Free Essay

E Commerce

In:

Submitted By Vannam
Words 5058
Pages 21
[MARCH 2016]
Group No. 1: 1. Ngo Thi Mai Lan 2. Nguyen Ngoc Hao 3. Nguyen Thi Tho 4. Mai Thị Thu 5. Nguyen The Tu

ASSIGNMENT FOR E-COMMERCE

Questions: 1. What’s difference between the virus, worm, and Trojan horse? 2. How would you protect your firm against a Denial of Service (DoS) attack? 3. Explain why an e-commerce site might not want to report being target of cybercrimals? 4. Is a computer with anti-virus software protected from viruses? Why or why bother? 5. Why the value of stolen information which prices range in underground marketplace is so wide? Answer: 1. The difference between the virus, worm, and Trojan horse Viruses, Worms, and Trojan are all part of a class of software called malware. Malware or malicious code (malcode) is short for malicious software. It is code or software that is specifically designed to damage, disrupt, steal, or in general inflict some other “bad” or illegitimate action on data, hosts, or networks. There are many different classes of malware that have varying ways of infecting systems and propagating themselves. Malware can infect systems by being bundled with other programs or attached as macros to files. Others are installed by exploiting a known vulnerability in an operating system (OS), network device, or other software, such as a hole in a browser that only requires users to visit a website to infect their computers. The vast majority, however, are installed by some action from a user, such as clicking an e-mail attachment or downloading a file from the Internet. Some of the more commonly known types of malware are viruses, worms, Trojans, bots, back doors, spyware, and adware. Damage from malware varies from causing minor irritation (such as browser popup ads), to stealing confidential information or money, destroying data, and compromising and/or entirely disabling systems and networks. Malware cannot damage the physical hardware of systems and network equipment, but it can damage the data and software residing on the equipment. Malware should also not be confused with defective software, which is intended for legitimate purposes but has errors or bugs. Two of the most common types of malware are viruses and worms. These types of programs are able to self-replicate and can spread copies of themselves, which might even be modified copies. To be classified as a virus or worm, malware must have the ability to propagate. The difference is that a worm operates more or less independently of other files, whereas a virus depends on a host program to spread itself. These and other classes of malicious software are described below. a) Viruses A computer virus is a type of malware that propagates by inserting a copy of itself into and becoming part of another program. It spreads from one computer to another, leaving infections as it travels. Viruses can range in severity from causing mildly annoying effects to damaging data or software and causing denial-of-service (DoS) conditions. Almost all viruses are attached to an executable file, which means the virus may exist on a system but will not be active or able to spread until a user runs or opens the malicious host file or program. When the host code is executed, the viral code is executed as well. Normally, the host program keeps functioning after it is infected by the virus. However, some viruses overwrite other programs with copies of themselves, which destroys the host program altogether. Viruses spread when the software or document they are attached to is transferred from one computer to another using the network, a disk, file sharing, or infected e-mail attachments. b) Worms Computer worms are similar to viruses in that they replicate functional copies of themselves and can cause the same type of damage. In contrast to viruses, which require the spreading of an infected host file, worms are standalone software and do not require a host program or human help to propagate. To spread, worms either exploit a vulnerability on the target system or use some kind of social engineering to trick users into executing them. A worm enters a computer through a vulnerability in the system and takes advantage of file-transport or information-transport features on the system, allowing it to travel unaided. c) Trojans A Trojan is another type of malware named after the wooden horse the Greeks used to infiltrate Troy. It is a harmful piece of software that looks legitimate. Users are typically tricked into loading and executing it on their systems. After it is activated, it can achieve any number of attacks on the host, from irritating the user (popping up windows or changing desktops) to damaging the host (deleting files, stealing data, or activating and spreading other malware, such as viruses). Trojans are also known to create back doors to give malicious users access to the system. - Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate. Trojans must spread through user interaction such as opening an e-mail attachment or downloading and running a file from the Internet. Tips to Combat Viruses, Worms and Trojan Horses on Your Computer: * Keep The Operating System Updated: The first step in protecting your computer from any malicious there is to ensure that your operating system (OS) is up-to-date. This is essential if you are running a Microsoft Windows OS. Secondly, you need to have anti-virus software installed on your system and ensure you download updates frequently to ensure your software has the latest fixes for new viruses, worms, and Trojan horses. Additionally, you want to make sure your anti-virus program has the capability to scan e-mail and files as they are downloaded from the Internet, and you also need to run full disk scans periodically. This will help prevent malicious programs from even reaching your computer. * Use a Firewall: You should also install a firewall. A firewall is a system that prevents unauthorized use and access to your computer. A firewall can be either hardware or software. Hardware firewalls provide a strong degree of protection from most forms of attack coming from the outside world and can be purchased as a stand-alone product or in broadband routers. Unfortunately, when battling viruses, worms and Trojans, a hardware firewall may be less effective than a software firewall, as it could possibly ignore embedded worms in outgoing e-mails and see this as regular network traffic. For individual home users, the most popular firewall choice is a software firewall. A good software firewall will protect your computer from outside attempts to control or gain access your computer, and usually provides additional protection against the most common Trojan programs or e-mail worms. The downside to software firewalls is that they will only protect the computer they are installed on, not a network. * It is important to remember that on its own a firewall is not going to rid you of your computer virus problems, but when used in conjunction with regular operating system updates and a good anti-virus scanning software, it will add some extra security and protection for your computer or network. 