0% found this document useful (0 votes)
19 views18 pages

Unit - 3 Notes E-Commerce

The document provides an overview of mobile commerce (m-commerce), detailing its definition, workings, types, advantages, disadvantages, challenges, and future trends. It highlights the significance of mobile devices in facilitating commerce and discusses the various technologies that support m-commerce, including SMS, USSD, and mobile web. Additionally, it compares m-commerce with traditional e-commerce and emphasizes the importance of security and user experience in mobile transactions.

Uploaded by

Nithyashree M
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
19 views18 pages

Unit - 3 Notes E-Commerce

The document provides an overview of mobile commerce (m-commerce), detailing its definition, workings, types, advantages, disadvantages, challenges, and future trends. It highlights the significance of mobile devices in facilitating commerce and discusses the various technologies that support m-commerce, including SMS, USSD, and mobile web. Additionally, it compares m-commerce with traditional e-commerce and emphasizes the importance of security and user experience in mobile transactions.

Uploaded by

Nithyashree M
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 18
JYOTHY INSTITUTE OF COMMERCE & MANAGEMENT #40/5, THATHAGUNI, OFF KANAKAPURA ROAD, BENGALURU - 560082 E-mail : [email protected] Website : www, ivothyicm,ora : THE GEOMETRY OF VIRTUAL WORLDS & THE PHYSIOLOGY OF HUMAN VISION > mobile commerce(m-commerce): meaning, how does it work, types, advantages, disadvantages, challenges, future trends, technologies, e-commerce v/s m-commerce, cellular network: meaning, uses, advantages, disadvantages, security issues. v v wireless spectrum wireless technology: types, advantages, disadvantages, different generations, portals in e-business: meaning, types, benefits vvyv human resources information system (HRIS): meaning, function/ benefits, types/modules. JYOTHY INSTITUTE OF COMMERCE & MANAGEMENT 5, #40/5, THATHAGUNI, OFF KANAKAPURA ROAD, BENGALURU - 560082 E-mail : [email protected] Website : www.iyothyicm.ora UNIT-3 THE GEOMETRY OF VIRTUAL WORLDS & THE PHYSIOLOGY OF HUMAN VISION MEANING OF MOBILE COMMERCE(M-COMMERCE} 1, COMMERCE > M-commerce (mobile commerce) is the buying and selling of goods and services through wireless handheld devices such as smartphones and tablets. M-commerce is a form of e-commerce that ‘enables users to access online shopping platforms without the use of a desktop computer. > Over time, content delivery through wireless devices has become faster, more secure and scalable. As a result, mobile commerce has grown rapidly. > Examples of m-commerce include in-app purchasing; mobile banking virtual marketplace apps, such as the Amazon mobile app; and digital wallets, such as Apple Pay, Google Pay and Samsung Wallet. Examples of m-commerce us specific industries include the following: + Financial services. Mobile banking and brokerage transactions are done from mobile devices. + Telecommunications. Handheld devices are used to make service changes and bill payments, and to do account reviews, * Service and retail. Consumers place and pay for orders on-the-fly through ontine stores. + Information services. Financial, sports, traffic, weather and many other news updates are accessed through mobile devices. HOW DOES MOBILE COMMERCE WORK? Besides banking operations, there are two users of m-commerce: the merchant and the customer. It’s important to know the perspective of both before making your business mobile-friendly. 1.Customer perspective. As people always carry their mobile devices with them, the m-optimized websites and apps enable a customer to shop on the go whenever and wherever. They have the convenience of reviewing the product and ordering it fast, as well as browse to compare offers from various retailers. In fact, some apps even aggregate the available products in lists for the users to spend less time on purchasing. ‘That helps with product discoverability, speeds up customer conversion, and enhances the overall buying experience, 2. Merchant perspective. The basic form of m-commerce is based on the peer-to-peer (P2P) model: the payments are arranged between the two sides without any intermediary. In this case, the merchant can add a direct payment option and let the customers pay in the app using the most convenient method. Depending on JYOTHY INSTITUTE OF COMMERCE & MANAGEMENT || #40/5, THATHAGUNI, OFF KANAKAPURA ROAD, BENGALURU ~ 560082 E-mail : [email protected] Website : www,jyothyicm,orq the nature of business and the geography, there might be third parties that participate in the transactions, which will entail modifying the payment procedures and systems. bend ro eae AUTOMATED mCOMMERCE slipping label WORK FLOW ea tecisedin eee Wee in Dpctceniew ae os ot, ro “Bayer SHIPPING m "a eis, rooucr aecewen —— “e y= eee Sner = ee a = S, Teasaction animation ‘Stipig and tacking formation, TYPES OF M-COMMERCE: 1. Mobile Shopping: The mobile device plays an important role in the success of mobile shopping. But what a customer expects today is an Omni channel experience, they want their brands to be available on their preferred channel. For instance, if'a customer scans a QR code in a retail store they ean do the shopping on Viber Chatbots and continue their shopping, 2.Mobile Banking: Mobile banking is also popularly known as “Net Banking” which is like online banking Financial institutes especially banks use both SMS, apps, and Chatbots to send out alerts and account activities. With the help of the WhatsApp Chatbots, customers can view their account balance, bank statement, fund transfer, review loans, and many other transactions by just communicating via WhatsApp in real-time. 3. Mobile Payments: Mobile payment is an alternative to the traditional channels of payments such as cash, cheque, credit/debit cards which are also known as Mobile Money Transfer, mobile money, or m-payments. Due to physical distancing, customers prefer to use contactless payments, and that is where mobile payments come in handy. ADVANTAGES OF MOBILE COMMERCI M-commer: 1. Large customer bas provides for a larger customer base and better retention than e- commerce in general, because m-commerce capabilities are more widely and easily accessible. Also, mobile analytics offers insights into customer shopping behaviour, pattern and history. To boost retention rates, ‘businesses can use this data to target shoppers with personalized offers and tailor-made discounts. 