
By S.K. Mourya and Shalu Gupta
This is a reference book of all the students of commerce faculty. recent trends in marketing...
Information and Information Technology are the key drivers of the Information age, which is also referred to as the post industrial society. The Information Age has ushered in a knowledge-based industrial revolution. The businesses in this era are networked and use IT to survive in a highly competitive environment. The relationship between IT and business is discussed in Information Technology and Business, while E-Commerce provides glimpse of the worldwide developments that have made e-commerce what it is today. E-Commerce is a series of ten “written chapters” that explores in depth the core of Electronic Commerce (e-commerce) technology and the tools that make e-commerce the cutting edge of business. It covers both the “technology” and the “non-technology” aspects of Electronic Commerce and the Internet.
explaining a prescriptive architecture for e-commerce. It introduces the concept of an e-commerce architecture frame that identifies the key decisions you need to make and the tradeoffs you need to consider when developing reliable and scalable systems. examines the Internet and World Wide Web of today and tomorrow, how it evolved, and how the present and future infrastructure of the Internet and Web enables new business opportunities. It is important for the business people to understand how the internet and related technologies work, and to be aware about the latest or upcoming technologies on the Internet. deals with Mobile Commerce and its growth track. How it is gaining increasing acceptance amongst various sections of the society. This growth can be traced back to technological and demographical developments that have influenced important aspects of the socio-cultural behavior in today’s world. The need for mobility seems to be a primary driving force behind M-Commerce applications such as Mobile Banking, Mobile Entertainment and Mobile Marketing etc. provider can instigate to reduce the risk of attack and compromise significantly. Awareness of the risks and the implementation of multi-layered security protocols, detailed and open privacy policies and strong authentication and encryption measures will go a long way to assure the consumer and insure the risk of compromise is kept minimal. explains the basic principles of firewalls. A firewall provides access control to a protected network, protecting a company’s private network from an untrusted public network. Every access request from a public network to the protected (that is, corporate) network must pass through the firewall. Different types of firewalls and firewall architectures have also been discussed. we study a well-accepted definition of the idea of Internet’s openness and danger of web surfing, which explains the growing popularity of data encryption including public key encryption and private key encryption. The latter is being frequently applied even to such common communications as instant messaging and emailing. And that is worth it, as otherwise with a lack of security mechanism any data transferred over the Internet may be easily stolen and viewed by anyone. It is even more dangerous in case of critical data that can be compromised in many ways, particularly if it is being stored in servers than can change its owner over the years.
presents an overview of Supply chain management, EDI which is a process which allows one company to send information to another company electronically rather than with paper. Business entities which conduct business electronically are called trading partners. Also this chapter highlights various Laws related to e-commerce