2. How would you protect your firm against a Denial of Service (DoS) attack? Denial of Service (DoS) attacks is among the most feared threats in today's cyber security landscape. Difficult to defend against and potentially costly, DoS attacks can cause outages of web sites and network services for organizations large and small. DoS attacks can also be lucrative for criminals, some of whom use these attacks to shake down businesses for anywhere from thousands to millions of dollars. Any deliberate effort to cut off your web site or network from its intended users qualifies as a DoS attack. Such attacks have been successfully deployed against major online businesses including Visa and Mastercard, Twitter, and WordPress. DoS attacks effectively knock the services offline, costing lost business and negative publicity. They also force IT staff to expend valuable resources defending against the attackers. If there is a silver lining to DoS attacks, it's this: The objective of the typical DoS attack is not to steal or expose confidential data. Most DoS attacks do not actually breach a company's network, they simply overwhelm it with traffic. In many recent cases, DoS attacks have been used by Anonymous and other hacktivist groups as a form of online protest against corporate and governmental targets whose policies or actions are at odds with the demonstrators. The exception to this is when a DoS attack is used as a distraction to funnel attention and resources away while a targeted breach attack is being launched. Sony claims that Anonymous used that technique against them in a major 2011 attack that ultimately led to the theft of over 12 million customers' credit card data. It makes them look bad, and customers don't trust them. As an example, would you want to do business with a bank if you knew it had been robbed repeatedly, or would you prefer to deal with a bank that you thought seemed safer? The most easily executed type of DoS attack is one that is launched from a single origin. In this attack, a single machine somewhere on the Internet issues a barrage of network requests against a targeted victim machine. The requests themselves can take a variety of forms – for example, an attack might use ICMP flooding via ping requests, or HTTP requests against a web server. Single-origin DoS attacks can be effective against undefended victims, but they have a few key limitations: Victims can block the originating IP address, either at the firewall level (to kill HTTP requests) or further upstream at the ISP level (to kill network-level floods). Security tools now exist to detect and prevent ICMP flood attacks. Web servers can be configured to detect and block HTTP request attacks. Enterprise products can identify and block single origin attacks as soon as they begin. These days, the more nefarious type of DoS is called the DDoS, or Distributed Denial of Service attack. In a DDoS attack, the incoming traffic flooding the victim originates from many different sources – potentially hundreds of thousands or more. This effectively makes it impossible to stop the attack simply by blocking a single IP address; plus, it is very difficult to distinguish legitimate user traffic from attack traffic when spread across so many points of origin. DDoS: The Rise of the Botnets Where does an attacker even get thousands of machines to launch a DDoS? Distributed Denial of Service attacks are executed by a so-called botnet – a collection of computers around the world infected with an attacker's malware. Malware infections can install silent software on a victim machine which places it under the control of a remote attacker. Successful botnets can be comprised of hundreds of thousands of infected machines, typically without the owners' knowledge. There big money in creating botnets – among other things, botnet creators rent out their creations to criminal enterprises who can use them to launch a DDoS. Large-scale DDoS attacks are not random. The perpetrators choose their victim deliberately, either due to a grudge, revenge, or an attempt to bully them into meeting some demands – possibly including paying extortion. Renting a botnot to launch a DDoS can cost about $100 per day, so the duration of an attack is partially dependent on how well-funded the attacker. Inside a DDoS The specific mechanisms used by a DDoS to "drop" a web site or network can vary depending on the attacker's preferred strategy. One major difference between DDoS implementations is whether they target the computing resources of the victim's machine or the network resources. An attack against a web server based on HTTP flooding – as many as 10,000 requests per second – can overwhelm the server software, eventually consuming the machine's memory, CPU time, and possibly even disk space (if the log files grow out of control). An attack such as a SYN flood instead focuses on the TCP network, overloading it with unacknowledged packets. Depending on how an organization's network is managed, this kind of DDoS can not only overwhelm a server, it also can overload switches or other network resources, potentially impacing a victim's entire network, including casualties unrelated to the victim if they share network space with the same ISP. HTTP and SYN floods are not the only weapons in a DDoS attacker's arsenal but they are among the most common. Other attack mechanisms may include UDP, ICMP and DNS floods, as well as mailbombs. A so-called "mixed DDoS" can incorporate several of these weapons into one attack. Can a DDoS be stopped? Let's start with the bad news: It is very difficult to defend against a sophisticated DDoS attack launched by a determined adversary. Many organizations struck by a DDoS are left to scramble in an effort to stop the attack once it has already begun. Sometimes this requires coordination with the ISP that provides network access. This is especially true when an ISP is forced to "null route" a victim – meaning that to protect other customers, the ISP routes traffic intended for the victim into the trash. This of course effectively prevents all access, including from legitimate users. One of the more well-known countermeasures against a SYN flood is the use of "SYN cookies" either in the server OS or, better yet for network efficiency, in a network security device at the network edge such as the Cisco Guard. SYN cookies provide a more efficient method for tracking incoming TCP connections lessening the chance for a typical SYN flood to overwhelm the stack. An effective defense against an HTTP flood can be the deployment of a reverse proxy – in particular a collection of reverse proxies spread across multiple hosting locations. A reverse proxy is somewhat akin to a bouncer at a nightclub, deciding which guests are allowed into the party, where the real web server is. By deploying many bouncers in different locations, the crush of incoming traffic is split into fractions, lessening the possibility of the network becoming overwhelmed. Deploying this type of architecture can be done in the scramble after an attack has begun, or baked into the network architecture of a web site as a preventative defense. The limitation with these DDoS defenses is that if the attacker can generate network traffic at a higher rate than your network's Internet connection can handle, it will be hard to avoid a meltdown. But what these defense strategies do accomplish is at least force the attacker to get a bigger gun. 3. Explain why an e-commerce site might not want to report being target of cybercrimals? It makes them look bad, and customers don't trust them. As an example, would you want to do business with a bank if you knew it had been robbed repeatedly, or would you prefer to deal with a bank that you thought seemed safer? Some companies are concerned that law enforcement investigations are slow although police often have a view of the larger picture than an individual company. Another common fear is that a company that reports cybercrime will have that information leaked to the media, but rarely do the leaks come from law enforcement agencies, she said Finally it makes them look bad, businesses are concerned about shareholder value, the reputation of their organizations, customers don't trust them. As an example, would you want to do business with a bank if you knew it had been robbed repeatedly, or would you prefer to deal with a bank that you thought seemed safer?

