Professional Documents
Culture Documents
Electronic commerce, commonly known as e-commerce, ecommerce or e-comm, consists of the buying and selling of products or services over electronic systems such as the Internet and other networks. It is more than just buying and selling products online. It also includes the entire online process of Developing, marketing, selling, delivering, servicing and paying for products and services. The amount of trade conducted electronically has grown extraordinarily with widespread Internet usage. The use of commerce is conducted in this way, spurring and drawing on innovations in electronic funds transfer, supply chain management, Internet marketing, online transaction processing, electronic data interchange (EDI), inventory management systems, and automated data collection systems. Modern electronic commerce typically uses the World Wide Web at least at some point in the transaction's lifecycle, although it can encompass a wider range of technologies such as e-mail, mobile devices and telephones as well. By Peter Fingar, there are three Pillars of Electronic Commerce model: Three electronic pillars support open market processes: electronic information, electronic relationships, and electronic transactions. Thus, this model builds on the existing market space and utilizes electronic mechanisms as an enabler of supporting open market processes. The first pillar, electronic information, is similar to Angehrns virtual information space. The WWW is viewed as a global repository of documents and multimedia data. Constructing an electronic information pillar is easy: most word processing software packages will easily convert documents into a web-readable format. The challenge is to construct a good, solid pillar that will not crumble, or in WWW terms, the web page does not freeze-up or links do not lead the visitor to a dead-end or having them wandering through a maze of links without easily finding the necessary information. Thus, the construction of the electronic information pillar should not be conducted in a shoddy fashion, or it will not adequately support the objective of an open market. The retrieval of the desired electronic information is the cause of frustration to many web surfers. Search engines and other intelligent agents are increasing in popularity to assist users to more efficiently and effectively navigate the WWW.
The second pillar, electronic relationships, is the central pillar, and is similar to Angehrns virtual communication space. The saying If you build it, they will come does not apply to website based electronic commerce. Placing information on products and service offerings on a web site does not mean that potential customers or guests will visit that web site a first time, and it especially does not mean that a user will return to the site. The electronic relationships pillar is about building a site that has the feeling of being a port of entry into a community. Having entrants pass through this port of entry on a somewhat regular basis is the key to successfully engaging in electronic commerce. In order to attract users over and over again to a site (which also means away from other sites), the site needs to have certain features; it must: Be innovative; Add value; Provide information and interaction not otherwise available; and Create forums for opinion-building activities. The third pillar is the Electronic transactions pillar. This pillar is similar to Angehrns virtual transaction space, and also encompasses Angehrns virtual distribution space. Many businesses have build an electronic information pillar and some have build or are building an electronic community pillar, but substantially fewer have constructed the electronic transaction pillar. Two impediments to constructing the pillar exist: the ability to engage in meaningful and sufficient negotiation processes and security of transaction data.
organizations to reengineer information flows and business processes. It directly addresses several problems long associated with paper-based transaction systems:
Time delaysPaper documents may take days to transport from one location to another, while manual processing methodologies necessitate steps like keying and filing that are rendered unnecessary through EDI. Labor costsIn non-EDI systems, manual processing is required for data keying, document storage and retrieval, sorting, matching, reconciling, envelope stuffing, stamping, signing, etc. While automated equipment can help with some of these processes, most managers will agree that labor costs for document processing represent a significant proportion of their overhead. In general, labor-based processes are much more expensive in the long term EDI alternatives. AccuracyEDI systems are more accurate than their manual processing counterparts because there are fewer points at which errors can be introduced into the system. Information AccessEDI systems permit myriad users access to a vast amount of detailed transaction data in a timely fashion. In a non-EDI environment, in which information is held in offices and file cabinets, such dissemination of information is possible only with great effort, and it cannot hope to match an EDI system's timeliness. Because EDI data is already in computer-retrievable form, it is subject to automated processing and analysis. It also requires far less storage space.
Moreover,in order for business to invest resources to engage in electronic commerce, the benefits must exceed the costs. So the following are the benefits can businesses potentially gain from engaging in electronic commerce: Internet and web-based electronic commerce is more affordable than traditional EDI; Internet and web-based electronic commerce allows more business partners to be reached than with traditional EDI; Internet and web-based electronic commerce can reach a more geographically dispersed customer base; Procurement processing costs can be lowered; Cost of purchases can be lowered; Reductions in inventories; Lower cycle times; Better customer service; and Lower sales and marketing costs.
References: Emmelhainz, Margaret A. EDI: A Total Management Guide. Van Nostrand Reinhold, 1993. Hill, Ned C., and Daniel M. Ferguson. "Electronic Data Interchange: A Definition and Perspective." EDI FORUM: The Journal of Electronic Data Interchange. March 1989. Laudon, Kenneth C., and Jane Price Laudon. Management Information Systems: A Contemporary Perspective. Macmillan, 1991.