2.Convenience: M-commerce makes it easier for customers to compare prices, read reviews and make purchases when and where they want to do these things. 3.Product variety: Customers can browse through a huge inventory of products while also taking advantage of the competitive pricing. 4. Automation: M-commerce automates a business's point of customer contact and sales with a variety of mobile contactless payment options, such as Apple Pay, PayPal One Touch and Visa Checkout. Many e- commerce sites also offer one-click checkout process functionality, which enables users to add payment information only once and then use the one-click option for every purchase made thereafter. M-commeri 5.Omni channel experient creates an Omni channel experience where products can be sold via multiple channels -- e-commerce websites, Amazon, eBay, Instagram. This approach makes it e customers to buy whenever and wherever they want. er for DISADVANTAGES OF M-COMMERCE: 1.Smartphone limitations: No matter how active channel it is but without a smartphone, nothing that ean be done, ie, user cannot make a purchase if he/she doesn’t have a mobile phone with them at the time of need of buying any product. 2. Need reliable shipment companies: The Companies selling their products gets dependent on other shipment companies for delivery of their products to the end consumer safely. 3. Issue of security: Customers are affaid of using their cards for online shopping because of the threat of losing their sum in the account due to any mishappening. 4.Payment faults: 7 ordered products are not delivered to the consumer, it may be intentionally or unintentionally. are chances that the amount will get deducted from the bank account but the S.Quality Check: Quality of the products cannot be ascertained by seeing them on an online platform, there are huge chances that the quality you want may differ from the quality you received. 6.Hacking issues: In the world of increasing technology the chances of data hacking also increase, the account details of user can also be hacked which may get him to the huge loss also MOBILE COMMERCE CHALLENGE! Designing digital interfaces for mobile devices means accounting for their inferior computing power and signal variability, Because of these challenges, mobile commerce may not always be the best option. 1.Security and privacy concerns: Mobile devices introduce a host of security concerns that don’t apply to desktop computers. For instance, users may connect to unsecured public Wi-Fi networks on their smartphones, exposing their data to possible interception. Mobile devices are also susceptible to loss or theft, thus exposing the owner's personal data, > Here’s how to secure your customer’s personal data on mobile devies vv * Strong authentication: Encourage users to create unique passwords and enable multi- factor authentication. Enable them to sign out remotely in case their device is stolen. ‘Encryption: Ensure sensitive payment information is encrypted during transmission and storage. * App permissions: Avoid requesting unnec ry permissions, such as location tracking, unless they are integral to the app’s function. Disable these permissions when the app is not in use. * Security updates: Regularly patching a mobile app or website prevents eyber attackers from exploiting unknown vulnerabilities. 2. Ensuring speed and performance: > Apps and websites are more likely to crash on mobile devices for reasons outside of your control Mobile devices have less processing power, memory, and storage than desktop computers, leading to slower rendering of complex web pages. > High-resolution images and rich media content showcase products in their best light. However, these assets can prolong page load times on mobile devices. Apps that rely on location data, such as ridesharing apps, can introduce additional delays if GPS signals are weak. 3. Navigating app store regulations: > App developers must adhere to guidelines set by the Apple App Store and Google Play Store to get their app approved and maintain a presence on the platform. > Flouting these regulations can result in app rejection, removal, or other penalties. + App store guidelines: Each platform has rules regarding content, functionality, design, and user experience. * User privacy and data collection: Clearly communicate how user data will be collected, used, and protected. Comply with relevant data protection regulations, ‘+ In-app purchases: App stores have guidelines regarding payment processing, subscription models, and price transparency. + User experience: Avoid excessive ads, pop-ups, and intrusive notifications that could lead to negative reviews. ‘* Age ratings: If your app is age-restricted, ensure you correctly set age ratings and implement content restrictions. + App store metadata: Provide accurate app descriptions, titles, and keywords. FUTURE ENDS OF MOBILE COMMERCE: Mobile commerce is evolving and starting to reach a wider audience. According to Insider Intelligence, 6.9% of retail transactions will take place through a mobile device in 2022 and m-commerce will account for 10.4% of all retal sales by 2025. Many businesses are adopting mobile commerce to avoid falling behind the competitors. With mobile commerce on the rise, mobile apps are a necessity for businesses looking to build a loyal customer base. Read on to explore the various benefits of investing in a mobile business