E-Commerce and ERP
E-Commerce and ERP
1. Overview, Definitions, Advantages & Disadvantages of E – Commerce, Threats of E – Commerce, Managerial Prospective, Rules & Regulations For
Controlling E – Commerce, Cyber Laws.
Overview:
E-Commerce or Electronics Commerce is a methodology of modern business, which addresses the need of business organizations, vendors and
customers to reduce cost and improve the quality of goods and services while increasing the speed of delivery. Ecommerce refers to the paperless
exchange of business information using the following ways −
Definitions:
E-commerce, short for electronic commerce, refers to the buying and selling of goods and services over the internet. It encompasses a wide range of
transactions, including online retail, electronic payments, online auctions, and internet banking. E-commerce has transformed the way businesses
operate and how consumers shop, providing convenience, accessibility, and global reach.
Threats of E – Commerce:
Since E-commerce deals with the transfer of money digitally, hackers and attackers use this as an opportunity to break into E-commerce websites
and gain some financial profit from them.
• Financial fraud: Whenever an online transaction or transfer of funds takes place, it always asks for some pin or passwords to authenticate and
allows only the authorized person to process the transactions. But due to some spyware and viruses used by attackers, they ca n also process
the transactions of the users by allowing the unauthorized person, which will lead to causing a financial fraud with the user .
• Phishing: It is one of the most common attacks nowadays on the users, where the attackers send emails and messages to a large number of
users which contain a special link in it. When the users open that link in their browser, the malware starts downloading in t he background and
the attacker gets full control over the financial information about the users. They make fake websites to make the users beli eve their website
and fill out their financial credentials.
• SQL injections: SQL injections are used by attackers to manipulate the database of large organizations. Attackers enter malicious code full o f
malware into the database and then they search for targeted queries in the database and then they collect all the sensitive i nformation in the
database.
• Cross-site scripting (XSS): Hackers target the website of E-commerce companies by entering malicious code into their codebase. It is a very
harmful attack as the control of the entire website goes into the hands of the attackers. It can enable the attackers to trac k the users by using
their browsing activity and their cookies. For More details please read the what is cross-site scripting XSS article.
• Trojans: Attackers make software that may appear to be useful before downloading, but after downloading the software it installs all t he
malicious programs on the computer. It collects data like personal details, address, email, financial credentials and it may cause data leaks.
Brute force attacks: Hackers draw patterns and use random methods to crack into someone else’s account as an unauthorized use r. It requires
the use of multiple algorithms and permutations and combinations to crack the password of an account by the attacker.
• DDoS attacks: Distributed Denial of Service (DDoS) attacks are most commonly used by hackers to not allow original legitimate users to acce ss
and buy and sell products from the E-commerce platforms. Hackers use a large number of computers to flood the number of requests to the
server so that at one time the server crashes out.
Managerial Prospective:
1. Planning for Success:
• Know Your Goals: Make sure your online goals match your overall business goals.
• Know Your Market: Understand who your customers are and what they want.
• Plan Long-term: Make a clear plan for how you'll grow your online business over time.
2. Making Things Run Smoothly:
• Use Good Systems: Make sure your online store talks well with your other business systems, like keeping track of inventory an d orders.
• Get Things to Customers Fast: Work closely with your suppliers to get products to your customers quickly and without mistakes .
• Help Customers Out: Make sure you're there for your customers when they need help, whether it's answering questions or dealin g with
problems.
3. Being Flexible and Creative:
• Try New Tech: Keep an eye on new technology that can make your online business better.
• Be Ready to Change: Be quick to make changes if something's not working or if there's a new opportunity.
• Make Things Better: Always look for ways to improve your online store and how you do business.
4. Keeping Risks in Check:
• Keep Things Safe: Make sure your website and your customers' information are safe from hackers.
• Follow the Rules: Know and follow the laws and rules that apply to online businesses, like how you handle customers' data and how you pay
taxes.
• Have a Backup Plan: Be ready for things to go wrong, like if your website goes down or your suppliers can't deliver.
Cyber Laws:
• Online Rules: Cyber laws are like rules for the internet. They're there to keep things safe and fair when people use computers and the
internet.
• Protecting Digital Space: These laws are made to protect things like personal information, online transactions, and digital content from bad
guys who might try to steal or misuse them.
• Preventing Cybercrime: Cyber laws also help catch and punish people who do bad things online, like hacking into websites, spreading viruses,
2.Technologies : Relationship Between E – Commerce & Networking, Different Types of Networking Commerce, Internet, Intranet &
Extranet, EDI Systems Wireless Application Protocol : Definition, Hand Held Devices, Mobility & Commerce, Mobile Computing,
Wireless Web, Web Security, Infrastructure Requirement For E – Commerce .
Technologies:
Relationship Between E – Commerce & Networking:
The relationship between e-commerce and networking is quite strong, as networking technologies play a crucial role in enabling and facilitating e-
commerce activities.
• Infrastructure for Online Transactions: Networking technologies provide the infrastructure needed for e-commerce transactions to occur over
the internet. This includes the physical infrastructure (such as servers, routers, and cables) and the communication protocol s (like TCP/IP) that
allow data to be exchanged between computers and devices.
• Website and Application Hosting: E-commerce websites and applications are hosted on servers connected to computer networks. Networking
technologies ensure that these servers are accessible to users worldwide, allowing them to browse products, make purchases, a nd interact
with the e-commerce platform.
• Online Payments and Transactions: Networking technologies enable secure online payment processing, allowing customers to make
transactions using credit cards, digital wallets, or other payment methods. Secure communication protocols (such as SSL/TLS) encrypt sensitive
data during transmission, ensuring the security of financial transactions over the internet.
• Supply Chain Management: Networking technologies facilitate communication and collaboration between various stakeholders in the e -
commerce supply chain, including suppliers, manufacturers, distributors, and logistics partners. This enables real -time tracking of inventory,
orders, and shipments, optimizing the efficiency and responsiveness of supply chain operations.
• Customer Engagement and Support: Networking technologies support various communication channels for customer engagement and
support, such as email, live chat, social media, and voice/video calls. These channels allow e -commerce businesses to interact with customers,
address inquiries, resolve issues, and provide personalized assistance in real-time.
• Data Analytics and Personalization: Networking technologies enable the collection, processing, and analysis of vast amounts of data
generated by e-commerce transactions and customer interactions. This data is used to gain insights into customer behavior, preferences, and
trends, enabling personalized product recommendations, targeted marketing campaigns, and optimization of the e -commerce experience.