Phillipus, Michael D. "Applying Electronic Data Interchange." Risk Management. April 1998. Rhodes, Wayne L., Jr. "Will the Internet Breath Life Into or Kill EDI." AS/400 Systems Management. October 1998. Kantor, Michael; James H. Burrows (1996-04-29). "Electronic Data Interchange (EDI)". National Institute of Standards and Technology. http://www.answers.com/topic/electronic-data-interchange#ixzz1JmAtvkWJ http://www.answers.com/topic/electronic-data-interchange#ixzz1Jm6Ok52H
Session (Layer 5) This layer establishes, manages and terminates connections between applications. The session layer sets up, coordinates, and terminates conversations, exchanges, and dialogues between the applications at each end. It deals with session and connection coordination. Transport (Layer 4) This layer provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-end error recovery and flow control. It ensures complete data transfer. Network (Layer 3) This layer provides switching and routing technologies, creating logical paths, known as virtual circuits, for transmitting data from node to node. Routing and forwarding are functions of this layer, as well as addressing, internetworking, error handling, congestion control and packet sequencing. Data Link (Layer 2) At this layer, data packets are encoded and decoded into bits. It furnishes transmission protocol knowledge and management and handles errors in the physical layer, flow control and frame synchronization. The data link layer is divided into two sub layers: The Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. The MAC sub layer controls how a computer on the network gains access to the data and permission to transmit it. The LLC layer controls frame synchronization, flow control and error checking. Physical (Layer 1) This layer conveys the bit stream - electrical impulse, light or radio signal -- through the network at the electrical and mechanical level. It provides the hardware means of sending and receiving data on a carrier, including defining cables, cards and physical aspects. Fast Ethernet, RS232, and ATM are protocols with physical layer components. Reference: http://www.doc.ua.pt/arch/itu/rec/product/X.htm : X.200 : Information technology - Open Systems Interconnection - Basic Reference Model: The basic model. X.207 : Information technology - Open Systems Interconnection - Application layer structure X.210 : Information technology - Open systems interconnection - Basic Reference Model: Conventions for the definition of OSI services X.211 : Information technology - Open systems interconnection - Physical service definition.
How to Configure Packet Filters There are three basic steps to packet filtering: 1. Knowing what to permit and what to restrict. 2. Formally defining packets that should be permitted and restricted. 3. Translating formal definitions to router syntax. Step 1. Decide what to permit and what to restrict. As a first step, you must decide, on a conceptual level, what services are approved and which are restricted. For example, do all the machines on your LAN accept mail from the Internet, or is it done by one central machine (i.e., an SMTP Gateway)? The best security policy is to restrict all packets except those expressly permitted. To simplify the procedure, we have three examples of filtering policies with the configuration for your router. Please refer to the primary page for these. Step 2. Formally define rules. Now that you have a conceptual security policy, you need to formally define it in such a way which allows easy translation into vendor syntax. A good template to work under is the following: Action Source deny allow Port Destination Port Type
xxx.xxx.xxx.xxx #### xxx.xxx.xxx.xxx #### (type) xxx.xxx.xxx.xxx #### xxx.xxx.xxx.xxx #### (type)
When designing rules, order of the rules count. When a packet meets a rule, the rest of the rules are ignored. TCP packet streams flow in two directions. Even though data is flowing in one direction, acknowledgment packets and control packets must flow the other way. All our customers have free and unlimited customer support. We will be more than happy to assist with any and all aspects of packet filtering, from the concepts to the technical implementations. Furthermore, since this router is Certified and Supported, we have experience with the nuances of the vendor specific syntax for implementing your packet filter policies!
Step 3. Translate into vendor specific syntax. Take a look at our Automated Filter Builder to convert your security profile to the syntax for your router. Reference: www.webopedia.com
Normally, a good planning involves considering the following objectives: Assessment of vulnerabilities Prevention and reduction of risk Creation of cost-effective solutions Minimization of business interruption and assurance of business continuity Securing alternative Internet access modes Recovery of lost data Providing disaster recovery procedures Training employees for disaster recovery scenarios
In designing a plan, the primary goal is to reduce the interruption of business and to ensure business continuity. For firms that have electronic commerce as mission-critical applications, alternative ISPs, web servers, and necessary databases and web-based programs must be readily and rapidly available. Disaster recovery plans, in order to be conducted properly, need support from top management because these plans can use substantial firm resources, both financial and human. Further, disaster recovery plans should be updated continuously as the operations change that they are intended to replace or supplement. An outdated plan may have been brilliant when it was created, but if it no longer reflects reality, it will be useless or less than sufficient when a disaster strikes.
References: www.disaster-recovery-guide.com