4. Is a computer with anti-virus software protected from viruses? Why or why bother? Most people believe that they’re totally protected because they have an anti-malware program.Unfortunately, that’s simply not true. The answer is partly the nature of anti-malware software… and partly the nature of “the race.” In the lead are malware writers looking for vulnerabilities and writing malware to exploit them. Coming in second are the anti-malware software vendors looking for ways to detect new malware as it appears as well as figure out the correct way to eradicate it when found. Next are the software vendors looking to plug the security holes that the malware exploited in the first place. Lastly are folks like you and me, hopefully keeping our systems up-to-date with the latest updates to both our anti-malware products as well as the systems and software that having vulnerabilities. As you can see, virus writers are almost always in the lead. You and I? We’re dead last – hopefully close to the pack, but still – last. As a result, the first answer boils down to simple bad luck. It’s possible to be doing everything as right as you can and still get infected if: * Your anti-malware software has not yet been updated to know how to detect it. * Your system or application software has not yet been patched to fix whatever vulnerability the virus exploits. * All anti-virus software is the same, only different. Sadly, as far as I can tell, there is simply no “best” anti-virus or anti-malware package. Almost all of the name brands are good, but I’ve not run into one that really stands out above the crowd at detecting absolutely positively everything. In other words, no matter what anti-virus package you run, it may miss something. Different packages may miss different things, but there’s no single package that you can count on to catch everything. So it’s possible to still get infected even though your anti-malware tools are completely up-to-date. Some classes of viruses exploit operating system vulnerabilities that are present simply by connecting to the internet. You don’t even have time to download your operating system update, or anti-virus software, before your machine is once again a victim. Firewalls help, particularly hardware firewalls such as routers. That’s one of the reasons why folks like me harp on putting your computer behind some sort of a firewall. Firewalls understand the difference between certain types of legitimate internet traffic and types that you’d never need. They block out the unwanted stuff before your computer ever really sees it or has a chance to be infected by it. The good news here is that most operating systems now either come with a software firewall turned on by default or strongly encourage you to turn it on as you perform your initial install. The harsh reality. All malware is not created equal, which is why there are so many different terms to describe the variations. Some exist merely to propagate. Others exist to do damage. Some exist to silently send spam. Still others start to blur the line between virus and spyware as they install monitoring or additional vulnerabilities on your system. Some travel by email. Others travel by downloaded applications. As we just saw, others can travel from unprotected computer to unprotected computer directly through the internet. No anti-malware tool can protect you from yourself. For example, if you open an email attachment that you don’t recognize and run it, you may install a virus before your anti-virus software has a chance to act. When downloading a file, if you choose to ignore a warning that your anti-virus package or firewall displays, you’re telling the software that you know better than it does what is or is not safe. If you choose to connect without a firewall or choose not to use automatic updating tools to keep your system as up-to-date as possible … it’s on you to know what you’re doing. It’s hard to say. Ask 10 people and you’ll get 10 different answers: hackers with too much free time, operating systems that aren’t robust enough, success in the marketplace that makes for a bigger target, and more. Of late, there’s more money to be made by infecting large numbers of machines with spam-sending bot software. For whatever reason, it is like this and will be for the foreseeable future. That’s why you and I are each responsible for keeping our computers safe on the internet. 5. Why the value of stolen information which prices range in underground marketplace is so wide? For your information Because stolen information allows a business to make informed decisions, attain long term business especially in this digital age. Making right decision in 21st century need Speed and accuracy, every successful organization has to go through a comprehensive market research process which enables management to make the right decision. Information is the plain facts and statistics collected during the operations of a business throughout many years with high cost. They can be used to measure/record a wide range of business activities - both internal and external. It is the basis for all reporting and as such is crucial in business. Example, customer data are the metrics that relate to customer interaction. It can be the number of jobs, the number of enquiries, the income received, the expenses incurred, In this context, customer information would be useful in providing metrics surrounding client/customer engagement to determine new ways to engage or work with your completion’s clients.

