SlideShare a Scribd company logo
COMPUTER APPLICATIONS
CLASS X (Code 165)
TOPIC:
UNIT 3: Cyber Ethics : E-commerce
By
HIMANSHU PATHAK
Contents
• Introduction
• Types of E-commerce
• Advantages of E-commerce
• Drawbacks of E-commerce
– Security Threats
– Privacy
– Fraud
• Secure Data transmission
– Security Measures
– Secure Socket Layer
Introduction
• E-commerce is also known as electronic
commerce or internet commerce.
• E-Commerce means buying and selling of
goods, products, or services over the internet.
• The standard definition of E-commerce is
a commercial transaction which is happened
over the internet.
• Online stores like Amazon, Flipkart, Myntra, Olx
are some examples of E-commerce websites.
Cont…
• To understand what e-commerce is with an
example, consider a scenario wherein we log in
to the Flipkart website.
• On this website, we get the chance to interact
with the vendor, get information about the
product like images, and detailed descriptions in
the form of text.
• If we like the product, we place the order by
sharing a delivery address and making the final
payment.
Types of E - Commerce
• Business to Business (B2B)
– Here the companies are doing business with each
other.
– The end consumer is not involved in any transaction.
– So the online transactions only involve
the manufacturers, wholesalers, retailers etc.
• Business to Consumer (B2C)
– Here the company will sell their goods and/or
services directly to the consumer.
– Popular examples are Amazon, Flipkart etc.
Cont…
• Consumer to Consumer (C2C)
– The consumers are in direct contact with each other.
– No company is involved.
– It helps people sell their personal goods and assets
directly to an interested party.
– OLX, Quikr etc follow this model.
• Consumer to Business (C2B)
– This is the reverse of B2C.
– So the consumer provides a good or some service to
the company.
– Say for example an IT freelancer who demos and sells his
software to a company.
Advantages of E - Commerce
• E-commerce has eliminated the geographical
barrier. Buyer and seller can communicate from
any part of the world.
• E-commerce is the 24*7 available shop, i.e. the
website is available at any time for shopping.
• It provides quick delivery of goods.
• Customer complaints are also addressed quickly.
Drawbacks of E - Commerce
• The start-up cost of e-commerce is high.
• Not all websites get success.
• Security is the primary concern in e-commerce.
• Due to interaction in the online medium,
miscommunication between customer and
company occurs.
• There are also incidents when the shipments are
misplaced, or the wrong order is delivered.
Security Threats
• Threat can be anything that can take advantage
of a vulnerability to breach security.
• Software attacks means attack by viruses,
Worms, Trojan Horse etc.
• Virus is malicious codes/program that causes to
data and files on a system.
• A Worm is a self replicating program which eat
up the entire disk space.
• Trojan horse is a program that appears harmless
code but actual performs malicious function.
Privacy
• Privacy means the extent to which a user’s data is kept
secret.
• It is the most important factor because it builds trust
among users/ customers.
• During an online transaction, many personal details of
customers such as credit/ debit card numbers, contact
information, etc. are provided to the merchant company.
• Sometimes they sell it to other companies to make profits
which may lead to cyber-crime against the user.
• Thus, it is important to protect the privacy of the user.
• To do so, merchant companies use HTTPS/ SSL protocol
along with firewall.
Fraud
• Fraud is an act of cheating user by various
means to steal his wealth.
• E-commerce is any type of false or illegal
transaction completed by someone from a bank
account of other person without his/her
permission. It is also called Cyber Crime.
• Some examples are charity fraud, online ticket
fraud, online gambling fraud, prize claiming etc.
Secure Data Transmission
• Following are the essential requirements for safe
e-commerce transaction:
– Confidentiality: Information should not be accessible
to an unauthorized person.
– Availability: Information should be provided
wherever and whenever required within time limit.
– Authenticity: There should be a mechanism to
authenticate a user.
Security Measures
• Encryption: Sender send the data after
encryption by using cypher code and only
authorized user who has a decrypt key, only get
information.
• Digital Signature: It ensures the authenticity of
the information.
• Security certificates: It is a unique digital id used
to verify the identity of an individual website or
user.
Secure Socket Layer - SSL
• Secure Data Transmission is the transfer of
data over a secure channel using encrypting
protocols such as SSL, SSH etc.
• Secure Socket Layer is the most commonly
used protocol and have the following security
measure:
– Authentication
– Encryption
– Integrity
Summary
• We learned:
E-commerce & their related issues.
• In the next class, we will start Unit IV –
Scratch in detail.
•Thanks