Internet:
The granddaddy of them all, the internet is a massive public network that connects billions of devices around the world. Anyo ne with an
internet connection can access the vast amount of information and resources available online, from websites and email to soci al media and
streaming services. Think of it as a giant digital highway system.
Intranet & Extranet:
• Intranet: In contrast, an intranet is a private network built within an organization. It's like a smaller, internal highway system acce ssible only to
• Wireless Application Protocol (WAP) is a set of communication protocols and an application environment designed for mobile devices to
access the internet. It was introduced in the late 1990s but has largely been superseded by modern web browsers and technolog ies. Unlike
the web browsers you use today, WAP browsers used a special markup language called WML (Wireless Markup Language) to display
information. WML was similar to HTML (Hypertext Markup Language) used on webpages, but simpler and optimized for small screen s.
Mobile Computing:
Mobile computing involves the use of portable computing devices, such as smartphones and tablets, to perform various computing tasks while on
the move. WAP enables mobile computing by allowing users to access internet-based resources, applications, and services from their mobile
devices, regardless of their location.
Wireless Web:
The wireless web refers to the subset of the internet that is accessible via wireless networks, using devices such as smartphones, tablets, and other
wireless-enabled devices. WAP technology plays a crucial role in enabling access to the wireless web by providing standards and protocols for
delivering web content and services to mobile devices. In the early days of the internet, most connections were wired, using ethernet cables. With
the rise of mobile devices and advancements in cellular networks (like 3G, 4G, and now 5G), users can access the web from anywhere with a
wireless signal.
Web Security:
Web security encompasses a range of measures and practices aimed at safeguarding web-based resources, applications, and services from various
security threats and vulnerabilities. In the context of WAP and EDI systems, ensuring web security is essential to protect sensitive information,
prevent unauthorized access, and maintain the integrity and availability of data.
• Encryption: Encryption is the process of encoding information to prevent unauthorized access. Secure communication protocols like HTTPS
use encryption to protect data during transmission, ensuring it's unreadable to unauthorized parties.
• Authentication: Authentication verifies the identity of users, devices, or systems accessing web-based resources. Strong methods like
passwords and biometrics prevent unauthorized access to sensitive data.
• Authorization: Authorization controls determine the level of access granted to authenticated users. Role -based access control ensures users
have access only to necessary resources, minimizing risks of unauthorized actions or data exposure.
• Firewalls: Firewalls monitor and control network traffic to protect web servers from unauthorized access and cyber threats by filtering and
blocking suspicious activity.
• Intrusion Detection and Prevention Systems (IDPS): IDPS monitor network activities for signs of malicious behavior, helping mitigate risks and
prevent security breaches.
• Vulnerability Management: Vulnerability Management involves identifying and remediating security vulnerabilities in web infrastructure
through regular assessments and patch management to reduce the likelihood of exploitation by cyber attackers.
(ii) Facilities: Facilities encompass physical infrastructure such as warehouses, distribution centers, and fulfilment centers. These faciliti es are
essential for storing inventory, managing logistics, and fulfilling customer orders efficiently.
(iii) Customer Services: Providing excellent customer service is essential for building trust and loyalty among e -commerce customers. This
includes offering multiple channels for customer support, such as live chat, email, and phone support, as well as implementin g robust systems
for managing inquiries, complaints, and returns.
(iv) Information Technology: Information technology infrastructure forms the backbone of e-commerce operations. This includes e-commerce
platforms, website hosting, content management systems (CMS), payment gateways, security protocols, and other technologies ne cessary for
managing online transactions, data storage, and website functionality.
(v) Fulfilment: Fulfilment infrastructure involves processes and systems for managing inventory, order processing, and shipping. This include s
inventory management software, order management systems (OMS), shipping carriers, and logistics partners to ensure timely and accurate
delivery of orders to customers.
(vi) Finance and Administration: Sound financial and administrative infrastructure is essential for managing e-commerce operations
effectively. This includes accounting systems, payment processing solutions, tax compliance, legal compliance, and administra tive processes
for managing finances, contracts, and regulatory requirements.
(vii) Human Resources: Skilled personnel are vital for driving e-commerce success. This includes hiring and training staff for various roles such
as customer service, marketing, IT, logistics, finance, and administration. Creating a positive workplace environment and off ering continuous
opportunities for professional growth are crucial for keeping talented employees and ensuring high productivity.
3.Business Models of e – commerce : Model Based On Transaction Type, Model Based On Transaction Party - B2B, B2C, C2B, C2C, E –
Governance.
1. Brokerage Model:
○ In the brokerage model, the e-commerce platform acts as an intermediary between buyers and sellers, facilitating transactions. The
platform typically charges a fee or commission for connecting buyers with sellers. Examples include real estate websites, stock trading
platforms, and online travel agencies.
2. Aggregator Model:
○ The aggregator model involves integrating information or services from various sources into a single platform for users. This model adds
value by simplifying the search and comparison process for consumers. Examples include travel comparison websites, job search
engines, and food delivery apps that aggregate restaurant options. Ex- FLIPKART
3. Infomediary Model:
○ In the infomediary model, the e-commerce platform collects and analyses consumer data to provide valuable insights to businesses.
These insights can be used for targeted marketing, product development, and personalized recommendations. Examples include
websites that offer personalized recommendations based on user preferences and behaviour.
4. Community Model:
○ The Community Model is all about bringing together people who like the same things. E-commerce websites using this model create
places where users can chat, leave reviews, and share their own stuff. This helps everyone connect and talk more. Examples include
sites like Facebook Marketplace and forums where people who really love something can chat.
5. Subscription Model:
○ The subscription model involves charging customers a recurring fee in exchange for access to products or services over a specified
period. E-commerce platforms using this model offer subscriptions for digital content, software, streaming services, and curated boxes
of physical goods. Examples include Netflix, Spotify, and subscription-based e-commerce stores.
6. Affiliate Model:
○ In the affiliate model, e-commerce platforms earn revenue by promoting third-party products or services and earning a commission for
referred sales or leads. Affiliates typically use tracking links or codes to track referrals and receive compensation based on predefined
criteria, such as clicks, sales, or sign-ups. Examples include affiliate marketing networks, product review blogs, and influencer marketing
platforms.
