SlideShare a Scribd company logo
1 of 18
Why E-commerce?




Unit 8 e-commerce
  Adam Lawson
Benefits of E-commerce
Global Marketplace

 When there is a global presence a business can attract a
 global audience, compare to a local audience which is
 attracted by a traditional business.

 Advantages
 •Not limited to who can buy items from a business.


 •An example would be game because it can sell items
 they have in store to other people and place around the
 world.

                                                            P2
Benefits of E-commerce
24/7 Trading

there isn’t a store that needs to be staffed, Trading can be
carried out at any time during the day or even at night.
Trading can be done during any time zones around the world.

Advantages
•Store doesn’t have to close.
•Orders can be made at any point in the day/ night.

•24/7 trading has a big advantage over traditional trading
because a traditional store can only be opened during the
day, whereas 24/7 trading can be done anytime during the
day and during the night.
                                                             P2
Benefits of E-commerce
Low Start -up & Running Costs

 With low start –up & running costs an E-commerce
 business doesn’t need to spend lots of money to get up
 and running, whereas a traditional shop has to pay for the
 shop and all the shelves and counter to go in the shop.

 Advantages
 •Don’t have to spend lots of money on getting the business
 up and running.
 •Don’t need to employ lots of people to set the business up.

 •Costs that need to be considered when starting up a
 website would be

                                                                P2
Benefits of E-commerce
Search Facilities

  most e-commerce sites now have a search
  facility where it takes just seconds to find
  the product you want. There are often
  different criteria you can easily add to find
  exact product you looking for.




                                                  P2
Benefits of E-commerce
Fluid Pricing- Is when the price of a product is
increased or decreased quickly depending on the
situation. An example of this could be when selling
airline tickets, when there are only a few tickets
left to be sold, the ticket could become more
expensive as the demands for the last few tickets
increase. But on the other hand when selling
holiday tickets the price could go down as the time
draws closer the value of the tickets could go up to
ensure as many of the places are filled.

                                                  P2
Weaknesses of E-commerce
Consumer Trust- consumers may worry about
many different things when using an
ecommerce site, some of these worries would
be whether the company is legit, also worries
about their personal information being leaked
and security worries.




                                                P2
Weaknesses of E-commerce
Lack of Human Contact- many customers
are put off from purchasing products online
because they can not speak directly to a
member of staff from the company, many
people find this impersonal and tend to
prefer to talk face to face.




                                              P2
Weaknesses of E-commerce
Product Description Problems- some
consumers can worry whether the
description on a ecommerce is actually
describing the product properly. This is more
of a worry with colour options as some
computer may display the image in a slightly
different colour. Also the quality of the image
could be another problem for the consumers.


                                              P2
Weaknesses of E-commerce
Security issues- security is one of the main
issues for people using ecommerce
sites, this is because their financial details
may not be safe, that the business may use
them to do unauthorized things or the
security of their information may not be
sufficient enough.



                                                 P2
The Technology
A browser allows you to search through the internet. The user needs to
tell the browser which page to open. One way this is done is via the
browser’s address bar.
Features of browsers: title bar, address bar, scroll bar, status bar.
Examples of browsers: Firefox, safari, Google chrome, internet explorer.

Web Authoring Software allows people without the knowledge of web
coding. The software generates the required HTML coding for the layout
of the webpage. The user can change between the graphical design and
the HTML to make changes to the webpage.
Examples of the software: adobe Dreamweaver, FrontPage, online
software is also available on sites such as wix.com



                                                                      P1
The Technology
Database systems – an E-commerce site usually has a database
attached, This holds a catalogue of products and customer records.
example of an e-commerce site is that it allows users to sign in, this
means it will have a database that holds all the customers details. The
database should link seamlessly so that the user is unaware of it.



IP addresses are used to make sure the data reaches the correct location
on a network, each computer is given a unique number, called an IP
address. It is a set if four numbers each from 0 to 255. For example
185.5.28.255 would address a specific computer on a network.




                                                                      P1
The Technology
Ports & Protocols- a protocol is a set way of working, if
computers don’t use the same protocols then they wouldn’t
be able to understand the data being passed between them.
Ports are used to connect protocols and ip addresses together
every computer has several ports for data to pass
through, these ports are virtual so they cannot be seen.
Browser & Platform Compatibility- a browser
is a piece of software that allows you to go
through the internet and access different
websites.
Platform compatibility

                                                            P1
The Technology
Domain Names- a domain name is used with a web
address that allows you to identify a particular web
page. It is important to have a easy to remember
domain name so when someone accesses the internet
the name will come to mind.