app. ‘The following are some of the current and future mobile commerce trends: 1.Mobile retargeting: This concept is an extension of location-based mobile marketing. Instead of putting ads at random places, this trend targets them contextually only at potential customers. For example, marketers can send an ad to users who have previously visited their mobile app or they might present an active mobile targeted ad to a user who comes into proximity of their store. Mobile retargeting offers a better return on investment compared with other advertisement strategies and is likely to become more popular in the future, 2.Augmented reality (AR): The number of mobile applications with embedded AR is growing rapidly. To improve its brand presence and provide digital content optimization, retail giant Ikea introduced an AR mobile application in 2017 that lets shoppers test products in real time through Apple iOS 11's ARKit technology. Customers use AR models of IKEA furniture from the mobile app to see how those pieces fit in their home and office spaces. Many brands, including Coca-Cola, Zara, cover gitl and Per, also use embedded AR in their mobile apps. 3.Mobile SEO: With the growing number of smartphone users accessing the internet, mobile responsive websites have become a necessity. Websites that are not mobile-friendly or do not provide a good user experience risk user abandonment, which in turn increases the bounce rate of their websites. Websites with higher bounce rates rank lower in SEO and Google searches. Therefore, building mobile websites that are adaptive to handheld devices is an important goal for all businesses, 4.Mobile banking: The biggest advantage of mobile banking is the ability to send money anywhere, anytime, Users can send money to others and conduct transactions with their bank irrespective of their location. This trend is likely to keep growing. According to Business Insider, as of 2021, there are an estimated 169.3 million mobile banking users in the United States, of whom nearly 80% said that mobile banking was their preferred way to access their accounts. 8.AI, Chatbots and shopping assistants: Powered by AI, Chatbots are becoming essential e tools. They help shoppers around the clock with product recommendations, purchase completion, customer support and other tasks. According to a Grand View Research report, the global Al Chatbots market is expected to reach $3.99 billion by 2030. Shoppers are becoming more comfortable with Chatbots as they have become accustomed to chatting with their friends and family over chat apps, such as WhatsApp, Facebook Messenger and Telegram. 6.Mobile ticketing: Gone are the days when users had to wait in long lines to buy movie or concert tickets. With mobile ticketing, users can buy and receive tickets through their smartphones. Mobile ticketing also eliminates the need to print the tickets as users receive them on their phones in a text format with a barcode that gets scanned at events. ‘TECHNOLOGIES FOR MOBILE COMMERCE: 1.SMS: SMS, or text messaging, is familiar to everyone. It is the oldest mobile commerce technology, supporting two-way interactive messaging, It is so easy to use that anyone can access it no matter what type of mobile device they are using. Text messages are capable of transmitting push notifications, which are ‘one-way alerts that can include news, special offers, and other information from content providers to subscribers. This feature has made SMS a valuable tool for businesses to disseminate timely information and promotions to a broad audience. 2.USSD: USSD differs from SMS in that it establishes a real-time connection, enabling session-based communications. This feature makes it akin to the mobile equivalent of Interactive Voice Response (IVR) systems used in customer service but without the voice component. Like SMS, USSD can transmit push notifications, respond to user queries (like checking the balance of a prepaid mobile account), and facilitate account top-ups, One of USSD’s key advantages is its wide accessibility, as it can be used on almost any mobile phone and is relatively straightforward to operate. Moreover, it enhances security by allowing the integration of password or mobile PIN protection. 3.WAP/Mobile Web: The first mobile commerce technology, WAP (Wireless Application Protocol), played a crucial role in the early stages of mobile web access. WAP 2.0, which became widely available on feature phones around 2004, marked a significant advancement in mobile web technology. It utilized XHTML, a variation of HTML, to deliver a mobile web experience. With the advent of smartphones, particularly following the launch of the iPhone, most of these devices supported browsers capable of handling HTML, broadening the scope and capabilities of mobile internet access. WAP 2.0 offered an experience much closer to what users were familiar with on desktops and laptops, although it was not identical. 4.8K: STK stands for SIM Toolkit, which is used by appearing in the menus of mobile devices as a permanent application through being stored on the Subscriber Identity Module (SIM) card. This mobile commerce technology uses the SIM to receive requests from the application and then sends the information to give commands to the mobile device. One of the key advantages of STK is its robust security. By offering identity verification and encryption, STK applications provide a level of security comparable to having a dedicated terminal DIFFERENCE BETWEEN E-COMMERCE AND M-COMMERC Feature Device Usage User Experience Connectivity Location-based Services Payment Options Screen Size Portability App Integration eCommerce Primarily desktops and laptops Access websites via web browsers Relies on internet connection, typically Wi-Fi Limited location-based functionality ‘Traditional online payment metnods, Larger screens. easier navigation Less portable, requires @ fxed location May integrate with some desktop applications, mCommerce Primarily smartphones and tablets Dedicated mobile apps or mobil optimized websites Utiizes mobile networks in addition towr-Fi Utiizes goofencing. push notineations, and ther loeation- based features Includes mobile wallets and contactless payments ‘Smaller screens, optimized for toueh input Highly portable, enables on-the-go shopping Integrates with various mobile apps ‘and services MEANING OF CELLULAR NETWORK: > A Cellular network or Mobile network is a radio network distributed over land areas called cells, each served by at least one fixed-location transceiver, known as a cell site or base station, Ina cellular network, each cell uses a different set of frequencies from neigh boring cells, to avoid interference and provide guaranteed bandwidth within each cell > A stationary trans er, Known as a cell site or base station, provides service in each cell. The cell site links to the primary network infrastructure, employing either a wireless or wired connection. Cellular network examples: + Smartphone communications: Cellular networks are fundamental to the operation of mobile phones for voice calls, text messaging, and internet connectivity. + Io devices: Internet of Things devices often use cellular networks for remote monitoring and control USING CELLULAR NETWORK: > Ensure you are using a secure connection when transmitting sensitive data over a cellular network, A VPN can help with this, Be aware of your data usage, as many cellular service providers implement data caps. When joined together these cells provide radio coverage over a wide geographic area This enables a large number of portable transceivers (e.g., mobile phones, pagers, etc.) to vv communicate with cach other and with fixed transceivers and telephones anywhere in the network, via base stations. PROS/ADVANTAGES OF CELLULAR NETWORK: 1.Universal coverage: Cellular networks cover a vast geographical area, reaching even remote locations. 2.Mobility: They provide seamles: service during transit, allowing mobile devices to move through different cells without losing conne CONS/DISADVANTAGES OG CELLULAR NETWORK; 1.Bandwidth limitation: Cellular networks can struggle to provide reliable service in densely populated areas or during peak usage times. 2.Dependence on infrastructure: Cellular service can be disrupted due to damage to physical infrastructure, such as cell towers. ‘NOTE: VPN stands for "Virtual Private Network" and describes the opportunity to establish a protected network connection when using public networks. VPNs enerypt your internet traffic and disguise your online identity. This makes it more difficult for third parties to track your activities online and steal data, LULAR NETWORKS: 1.Authentication: Cellular networks have a large number of subscribers, and each has to be authenticated to censure the right people are using the network. Since the purpose of 3G is to enable people to communicate from anywhere in the world, the issue of cross region and cross provider authentication becomes an issue. 2.Integrity: With services such as SMS, chat and file transfer it is important that the data arrives without any modifications. 3.Confidentiality: With the increased use of cellular phones in sensitive communication, there is a need for a secure channel in order to transmit information, 4. Access Control: The Cellular device may have files that need to have restricted access to them. The device might access a database where some sort of role based access control is necessary. 5. Operating Systems in Mobile Devices: Cellular Phones have evolved fiom low processing power, ad-hoc supervisors to high power processors and full-fledged operating systems. Some phones may use a Java Based system, others use Microsoft Windows CE and have the same capabilities as a desktop computer. Issues may arise in the OS which might open security holes that can be exploited. 6.Web Services: A Web Service is a component that provides functionality accessible through the web using the standard HTTP Protocol. This opens the cellular device to variety of security issues such as viruses, buffer overflows, denial of service attacks etc. 7.Location Detection: The actual location of a cellular device needs to be kept hidden for reasons of privacy of the user. With the move to IP based networks, the issue arises that a user may be associated with an access point and therefore their location might be compromised. 8. Viruses and Malware: With increased functionality provided in cellular systems, problems prevalent in larger systems such as viruses and malware arise. The first virus that appeared on cellular devices was Liberty. An affected device can also be used to attack the cellular network infrastructure by becoming part ofa large scale denial of service attack 9.Downloaded Contents: Spyware or Adware might be downloaded causing security issues. Another problem is that of digital rights management, Users might download unauthorized copies of music, videos, wallpapers and games. 10. Device Security: Ifa device is lost or stolen, it needs to be protected from unauthorized use so that potential sensitive information such as emails, documents, phone numbers ete. cannot be accessed, WIRE SPI TRU > Wireless spectrum is the radio frequencies that wireless signals use to travel over. It's part of the electromagnetic (EM) spectrum, which also includes other frequencies that people interact with daily. The EM spectrum is divided into sections called frequency bands, cach with different characteristics and essential for different types of communication. For example, low-band spectrum travels longer distances with minimal signal interruption, > Radio waves are a type of electromagnetic radiation, which is a form of light. They are measured by IM spectrum with frequencies from 3 wavelength or frequency. The radio spectrum is the part of the Hz to 3,000 GHz > Wireless spectrum is used in wireless communications, such as between people, people and machines, or systems, or between