selling from electronics, fashion clothes, shoes, food, travel agency for
online tickets, houses, motor vehicles and providing logistics for their own deliveries to their
consumers. This ensures goods have been delivered to the customers within their stipulated
time with no delay. Jumia is in 23 countries within Africa, launched in Kenya 2012, is an
online company within the marketplaces and classified websites. Jumia generates about $
234 million revenue which stands for 265% growth from 2014. As from 2016 Jumia is doing
90% of African GDP and about 50% million customers. Jumia has become the continent first
icon being valued over 1 billion USD, as of 2017..
i) You have been hired to come up with a proposal procurement document to purchase
accounting software, write short notes on the contents of the document (5 Marks)
ii) “Jumia generates about $ 234 million revenue which stands for 265% growth from
2014” describe how Jumia has achieved this
- Market Expansion: By operating in multiple African countries, Jumia has
tapped into diverse markets, increasing its reach and potential customer
base.
- Diversification of Offerings: Jumia's wide range of products, from
electronics to fashion, food, and travel services, has attracted a broad
audience, contributing to revenue growth.
- Efficient Logistics: Jumia's emphasis on timely deliveries and efficient
logistics has enhanced customer satisfaction, leading to repeat business
and increased revenue.
- Innovative Marketing: Jumia's marketing strategies, including advertising
services and value-added services, have helped attract sellers and
consumers, boosting revenue.
- Strategic Partnerships: Collaborations with companies like Reckitt
Benckiser to offer affordable hygiene products have expanded Jumia's
product offerings and customer base.
QUESTION THREE (20 Marks) A major E-Commerce company was made aware that the contents
of its customer database had been compromised. This information was identified via an online
blog owned by a security researcher who felt the company’s ability to maintain their customers’
data in a secure manner was negligent. 7Safe experts attended the client site and identified that
their eCommerce website API was misconfigured and allowed malformed queries to be entered.
This meant it was possible to obtain other customer information including both personal and
data regarding purchases from the website. We also studied the company’s network and
identified a number of security flaws, including logging failures, and the ability to navigate the
network unhindered. We determined that collectively this would enable a hacker to gain
unfettered access to company and client data with the ability to track such access greatly
reduced.
i) “We also studied the company’s network and identified a number of security flaws,
including logging failures, and the ability to navigate the network unhindered” discuss
the causes of this statement (10 Marks)
The statement regarding the identification of security flaws in the company's network,
including logging failures and unhindered network navigation, can be attributed to
several causes:
The impact of the identified security flaws in the company's network, including logging failures
and unhindered network navigation, can be significant:
2. Reputation Damage:
- Loss of customer trust and confidence due to perceived negligence in safeguarding data.
- Negative publicity and public scrutiny can harm the company's brand reputation.
3. Financial Loss:
- Costs associated with investigating the breach, implementing security improvements, and
potential legal liabilities.
- Loss of revenue due to customer churn and decreased sales resulting from a damaged
reputation.
4. Regulatory Compliance Issues:
- Non-compliance with data protection regulations can lead to fines and legal consequences.
- Failure to protect customer data in accordance with industry standards can result in
regulatory penalties.
For China’s e-tailing market, the first and top company that has captured world-wide attention
is
the Al-ibaba Group. The company introduces itself on its homepage as follows: “Alibaba Group
was established in 1999 by 18 people led by Jack Ma, a former English teacher from Hangzhou,
China. From the outset, the company’s founders shared a belief that the Internet would level
the
playing field by enabling small enterprises to leverage innovation and technology to grow and
compete more effectively in the domestic and global economies. Since launching its first website
helping small Chinese exporters, manufacturers and entrepreneurs to sell internationally, the
Alibaba Group has grown into a global leader in online and mobile commerce. Today the
company and its related companies operate leading wholesale and retail online marketplaces as
well as Internet-based businesses offering advertising and marketing services, electronic
payment, cloud-based computing and network services and mobile solutions, among others.”
a) How has Electronic payment improved customer service for Alibaba
Company (10 Marks)
Electronic Payment's Impact on Customer Service for Alibaba Company
Electronic payment has significantly improved customer service for Alibaba Company in
the following ways:
Customers can make purchases efficiently without the need for physical cash,
leading to faster checkout processes.
Global Reach:
Electronic payment systems enable Alibaba to cater to a global customer base by
accepting various currencies and payment methods.
b) What are the reasons Alibaba would choose social media marketing (10 Marks)
Reasons for Alibaba's Social Media Marketing Strategy
Alibaba utilizes social media marketing for the following reasons:
Increases Brand Trust and Credibility:
Social media platforms provide a direct channel for Alibaba to engage with its audience, build
trust, and establish credibility.
By actively participating in social media conversations, Alibaba can humanize its brand and
connect with customers on a personal level.
Drives Website Traffic and Boosts Sales:
Social media marketing helps drive traffic to Alibaba's e-commerce platforms, increasing
visibility and attracting potential customers.
Engaging content and promotions on social media can lead to higher conversion rates and boost
sales for Alibaba.
Enhances Customer Engagement:
Social media allows Alibaba to interact with customers in real-time, respond to inquiries, and
provide personalized customer service.
By engaging with customers on social media, Alibaba can foster relationships, address concerns,
and create a loyal customer base.
Cost-Effective Marketing:
Social media marketing is a cost-effective way for Alibaba to