The Underground Hacker Marketplace Imagine walking through a marketplace with vendors lining both sides of the street.
As you look at all the displays, you notice a wide range of products and services, from high-end to low-end offerings, with something for everyone. Many vendors you walk by provide discounts for bulk purchases and promise money-back guarantees if you are not happy with the product. As you examine the products you become inspired and ask yourself, “Why can’t I learn to make these products myself and use them?” Just as this thought bubble dissipates from your brow, you turn the corner and find a row of vendors offering classes on how to build and use these products in the comfort of your own home. Truly a one-stop-shop! Why can’t more businesses have such a forward thinking strategy? Welcome to the underground hacker marketplace. The imagery described above is an accurate depiction of today’s marketplace for cybercriminals: a world of commerce with goods, tools and training to enable hackers to breach unsuspecting individuals, groups, and companies. Dell SecureWorks’, Director of Malware Research Joe Stewart and Network Security Analyst David Shear visited this dark market during November 2014 to see how the underground market was evolving. They found a larger selection of stolen goods and tools for hacker enablement, along with a new level of business strategy and sophistication. Stolen Goods for Hacker Enablement The underground hacker marketplace is a haven for purchasing stolen personal data, credit cards and bank accounts. Shopping is easy in this dark market. Shoppers can obtain these illicit goods with a simple click of a button, in the comfort of their home.
All the dirty work of obtaining the stolen credentials and accessing accounts has already been done. One of the most notable additions in the market is an increase in the number of fake credentials for sale. These fake credentials include new identity packages, passports, driver’s licenses and social security cards. These documents can enable criminals to defraud, deceive and cheat victims out of money via false bank loan applications, counterfeit checks and fake credit cards. According to one US Law Department, three scammers were producing and selling fake driver’s licenses and using them for “cash out” schemes. These schemes involved stolen credit card information, usually obtained through hacking or ATM skimming operations, which are encoded onto counterfeit credit cards and then used to steal cash from victims’ accounts. According to the FBI, from December 30, 2013 to June 23, 2014, the conspirators sold 1,514 fake driver’s licenses for $232,660. This is just one example of how cybercriminals commit fraud. For the more tech-savvy criminal shopper, online banking credentials are for sale. These electronic stolen goods provide the username and password for a “High Value” online bank account with a “verified” balance between $70,000 and $150,000 for approximately six percent of the account balance. Smart criminals would pay this rate only to a seller who had a reputation for providing solid credentials for premium verified accounts. For a $70,000 account that payoff would run approximately $4,200. The hacker marketplace carries a wide array of products at different price points. New types of bundled illicit goods are continually being adding to upsell and cross-sell, resulting in increased profitability for cybercriminals. Below is the typical going rate for stolen credentials, credit cards and bank accounts. Source: Dell SecureWorks, Underground Hacker Markets Report December 2014

