Customers need to trust that the online marketplace and its businesses will not violate the right to privacy. Electrical privacy practices can have both immediate and long-term negative business consequences. Violators expose themselves to harsh penalties from various government agencies and victimized customers, as well as floggers and consumer interest groups. All of the above Question 13. 13. (TCO 7) Ethical issues raised by m-commerce include all of the following except (Points 5) limited access to data and documents. Privacy invasion. Infringing on workers’ personal time. Isolation. Question 14. 14. (TCO 7) All of the following are security-related issues of m- commerce except (Points : 5) abstractionist security issues of auditing and nonresidential are less difficult because cell phones have the ability to store the digital equivalent of a receipt. The basic security goals of confidentiality, authentication, authorization, and integrity are just as important for m- commerce as they are for e-commerce. As the capabilities of cell phones and Pads increase and converge, the threat of attack from malicious code increases. N appropriate level of security must be maintained on each outwork that traffic flows through, in spite of the fact that interoperability among the various networks is difficult. Question 15. 15. (TCO 8) A website provides details on a manufactured product. What type of website is this? (Points : 5) Informational interactive Transactional Framed Question 16. 16. (TCO 8) Which of the following is not one of the Steps in business formation? (Points : 5) Identify a customer or business need. Construct an interactive website. Investigate the opportunity.
Determine the business owners ability to meet the need. 1 . (T CO 1) Write a short essay that defines the term e-commerce, then scribe how companies have utilized this new medium. (Points : 35) E-commerce is the purchasing and selling of any goods or services, or the transmitting of data or funds over an electric network (the Internet). These types of transactions can occur either by business to business (BIB), business to customer (BBC), customer to customer (ICC), or customer to business (CB). Companies have been able to utilize e-commerce by using within their official websites.
Several companies have implemented e-Payment systems on their websites and this has made purchasing goods or services on said websites a to more convenient for customers all around the world. The popular types of e-payment for online shopping are (American. Du, n. D. ): Credit Cards. This can be credit cards, debit cards, or prepaid cards. Customers who own any of these cards can pay for products and services just by providing their card information, card number, name of the owner, and security code to facilitate payment. The funds will then be transferred by the issuing financial institution to settle the purchase.
Mobile Devices. With the explosion of mobile devices in recent history, this is also a way that customers can pay for goods online. Customers can pay by sending SMS messages, PIN numbers, using WAP or infrared and Bluetooth technology to transmit account data in order to facilitate payment by guaranteeing financial institutions. As for third party online payment systems, there are several service provides that are quite notable for their excellent track record in facilitating payment for e-commerce sites or any type of business (Meyer, 2012).
Third-party online payment service providers have been popular for small business specifically, as they enable them to manage payment/cash flow more easily. The fees are usually upfront and charged to client/users, thereby minimizing cost for the merchants. The more critical advantage of contracting a third party payment system is that there are security measures and responsibilities that need to be followed, i. E. , on customer privacy with regards to payment mechanisms, are placed mainly on them rather than the merchants themselves.
Reference: Meyer, R (1 5 May 201 2) 10 Excellent Online Payment Systems. Six Revisions. Retrieved from http://excretions. Com/tools/online-payment- systems/ 2. (T CO 4) Compare current motives Of hackers to those Of the past. Points : 35) A typical hackers motivation for doing what they do is either curiosity, commercial gain, or political/ideological propagation. In the past, a hacker’s ethics and motives would reflect their resistance to obstacles, and their ideology of the liberators power of technology. Below are 3 popular principles of the old hacker ethic: 1 .
Hands on Imperative: Hackers thought that access to a computer or advanced hardware should be given to everyone. 2. “Information Wants to be Free”: This can be meant in three different ways. All hackers believed one or more of these. (a) no restrictions whatsoever b) no control whatsoever (c) doesn’t cost anything to use 3. Mistrust Authority: Hackers would want to promote decentralization. Most hackers show a lot of hate and distrust towards the state, corporations, and computer administrative bureaucracies. Tools like the computer and the Internet allowed hackers to gain power (and to take it away) from large organizations.
The new hacker ethic is to protect privacy, leave no traces, and self defense. The main motives for current hackers are monetary gain, intellectual challenges, vengeance, or terrorism. Reference: http://whiff. Du/?mismatch/Hackett. HTML 3. TCO 2) List and describe the four basic types of BIB transactions and activities. (Points : 35) The four basic types of BIB transactions are as follows: 1. Sell-side 2. Buy-side 3. Exchange 4. Supply chain improvements and collaborative commerce. A sell-side transaction focuses on one selling selling to many different buyers.
A buy-side transaction is one buyer purchasing goods/services from many different sellers. An exchange transaction involves many different sellers and buyers working together. The supply chain improvements and collaborative commerce transaction includes everything that the other transactions have, s well as providing supply chain improvements, communication, collaborating, and the sharing of ideas for joint designs, planning, and so on. Reference: Our Text pig 173. 4. (TCO 6) Discuss the role of intermediaries in BIB. Distinguish between buy- side and sell-side intermediaries. Points : 35) The major role of intermediaries in BIB transactions is to make sure that buy-side and sell-side conditionals coincide. Buy-side transactions focus on one buyer purchasing goods/services from many different sellers. The intermediaries job would be buy all the gods and services. In a sell-side transaction, the intermediaries old focus on selling goods and services to specific buyers. Question 5. 5. (TCO 6) Define procurement. (Points : 35) e-Procurement refers to web based procurement networks in which case one or multiple businesses source out their suppliers at the lowest possible price. -procurement can cause a lot of issues for buyers that purchase things individually. In a lot of cases, buyers engage in maverick buying in order to save time. An effective solution to such a e-Procurement problem is group all of the catalogs of any approved suppliers together, and combine them into one single electronic catalog. This way, the suppliers’ catalogs on their buyer’s server is easier to control all procurement. This type of aggregation is called an internal procurement marketplace. Reference: Our Text Peg 190 6. (TCO 3) Explain how personalization is done in e-Commerce. Points : 35) personalization in e-Commerce is the matching Of services, advertising content, and products with single clients and their specific preferences. This matching process is based on what a business knows about their specific client(s). If a company wants to keep clients interested in their products and services, then they need to offer them personalization. Acknowledging clients by offering them certain discounts based on past purchases would be one example of personalization. Set 2 (T CO 2) Mobile devices used in m-commerce include (Points : 5) cell phones and smart phones.