1. Business-to-Business (B2B): This involves transactions between two businesses. For example, a manufacturer selling components to another
company that assembles them into a final product.
2. Business-to-Consumer (B2C): This involves transactions between a business and individual consumers. For instance, when you buy a product
from an online retailer like Amazon.
3. Consumer-to-Consumer (C2C): This involves transactions between individual consumers. Examples include selling goods on platforms like
eBay or Craigslist.
4. Consumer-to-Business (C2B): This involves individual consumers providing products or services to businesses. For example, freelance writers
selling articles to a media company.
5. Business-to-Government (B2G): This involves transactions between a business and a government entity. It could include selling goods or
services to government agencies, such as a technology company providing software to a city government.
6. Government-to-Business (G2B): This involves transactions where a government provides services or goods to businesses. An example could
be a government agency issuing permits or licenses to businesses.
7. Government-to-Citizen (G2C): This involves interactions where a government provides services or information directly to citizens. This might
E – Governance:
E-Governance, short for electronic governance, refers to the use of information and communication technologies (ICTs) by government agencies to
provide public services, exchange information, and engage with citizens. It encompasses a wide range of activities aimed at enhancing the efficiency,
transparency, and accessibility of government services and processes through digital means.
1. Market Research and Analysis: Understand your target audience and competitors to identify opportunities and gaps in the market. This helps
you figure out how you can stand out and meet your customers' needs better.
2. Optimize User Experience (UX): Your website or app should be easy to use and look nice. This makes it more likely that people will buy from
you and want to come back.
3. Implement Effective Marketing and Advertising Strategies: Utilize various marketing channels and tactics to attract, convert, and retain
customers. Use different ways to tell people about your products, like social media or ads. This helps more people find out a bout what you're
selling and buy from you.
4. Prioritize Customer Service and Satisfaction: Be really nice and helpful to the people who buy from you. If they have a problem, try to fix it
quickly. Happy customers are more likely to come back and tell their friends about you.
5. Monitor and Analyse Performance: Continuously track e-commerce metrics and analytics data to optimize performance and make data -
driven decisions. Look at the numbers to see if your business is doing well. Check things like how many people are visiting y our website and
how many are buying from you. This helps you know what's working and what you might need to change.
5. Four C’s : ( Convergence, Collaborative Computing, Content Management & Call Center ).
a) Convergence : Technological Advances in Convergence – Types, Convergence and its implications, Convergence & Electronic Commerce.
b) Collaborative Computing : Collaborative product development, contract as per CAD, Simultaneous Collaboration, Security.
c) Content Management : Definition of content, Authoring Tools & Content Management, Content – partnership, repositories,
convergence, providers, Web Traffic & Traffic Management ; Content Marketing.
d) Call Center : Definition, Need, Tasks Handled, Mode of Operation, Equipment , Strength & Weaknesses of Call Center, Customer
Premises Equipment (CPE).
Four C’s : ( Convergence, Collaborative Computing, Content Management & Call Center ).
1. Convergence:
This means things coming together. In technology, convergence refers to different devices or technologies becoming similar or working
together. For example, smartphones are a convergence of phones, computers, and cameras.
2. Collaborative Computing:
This is about people working together using computers or digital tools. It could be things like sharing files online, working on documents
together, or having virtual meetings with colleagues from different locations.
3. Content Management:
This involves creating, storing, organizing, and delivering information electronically. Businesses use content management sy stems to manage
websites, blogs, social media content, and other digital assets.
4. Call Center:
A call center is a place where people answer calls from customers or clients. They might provide customer service, take order s, or offer
technical support over the phone. Call centers can also use technology like chatbots or automated systems to handle inquiries .
a) Convergence : Technological Advances in Convergence – Types, Convergence and its implications, Convergence & Electronic Commerce.
Technological Advances in Convergence-
Types:
• Data Integration: Traditionally, E-commerce platforms and ERPs operated in separately. Convergence allows for seamless data flow between
the two. This means real-time inventory updates, order fulfillment tracking, and automatic customer data synchronization.
• Functional Integration: Imagine managing your online store and back-office operations from a single platform. Convergence allows features
like order processing, customer relationship management (CRM), and accounting to be integrated within the E -commerce system.
b) Collaborative Computing : Collaborative product development, contract as per CAD, Simultaneous Collaboration, Security.
Collaborative Product Development (CPD):
• Imagine engineers, designers, and suppliers working on a product simultaneously using a central platform.
• CPD tools allow for real-time updates, shared revisions, and streamlined communication, leading to faster development cycles and improved
product quality.
Simultaneous Collaboration:
• Forget waiting your turn to edit a file. Collaborative tools allow multiple users to work on the same document or model at the same time.
• This facilitates faster decision-making, reduces turnaround times, and improves overall productivity by eliminating the need for back -and-forth
communication and file sharing delays.
Security:
Security is top priority when dealing with sensitive product data. Here's how collaborative platforms address it:
• Access Controls: Granular permission settings ensure only authorized users can access specific data and functionalities.
• Data Encryption: Sensitive information is encrypted at rest and in transit, protecting it from unauthorized access.
• Version Control: Track changes and revert to previous versions if needed, ensuring data integrity.
c) Content Management: Definition of content, Authoring Tools & Content Management, Content – partnership, repositories, convergence,
providers, Web Traffic & Traffic Management ; Content Marketing.
Definition of Content:
Content is any information you share with your audience. It can be informative (blog posts, articles), entertaining (videos, social media posts,
podcasts), or convincing (marketing copy, product descriptions).
Content – partnership:
Content partnerships are a powerful way to grow your personal brand and reach new audiences. They involve collaborating with other content
creators, influencers, or organizations to produce and distribute valuable content that benefits both parties.
Repositories:
Convergence:
In the context of content management, convergence refers to the merging of different content types (text, video, audio) into a unified experience.
This allows you to deliver a more engaging and interactive experience for your audience.
Content Providers:
These are companies or individuals who create and distribute content. They can be freelance writers, stock photo agencies, or even internal content
creation teams within your organization.
Content Marketing:
This is the strategic use of content to attract, engage, and convert your target audience into customers. Instead of directly selling, they focus on
providing useful information to build trust and credibility. This can include blog posts, videos, social media posts, and more. The aim is to drive
traffic, improve brand awareness, and support customer loyalty.
(Imagine you have a favourite store that sells clothes. Usually, they might advertise their products directly, like showing pictures of their latest outfits or offering discounts.