things. I's key in enabling and promoting safe, innovative, and efficient systems for, among others, transport, energy, public-safety, environmental protection, and circular economy systems. > Examples of wireless systems that use radio frequency to deliver data in bits via the air include: Radar, Radio broadcasting, IoT wireless technology like Bluetooth, Wi-Fi, and Every cell phone TYPES / APPLICATION OF WIRELESS TECHNOLOGY: 1 Satellite Communication: Satellite communication is spread all over the world widely to allow users to stay connected almost anywhere on the universe. When the signal is sent near the satellite then, the satellite amplifies the signal and sends it back to the antenna receiver which is located on the surface of the earth. Satellite communication contains a couple of main components like the 1. space segment and 2.the ground segment, The ground segment consists of fixed or mobile transmission, reception and ancillary equipment and the space segment, which mainly is the satellite itself 2.Infrared Communicatio : Infrared wireless technological communication information in a device or systems through infrared radiation, Infrared radiation is an electromagnetic energy at a wavelength that is Jonger than that of red light (which has high wavelength). It is used for TV remote control, security control, and a communication which stays within a short range. In the electromagnetic spectrum, infrared radiation (IR) lies between microwaves and visible light. So, they can be used as a source of communication at the end of the day. For successful infrared communication, a photo LED transmitter and a photodiode receptor are very much required, So the information between the source and the target is transferred through this, way. The source and destination can be TVs, mobile phones, security systems, computers, laptops and ete. 3. Broadeast Radio: The first wireless technological communications are the open radio communication to seek out widespread use, and it still serves a purpose in recent years. Handy multi-channel radios permit a user to speak over short distances, whereas citizen’s bands offer communication services for sailors. Fi is a wireless communication used by various electronic devices like smartphones, laptops, IPad ete. In this particular setup, a router works as a communication hub wirelessly. These networks allow users to be connected only within close proximity to a router. WieFi is very common in networking applications which affords portability without a wire. These networks require to be protected with passwords for the purpose of its security, otherwise it will be accessed by other people 5.Microwave Communication: Microwave wireless communication is an effective communication that mainly uses radio waves. The wavelengths of radio waves are measured in centimeters(em). In this communication, the information can be transferred using two methods, One is the terrestrial method and the other one is the satellite method. Satellite method, the data can be transmitted through a satellite that orbits 22,300 miles above this earth, Stations on the earth receive and send data signals from the satellite. It has a frequency ranging from 11 GHz-14GHz and with a transmission speed of Mbps to 10Mbps.The main disadvantage of microwave signals is, they can be sometimes highly affected by bad weather, especially when the weather is rainy. 6.Bluetooth Technology: The Bluetooth technology is used for exchanging data between mobile and other devices wirelessly to a system for the transferring of data. Cell phones are connected to hands free earphones, mouse, wireless keyboard. By using a Bluetooth device, the information from one device to another device. This technology has various functions ADVANTAGES OF WIRELESS TECHNOLOGY: Y Any data or information can be transmitted faster and with a high speed ‘Maintenance and installation is less costly for these networks The internet can be accessed from anywhere wirelessly. Itis very helpful for workers, doctors working in remote a centers, RAK as they can be in touch with medical DISADVANTAGES OF WIRELESS TECH LOGY: Y An unauthorized person can easily capture the wireless signals which spread through the air. Y Itis very important to secure the wireless network so that the information cannot be misused by unauthorized users. SENERATION OF WIREL Martin Cooper is the man behind the evolution of wireless communication, It initially invented a device that wirelessly transmitted data and is considered the first generation of mobile communication, The various generations of wireless communication are; 1.1G Wireless Communication: 1G was introduced in the USA. The first generation is the initial step to today’s technology and was introduced in the year the 1980s. Using the 1G technology, we can only make voice calls. The data is transmitted between the devices using analog signals. Out of the two types of frequency modulation, analog Frequency modulation is used and modulates the data signals in the form of sine waves. Features of 1G wireless communication: The Operating frequency of 1G is 800 MHz and 900 MHz ¥ The Maximum rate of speed can be up to 2.5Kbps. The Capacity of data to transmit via 1G will have a bandwidth of 30 KHz. Drawbacks of 1G Technology: Y Only the voice can be transmitted in 1G and its quality is very low. Y Mobile Phones cannot have a long life in battery usage and are very bigger which is very difficult to carry. 2. 