Tools and Training for Beginner Hackers An easy way to begin a career in cybercrime and commit other acts of fraud is by simply purchasing the goods necessary to perform the fraudulent act. For hackers who have higher aspirations and are ready to take a deeper plunge, there are readily available training and tools for sale. In this section of the underground market, both malware and infected computers can be quickly and easily purchased for “off-the-shelf” cybercrime. Hacker Tutorials train eager-to-learn beginners, and hacker services are easily obtained for more advanced cybercrime. Malware in this section of the market ranges anywhere from $20 for basic Remote Access Trojans (RATs) to $1,800 a month for more advanced exploit kits. Many common RATs for purchase include: Darkcomet, *Blackshades, Cybergate, Predator Pain and Dark DDoser. RAT prices have dropped during the past 12 months, likely due to the fact that there are numerous RATS available which are free because the source code has been leaked. Hackers like a RAT that is easily available for purchase or for free because they can run it through a Crypter which makes it undetectable to anti-virus and anti-malware programs. A popular Crypter such as Aegis, Sheikh Crypter or xProtect cost a criminal shopper somewhere between $50 and $150, depending on how well it encrypts the malware and makes it fully undetectable. Advanced hackers know how to code their own Crypters, so many of those buying Crypters are unskilled “script kiddies” looking to make a quick hit. The two most common types of exploit kits for sale are Nuclear and Sweet Orange which can be leased by day, week or month. The cost in the underground market for a month of Nuclear runs around $600, and Sweet Orange runs approximately $1,800 a month.
A new feature in the hacker marketplace is geographically focused products and services. Compromised computers or bots for sale, are now located in specific countries so that they can access region-specific financial sites. This improvement has increased the price of bots substantially. Bots located in the US are priced higher than many other regions. It is theorized that US bots would potentially have access to financial sites that people in other countries don’t have access to. For example, if the hackers’ intention is to steal Coinbase bitcoin accounts, they would need access to compromised US computers because Coinbase only does business with US-based customers. Likewise, European-issued credit cards are more secure due to the use of chip and pin technology mandated by EMV, a technical standard for smart payment cards and payment terminals. They are more difficult to hack, resulting in a lower price for European bots. In the underground market, the going rate for a thousand US bots is $140-$190 but only $100-$120 for a thousand UK bots, and a nominal$4-$12 for Asia bots. For novice hackers or “newbies,” as they are often called by established hackers, the underground marketplace is a great avenue to learn from experienced hackers who sell Hacker Training Tutorials. The topics span from how to do “Basic Carding” to “Cashing Out Fullz or Credit Cards via Online Shopping” to “How to do ATM Hacks and Get Much More Money that you Withdraw” to “How to have 100% Successful Bank Transfers.” Manuals containing handfuls of tutorials explain a variety of cybercriminal activities can be purchased for a mere $30, while individual training tutorials can run as low as one dollar. Tutorials on exploit kits, Crypters, DDoS attacks, Spam attacks and phishing are also available. These tutorials not only explain what a Crypter, Remote Access Trojan (RAT) and exploit are but also how their used, popularity and typical purchase price. For hackers who don’t want to do the dirty work themselves, hacker services are available for hire. Some common services include: hacking into a website, Distributed Denial or Service (DDoS) Attacks and Doxing. The purchase price for website hacking varies depending on the reputation of the hacker. The higher the price, the more reputable the hacker. It is common to see prices range $100 -$300. The cost of a hacking service that knocks a website offline has remained stable. Pricing is established by number of attacks for a specified period of time. For example, a Dodos attack will run $3- $5 per hour, $90- $100 per day, and $400 - $600 per week. Lastly, Doxing is available and used when someone is seeking intel on a target. A hired hacker will get all the information on the target by searching through social media sites, public information sites, social engineering manipulation and information-stealing malware. Doxing Services are priced $25 - $100. Conclusion: Continuous Improvement to Products and Services The underground marketplace continually evolves. These virtual storefronts of illegal commerce are well-oiled machines offering 100% Satisfaction Guarantees and bundled deals on numerous offerings. It’s important to remain aware of the sophistication of this changing marketplace to make better decisions about the best security measures to protect against known and evolving threats. This short visit to the illegal underground hacker bazaar, has provided you a brief snapshot of the thriving cybercriminal world of commerce. As long as there is valuable data available to steal, the Underground Hacker Marketplace will continue to boom. This underscores the importance of a layered security approach. “According to the FBI, from December
30, 2013 to June 23, 2014, the conspirators sold 1,514 fake driver’s licenses for $232,660.” “These virtual storefronts of illegal commerce are well-oiled machines offering 100% Satisfaction Guarantees and bundled deals on numerous
offerings.”

Similar Documents

Premium Essay

E-Commerce

...Greenwich School of Management / plymouth university | E- Commerce | PC303 | | Sonny Tella Leshie : SN/129122 | | | Table of Contents 1.0 Executive Summary 2 2.0 Introduction 2 2.0 E-Commerce 3 3.1 Benefits of E-Commerce 3 3.2 Limitations of E-Commerce 4 4.0 Features of E-Commerce 4 4.1 Ubiquity 5 4.2 Global Reach 5 4.3 Universal Standards 6 4.4 Richness 6 4.5 Interactivity 7 4.6 Information Density 7 4.7 Personalisation/Customisation 7 4.8 Social Technology 8 5.0 Privacy and Security Issues 9 5.2 Security 9 6.0 Ethical Factors 10 6.1 Privacy 10 7.0 Recommendations 11 8.0 Conclusion 11 9.0 Bibliography 11 Appendix 13 1.0 13 2.0 14 3.0 15 4.0 16 5.0 17 1.0 Executive Summary This is a report of a critical review of the E-Commerce website of “Alfasud Parts Online”. The report will look at the general role of e-commerce in contemporary business and the advantages or otherwise for Alfasud. A critical analysis of the implementation of the unique features of E-Commerce shall be undertaken and their business significance for the company will be evaluated. This report will evaluate the security provisions on the e-commerce website and the employed technologies and methods for ensuring security and privacy. An evaluation of necessary ethical considerations and others issues arising on the website will also be conducted. The report will draw conclusions and make recommendations to the board...

Words: 2846 - Pages: 12

Premium Essay

E-Commerce

...an exciting age of human innovations where a single generation can witness extreme shifts in technology and way of life. One of the most significant forces driving this development is the ability to record and deliver information across distances and at rates expanding exponentially. This is also referred to as the information age. Digital technology has changed the economy. The new terminology being used is e-marketing where the primary source of value creation for consumers has shifted from physical goods to services and information. This does not mean that everything we previously knew about business becomes irrelevant and obsolete, but it does mean that significant changes in business environment justify new approaches to thinking of the best marketing strategy and management. In summary E-commerce can be defined as an exchange of goods and services between parties, individuals and organizations as well as the electronically based intra and inter organizational activities that facilitate such exchanges.(Dave.C.,2007,p,4) There are four categories of E-commerce:- a) Business to business b) Business to consumer c) Consumer to business d) Consumer to consumer Most business still carries out the traditional ways of conducting business. This is by having a physical address where they have their products and services and translations are made there. Due to the new dot com community and ways of doing business many businesses have taken up the opportunity...