But with content marketing, they do something different. They create helpful or interesting content that you might enjoy, like fashion tips, styling advice, or behind-the-scenes videos showing how clothes
are made. They share this content on their website, social media, or even in emails.
Now, when you see their posts or articles, you find them useful or entertaining. You might learn new things about fashion orget inspired by their ideas. Over time, you start to trust and like this store even
more because they're not just trying to sell you stuff – they're also giving you something valuable.)
d) Call Center : Definition, Need, Tasks Handled, Mode of Operation, Equipment , Strength & Weaknesses of Call Center, Customer Premises
Equipment (CPE).
Definition:
A call center is a centralized office or facility where trained agents handle incoming and outgoing phone calls from customers or clients. The main
purpose of a call center is to provide customer support, answer inquiries, resolve issues, and handle various types of communication.
Need:
Call centers are needed because they serve as a primary point of contact between a business and its customers. They help businesses manage high
volumes of incoming calls efficiently, provide timely assistance to customers, and maintain a positive brand image through excellent customer
service.
Tasks Handled:
Call center agents handle a wide range of tasks, including:
• Answering customer inquiries about products or services
• Providing technical support or troubleshooting assistance
• Processing orders or reservations
• Handling complaints or concerns
• Conducting surveys or market research
• Following up on customer issues or requests
Mode of Operation:
Call centers operate using various modes, such as inbound, outbound, or blended:
• Inbound: Agents receive incoming calls from customers seeking assistance or information.
• Outbound: Agents make outgoing calls to customers for purposes like sales, follow-ups, or surveys.
• Blended: Call centers handle both inbound and outbound calls, depending on the needs of the business.
Equipment:
Call centers require specific equipment to operate effectively, including:
• Phone systems (such as PBX or VoIP)
• Computers with customer relationship management (CRM) software
• Headsets for agents
• Call recording and monitoring systems
• Automated call distribution (ACD) systems
• Interactive voice response (IVR) systems
Supply Chain Management : E – logistics, Supply Chain Portal, Supply Chain Planning Tools (SCP Tools), Supply Chain Execution (SCE), SCE -
Framework, Internet’s effect on Supply Chain Power.
Supply chain management (SCM) is the art and science of managing the flow of goods and services from raw materials all the way to the end
customer. It's a complex process that involves a network of different players working together to get products where they need to be, when they
need to be there.
Core Functions:
1. Planning & Procurement(buying): This encompasses predicting demand, acquiring materials, and bargaining with suppliers to secure
favourable prices.
2. Production: This involves converting raw materials into finished products with optimal efficiency.
3. Inventory Management: This entails maintaining an optimal level of stock to prevent shortages or excess inventory.
4. Warehousing: This involves strategically storing products to facilitate efficient distribution.
5. Transportation & Logistics: This encompasses the movement of products from manufacturing facilities to warehouses and ultimately to
customers.
6. Distribution & Fulfillment: This entails delivering products to the final point of sale or directly to customers.
7. Returns Management: This involves efficiently handling customer returns for exchange or refund.
E – logistics:
E-logistics, short for electronic logistics, refers to the use of information technology (IT) and digital tools to manage and optimize various side of
logistics operations within the supply chain. It encompasses a range of activities, from purchasing and inventory management to transportation and
distribution, all conducted electronically.
E-logistics is like using computers, software, and the internet to make shipping and delivering goods easier and more efficient. It involves things like
tracking shipments online, using software to plan the best routes for delivery trucks, and automatically updating inventory levels in warehouses. By
digitizing and automating logistics processes, e-logistics helps businesses reduce costs, improve accuracy, and deliver goods to customers faster.
1. Communicate and Collaborate: Share information and collaborate with suppliers, manufacturers, distributors, and other partners involved in
the supply chain.
2. Manage Orders and Inventory: Place orders, track shipments, and monitor inventory levels in real-time to ensure smooth operations and
timely delivery of products.
3. Access Data and Analytics: Analyse data and generate reports on key supply chain metrics, such as order fulfillment rates, inventory turnover,
and transportation costs, to make informed decisions and optimize performance.
4. Streamline Processes: Automate routine tasks, such as order processing and invoicing, to reduce errors, save time, and improve efficiency.
5. Ensure Compliance and Traceability: Monitor compliance with regulations and standards, as well as track the origin and movement of
products throughout the supply chain to ensure quality control and traceability.
SCE - Framework:
A Supply Chain Execution (SCE) framework serves as a structured approach to manage and optimize the flow of goods, information, and finances
across the supply chain. Here's a basic framework:
1. Plan:
○ Demand Planning: Forecasting customer demand and aligning it with production and procurement plans.
○ Supply Planning: Assessing the availability of materials, capacity, and resources to fulfil demand.
○ Inventory Planning: Optimizing inventory levels to balance service levels and costs.
2. Source:
○ Supplier Management: Selecting, managing, and developing relationships with suppliers to ensure timely and quality supply of
materials.
○ Procurement: Acquiring goods and services at the best possible cost, considering quality, lead times, and supplier reliability.
3. Make:
○ Manufacturing: Converting raw materials into finished products efficiently while maintaining quality standards.
○ Production Scheduling: Creating schedules to optimize resource utilization, minimize lead times, and meet customer demand.
4. Deliver:
○ Warehouse Management: Managing the storage, handling, and movement of inventory within warehouses or distribution centers.
○ Transportation Management: Planning, optimizing, and executing the movement of goods from suppliers to customers.
○ Order Management: Processing customer orders, managing order fulfillment, and ensuring on-time delivery.
5. Return:
○ Reverse Logistics: Handling returns, repairs, recycling, or disposal of products, aiming to minimize costs and environmental impact.
6. Integration:
○ Information Systems Integration: Integrating various software systems (e.g., ERP, WMS, TMS) to enable seamless flow of information
across the supply chain.
○ Collaboration: Facilitating communication and collaboration among supply chain partners to improve visibility and responsiveness.
7. Measurement and Improvement:
○ Key Performance Indicators (KPIs): Establishing metrics to measure performance across the supply chain (e.g., fill rate, on-time delivery,
inventory turns).
○ Continuous Improvement: Analyzing performance data, identifying areas for improvement, and implementing corrective actions to
enhance efficiency and effectiveness.
8. E – Payment Mechanism: Payment through card system, E – Cheque, E – Cash, E – Payment Threats & Protections.
Electronic payment mechanisms, such as payment through card systems, e-cheques, e-cash, come with their own set of benefits and challenges.