2G Wireless Communication: 2G was introduced in Finland. To have advancement over the 1G, the GSM (Global System for Mobile Communication) was introduced. In the current technology, every system has the basis of GSM. This generation is responsible for the upgradation from voice calls to MMS. (Multimedia Messaging System) and SMS (Short Message Systems). Features of 2G wireless communication: The Digital frequency modulation or digital communication technique is used to transmit the data in the form of 0's and 1’s of 1.8GHz. Y The data speed of 2G is nearly up to 64 Kbps. Y The Voice quality also improved from 1G, it supports both voice and data, Y- This generation is responsible for using the internet at a low speed using GPRS, Drawbacks of 2G Technology: ¥ Ttneeds strong network coverage for data transmission, ¥ Even though it helps in sending messages, it eannot handle videos for transmission 3.3G Wireless Communications: 3G was introduced in Japan, It comes with data transfer technology such as UMTS (Universal Mobile Terrestrials System) for use in smartphones. With this feature, we can have the video calling option and play games online on cellular phones. Features of 3G Technology: Y It supports both voice and data with a data rate of 3.1 Mbps. The Intemet Service provided is broadcast. Y Ithas high security and international roaming, Drawbacks of 3G Technology: Y The power consumption of using 3G technology is high. Y It provides a wider capacity for data transmission at a faster speed, The time taken to download via 3G is faster and more expensive to buy. 4. 4G Wireless Communications: 3G wa Wirel data, introduced in South Korea. Long Term Evolution (LTE) and Fidelity (Wi-Fi) is data technology used and it provides faster data rate to upload and download Features of 4G Technology The Data rate provides a capacity of 100Mbps to 1Gbps and is highly securable by using the Encryption Technique. Y The Intemet Service provided by 4G is Ultra-Broadband, Y It provides high speed and global mobility using the internet and International calls Drawbacks of 4G technology: Y_ It provides costlier hardware and infrastructure setup. Y Due to the high data rate speed, the battery usage is less 5, SG Wireless Communications: The technology which is currently implemented gives the user a high data rate. To support this high data rate for transmission it uses multi-meter waves and some unauthorized spectrum. The data transfer technology used is LTE advanced, OMA (Orthogonal Multiple access), and NOMA (Non-Orthogonal Multiple access). Features of SG Technology: The Internet service used is an ultra-fast mobile network. Y It provides consumers with high security and a trustable transmission. MEANING OF PORTALS IN E-BUSINES! Ecommerce portals are online platforms where buyer-seller trading transactions are conducted, ‘Manufacturers and distributors launch ecommerce portals to transit their buyers to an online channel, Portals streamline the buying process by facilitating bulk ordering and enabling volume-based pricing, PORTALS 1. B2B e-commerce portal: B2B e-commerce portal is a self-service gateway where businesses can easily order and buy products and manage relationships with vendors and partners in one place. More and more wholesalers, manufacturers, distributors, and other companies allocate funds to make a custom vendor portal seeking to cut costs, optimize the purchasing cycle, and increase efficiency. 2.B2C e-commerce portal: These are some of the most popular types of portals. Unlike regular online stores where users browse through products, make a purchase, and go, B2C portals provide customers with a range of valuable features that increase retention and improve user experience — user account, order history, rewards ‘management, e-wallets, personalized content, offers, and discount programs, ete Benefits: B2B and B2C brands alike benefit from web portal creation in various aspects. * Reduce time to sale, improve buyer journey, and boost repeat sales. + Easily expand market presence and reach new audiences anywhere. + Reduce customer support and operating costs, + Enable seamless cos effective scalability to new markets. * Provide personalized experiences, upsell products and services. 3.E-Health web portals: eHealth portals for doctors and patients made a huge impact on healthcare outcomes, specifically on the patient experience and effectiveness of care, Patient web portals are designed to provide patients with secure access to their healthcare data (appointments, test results, medical history, etc.) and allow them to contact and communicate with health and social care providers — doctors, clinics, and hospitals. Among the most popular features of patient portals are appointment booking, medical history, messaging, and prescription renewals Benefits: Multiple advantages of web portals for doctors and patients positively affect the healthcare experience. + Enhance patient engagement and medication adherence. + Improve doctor-to-patient communication making it more convenient and accessible. * Optimize healthcare workflows and remove inefficiencies that lead to long lines and waiting times at the hospital. * Enable cost reduction and administrative savings, * Provide a secure platform for storing and accessing medical records. 4.Financial and banking portals: One of the most common types of web portals that we use every day is a banking web portal that provides access to banking services and allows authorized users to securely make transactions online, Financial portals are used by investors and brokers to receive up-to-date financial information and market news, drill and analyses data, ete, Benefits: The primary web portal purpose in banking is to enable secure transactions online and ensure the traceability and safety of financial data, * Provide secure access to banking and financial services 24/7. # Automate recurring payments and reduce the risks of accumulating debt. * Gain visibility into financial operations and simplify budgeting and expense tracking. * Protect financial information and transactions online. * Eliminate paperwork and manual financial management 5,Student portals: Student portals are popular types of web portals used in education and eLearning. They are widely adopted by colleges and universities to provide students with important information about curriculum and campus life and help them manage the educational process and track progress. Benefits: Web portal is essentially a centralized hub where students can get the information and support they need for successful learning and enjoyable life on campus. + Provide easy access to academic information, course and research materials, schedules, and grades, enhancing the leaming experience. + Help students integrate into the community faster and get help on the go. + Give students online space to connect to professors, advisors, and peers, improving collaboration and support. + Simplify administrative tasks and payments online. * Enable tracking progress and planning an educational journey. 