Multiple Domain Registration- allows a web page to
have several domain names, so if a user type the
name incorrectly they will be directed to the correct
website.

                                                    P1
Security
Hacking- is finding a weakness in a system and
exploiting it, there are different reasons why someone
would hack a computer, such as profit, protest or a
challenge. When hacking into a computer you are
breaking the computer misuse act.
Hacking Prevention- a way to prevent
hacking would be to have a strong password
which is change every 90 days, also install
anti-virus software on the all computers.
Another way would be to ensure the
operating system that is installed is up to
date.                                              P3, M2
Security
Viruses- there are different types of viruses, that can
spread throughout the computer system. Trojan horse
is one of the viruses that you can get on your
computer this is usually passed through a piece of
software but doesn’t copy itself. Worms is passed
through an email and copies itself
Virus Prevention- a way to prevent viruses
would be have an up to date anti-virus
software installed, also don’t open emails if
you don’t know where they are from and
don’t download anything that is not trusted.
                                                  P3, M2
Security
ID Theft- is a form of fraud where someone uses
another persons identity, people do this to gain access
to resources or obtain credit or other benefits from
that person.

ID Theft Protection-a way to prevent id theft
when online would be to make sure you have a
secure webpage you can check this by looking at
the bottom of your web browser for a locked icon
or you could check your address bar to see if it says
http: at the beginning this means that the webpage
is secure and your information is encrypted
                                                        P3, M2
Security
Strong Passwords- is a way of protecting your
personal information and preventing this information
is vital. Using a unique password that consists of
letters and number is more secure than just letters or
just numbers, changing your password every 90 days
is a way of limiting a hackers’ ability to gain access to
your details. When a employee leaves a company their
username and password is immediately deleted, also
the company policy should state the consequences
faced when someone is found to be tampering with
the network.
                                                       P3

More Related Content

Similar to Unit 8 e commerce

Benefits of e commerce 1st assignment
Benefits of e commerce 1st assignmentBenefits of e commerce 1st assignment
Benefits of e commerce 1st assignmentbradfenney94
 
Unit8 a1 student_template
Unit8 a1 student_templateUnit8 a1 student_template
Unit8 a1 student_templateIronCheese
 
Unit 8 assignment 1
Unit 8   assignment 1Unit 8   assignment 1
Unit 8 assignment 1KingHarribo
 
Unit8 a1 student_template
Unit8 a1 student_templateUnit8 a1 student_template
Unit8 a1 student_templateNicoleeHughess
 
Unit8 a1 student_template done
Unit8 a1 student_template doneUnit8 a1 student_template done
Unit8 a1 student_template doneNicoleeHughess
 
Unit8 a1 student_template
Unit8 a1 student_templateUnit8 a1 student_template
Unit8 a1 student_templaterdgoddard
 
Unit 8 powerpoint complete
Unit 8 powerpoint completeUnit 8 powerpoint complete
Unit 8 powerpoint completedanpeerice
 
Unit 8 powerpoint complete
Unit 8 powerpoint completeUnit 8 powerpoint complete
Unit 8 powerpoint completedannypriceslides
 
Unit 8 powerpoint complete
Unit 8 powerpoint completeUnit 8 powerpoint complete
Unit 8 powerpoint completedannypriceslides
 
Unit8 a1 student_template
Unit8 a1 student_templateUnit8 a1 student_template
Unit8 a1 student_templateDannySD95
 
Shaun aldis main powerpoint
Shaun aldis main powerpointShaun aldis main powerpoint
Shaun aldis main powerpointShaunAldis
 
Unit 8 ecommerce p1
Unit 8   ecommerce p1Unit 8   ecommerce p1
Unit 8 ecommerce p1IronCheese
 
Unit8 a1 jaimie walsh
Unit8 a1 jaimie walshUnit8 a1 jaimie walsh
Unit8 a1 jaimie walshwalsha
 
Mybestdomainregistrar
MybestdomainregistrarMybestdomainregistrar
Mybestdomainregistrarandrewmark111
 
What Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdfWhat Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdfHost It Smart
 
Impact of Insecure Communications
Impact of Insecure CommunicationsImpact of Insecure Communications
Impact of Insecure CommunicationsKavika Roy
 

Similar to Unit 8 e commerce (20)

Benefits of e commerce 1st assignment
Benefits of e commerce 1st assignmentBenefits of e commerce 1st assignment
Benefits of e commerce 1st assignment
 
Unit8 a1 student_template
Unit8 a1 student_templateUnit8 a1 student_template
Unit8 a1 student_template
 
Unit 8 assignment 1
Unit 8   assignment 1Unit 8   assignment 1
Unit 8 assignment 1
 
Unit8 a1 student_template
Unit8 a1 student_templateUnit8 a1 student_template
Unit8 a1 student_template
 
Unit8 a1 student_template done
Unit8 a1 student_template doneUnit8 a1 student_template done
Unit8 a1 student_template done
 
Unit8 a1 student_template
Unit8 a1 student_templateUnit8 a1 student_template
Unit8 a1 student_template
 
Unit 8 powerpoint complete
Unit 8 powerpoint completeUnit 8 powerpoint complete
Unit 8 powerpoint complete
 
Unit 8 powerpoint complete
Unit 8 powerpoint completeUnit 8 powerpoint complete
Unit 8 powerpoint complete
 
Unit 8 powerpoint complete
Unit 8 powerpoint completeUnit 8 powerpoint complete
Unit 8 powerpoint complete
 
Unit8 a1 student_template
Unit8 a1 student_templateUnit8 a1 student_template
Unit8 a1 student_template
 
E commerce
E commerceE commerce
E commerce
 
Shaun aldis main powerpoint
Shaun aldis main powerpointShaun aldis main powerpoint
Shaun aldis main powerpoint
 
Unit 8 ecommerce p1
Unit 8   ecommerce p1Unit 8   ecommerce p1
Unit 8 ecommerce p1
 
Unit8 a1 jaimie walsh
Unit8 a1 jaimie walshUnit8 a1 jaimie walsh
Unit8 a1 jaimie walsh
 
Mybestdomainregistrar
MybestdomainregistrarMybestdomainregistrar
Mybestdomainregistrar
 
E commerce
E commerceE commerce
E commerce
 
What Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdfWhat Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdf
 
Unit 8 ass 1
Unit 8 ass 1Unit 8 ass 1
Unit 8 ass 1
 
Impact of Insecure Communications
Impact of Insecure CommunicationsImpact of Insecure Communications
Impact of Insecure Communications
 
Module 10 e security-en
Module 10 e security-enModule 10 e security-en
Module 10 e security-en
 

Unit 8 e commerce

  • 1. Why E-commerce? Unit 8 e-commerce Adam Lawson
  • 2. Benefits of E-commerce Global Marketplace When there is a global presence a business can attract a global audience, compare to a local audience which is attracted by a traditional business. Advantages •Not limited to who can buy items from a business. •An example would be game because it can sell items they have in store to other people and place around the world. P2
  • 3. Benefits of E-commerce 24/7 Trading there isn’t a store that needs to be staffed, Trading can be carried out at any time during the day or even at night. Trading can be done during any time zones around the world. Advantages •Store doesn’t have to close. •Orders can be made at any point in the day/ night. •24/7 trading has a big advantage over traditional trading because a traditional store can only be opened during the day, whereas 24/7 trading can be done anytime during the day and during the night. P2
  • 4. Benefits of E-commerce Low Start -up & Running Costs With low start –up & running costs an E-commerce business doesn’t need to spend lots of money to get up and running, whereas a traditional shop has to pay for the shop and all the shelves and counter to go in the shop. Advantages •Don’t have to spend lots of money on getting the business up and running. •Don’t need to employ lots of people to set the business up. •Costs that need to be considered when starting up a website would be P2
  • 5. Benefits of E-commerce Search Facilities most e-commerce sites now have a search facility where it takes just seconds to find the product you want. There are often different criteria you can easily add to find exact product you looking for. P2
  • 6. Benefits of E-commerce Fluid Pricing- Is when the price of a product is increased or decreased quickly depending on the situation. An example of this could be when selling airline tickets, when there are only a few tickets left to be sold, the ticket could become more expensive as the demands for the last few tickets increase. But on the other hand when selling holiday tickets the price could go down as the time draws closer the value of the tickets could go up to ensure as many of the places are filled. P2
  • 7. Weaknesses of E-commerce Consumer Trust- consumers may worry about many different things when using an ecommerce site, some of these worries would be whether the company is legit, also worries about their personal information being leaked and security worries. P2
  • 8. Weaknesses of E-commerce Lack of Human Contact- many customers are put off from purchasing products online because they can not speak directly to a member of staff from the company, many people find this impersonal and tend to prefer to talk face to face. P2
  • 9. Weaknesses of E-commerce Product Description Problems- some consumers can worry whether the description on a ecommerce is actually describing the product properly. This is more of a worry with colour options as some computer may display the image in a slightly different colour. Also the quality of the image could be another problem for the consumers. P2
  • 10. Weaknesses of E-commerce Security issues- security is one of the main issues for people using ecommerce sites, this is because their financial details may not be safe, that the business may use them to do unauthorized things or the security of their information may not be sufficient enough. P2
  • 11. The Technology A browser allows you to search through the internet. The user needs to tell the browser which page to open. One way this is done is via the browser’s address bar. Features of browsers: title bar, address bar, scroll bar, status bar. Examples of browsers: Firefox, safari, Google chrome, internet explorer. Web Authoring Software allows people without the knowledge of web coding. The software generates the required HTML coding for the layout of the webpage. The user can change between the graphical design and the HTML to make changes to the webpage. Examples of the software: adobe Dreamweaver, FrontPage, online software is also available on sites such as wix.com P1
  • 12. The Technology Database systems – an E-commerce site usually has a database attached, This holds a catalogue of products and customer records. example of an e-commerce site is that it allows users to sign in, this means it will have a database that holds all the customers details. The database should link seamlessly so that the user is unaware of it. IP addresses are used to make sure the data reaches the correct location on a network, each computer is given a unique number, called an IP address. It is a set if four numbers each from 0 to 255. For example 185.5.28.255 would address a specific computer on a network. P1
  • 13. The Technology Ports & Protocols- a protocol is a set way of working, if computers don’t use the same protocols then they wouldn’t be able to understand the data being passed between them. Ports are used to connect protocols and ip addresses together every computer has several ports for data to pass through, these ports are virtual so they cannot be seen. Browser & Platform Compatibility- a browser is a piece of software that allows you to go through the internet and access different websites. Platform compatibility P1
  • 14. The Technology Domain Names- a domain name is used with a web address that allows you to identify a particular web page. It is important to have a easy to remember domain name so when someone accesses the internet the name will come to mind. Multiple Domain Registration- allows a web page to have several domain names, so if a user type the name incorrectly they will be directed to the correct website. P1
  • 15. Security Hacking- is finding a weakness in a system and exploiting it, there are different reasons why someone would hack a computer, such as profit, protest or a challenge. When hacking into a computer you are breaking the computer misuse act. Hacking Prevention- a way to prevent hacking would be to have a strong password which is change every 90 days, also install anti-virus software on the all computers. Another way would be to ensure the operating system that is installed is up to date. P3, M2
  • 16. Security Viruses- there are different types of viruses, that can spread throughout the computer system. Trojan horse is one of the viruses that you can get on your computer this is usually passed through a piece of software but doesn’t copy itself. Worms is passed through an email and copies itself Virus Prevention- a way to prevent viruses would be have an up to date anti-virus software installed, also don’t open emails if you don’t know where they are from and don’t download anything that is not trusted. P3, M2
  • 17. Security ID Theft- is a form of fraud where someone uses another persons identity, people do this to gain access to resources or obtain credit or other benefits from that person. ID Theft Protection-a way to prevent id theft when online would be to make sure you have a secure webpage you can check this by looking at the bottom of your web browser for a locked icon or you could check your address bar to see if it says http: at the beginning this means that the webpage is secure and your information is encrypted P3, M2
  • 18. Security Strong Passwords- is a way of protecting your personal information and preventing this information is vital. Using a unique password that consists of letters and number is more secure than just letters or just numbers, changing your password every 90 days is a way of limiting a hackers’ ability to gain access to your details. When a employee leaves a company their username and password is immediately deleted, also the company policy should state the consequences faced when someone is found to be tampering with the network. P3