E – Cheque:
An e-cheque, also known as an electronic check or digital check, is a modern alternative to the traditional paper check. It offers a similar function but
utilizes electronic means to transfer funds from the payer's checking account to the payee's account.
Here's a breakdown of e-cheques:
How it Works:
• Instead of a physical check, the payer provides their bank account details and payment information electronically. This can b e done through a
payment portal, accounting software, or even online banking platforms.
• The information is then transmitted securely through an Automated Clearing House (ACH) network.
• The ACH network verifies the account details and initiates the transfer of funds between the payer's and payee's banks.
• The payee receives the funds electronically into their checking account.
E – Cash:
E-cash is a form of electronic payment system where a certain amount of money is stored on a client device (like a PC or mobile device) and made
accessible for internet transactions. It's also known as (cyber-cash, digital cash, or e-money), and it utilizes e-cash software installed on the user's PC
or electronic devices. Both the customer and the merchant need to sign up with the bank issuing e-cash. In e-cash transactions, money is transferred
directly from the customer's desktop to the merchant's site. As a result, e-cash transactions usually require no remote authorization, no signature
validation, and no personal identification number (PIN) codes to confirm identities at the point of sale. It's similar to transmitting numbers from one
computer to another.
E-cash can be implemented in two ways: on-line and off-line. In online implementation, e-cash is stored by the bank or issuer, and the consumer
needs to request it when a consumer makes payment. In contrast, offline e-cash is kept by the consumer in a device such as a smart card or other
type of token.
The user first needs an e-cash software program and an e-cash bank account from which e-cash can be withdrawn or deposited. The user withdraws
the e-cash from the account onto his/her computer and spends it on the Internet without being traced or having personal information available to
other parties involved in the process. The recipients of the e-cash can then send the money to their bank account, similar to depositing "real" cash.
1. Consumer buys e-cash from bank
2. Bank sends e-cash bits to consumer (after charging that amount plus fee)
3. The consumer sends e-cash to the merchant.
4. The merchant checks with the bank that the e-cash is valid (checking for forgery or fraud).
5. The bank verifies that the e-cash is valid.
6. Parties complete the transaction: for example, the merchant presents the e-cash to the issuing bank for deposit once goods or services are
delivered.
Protecting Yourself:
○ Strong Passwords & Two-Factor Authentication: Use complex passwords for your online accounts and enable two-factor authentication
(2FA) whenever possible. 2FA adds an extra layer of security by requiring a code from your phone or email in addition to your password.
○ Be Wary of Emails and Calls: Don't click on links or attachments in suspicious emails or respond to unsolicited calls requesting your
financial information. Legitimate companies won't ask for sensitive information through these channels.
○ Secure Your Devices: Keep your operating system, apps, and antivirus software up to date. Avoid downloading apps from untrusted
sources.
○ Review Bank Statements Regularly: Monitor your bank and credit card statements for unauthorized transactions. Report any suspicious
activity immediately.
○ Use Secure Wi-Fi: Avoid making payments on public Wi-Fi if possible. If you must, consider using a VPN to encrypt your data.
E-Marketing:
This is the use of electronic channels to promote and sell products or services. It encompasses a wide range of strategies:
• Search Engine Marketing (SEM): Techniques to improve your website's ranking in search engine results pages (SERPs) to drive organic traffic.
• Social Media Marketing (SMM): Utilizing social media platforms like Facebook, Instagram, or Twitter to connect with potential customers and
promote your brand.
• Email Marketing: Sending targeted email campaigns to promote products, share news, or offer discounts.
• Content Marketing: Creating valuable content (blogs, articles, videos) to attract and engage potential customers.
• Pay-Per-Click (PPC) Advertising: Running targeted ads on search engines or social media platforms where you pay each time someone clicks
on your ad.
Tele-marketing.
This involves contacting potential customers by phone to generate leads, evaluate potential customers' interest, or directly sell products or services
• Outbound Calls: Outbound telemarketing involves agents proactively reaching out to potential customers or leads. These calls are initiated by
the company to promote products or services, generate sales, or conduct market research.
• Inbound Calls: Inbound telemarketing involves handling incoming calls from customers who are responding to marketing efforts or seeking
assistance. These calls may include inquiries about products, placing orders, or requesting customer support.
• Lead Generation: Lead generation is about finding people who might want to buy what you're selling. With lead generation telemarketing,
people called agents try to find these potential customers. They talk to individuals or businesses to learn about what they m ight need or want
to buy. They ask questions to see if these people could become actual customers.
• Sales Calls: Sales calls involve agents actively selling products or services to potential customers. These calls may follow up on leads g enerated
through marketing efforts, outbound prospecting, or inbound inquiries.
10. Electronic Data Interchange (EDI): Meaning, Benefits, Concepts, Application, EDI Model, Protocols (UN EDI FACT / GTDI, ANSI X –
12), Data Encryption (DES / RSA).
Meaning: Electronic Data Interchange (EDI) is like a digital language that allows different computer systems to talk to each other and exchange
information. Instead of using paper documents like invoices or purchase orders, EDI lets businesses send this information electronically, saving time
Concepts: At its core, EDI involves translating information from a company's internal format into a standard electronic format that can be
understood by other systems. This involves mapping data fields and defining rules for how information should be structured and transmitted.
EDI follows a set of rules (like a recipe) for sending and receiving data. This ensures everything is formatted correctly and includes all the necessary
information.
Similar to regional variations in languages, EDI has different protocols like UN/EDIFACT and ANSI ASC X12. These define the specific way data is
structured within EDI.
EDI takes data security seriously. Techniques like DES and RSA encryption scramble information before sending it, like locking it in a vault, to ensure
only authorized parties can access it.
EDI Model:
The basic process of EDI-based transactions is the same as their manual. The only difference that EDI makes is that its transactions are done
electronically, and data packets are formatted according to the standards of EDI. The following figure describes the basic process of the EDI model:
1st. In EDI model, firstly the sender must generate the application file using its business application system. This file contains the processed
documents. The document sent by the sender has to be translated into an agreed EDI standard format. The process of translatin g EDI
documents into EDI standard format is called mapping.
2nd. The translation software uses this mapping to translate the transaction of EDI so that it can easily understand y the receivi ng organization.