6.Employee portals: Employee portals help the company’s staff easily access work-related information (training programs, schedules, workflow data) and tools for project management and collaboration. Similar to other web portal types, B2E portals are usually integrated into the company’s infrastructure and, in some cases, are available only via corporate private networks. Benefits: Employee web portals are useful tools for organizations to improve employee experience and optimize HRM and recruiting process. + Increase employee engagement and contribute to a positive work culture, * Give 2 360-degree view of the employee lifecycle for data-driven retention strategies and optimized performance management. * Consolidate administrative and TIR tasks and promote employee independence. Reduce time and cost by automating HR operations. + Enhance employee data safety, accuracy, and compliance. 7.Community portals: This is a diverse category since community portals can be used for many different purposes from managing common assets to providing a small community with an online platform for collaboration, Benefits: Just like every web portal with examples in education, healthcare, and e-commerce that we have already mentioned, community portals provide a wide range of benefits + Foster communication and collaboration. + Facilitate knowledge sharing among community members. * Promote social interaction and engagement. + Help manage common assets efficiently. * Provide tools for organizing and holding community events. 8. Public services and government portals: Web portals for public services and government portals are used worldwide to provide citizens with fast and convenient access to all important information such as, taxation, employment, immigration, law, and so on. The best web portal example in this category would be a national, state, or city portal that serves the citizens of a certain country. HR A human resources information system (HRIS) is a crucial software tool for HR departments that collects and stores employce data, An HRIS is an HR software solution that stores and analyses employee data for end-to-end human resources management (HRM). This data is used in daily HR tasks, including employee recruitment, payroll processing, accounting and performance management. FUNCTION/ BENEFITS OF HRIS: 1 Payroll Management: HRIS systems can assist with and automate the process of running payroll. They can create payment orders as start dates and other employee changes are updated within the system. This module takes data from other HRIS system functions, including time and attendance and employee status, to determine correct payment amounts. Check out our review of Gusto to learn about an excellent HR solution with payroll functionality. 2.Benefits administration Management: HRIS systems with efficient user interfaces can help employees ‘manage their employee benefits. They allow employees to schedule time off for vacation or parental leave or sign up for specific benefits when they become eligible. Visit our review of ADP to lea more about a comprehensive HR solution with particularly good benefits administration capabilities. 3.Performance management: Managers can track the progress of multiple employees through performance ‘management software. This HRIS module provides templates for employee performance check-ins and guides to creating a performance rating system for all employees. 4.Time and attendance Management: Some HRIS software packages can integrate with time and attendance modules to track employee time data. For employees who do shift work, this system allows ‘management to keep track of hours worked versus the time each employee is scheduled to work. If an employee is late or misses work, the system can also send an alert to the manager. 5. Training: Employee development is crucial for company growth. Many HRIS systems have training ‘modules that track employee skills, certifications and other professional development endeavors. Monitoring and encouraging employee development and training is also a great way to attract top talent. 6, Reporting and analyties: Some HRIS systems include a reporting and analytics module that provides in- depth analysis of “transactions,” such as hiring a new employee, employment status changes, employee absenteeism or tardiness, and more. The system can analyses this data and provide reports on things like JYOTHY INSTITUTE OF COMMERCE & MANAGEMENT #40/5, THATHAGUNI, OFF KANAKAPURA ROAD, BENGALURU — 560082 E-mail : [email protected] Website : www,jyothyicm,org employee turnover rate and employee performance that help HR personnel spot patterns and form solutions. ‘TYPES OF HRIS PLATFORMS/ MODULES: While all HRIS tools are built to improve HR processes, different systems focus on different functions. And sintce not every organization shares the same HR processes and goals, you can break HRIS platforms into five main types designed to approach differing objectives related to human resources and human capital at large: 1. Operational HRIS: Operational HRIS systems collect and report human resource data such as employee records, position details, and performance appraisal information. They help provide HR managers with the data they need to perform tasks such as performance management, promotions, hiring, and internal personnel changes. Primary Function: Record management Use cases: Performance management Teal for Standard