More Related Content

What's hot

Digital law
Digital lawDigital law
Digital law
zrh48
 
Copyright in video
Copyright in videoCopyright in video
Copyright in video
Bob182003
 
Module 8 security and ethical challenges
Module 8 security and ethical challengesModule 8 security and ethical challenges
Module 8 security and ethical challenges
CRM
 
Computer And The Law
Computer And The LawComputer And The Law
Computer And The LawSaimaRafiq
 
legal and ethcal issues of e business
legal and ethcal issues of e businesslegal and ethcal issues of e business
legal and ethcal issues of e business
Kdnk Kiriti
 
Intellectual Property in Cyberspace
Intellectual Property in CyberspaceIntellectual Property in Cyberspace
Intellectual Property in Cyberspace
Mindaugas Kiskis
 
Cyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12thCyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12th
Kartik Chhabra
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshiplarkinsa
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
Jennifer Polack
 
Intellectual Property
Intellectual PropertyIntellectual Property
Intellectual Property
Nazrul Islam
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodcharvill
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computer
Abdullah Khosa
 
digital law
digital lawdigital law
digital law11tsk
 
Ethical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on ComputingEthical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on Computing
Laguna State Polytechnic University
 
Digital Rights Management for Ebooks
Digital Rights Management for EbooksDigital Rights Management for Ebooks
Digital Rights Management for Ebooks
eBOUND Canada
 
A Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information TechnologyA Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information Technology
Laguna State Polytechnic University
 
Chap 8
Chap 8Chap 8
Chap 8
GTU
 

What's hot (20)

Digital law
Digital lawDigital law
Digital law
 
Copyright in video
Copyright in videoCopyright in video
Copyright in video
 
Module 8 security and ethical challenges
Module 8 security and ethical challengesModule 8 security and ethical challenges
Module 8 security and ethical challenges
 
Computer And The Law
Computer And The LawComputer And The Law
Computer And The Law
 
legal and ethcal issues of e business
legal and ethcal issues of e businesslegal and ethcal issues of e business
legal and ethcal issues of e business
 
Intellectual Property in Cyberspace
Intellectual Property in CyberspaceIntellectual Property in Cyberspace
Intellectual Property in Cyberspace
 
Cyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12thCyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12th
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Intellectual Property
Intellectual PropertyIntellectual Property
Intellectual Property
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computer
 
digital law
digital lawdigital law
digital law
 
Ethical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on ComputingEthical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on Computing
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
Digital Rights Management for Ebooks
Digital Rights Management for EbooksDigital Rights Management for Ebooks
Digital Rights Management for Ebooks
 
DRM Powerpoint
DRM PowerpointDRM Powerpoint
DRM Powerpoint
 
A Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information TechnologyA Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information Technology
 
Chap 8
Chap 8Chap 8
Chap 8
 

Similar to Introduction to E commerce

Unit 3B.pdf
Unit 3B.pdfUnit 3B.pdf
Unit 3B.pdf
TuhinUtsabPaul
 
Electronic Commerce
Electronic CommerceElectronic Commerce
Electronic Commerce
SanjaySharma1059
 
E commerce(report)
E commerce(report)E commerce(report)
E commerce(report)
Delmer Gerald Calderon
 
security threats.pptx
security threats.pptxsecurity threats.pptx
security threats.pptx
Surajsingh809614
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...Rishav Gupta
 
