Principles of Information Systems
13th Edition
ISBN: 9781337660556
Author: Ralph Stair; George Reynolds
Publisher: Cengage Learning US
expand_more
expand_more
format_list_bulleted
Question
Chapter 7, Problem 3TA
Program Plan Intro
Electronic commerce:
- Electronic commerce is a method of buying and selling of products or goods through online. Here, money and data transactions are done using internet.
- Electronic commerce is also called as E-commerce or Internet commerce.
- Even though the technologies available such as e-mail, social media, and mobiles, the modern e-commerce mostly uses the Internet for the online purchasing of products.
- It is the most efficient method to communicate within the organization of business transactions such as maintaining the financial records of the users such as bank balances, name, and address. But it is just a part of e-commerce business.
Six forms of electronic commerce:
- It includes different forms of commerce based on the transactions performed.
- Business-to-Business (B2B):
- It includes the transactions performed between two different businesses like manufacturer and wholesaler, wholesaler and retailer and many such.
- Example: automobile manufacturing.
- Business-to-Consumer (B2C):
- It includes the transactions performed between the companies and the consumers or customers.
- Here, the end users of that company are referred as consumers or customers.
- For example, customer buying a fridge from the electronic retailer is known as B2C transaction.
- Consumer-to-Consumer (C2C):
- It includes the transactions performed between two different customers or consumers.
- Example: Online auctions like OLX.
- Government-to-Business (G2B):
- It includes the transactions performed between the public administration and the enterprises.
- Government-to-Citizen (G2C):
- It includes the transactions performed between the government and the citizen or private individual.
- Example: applying for a certificate.
- Government-to-Government (G2G):
- It includes the transactions performed between two different government agencies.
- Example: Northeast Gang
Information System (NEGIS).
- Business-to-Business (B2B):
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Explain how algorithms employed by social media platforms might unintentionally exacerbate a crisis situation.
What are your thoughts on whether or not social media platforms like Facebook should provide access to a user's account so that law enforcement may undertake investigations? What exactly is the purpose of posing such a question?
What design considerations are there for disabled users?
Chapter 7 Solutions
Principles of Information Systems
Ch. 7.1 - Prob. 1RQCh. 7.1 - Prob. 2RQCh. 7.1 - Prob. 1CTQCh. 7.1 - Prob. 2CTQCh. 7.2 - Prob. 1RQCh. 7.2 - Prob. 2RQCh. 7.2 - Prob. 1CTQCh. 7.2 - Prob. 2CTQCh. 7.3 - Prob. 1RQCh. 7.3 - Prob. 2RQ
Ch. 7.3 - Prob. 1CTQCh. 7.3 - Prob. 2CTQCh. 7.4 - Prob. 1RQCh. 7.4 - Prob. 2RQCh. 7.4 - Prob. 1CTQCh. 7.4 - Prob. 2CTQCh. 7.5 - Prob. 1RQCh. 7.5 - Prob. 2RQCh. 7.5 - Prob. 1CTQCh. 7.5 - Prob. 2CTQCh. 7 - Prob. 1SATCh. 7 - Prob. 2SATCh. 7 - Prob. 3SATCh. 7 - Prob. 4SATCh. 7 - Prob. 5SATCh. 7 - Prob. 6SATCh. 7 - Prob. 7SATCh. 7 - Prob. 8SATCh. 7 - Prob. 9SATCh. 7 - Prob. 10SATCh. 7 - Prob. 11SATCh. 7 - Prob. 12SATCh. 7 - Prob. 13SATCh. 7 - Prob. 14SATCh. 7 - Prob. 15SATCh. 7 - Prob. 16SATCh. 7 - Prob. 17SATCh. 7 - Prob. 1RQCh. 7 - Prob. 2RQCh. 7 - Prob. 3RQCh. 7 - Prob. 4RQCh. 7 - Prob. 5RQCh. 7 - Prob. 6RQCh. 7 - Prob. 7RQCh. 7 - Prob. 8RQCh. 7 - Prob. 9RQCh. 7 - Prob. 10RQCh. 7 - Prob. 11RQCh. 7 - Prob. 12RQCh. 7 - Prob. 13RQCh. 7 - Prob. 14RQCh. 7 - Prob. 15RQCh. 7 - Prob. 16RQCh. 7 - Prob. 17RQCh. 7 - Prob. 18RQCh. 7 - Prob. 1DQCh. 7 - Prob. 2DQCh. 7 - Prob. 3DQCh. 7 - Prob. 4DQCh. 7 - Prob. 5DQCh. 7 - Prob. 6DQCh. 7 - Prob. 7DQCh. 7 - Prob. 8DQCh. 7 - Prob. 9DQCh. 7 - Prob. 10DQCh. 7 - Prob. 11DQCh. 7 - Prob. 12DQCh. 7 - Prob. 2PSECh. 7 - Prob. 3PSECh. 7 - Prob. 1TACh. 7 - Prob. 2TACh. 7 - Prob. 3TACh. 7 - Prob. 2WECh. 7 - Prob. 1CECh. 7 - Prob. 2CECh. 7 - Prob. 3CECh. 7 - Prob. 1CTQ1Ch. 7 - Prob. 2CTQ1Ch. 7 - Prob. 3CTQ1Ch. 7 - Prob. 1CTQ2Ch. 7 - Prob. 2CTQ2Ch. 7 - Prob. 3CTQ2
Knowledge Booster
Similar questions