Words: 3079 - Pages: 13

Premium Essay

E-Commerce

...Glossary |Term |Definition | |Electronic Commerce |Electronic commerce is the buying and selling of goods and services on the Internet, especially the World Wide | | |Web. | |Etsy/Pinterest |Online websites for buying and selling products and ideas. | Executive summary The main objective of this report is to identify and analyse the benefits and problems associated using the E-commerce. The case study evolves the client, Miss Amanda Jane Walter in which her horse riding apparel business is threaten as many customers search and buy the products online compared to Amanda Jane who only sells the items directly to their customer. This report explains how E-commerce can be incorporated to help the company, Amanda Jane Horse Wear, to improve its business operations and improve on its advertising to outreach to a greater target audience within the horse-riding community. Some benefits identified include increased business efficiency, reduced operations cost, providing additional convenience to customers and expanding the company’s current customer base. On the other hand, the report will highlight the challenges that the business might face in...

Words: 2826 - Pages: 12

Premium Essay

E-Commerce

...Introduction of e-commerce Electronic commerce can be defined as sales or purchase of goods and services or any commercial transaction through electronic systems such as internet, telephone and e-mail. There are several forms of e-commerce, including: Business-to-Business (B2B) is the electronic transactions between enterprises for conducting business. Business-to-Consumer (B2C) is the business sell of products or services directly to customers, such as Gmarket, Alibaba etc. Consumer-to-consumer (C2C) is the business conduct between consumers. This usually is a form of auction or forum site, such as E-bay. Consumers post what they intend to sell on the webpage, other consumers can access and bid for the item. Customer-to-business (C2B) is a form of business offered by consumer to business to exchange for money. For example, designers sell a design to a multimedia manufacturing company online. One of the major subset of E-commerce is mobile commerce. It is the sale and purchase of goods or services or conducts any business activities through internet connection using handy devices such as mobile phones and tablets. Mobile commerce is getting popular and can be defined as the next generation of e-commerce. Businesses conduct e-commerce to stay competitive. Some of the businesses are successful with the use of e-commerce, such as online shop Amazon and DBS Bank. Amazon provides a massive range of products. They are focus on their selection, price and convenience. Customers can...

Words: 3739 - Pages: 15

Premium Essay

E Commerce

...LIMITATIONS OF E-COMMERCE Technical Limitations  Lack of sufficient system's security, reliability, standards, and communication protocols.  Insufficient telecommunication bandwidth.  The software development tools are still evolving and changing rapidly.  Difficulties in integrating the Internet and electronic commerce software with some existing applications and databases.  The need for special Web servers and other infrastructures, in addition to the network servers (additional cost).  Possible problems of interoperability, meaning that some E-commerce software does not fit with some hardware, or is incompatible with some operating systems or other components. Non-Technical Limitations  Cost and justification (35% of the respondents) The cost of developing an EC in house can be very high, and mistakes due to lack of experience, may result in delays. There are many opportunities for outsourcing, but where and how to do it is not a simple issue. Furthermore, to justify the system one needs to deal with some intangible benefits which are difficult to quantify.  Security and Privacy (17% of the respondents) These issues are especially important in the B2C area, and security concerns are not truly so serious from a technical standpoint. Privacy measures are constantly improving too. Yet, the customers perceive these issues as very important and therefore the E-commerce industry has a very long and difficult task of convincing customers that online transactions...

Words: 389 - Pages: 2

Premium Essay

E-Commerce

...E-Commerce A Brief Examination of a Popular Electronic Information Technology The purpose of this assignment is to “demonstrate an understanding of information systems, define and display how information technology may be used strategically in organizations.” The following discussion specifically focuses on the electronic business of E-Commerce and identifies how this industry uses information technology to compete, provide goods/services and offer innovative trends within the consumer market place. Characterizing Commerce Commerce is generally defined as “a division of trade or production which deals with the exchange of good and services from a producer to the consumer.” It also encompasses the “trading of information and funds or other entities” that maintain economic value. Characterizing E-Commerce E-Commerce is commonly referred to as “electronic marketing.” It consists of buying, selling or the exchange of goods and services over an electronic medium such as the internet or other computer based networks where a transaction or “terms of sale” are performed electronically. E-Commerce Popularity Since the advent of the internet and the potential uses information technology brought to the business environment, nearly all main stream commerce related industries discovered an opportunity to establish a presence in the electronic marketing environment due to the low entry cost and reductions in transaction expenses that provided increasing...

Words: 1725 - Pages: 7

Premium Essay

E-Commerce

...2/24/2015 Carolina Guerraz John Cabot University E-commerce Industry Analysis Contents Introduction 2 Industry Background 2 PEST Analysis 4 Political 4 Economic 5 Social 6 Technological 7 Michael Porter’s Five Forces Analysis 7 Threat of New Entrants 7 The Power of Suppliers 8 The Power of Buyers 8 Threat of Substitutes 9 Rivalry 9 Conclusion 9 Bibliography 11 Introduction The objective of this paper is to analyze e-commerce industry in Italy and to determine its attractiveness by applying PEST analysis and Michael Porter’s Five-Force Analysis. E-commerce is defined as the sale of products and services through computer networks.  As the world changes and technology advances, firms must adapt to new trends so that new competitive advantages can become part of the industry. In e-commerce industries, information and communication technologies (ICT) and merchandise are the suppliers, online retailers are the players, and end-consumers are the buyers. After having described the e-commerce industry background and its trends, both on a global perspective and specifically in Italy, an environmental analysis will be described as a way to determine the industry attractiveness. Industry Background The e-commerce industry is one of the fastest growing industries throughout the world even though differences exist in the stage of development from country to country. According to Euromonitor, global online retail sales have increased 17% from 2007 to 2012. In addition...