Security issues in E-commerce
Security issues in E-commerceSecurity issues in E-commerce
Security issues in E-commerce
nikitaTahilyani1
 
6. Security Threats with E-Commerce
6. Security Threats with E-Commerce6. Security Threats with E-Commerce
6. Security Threats with E-CommerceJitendra Tomar
 
E commerce security
E commerce securityE commerce security
E commerce security
Roha1234567
 
Module 10 e security-en
Module 10 e security-enModule 10 e security-en
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
Dumindu Pahalawatta
 
E commerce & and e-buisiness
E commerce & and e-buisinessE commerce & and e-buisiness
E commerce & and e-buisiness
AbhijithV24
 
Cybercrime
CybercrimeCybercrime
Cybercrime
deepika28g
 
academic model.docx
academic model.docxacademic model.docx
academic model.docx
freelancer
 
E-commerce.pptx
E-commerce.pptxE-commerce.pptx
E-commerce.pptx
Vedansh Bokolia
 
e-commerce
e-commercee-commerce
e-commerce
benouini rachid
 
E Commerce -Security Threats and Challenges
E Commerce -Security Threats and ChallengesE Commerce -Security Threats and Challenges
E Commerce -Security Threats and Challenges
Inderjeet Singh
 
Cyber security best practices power point presentation
Cyber security best practices power point presentationCyber security best practices power point presentation
Cyber security best practices power point presentation
AbcdEfg576575
 
Lecture 13 -_e-commmerce_e-banking_and_advanced_tech
Lecture 13 -_e-commmerce_e-banking_and_advanced_techLecture 13 -_e-commmerce_e-banking_and_advanced_tech
Lecture 13 -_e-commmerce_e-banking_and_advanced_techSerious_SamSoul
 

Similar to Introduction to E commerce (20)

Unit 3B.pdf
Unit 3B.pdfUnit 3B.pdf
Unit 3B.pdf
 
Chapter7
Chapter7Chapter7
Chapter7
 
Electronic Commerce
Electronic CommerceElectronic Commerce
Electronic Commerce
 
E commerce(report)
E commerce(report)E commerce(report)
E commerce(report)
 
security threats.pptx
security threats.pptxsecurity threats.pptx
security threats.pptx
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...
 
Security issues in E-commerce
Security issues in E-commerceSecurity issues in E-commerce
Security issues in E-commerce
 
6. Security Threats with E-Commerce
6. Security Threats with E-Commerce6. Security Threats with E-Commerce
6. Security Threats with E-Commerce
 
E commerce security
E commerce securityE commerce security
E commerce security
 
Module 10 e security-en
Module 10 e security-enModule 10 e security-en
Module 10 e security-en
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
E-commerce
E-commerceE-commerce
E-commerce
 
E commerce & and e-buisiness
E commerce & and e-buisinessE commerce & and e-buisiness
E commerce & and e-buisiness
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
academic model.docx
academic model.docxacademic model.docx
academic model.docx
 
E-commerce.pptx
E-commerce.pptxE-commerce.pptx
E-commerce.pptx
 
e-commerce
e-commercee-commerce
e-commerce
 
E Commerce -Security Threats and Challenges
E Commerce -Security Threats and ChallengesE Commerce -Security Threats and Challenges
E Commerce -Security Threats and Challenges
 
Cyber security best practices power point presentation
Cyber security best practices power point presentationCyber security best practices power point presentation
Cyber security best practices power point presentation
 
Lecture 13 -_e-commmerce_e-banking_and_advanced_tech
Lecture 13 -_e-commmerce_e-banking_and_advanced_techLecture 13 -_e-commmerce_e-banking_and_advanced_tech
Lecture 13 -_e-commmerce_e-banking_and_advanced_tech
 

More from Himanshu Pathak

Intellectual property rights
Intellectual property rightsIntellectual property rights
Intellectual property rights
Himanshu Pathak
 