HR functions Key benefits: Task automation Suitability Various organizations 2, Tactical HRIS: Tactical HRIS systems are involved in processes related to the use of resources. This includes recruiting, training, compensation, vacanci are more useful for making big- picture decisions about things like resource allocation, job analyses, and team development. Tactical HRIS systems are more for organizations that need assistance making macro-level decisions about what to do with resources and and so on. The ss for those who need support with smaller day-to-day tasks. Primary Function: Resource use optimization Use cases: Recruiting, training, ete. Teal for “Macro-level decisions Key benefits: Big-picture insights Suitability Macro-level organizations 3. Strategic HIRIS: Just like it sounds, strategic HIR data systems help with strategic analysis and decision- making. They assist HR professionals with functions like goal-setting and future workforce planning. Strategic HR systems can help with awareness regarding available labor resources and proper workforce planning by managing data like market information and operations budgets. Strategic HRIS systems are especially beneficial to organizations looking to expand or grow strategically. Primary Function S Use cases Goal-setting & planning jrowth & expansion Key benefits: Data-driven decisions Suitability: Growing strategic companies JYOTHY INSTITUTE OF COMMERCE & MANAGEMENT #40/5, THATHAGUNI, OFF KANAKAPURA ROAD, BENGALURU — 560082 E-mail : [email protected] Website : www,jyothyicm,orq 4. Comprehensive HRIS: A comprehensive HRIS is somewhat of a combination of the above types, involved in all things HR, including operational, tactical, and strategic matters. It works as a streamlined database and platform to offer easy review and management of a variety of HR-related tasks and areas, including: Employee information, HR files, Open positions, Recruitment and hiring details.A. comprehensive HRIS functions as a one-stop shop for storing and displaying any information needed to perform nearly all HR functions [Primary Function: | All-inclusive HR management Tse cases: ‘AIITIR operations Ideal for: Full-spectram AR management IKey benefits ‘One-stop shop for HR needs (Suitability: Need for complete solutions 5, Limited-Funetion HRIS: Unlike a comprehensive HIRIS, a limited-function HRIS serves one purpose only. These systems are not necessarily made for strategic planning or management. Instead, their functions are more concrete and granular. The exact function of each limited-function HRIS depends on the particular system. For example, an HRIS might be created specifically for training or benefits management. Limited- function HRIS systems are generally better suited for smaller companies as they are often inexpensive, easy to operate, and can be used comprehensively by even a single HR manager [Primary Function: | Single-purpose HR management Tse cases: Specific HR functions lideal for: Targeted HR tasks IKey benefits Focused, efficient management (Suitability: ‘Small companies or departments WHAT IS A SKIMMING ATTACK: Skimming is an act of copying the cardholder's personal payment information. Criminals employ different strategies for this purpose, such as photocopying receipts or more advanced methods, such as installing a small electronic device called a skimmer, mostly inside ATM or EFTPOS terminals, to store hundreds of victims’ card numbers and PINs. The stolen credit card information is used by scammers to make online purchases, card cloning, or sell on different black markets on the web. HOW DO SKIMMING ATTACKS WORK? skimming attacks, in general, are carried out in three main steps: L.gaining access: The first step involves the attackers gaining access to the mode through which they will carry out the attack. this can include gaining access to an atm or pos terminal or exploiting vulnerabilities in an organization’s infrastructure, such as checkout pages on e-commerce websites. 2colleeting data: In the next step, attackers tamper with the original device or install skimmers to collect sensitive information. as the customer swipes their card or inputs the details, all of the sensitive information is recorded and collected inside the skimmer. 3.Harvesting sensitive information: After collecting all of the sensitive customer card details, the attackers send it to their own servers or collect it physically by retracting the skimmer device that they installed. the collected information can then be used for malicious activities. HOW TO PROTECT FROM SKIMMING ATTAC! Several measures can be taken to protect yourself from skimming attacks, These include: L.Account monitoring: It is essential to monitor your bank account closely to detect any suspicious and unauthorized activity happening on your account. Usually, there’s a small-time frame to dispute unaccountable charges if they have fallen victim to such a fraud 2.Using low-limit cards: Users should always prioritize using low-limit cards for online and physical transactions. The reason is that if they fall victim to skimming, the low limit on the card will restrict the amount of damage that can be carried out by the fraudsters and will alert the cardholders that their card information has been compromised. 3.Avoiding suspicious ATMs: If you suspect that an ATM is not in optimal condition, such as an unknown object attached to the area where you're supposed to enter the card, report it immediately and avoid using it. It could be that the criminals have installed a skimmer on the ATM to carry out a skimming attack 4.Using only trusted websites for online transactions: This one is perhaps the most important measure you can take to prevent yourself from an online skimming attack. Always ensure that the website where you are entering your card details is trusted and has implemented security measures such as SSL certificates, which encrypt your information and prevent it from being stolen.

You might also like