Words: 2657 - Pages: 11

Premium Essay

E-Commerce

...your opinion, will e-commerce replace the traditional business transaction within the next ten years? Justify your stand and support your arguments with reasons and examples. You should write between 600 and 650 words. Instructor : Ms Jane Chai En-Huey E-commerce (Electronic commerce) is refer to all business transaction happened through electronic platform such as internet. Recent years, e-commerce has expanded rapidly and is believed to continue at this rate of expansion or even accelerate. As the Internet continues to grow exponentially, e-commerce becomes more general in our lifestyle unlike the traditional business transaction. Traditional business transaction can only be conducted in the form of face-to-face which may confront a lot of difficulties like communication and transportation problems. Due to the advancement of technology, business transaction has become easier and faster, thus, speed up the transaction between sellers and buyers. Therefore, it is strongly believed that e-commerce will replace the traditional business transaction within the next ten years. There are some reasons that prove traditional business transaction is replaceable such as lower cost and improvement in customer service. E-commerce can play an important role in future economy because lower cost is needed to conduct a business through internet than traditional business transaction. The labour cost is reduced because no salesmen are needed in e-commerce. The e-payment can also reduce...

Words: 898 - Pages: 4

Premium Essay

E-Commerce

...Running head: E-Commerce Commerce over the Internet is Relatable Safe Insert Name Insert Grade Course Insert Tutor’s Name 23 November 2010 Outline Introduction This section defines the term internet commerce and gives a brief overview of its history. Requirements for E-commerce It gives some of the major requirements involved in starting up an E-business. This includes; 1. Online store- for processing or transactions, and making purchases 2. Website- for marketing products 3. Secure interface- for preventing unauthorized people from accessing critical information Benefits of E-commerce This section gives some of the benefits and opportunities accrued to a business involved in E-commerce. They are; 1. Large number of potential customers- A large number of people rely on the internet thus they are likely to access information pertaining a particular product 2. Timeliness- transactions are facilitated quickly and customers get their products on time 3. Reduced marketing cost- requires very minimal marketing costs as compared to direct marketing 4. Reduced communication cost- communication is done online which is a bit cheaper than use of mobile phones or mails Limitation and challenges This part of the research paper gives some of the disadvantages associated with E-commerce 1. Limitation on the type of product- not all products can be sold over the internet because...

Words: 3226 - Pages: 13

Premium Essay

E-Commerce

...CHALLENGES OF SECURITY, PROTECTION AND TRUST ON E-COMMERCE: A CASE OF ONLINE PURCHASING IN LIBYA Abdulghader.A.Ahmed.Moftah1,Siti Norul Huda Sheikh Abdullah2,Hadya.S.Hawedi3 Center of Artificial Intelligence Technology, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia (UKM) 1, 2 Center of System Science, Faculty of Computer and Mathematical Science ,Universiti Teknologi MARA (UiTM) Malaysia . 3 ABSTRACT : E-commerce is a successful business-based innovation via internet. This form of business transaction strategy offers many opportunities for growth in business and marketing services in various aspects. Online shopping is an intermediary mode between marketers or sellers to the end user or the consumers. Nature of online transaction in Libya is constrained by instability resulting from insecurity, unprotected transaction as well as trust. Online shopping could become predominant source of shopping method, if the barriers associated with insecurity, trust and customer’s protection are tackled. Owing to the significance of e-commerce towards Libyan economic growth, this paper highlights the limitations associated with e-commerce transaction in Libya and proposes relevant steps towards overcoming these constrains. Relevance of integrating e-commerce in Libyan economic system is discussed with. Keywords: E-commerce, online shopping, security, protection, trust . I.INTRODUCTION E-commerce encompasses buying and selling of products and...

Words: 2821 - Pages: 12

Premium Essay

E-Commerce

...E-commerce In its simplest form ecommerce is the buying and selling of products and services by businesses and consumers over the Internet. People use the term "ecommerce" to describe encrypted payments on the Internet. Sometimes these transactions include the real-time transfer of funds from buyer to seller and sometimes this is handled manually through an eft-pos terminal once a secure order is received by the merchant. Internet sales are increasing rapidly as consumers take advantage of lower prices offer by wholesalers retailing their products. This trend is set to strengthen as web sites address consumer security and privacy concerns. There is several ways of looking at e-commerce • Communication perspective • From a business perspective • Interface perspective • From online perspective • Structural perspective • Market perspective Beginning & Future of eCommerce eCommerce basically began (although debated) in 1994 when Jeff Bezos started Amazon.com out of his own garage. Well known eCommerce stores include sites like eBay, Dell, Walmart and many more. Since 1994, businesses of all shapes and sizes have began launching or expanding their Online presence. At any given time, there are approximately 8 million consumers worldwide that actively shop and buy through Web based stores or retailers (nearly one tenth of our world population). Online studies have claimed that online retail revenues will surpass the quarter-trillion-dollar mark by...