An Introduction to Cyber Ethics
An Introduction to Cyber EthicsAn Introduction to Cyber Ethics
An Introduction to Cyber Ethics
Himanshu Pathak
 
Cascading style sheet part 2
Cascading style sheet   part 2Cascading style sheet   part 2
Cascading style sheet part 2
Himanshu Pathak
 
Cascading style sheet an introduction
Cascading style sheet   an introductionCascading style sheet   an introduction
Cascading style sheet an introduction
Himanshu Pathak
 
Html multimedia
Html multimediaHtml multimedia
Html multimedia
Himanshu Pathak
 
Html forms
Html formsHtml forms
Html forms
Himanshu Pathak
 
Html tables
Html tablesHtml tables
Html tables
Himanshu Pathak
 
Html link and list tags
Html link and list tagsHtml link and list tags
Html link and list tags
Himanshu Pathak
 
HTML Text formatting tags
HTML Text formatting tagsHTML Text formatting tags
HTML Text formatting tags
Himanshu Pathak
 
Basic html tags
Basic html tagsBasic html tags
Basic html tags
Himanshu Pathak
 
Introduction to html
Introduction to htmlIntroduction to html
Introduction to html
Himanshu Pathak
 
Mobile technologies
Mobile technologiesMobile technologies
Mobile technologies
Himanshu Pathak
 
Web services
Web servicesWeb services
Web services
Himanshu Pathak
 
Remote Login and File Transfer Protocols
Remote Login and File Transfer ProtocolsRemote Login and File Transfer Protocols
Remote Login and File Transfer Protocols
Himanshu Pathak
 
Internet protocol
Internet protocolInternet protocol
Internet protocol
Himanshu Pathak
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
Himanshu Pathak
 
What is Computer?
What is Computer?What is Computer?
What is Computer?
Himanshu Pathak
 

More from Himanshu Pathak (17)

Intellectual property rights
Intellectual property rightsIntellectual property rights
Intellectual property rights
 
An Introduction to Cyber Ethics
An Introduction to Cyber EthicsAn Introduction to Cyber Ethics
An Introduction to Cyber Ethics
 
Cascading style sheet part 2
Cascading style sheet   part 2Cascading style sheet   part 2
Cascading style sheet part 2
 
Cascading style sheet an introduction
Cascading style sheet   an introductionCascading style sheet   an introduction
Cascading style sheet an introduction
 
Html multimedia
Html multimediaHtml multimedia
Html multimedia
 
Html forms
Html formsHtml forms
Html forms
 
Html tables
Html tablesHtml tables
Html tables
 
Html link and list tags
Html link and list tagsHtml link and list tags
Html link and list tags
 
HTML Text formatting tags
HTML Text formatting tagsHTML Text formatting tags
HTML Text formatting tags
 
Basic html tags
Basic html tagsBasic html tags
Basic html tags
 
Introduction to html
Introduction to htmlIntroduction to html
Introduction to html
 
Mobile technologies
Mobile technologiesMobile technologies
Mobile technologies
 
Web services
Web servicesWeb services
Web services
 
Remote Login and File Transfer Protocols
Remote Login and File Transfer ProtocolsRemote Login and File Transfer Protocols
Remote Login and File Transfer Protocols
 
Internet protocol
Internet protocolInternet protocol
Internet protocol
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
 
What is Computer?
What is Computer?What is Computer?
What is Computer?
 