- Employees who check their email while at work should pay special attention to any constraints that are placed on the policy or practise that directly impacts them, since this might have a negative impact on their jobs.arrow_forwardAssignment Content Imagine you have been hired to conduct a social engineering penetration test by a flooring sales and installation company with showrooms, warehouses, and offices throughout the state. Recently, several employees, including the company’s president, fell prey to a phishing scam. The company’s leadership realized they needed to better understand social engineering to better protect the company, the employees, and their customers. The first step is to present a general overview of social engineering and how social engineering threats function in preparation for the social engineering penetration test to the leadership team. Create a 10- to 12-slide media-rich presentation with speaker notes providing your client with details on how the social engineering penetration test will be conducted. Include the following information: Explain the concept of social engineering and how it can threaten the security of an organization. Describe human-, computer-, and…arrow_forwardFind a prevalent issue/problem in your community (Anywhere in PHILIPPINES). Now, list ways technologies can help to solve that problem and how. (no plagiarism, will check the answer. thank you)arrow_forward
- Verify whether you or your company has a Twitter or Facebook page. Is there anything that distinguishes them from other similar social networking sites? I was wondering what percentage of organizations rely on these online resources for recruiting. I speak five languages well; is it okay if I use them all here? How do experts network and meet potential customers and partners on these sites?arrow_forwardNo photo sharing is allowed. You're reaching out to a real estate agent through email to share photos of a listing. Every time you attempt to send the email, you receive a robotic answer that the attachments are too large. Tell me about your future goals.arrow_forwardHow should an athletic administrator navigate social media usage for college athletes?arrow_forward
- Where do you stand on the issue of social media monitoring by employers? What should be the scope of such monitoring? Does your opinion change if you use employer owned equipment and use social media at work?arrow_forwardAssignment: The Evolution of Mobile Technologies Learning Objectives and Outcomes ▪ Describe the features of the generations (1G to 5G) of mobile technology. ▪ Describe the security challenges of each generation and how those challenges have been addressed. Assignment Requirements You are a networking consultant for Secure Systems Solutions (SSS), specializing in wireless and mobile device security. SSS has been asked to make a presentation to a high school computer programming club. The company president, Thomas, encourages employees to become involved in the community, and Claire, a senior manager at SSS, has asked you to create a brief PowerPoint presentation. The programming club has an interest in old technology as well as new. The presentation should focus on how mobile technologies have evolved over the years, from 1G to 5G. For this assignment: 1. Research the generations (1G to 5G) of mobile technology to date. 2. Develop a PowerPoint presentation that describes each…arrow_forwardDescribe how a wireless access point works and the association process. Assignment RequirementsYou are a networking consultant for Secure Systems Solutions (SSS), specializing in wireless and mobile device security. SSS strives to be active in community affairs. The parent-teacher organization within the local school district is planning to host a technology learning event aimed at junior high school students. The organization has come to SSS for assistance. Your manager has asked you to prepare a presentation for the students that describes how a wireless access point works. 1. Develop a presentation that includes: • The purpose of a wireless access point • The purpose of antennas • The association processarrow_forward
- Online communication is not limited to message boards, newsletters, blogs, or IM; social networking sites like Facebook and Twitter, as well as online discussion forums like Reddit and Speakeasy, should also be considered. When doing online research, what are the benefits of using these tools?arrow_forwardMobile application development is the process of making software for smartphones, tablets and digital assistants, most commonly for the Android and iOS operating systems. The software can be preinstalled on the device, downloaded from a mobile app store, or accessed through a mobile web browser. Mobile design is an important aspect to consider when implementing an e-commerce website. Assess the elements of site and mobile design and recommend the vital elements that should be considered as a part of e-commerce implementationarrow_forwardwhat occurs when individuals engage in illicit activities online and how such activities are carried out. What are some ways that you may protect yourself from being a victim of a crime that takes place online? In what ways are you able to put a stop to it?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningEnhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage Learning
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,