Words: 1451 - Pages: 6

Premium Essay

E Commerce

...Prepared By Mohsin rubel Instructor Prof. Emilia Butu ISM 510 Stratford University Falls Church Campus 06/27/2014 E-commerce is the use of internet and the web to make business transactions. Millions of people make purchases on the web, so what makes e-commerce so special? There are 8 unique features of e-commerce that make it so successful. The first thing that makes e-commerce so great is Ubiquity; it is available everywhere at anytime. Online the stores never close. Online shopping has hurt traditional businesses in some ways and helped it in other ways. A positive thing is clicks-and-bricks; you can order online and pick it up at the store. E-commerce has forced business to get online or loss business. One of the negatives is that e-commerce takes away business from traditional businesses. It hurts small "mom and pop" shops as well as big business. Office supply companies like Staples and OfficeMax send out coupons offering $10 off $50 if you buy in-store instead of online so they can reduce in store stock and increase sales. Many companies have a sales quota to make for each store and if they don't they will have to close that store. Global Reach is a great feature of e-commerce. It takes the marketplace to marketspace. You can go "shopping" all around the world in one place. This has given businesses a chance to reach other markets and to billions of potential customers. I think that traditional businesses traditionally advertised on the radio...

Words: 911 - Pages: 4

Premium Essay

E-Commerce

...E-Commerce industry Study Objective * To learn about the existing trends in e-commerce industry today * To analyse in depth the benefits and limitations of online transactions of products * To examine the online shopping sites prevalent in Coimbatore such as the mall.coimbatore which is an online shopping store and personal buying assistant in Coimbatore * To observe the future of the industry and recommend improvement ideas Need for selecting the ecommerce Industry India, one of the fastest growing economies presents a world of opportunities to entrepreneurs, investors, and researchers with an interest in the global economy. India’s e-Commerce industry is on the growth curve and experiencing a spurt in growth. With this increased interest comes a surge in demand for facts, trends and indicators. Highly concentrated urban areas with very high literacy rates, a vast rural population with fast increasing literacy rate, a rapidly growing internet user base, technology advancement and adoption and such other factors make India a dream destination for ecommerce players. E-commerce combines web technology with business economics. As of the last 10 years, online visibility for such online enterprises now heavily rely on the relationship between the own online sales platform and Search Engines for improved traffic consisting of presumable customers with the intent of acquiring products or services related to the customers’ needs. In 2008 an Internet behavioural analysis...

Words: 6470 - Pages: 26

Premium Essay

E-Commerce

...FUTURE OF E-COMMERCE Kunal Thakur, PGP2, IIM Indore FUTURE OF E-COMMERCE : BILLION DOLLAR INDUSTRY With the growth of technology and IT in particular, the time of “e-fying” everything, starting from mail, books to market place, began, and given the scenario and opportunities it is bound to continue and affect people’s lives in future. As Jeff Bezos, Founder and CEO of Amazon.com said, "I believe we can still be a footnote in the history of e-commerce", it throws light on how much growth potential e-commerce has when the top management of world’s largest e-commerce site believes that they can be a footnote in history. Since inception, ecommerce has been breaking boundaries and facilitating buyers and sellers to come together and let them carry out transactions efficiently and more conveniently spreading even across continents. The trends and innovations in electronic commerce are springing up by the hour. With the rate of technological advances only the bandwidth and internet penetration are the limiting factors and that too for the lesser developed nations. With increasing internet reach even that constraint won’t be present for long. In India, for example there were around 16 million broadband internet subscribers by the end of 2010, out of which 7.4 million are using online shopping. The Internet penetration level in small towns of rural India has increased from a mere 5% in year 2000 to 36% in 2009 itself. These trends have further led to m-commerce coming to the fore...

Words: 1735 - Pages: 7

Free Essay

E-Commerce

...国际管理 International Management 刘意蒙(Angela)2010202124 郑在宪(Daniel)2012290112 Marc-Philip Moeller 2014591083 联系:18610732267 2639015607@qq.com 国际管理 Case Analysis of Alibaba.com and DHGate.com 1. Browse and compare the business models of Alibaba.com and DHGate.com After comparing Alibaba.com and DHGate.com, our group found out that these two websites share some similarities as well as have some distinctive differences. [Similarities] Both Alibaba.com and DHGate.com are B2B e-commerce websites, which provide a third party e-commerce transaction platform for sellers to source business opportunities and make deals. Both sites target small and medium enterprises as their customers, aiming to help them sell their products or buy products from other enterprises far way more easily. In order to create a platform that benefits small and medium enterprises, both sites provide free services such as posting information about the product, providing information about the supply and demand of a specific market, and supporting those enterprises to make product display. [Differences] (1) Value propositions are different. Alibaba.com focuses on publishing deal information online and transactions are mainly made off-line. In other words, a small or medium enterprise publishes information about its products and its contact information on Alibaba.com and when other enterprises are interested in its products, they will contact this company and make transactions off-line on their own...

Words: 1188 - Pages: 5