Recently uploaded

678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 

Recently uploaded (20)

678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 

Introduction to E commerce

  • 1. COMPUTER APPLICATIONS CLASS X (Code 165) TOPIC: UNIT 3: Cyber Ethics : E-commerce By HIMANSHU PATHAK
  • 2. Contents • Introduction • Types of E-commerce • Advantages of E-commerce • Drawbacks of E-commerce – Security Threats – Privacy – Fraud • Secure Data transmission – Security Measures – Secure Socket Layer
  • 3. Introduction • E-commerce is also known as electronic commerce or internet commerce. • E-Commerce means buying and selling of goods, products, or services over the internet. • The standard definition of E-commerce is a commercial transaction which is happened over the internet. • Online stores like Amazon, Flipkart, Myntra, Olx are some examples of E-commerce websites.
  • 4. Cont… • To understand what e-commerce is with an example, consider a scenario wherein we log in to the Flipkart website. • On this website, we get the chance to interact with the vendor, get information about the product like images, and detailed descriptions in the form of text. • If we like the product, we place the order by sharing a delivery address and making the final payment.
  • 5. Types of E - Commerce • Business to Business (B2B) – Here the companies are doing business with each other. – The end consumer is not involved in any transaction. – So the online transactions only involve the manufacturers, wholesalers, retailers etc. • Business to Consumer (B2C) – Here the company will sell their goods and/or services directly to the consumer. – Popular examples are Amazon, Flipkart etc.
  • 6. Cont… • Consumer to Consumer (C2C) – The consumers are in direct contact with each other. – No company is involved. – It helps people sell their personal goods and assets directly to an interested party. – OLX, Quikr etc follow this model. • Consumer to Business (C2B) – This is the reverse of B2C. – So the consumer provides a good or some service to the company. – Say for example an IT freelancer who demos and sells his software to a company.
  • 7. Advantages of E - Commerce • E-commerce has eliminated the geographical barrier. Buyer and seller can communicate from any part of the world. • E-commerce is the 24*7 available shop, i.e. the website is available at any time for shopping. • It provides quick delivery of goods. • Customer complaints are also addressed quickly.
  • 8. Drawbacks of E - Commerce • The start-up cost of e-commerce is high. • Not all websites get success. • Security is the primary concern in e-commerce. • Due to interaction in the online medium, miscommunication between customer and company occurs. • There are also incidents when the shipments are misplaced, or the wrong order is delivered.
  • 9. Security Threats • Threat can be anything that can take advantage of a vulnerability to breach security. • Software attacks means attack by viruses, Worms, Trojan Horse etc. • Virus is malicious codes/program that causes to data and files on a system. • A Worm is a self replicating program which eat up the entire disk space. • Trojan horse is a program that appears harmless code but actual performs malicious function.
  • 10. Privacy • Privacy means the extent to which a user’s data is kept secret. • It is the most important factor because it builds trust among users/ customers. • During an online transaction, many personal details of customers such as credit/ debit card numbers, contact information, etc. are provided to the merchant company. • Sometimes they sell it to other companies to make profits which may lead to cyber-crime against the user. • Thus, it is important to protect the privacy of the user. • To do so, merchant companies use HTTPS/ SSL protocol along with firewall.
  • 11. Fraud • Fraud is an act of cheating user by various means to steal his wealth. • E-commerce is any type of false or illegal transaction completed by someone from a bank account of other person without his/her permission. It is also called Cyber Crime. • Some examples are charity fraud, online ticket fraud, online gambling fraud, prize claiming etc.
  • 12. Secure Data Transmission • Following are the essential requirements for safe e-commerce transaction: – Confidentiality: Information should not be accessible to an unauthorized person. – Availability: Information should be provided wherever and whenever required within time limit. – Authenticity: There should be a mechanism to authenticate a user.
  • 13. Security Measures • Encryption: Sender send the data after encryption by using cypher code and only authorized user who has a decrypt key, only get information. • Digital Signature: It ensures the authenticity of the information. • Security certificates: It is a unique digital id used to verify the identity of an individual website or user.
  • 14. Secure Socket Layer - SSL • Secure Data Transmission is the transfer of data over a secure channel using encrypting protocols such as SSL, SSH etc. • Secure Socket Layer is the most commonly used protocol and have the following security measure: – Authentication – Encryption – Integrity
  • 15. Summary • We learned: E-commerce & their related issues. • In the next class, we will start Unit IV – Scratch in detail. •Thanks