Documente Academic
Documente Profesional
Documente Cultură
EDI in Action :
Edi has been used in the procurement function to steam-line the interaction between the
Buyer and seller .the other uses for EDI are universities use EDI to exchange transcripts
quickly.
Automatically units uses EDI to transmit large complex engineering design created on
the specialized computers.
Large multinational companies use EDI to send online price catalogs to customers
Listed products , prices ,discounts and terms.
The EDI Transaction for a purchase ,shipment and payments are as follows :
These are the various steps as follows:
1.Buyers computer sends purchase order to sellers computer
2.Sellers computer sends purchase order confirmation to buyers computer
3.sellers computer sends booking request to transport companies computer.
4.Transport companies computer sends booking confirmation to sellers computer
5.sellers computer sends advance ship notice to buyers computer.
6.Trnasport company’ s computer sends status to sellers computer.
7.buyers computer sends receipt advice to sellers computer.
8.Sellers computer sends invoice to buyers computers.
9.Buyers computer sends payment to sellers computer
ELECTRONIC CHECKS
They are designed to accommodate many individual and entities that might prefer to
pay on credit or other than cash.
From the above diagram the buyer must register with a third party accounting server
before they are able to write electronic check.
-The accounting server acts as billing a servicing and the registration process
depends on the accounting server , they may require a credit card or bank account
details to back the checks .
-Once the customer registered a buyer can contact seller goods and services to
complete a transaction .The buyer sends the check to the seller for a certain amount of
money.
-These checks may be sending using email or other transport.
-When deposited the check authorize transfer of account balance from the current
against the check was drawn to the account.
-Accounting server authenticates digital signature on the check using the key
method of cryptographic algorithm.
E-Check have the following advantages:
They work same as traditional checks , thus simplifying customer education.
It is well suited for clearing micro payments.
It creates float and availability of transaction cost.
Financial risk is taken by accounting server so easier acceptance.
Another check called “netcheque” was developed by Information science institute(ISI)
by Clifford Newman.
It include software for writing and depositing checks independent of other applications.
The API will provide common functions to be called as automatically when with other
transaction functions.
NOT FOUND
5)what is an electronic fund transfer?what are the security issues involved in it?
ANS:
Electronic fund transfer:
Electronic fund transfer or EFT is the electronic exchange or transfer of money from one
account to another, either within a single financial institution or across multiple
institutions, through computer-based systems.
Security
Security means the protection of the integrity of EFT systems and their information from illegal
or unauthorized access and use. Although the loss per theft appears to be greater than for paper
based payment systems, there is no real evidence that EFT systems to date have resulted in a
higher than average crime rate. Why, then, is the security of EFT systems an important public
concern and potentially a major policy issue? In comparison with other payment systems, EFT
appears to have some additional vulnerabilities.
For example:
EFT systems have many points of access where transactions can be affected in unauthorized ways
because of direct customer involvement with the dynamics of the systems, the use of
telecommunication lines, and the ways in which data are aggregated and transmitted among and
between sites and institutions.
EFT crime is often difficult to detect because funds/data can be removed or manipulated by
instructions hidden in complex computer software; the dynamics of the criminal action may be
understood by only a few experts within the institution.
EFT crime offers a sporting element, or intellectual challenge, that perhaps is as enticing to some
as the opportunity for financial gain.
It is possible, in theory, for large banks of data to be destroyed by remote agents, creating the
opportunity for maliciousness, extortion, blackmail, or terrorism.
EFT systems reduce the effectiveness of—or eliminate altogether—some of the traditional
methods of controlling and auditing access to financial accounts.
The level of EFT security violations is difficult to assess at present because there is
underreporting of EFT crime, a paucity of information about EFT security, and a lack of informed
public discussion. While there is a danger that giving these problems higher visibility through
public discussion may at first exacerbate them, the public is entitled to know what risks they are
exposed to in using EFT services. Furthermore, both law enforcement agents and financial
institutions would benefit by sharing information about vulnerabilities, defense strategies, and
security-enhancing technologies.
Some believe that effective technology and sound management procedures exist to
adequately assure EFT security, though even present technology and procedures are not all
widely used. Their use varies among institutions. There is as yet no clear and consistent
set of industrywide security standards for protecting computer systems. Better information about
EFT security would allow Congress and State legislatures to assess more effectively the possible
need for new legislation and/or regulations.
6)explian in detail about mercantile process model in mercants prespective?
ANS:
Merchantile’s model from the Merchantile’s perceptive:
Fig: Order management cycle in E-commerce
It consists of eight different activities that are grouped into three phases:
1.Presale phase
2. Product service / delivery
3. Post sale interaction phase
1.Presale phase :
It consists of two activities namely
a) Customer enquiry and order planning and order generation
b) Cost estimation and price of product services
4. Video servers and electronic commerce : Video servers are important link
between the content providers (entertainment/media) and transport
providers(telcos/videos/cable operators). The video servers tackle the
simultaneous overlapping “ supply problem that arises when providing ondemand
services to large numbers of homes. All video servers need not be hardware based.
5.Information delivery/ transport and Ecommerce applications
Transport providers are telecommunications , cable, wireless industries,
computer networks including commercial networks like Compuserve and
public network like Internet.
The various transport routes:
Information transport providers Information delivery methods
1.Telecommunications long-distances , local lines
2. Cable television coaxial cable, fiber optic
3.wireless communications cellular &radio network, paging
Systems
4. Computer based online companies internet , commercial online
service providers
computer based online companies: these providers are dial up linkage of lower
bandwidth when compared to telecom and cable high ways. Various providers like
Prodigy, compuServe .
Consumer access devices: These are devices which can provide access to information
and they are videophones, PCs, PDAs and television capable of handling two way
communication , cellular phones , mobile and portable computers.
8)Write about electronic payment system and also explian the risks involed in it?
ANS:
Electronic Payment System
ANS: