Posts

What is Secured Electronic Transaction (SET) Protocol? Describe how purchase request, payment authorization and payment capture are done in SET? [

Image
Secured Electronic Transaction (SET) Protocol Secure Electronic Transaction is an open-source encryption and security specification designed to protect credit card transactions on the internet. The secure electronic transaction is not a payment system; it is a set of security protocols and formats that ensures that using online payment transactions on the internet is secure. Secure Electronic Transaction is also called SET. i) Purchase Request:   Before the purchase request exchange begins, the cardholder has completed browsing, selecting, and ordering. The end of this phase occurs when the merchant sends a completed order to the customer. All of the preceding occurs without the use of SET. The purchase request involves 4 messages:- Initiate Request Initiate Response Purchase Request  Purchase Response When the merchant receives the Purchase Request message, it performs the following actions: It verifies the cardholder certificates by means of its CA signatures. It verifies th...

Describe the various security mechanisms used to secure e-commerce systems.

Image
Security mechanisms used to secure e-commerce systems E-Commerce security is the guideline that ensures safe transactions through the internet. It consists of protocols that safeguard people who engage in online selling and buying goods and services.  The different types of security measures of e-commerce systems are given below i) Cryptography:  Cryptography is a science that is used to hide the semantic meaning of a text using some mathematical module. They give the power to hide the information during the network traverse or storage. Many methods are 16-bit,32-bit, 128-bit, and 256-bit encryption or many algorithms like AES, DES, Message Digest, RSA, Quantum encryption, etc. In this form, Original messages are converted into non-readable forms. ii) Hash Function:  Hash functions are an important type of cryptographic algorithm and are widely used in cryptography such as digital signature, data authentication, e-commerce, e-cash, and many other applications. The purpose...

What are the barriers to the complete implementation of private industrial networks?

Image
 The barriers to the complete implementation of private industrial networks are:- One barrier is that participating firms are required to share sensitive data with their business partners up and down the supply chain. This is a huge corporate mindset change because what was previously considered proprietary and secret must now be shared. Furthermore, in the digital environment, it can be difficult to control the limits of this information sharing. Information that a firm willingly gives to its largest customer may wind up being shared with its closest competitor. Other barriers include difficulties in integrating private industrial networks into existing ERP (enterprise resource planning) systems and EDI (electronic data interchange) networks. Most ERP systems were not designed initially to work with extranets or even to be particularly Internet compliant; they were based on business models that use entirely internal business processes. Furthermore, changes in corporate culture and...

What is CPFR, and what benefits could it achieve for the members of a private industrial network?

Image
 CPFR (collaborative resource planning, forecasting, and replenishment)  CPFR (collaborative resource planning, forecasting, and replenishment) involves working with network members to forecast demand, develop production plans, and coordinate shipping, warehousing, and stocking activities. The goal is to ensure that retail and wholesale shelf space is precisely maintained.  The benefits it could achieve for private industrial network members are that hundreds of millions of dollars of excess inventory and capacity could be wrung out of an industry.

Explain the difference between an industry consortium and a private industrial network.

Image
The difference between an industry consortium and a private industrial network are:- Private industrial networks, which presently dominate B2B commerce, are Web-enabled networks for coordinating trans-organizational business processes (collaborative commerce). These networks range in scope from a single firm to an entire industry. Although the central purpose of a private network is to provide industry-wide global solutions to achieve the highest levels of efficiency, they generally start with a single sponsoring company that “owns” the network. This differentiates private markets from industry consortia, which are usually owned collectively by major firms through equity participation.

What is the main reason why many of the independent exchanges developed in the early days of e-commerce failed?

Image
 The main reason is they failed to attract enough players to achieve liquidity. That is, the number of buyers and sellers in the market, the transaction volume, and the size of the transactions were insufficient to sustain a profit.

List three of the objectives of a private industrial network.

Image
The objectives of a private industrial network may include to: • develop efficient industry-wide purchasing and selling business processes • develop industry-wide resource planning to supplement enterprise-wide resource planning • create increasing supply chain visibility so that the inventory levels of buyers and suppliers will be known to the participants • achieve closer buyer-supplier relationships, including demand forecasting, communications, and conflict resolution • foster operations on a global scale • reduce industry risk by preventing imbalances in supply and demand, including developing financial derivatives, insurance, and futures markets