3rd. The document file is sent electronically either through a value-added network using EDI software, a web-based EDI tool, or outsourcing with
an EDI service provider.
4th. The trading partner receives the file. The receiver translates the file from the EDI standard format to a file usable by thei r Business Application
Software.
5th. An acknowledgement document is generated to the originating organization. (means that once the receiving organization receives the
electronic document sent by the sender (originating organization), they acknowledge receipt of the document by generating ano ther document
confirming its successful reception.)
ANSI X – 12:
EDI ANSI X12 provides a standardized format and guidelines for exchanging various business documents electronically, such as purchase orders,
invoices, and shipment notifications.
Just like with UN/EDIFACT, EDI ANSI X12 defines specific structures for different types of business documents.
Each document type is assigned a unique identifier, called a transaction set, which outlines the format and content of the message.
For example, an EDI ANSI X12 850 transaction set represents a purchase order, while an EDI ANSI X12 810 transaction set represents an invoice.
These transaction sets contain segments and data elements, which organize the information in a standardized way, making it easier to understand
and process. A transaction set carries the same information as the printed version of the document, but it's a condensed version, focusing only on
what's necessary.
DES: DES ( Data Encryption Standard ) Algorithm Part -1 Explained in Hindi l Network Security (4 parts)
DES is an implementation of a Feistel Cipher. It uses 16 round Feistel structure. The block size is 64-bit. Though, key length is 64-bit, DES has an
effective key length of 56 bits, since 8 of the 64 bits of the key are not used by the encryption algorithm (function as check bits only). General
Structure of DES is depicted in the following illustration −
The initial and final permutations are straight Permutation boxes (P-boxes) that are inverses of each other.
• Round Function The heart of this cipher is the DES function, f. The DES function applies a 48-bit key to the rightmost 32 bits to produce a 32-
bit output.
• There are a total of eight S-box tables. The output of all eight s-boxes is then combined in to 32 bit section.
• Straight Permutation − The 32 bit output of S-boxes is then subjected to the straight permutation with rule.
RSA: RSA Algorithm Part-1 Explained With Solved Example in Hindi (3 Parts)
RSA Encryption Algorithm: RSA is the most common public-key algorithm, named after its inventors Rivest, Shamir, and Adelman (RSA).
This example shows how we can encrypt plaintext 9 using the RSA public-key encryption algorithm. This example uses
prime numbers 7 and 11 to generate the public and private keys.
Explanation:
Step 1: Select two large prime numbers, p, and q.
p=7
q = 11
Step 2: Multiply these numbers to find n = p x q, where n is called the modulus for encryption and decryption.
First, we calculate
n=pxq
n = 7 x 11
n = 77
Step 3: Choose a number e less that n, such that n is relatively prime to (p - 1) x (q -1). It means that e and (p - 1) x (q -
1) have no common factor except 1. Choose "e" such that 1<e < φ (n), e is prime to φ (n), gcd (e, d (n)) =1.
Second, we calculate
AD
11. Risk of E – Commerce: Overview, Security for E – Commerce, Security Standards, Firewall, Cryptography, Key Management, Password
Systems, Digital certificates, Digital signatures.
Overview:
1. Security Breaches: Hackers love targeting online stores, trying to steal customer data. It's a big deal because it can harm your reputation and
land you in trouble. Nearly a third of all successful hacks happen on e-commerce sites. To stay safe, enhance your security with SSL
certificates, pick a secure platform, and keep a close watch for anything fishy.
2. Refunds and Disputes: Sometimes, customers ask for their money back or argue about their purchases. Chargebacks are like a double
whammy – you lose the sale and have to pay extra fees. Make sure your refund rules are crystal clear and deal with arguments gently to keep
customers smiling.
3. Intellectual Property Issues: Copying stuff from others, whether it's images or text, can land you in trouble. Always create your own content
or use properly licensed material to avoid legal trouble.
4. Low SEO Ranking: If people can't find your store on Google, you're in trouble. Invest in understanding how to boost your search engine
ranking to get noticed by potential customers.
5. DDOS Attacks: These attacks overload your website with fake traffic, causing it to crash. Have a plan to protect against them, like monitor ing
your traffic or using cloud services.
6. Stolen Credit Card Info: This is a big one. If thieves get their hands on customer credit card info, it's bad news for everyone. Follow strict
security standards to keep this from happening.
7. Poor Customer Service: Treat your customers right, or they'll take their business elsewhere. Invest in quality service to keep them happy and
coming back for more.
8. Inadequate Authentication: Simple passwords aren't enough anymore. Enhance your security with multi-factor authentication to keep the
bad guys out.
9. Currency Exchange Risks: If you're selling globally, currency rates can mess with your profits. Try to stick to one currency or use payment
platforms that handle conversions for you.
10. Customer Expectations: If your site doesn't match up to what customers expect, they'll go somewhere else. Keep up with the latest trends
and make sure your site is easy to use and looks good.
Security Standards:
Security standards play a crucial role in mitigating risks associated with e-commerce. Here are some key security standards commonly applied in the
industry:
1. Payment Card Industry Data Security Standard (PCI DSS): PCI DSS is a set of security standards designed to ensure that companies that
accept, process, store, or transmit credit card information maintain a secure environment. It includes requirements for netwo rk security, data
encryption, access control, and regular monitoring.
2. Transport Layer Security (TLS): TLS is a cryptographic protocol that ensures secure communication over a computer network. It encrypts data
transmitted between a user's browser and the e-commerce server, safeguarding sensitive information such as credit card details, passwords,
and personal data.
3. Secure Sockets Layer (SSL): SSL is a predecessor of TLS and provides a secure connection between web servers and browsers. While TLS has
largely replaced SSL due to security vulnerabilities, SSL is still referenced in the context of older systems and protocols.
4. ISO/IEC 27001: ISO/IEC 27001 is an internationally recognized standard for information security management systems (ISMS). It provides a
systematic approach to managing sensitive company information, ensuring its confidentiality, integrity, and availability.
5. ISO/IEC 27002: ISO/IEC 27002 provides guidelines and best practices for implementing security controls based on the requirements outlined in
ISO/IEC 27001. It covers various aspects of information security, including organizational security, access control, cryptography, and incident
management.
Firewall:
Firewalls act as a barrier between a trusted internal network and untrusted external networks (like the internet). They monitor and control incoming
and outgoing network traffic based on predetermined security rules. Risks such as unauthorized access, malware attacks, and data breaches can be
mitigated by properly configuring and maintaining firewalls. They can prevent unauthorized access to sensitive data stored on e-commerce servers
and protect against various types of cyber threats.
Cryptography:
Cryptography involves securing communication and data by converting it into a format that is unreadable without the proper decryption key. It
helps ensure confidentiality, integrity, and authenticity of data transmitted over the internet. Risks such as eavesdropping, data tampering, and
identity theft can be mitigated through the use of cryptographic techniques like encryption, digital signatures, and hashing algorithms.
Key Management:
Key management refers to the process of generating, storing, distributing, and revoking cryptographic keys used in encryption systems. It's a crucial
aspect of maintaining the security of sensitive data and communications. Effective key management ensures that only authorized users can access
encrypted data and that the encryption keys are protected from unauthorized access or tampering.
Password Systems:
• Weak Passwords: Users may choose weak passwords that are easy to guess or crack, such as "password123" or common words.
• Password Reuse: Users often reuse passwords across multiple accounts, increasing the risk of a security breach if one account is
compromised.
• Phishing Attacks: Attackers may use phishing emails or fake websites to trick users into revealing their passwords.
• Brute Force Attacks: Hackers can attempt to guess passwords by systematically trying different combinations until they find the correct one.
• Credential Stuffing: Attackers use stolen username/password combinations from one service to gain unauthorized access to other services
where users have reused the same credentials.
Digital certificates:
A digital certificate, also known as a public key certificate or identity certificate, is essentially an electronic document that verifies the online identity
Imagine you're shopping online. A digital certificate helps ensure you're on the legitimate website of the store you intended to visit, not a fake one
designed to steal your information.
• Public Key Infrastructure (PKI): Digital certificates rely on a system called Public Key Infrastructure (PKI). PKI involves a trusted third -party
called a Certificate Authority (CA) that issues and verifies certificates.
• The Contents: A digital certificate contains several key pieces of information:
○ The identity of the entity the certificate belongs to (e.g., website name, organization name)
○ The entity's public key (used for encryption)
○ The issuing CA's information and digital signature
○ Validity period (certificates have expiration dates)
• The Process: When you visit a website secured with a digital certificate (usually indicated by a lock icon in your browser bar), your brow ser
checks the certificate's validity with the issuing CA. If everything checks out, the browser establishes a secure encrypted c onnection with the
website. This ensures that the data you send and receive is confidential and hasn't been tampered with.
Digital certificates play a crucial role in securing online transactions and communication. They help ensure:
• Authentication: You're interacting with the genuine entity you intend to (website, server, etc.).
• Data Encryption: Information exchanged is scrambled and can only be decrypted by the authorized recipient.
• Data Integrity: You can be confident the data hasn't been altered during transmission.
Digital signatures:
1. Cryptographic Magic: Digital signatures rely on the principles of cryptography, which involves scrambling and unscrambling data using keys.
There are two main keys involved:
○ Private Key: This is a confidential key kept securely by the signer. It's akin to a secret password used for creating the signature.
○ Public Key: Unlike the private key, the public key is shared openly and can be distributed to anyone who needs to verify the signature.
It's used to authenticate the signature.
2. The Signing Process: When you digitally sign a document or message:
○ First, a cryptographic hash function is applied to the content of the document. This function generates a unique, fixed-length string of
characters, called a hash or digest. The hash is essentially a digital fingerprint of the document's content.
○ Next, this hash is encrypted using your private key. The result is your digital signature.
3. Verification: Now, let's say someone receives the digitally signed document and wants to verify its authenticity:
○ They obtain your public key, which is openly available.
○ Using this public key, they decrypt the digital signature, revealing the original hash.
○ Then, they independently compute the hash of the received document using the same cryptographic hash function.
○ If the hash they compute matches the decrypted hash from the digital signature, it means the document hasn't been tampered with
since it was signed, and it indeed originated from the owner of the private key. In other words, the signature is valid, and the document
is considered authentic.
12. Enterprise Resource Planning (ERP) : Features, capabilities and Overview of Commercial Software, re-engineering work
processes for IT applications, Business Process Redesign, Knowledge engineering and data warehouse . Business Modules: Finance,
Manufacturing (Production), Human Resources, Plant Maintenance, Materials Management, Quality Management, Sales &
Distribution ERP Package, ERP Market: ERP Market Place, SAP AG, PeopleSoft, BAAN, JD Edwards, Oracle Corporation ERP-Present
and Future: Enterprise Application Integration (EAI), ERP and E-Commerce, ERP and Internet, Future Directions in ERP
Enterprise Resource Planning (ERP) systems are like a bundle of helpful tools for businesses. They're like a superhero team for your company's tasks,
all working together to make things run smoothly.
Imagine having all your important information in one place, instead of scattered everywhere. That's what ERP systems do—they gather up data from
different parts of your business and put it all in one central spot. This makes it easier to see what's going on and helps you save time and money by
getting rid of repetitive tasks.
In today's fast-paced world, it's crucial for companies to be quick on their feet and run efficiently. That's where ERP systems come in handy,
especially for manufacturing companies. They help you stay nimble and keep your business healthy.
Features:
Some key features that ERP systems offer:
• Integration: This means bringing together all your business processes and data into one system, so everything works together seamlessly.
• Automation: ERP systems automate repetitive tasks, so you can focus on more important things.
• Data Analysis: ERP systems provide businesses with a wealth of data that can be used to identify trends, make better decisions, and improve
overall performance.
• Tracking and Visibility: ERP systems let you see what's happening in your business in real-time, so you're always in the know.
• Reporting: They generate reports that give you insights into how your business is doing and where you can improve.
• Accounting: ERP systems manage your finances, so you can keep track of your money and make sure everything adds up.
• Supply Chain Management: They help you keep track of your inventory and make sure everything gets where it needs to go.
• Human Resource Management: ERP systems help you manage your employees, from hiring to payroll to performance reviews.
• Customer Relationship Management: They help you keep track of your customers and make sure they're happy with your products or
• Data Warehousing: Data warehousing involves the process of collecting, storing, and organizing large volumes of data from multiple sources
within an organization. This centralized repository, known as a data warehouse, provides a unified view of data for analysis and reporting
purposes.
Business Modules:-
Finance:
Manufacturing (Production):
The Manufacturing or Production module in an ERP system is designed to streamline and optimize the production process. It covers various aspects
of manufacturing operations, from planning and scheduling to execution and quality control.
• Bill of Materials (BOM): The BOM is a comprehensive list of all components, parts, and raw materials required to manufacture a product.
• Routing and Work Centers: Defines production steps and locations.
• Work Orders Management: Work orders are instructions that detail the tasks, resources, and timelines required to produce a specific quantity
of a product.
• Capacity Planning and Scheduling: This feature helps in optimizing production schedules by considering available resources (machinery, labor,
etc.) and capacity constraints.
• Shop Floor Control: Shop floor control enables real-time monitoring and management of production activities on the shop floor.
• Quality Control and Inspection: Quality control processes are integrated into the manufacturing module to ensure that products meet
specified quality standards.
• Inventory Management: Inventory management functionalities within the production module track raw materials, work -in-progress (WIP),
and finished goods inventory. It helps in optimizing inventory levels, reducing carrying costs, and minimizing stockouts.
• Material Requirements Planning (MRP): MRP calculates material requirements based on production schedules, BOMs, and inventory levels.
• Production Costing and Analysis: This feature calculates the cost of manufacturing products, including direct labor, materials, and overhead
costs.
• Integration with Other Modules: Coordinates with other ERP functions.
Human Resources:
Human Resources (HR) is a critical function within any organization, focusing on the management of people.
1. Personal Management
Maintain comprehensive records of employees' personal information, including contact details, emergency contacts, and personal identification
documents. Track details of employees' work history within the organization, including roles, departments, start dates, end dates, and reasons for
leaving (if applicable). Ensure that employee records and personal data handling comply with relevant laws and regulations, such as GDPR, HIPAA,
etc.
2. Organization Management
See and organize the company structure, including departments, teams, and who reports to whom. Create and manage job roles and positions in
the company. Keep track of open jobs, job descriptions, and responsibilities. Predict how many staff members are needed based on the company's
goals and market trends. This includes planning for future leaders and identifying any skill gaps. Help the company smoothly handle big changes like
Changing the company's structure, such as reorganizing departments or roles, Combining with another company to form a new, or Buying another
company to expand the business. Ensure good communication and smooth transitions during these changes.
3. Payroll Management
Automate the calculation and distribution of employee salaries, including regular pay, bonuses, and incentives. Manage various deductions (taxes,
social security, health insurance) and contributions (retirement plans, savings schemes). Ensure payroll processes comply with local and
international labor laws and regulations. Facilitate timely disbursement of salaries through direct deposit, checks, or other payment methods.
4. Time Management
Monitor and record employee attendance, including clock-in/clock-out times, breaks, and leave taken. Manage various types of leave (annual leave,
sick leave, maternity/paternity leave) and handle leave requests and approvals. Track and approve overtime hours worked by employees. Ensure
compliance with labor laws regarding overtime pay. Create and manage work schedules and shifts.
5. Personal Development
Develop and manage training programs to enhance employees' skills. Include on-the-job training, workshops, and e-learning modules.
Conduct regular performance reviews to assess employee performance. Assist employees in planning their career paths within the organization.
Identify skill gaps and provide targeted training to address these gaps. Pair employees with mentors who can guide and advise them.
Plant Maintenance:
The Plant Maintenance module in ERP software helps manage all maintenance activities for machines and equipment within a company.
1. Integrated Solution
The Plant Maintenance module is part of a larger ERP system that supports the entire organization. It helps manage all maintenance activities for
machines and equipment, ensuring smooth operations across the company.
2. Flexible System Structure
The module allows you to organize technical systems in various ways. This flexibility makes it easy to navigate and manage maintenance tasks.
3. Documentation
All planning, processing, and history of maintenance tasks are recorded in the system. This ensures that there is a complete and accurate record of
all maintenance activities.
4. Historical Database
The system saves all past maintenance tasks like inspections, servicing, and repairs. If a machine breaks down frequently, you can look at the repair
history to identify patterns and address the root cause.
5. Analysis and Reporting
The system provides various reports and analysis options to evaluate maintenance data. You can generate a report to see which machines require
the most maintenance and why. If the data shows a certain part fails often, you can replace it before it causes a machine to stop working.
Materials Management:
Quality Management:
The Quality Management (QM) module within an ERP system acts as a central hub for ensuring consistent product quality throughout your
manufacturing or production processes.
• Quality Planning:
These are like detailed guides that say when and how to check stuff during the making process. They also set the standards fo r what's
considered good quality for materials. We use special tools, like control charts and stats, to watch how things are going. Th is helps us catch
any problems early.
• Quality Control (QC):
Instead of checking things by hand, we use machines to help us. They collect data from inspections and tests. We don't wait u ntil the end to
see if things are good. We watch during the process to spot any issues early. If we find something wrong, we don't just ignor e it. We figure out
why it happened and make sure it doesn't happen again. This keeps our products top-notch!
The goal of such a package is to integrate and streamline the entire sales process, from receiving orders to delivering products or services to
customers, while also providing tools for analyzing sales performance, managing customer relationships, and optimizing inventory levels. This helps
businesses improve efficiency, reduce costs, and enhance customer satisfaction by ensuring accurate and timely order fulfillment.
ERP Market:-
The ERP market is a dynamic arena where businesses seek software solutions to streamline their operations and enhance efficiency.
Here's a closer look at some significant players in this market:
1. ERP Market Place: This is where companies go to find the right software for their needs. It's like a big shopping area where
businesses can explore different options, talk to experts, and choose the best ERP solution for them.
2. SAP AG: SAP AG, commonly known as SAP, SAP is one of the biggest names in the ERP market. They make software that helps
businesses with lots of things like managing money, keeping track of employees, handling orders, and more. Their software is used
by companies all over the world, no matter how big or small.
3. PeopleSoft: PeopleSoft, now owned by Oracle Corporation, provides ERP solutions primarily focused on human capital
management (HCM), financial management, and supply chain management. Their software is known for its robust features
tailored for large enterprises.
4. BAAN: Baan, now part of Infor, specializes in ERP solutions for manufacturing companies. Baan's ERP software offers
functionalities for managing production processes, supply chain operations, distribution, and financials, catering specifical ly to the
needs of manufacturing industries.
5. JD Edwards: JD Edwards, also owned by Oracle Corporation, offers ERP solutions targeted at industries like manufacturing,
distribution, and asset-intensive sectors. Their software encompasses modules for financial management, supply chain
management, manufacturing, and project management, among others.