E Commerce QNS
E Commerce QNS
1. EXPLAIN E-COMMERCE ?
Electronic commerce (e-commerce) refers to the buying and selling of goods and services over
the internet. It involves online transactions between businesses, consumers, or both, and includes
a wide range of activities beyond just sales, such as marketing, supply chain management, online
payment processing, and customer support.
Types of E-Commerce:
Key Components:
Advantages:
Challenges:
🔹 1. Communication
This refers to how businesses connect and interact with customers over the internet.
🔹 2. Transaction
Purpose: Facilitate secure and efficient exchange of goods, services, and payments.
Tools: Shopping carts, online payment gateways (PayPal, Stripe), order management
systems.
Example: A user adds items to a cart, pays online, and receives confirmation.
🔹 3. Distribution
Purpose: Ensure the customer receives what they paid for, either physically or digitally.
Types:
o Digital delivery (e.g., software, music downloads)
o Physical shipping (e.g., Amazon shipping books)
Example: Netflix streaming a movie instantly, or Amazon delivering a package.
Summary Table:
Component Role in E-Commerce Example
Communication Interaction with customers Email marketing, live chat
Transaction Purchase and payment process Online checkout, digital wallets
Distribution Delivery of goods/services Shipping, digital downloads
3. INTERNET PROTOCOL ?
The Internet Protocol (IP) is the fundamental set of rules that governs how data is sent and
received over the internet. It ensures that data travels from one computer (or device) to another in
a structured and reliable way.
🔹 What IP Does:
🔹 How It Works:
1. Data is broken into packets – Large messages are divided into smaller chunks.
2. Each packet gets an IP header – Contains source and destination IP addresses.
3. Packets are sent across the network – Routers use IP addresses to forward packets.
4. Packets are reassembled – At the destination, the device reassembles the original data.
🔹 Types of IP:
🔹 Why IP Matters:
4. BUISNESS STRATEGY?
A business strategy is a plan of action a company uses to achieve specific goals and gain a
competitive advantage in the market. It outlines how a business will compete, operate, and grow
over time.
Model Description
One supplier sells to many buyers through a dedicated
Supplier-Oriented
website
Buyer-Oriented A large buyer invites multiple suppliers to bid or supply
Intermediary-Oriented / Third-party platforms facilitate transactions between buyers
Marketplace and sellers
B2B Vertical Marketplaces Industry-specific platforms (e.g., for chemicals, electronics)
B2B Horizontal Marketplaces General platforms serving multiple industries
An Electronic Credit Card System refers to the digital infrastructure that allows users to
make secure online payments using their credit cards. It's a key part of e-commerce that enables
the transfer of funds between buyers, merchants, banks, and payment processors.
🔹 Key Participants
1. Customer places an order on the merchant's website and enters credit card details.
2. Payment gateway encrypts the data and sends it to the card network (e.g., Visa).
3. The card network routes the request to the issuing bank for approval.
4. The issuing bank checks:
o Card validity
o Available credit
o Fraud risk
5. If approved, an authorization code is sent back through the chain to the merchant.
6. The merchant completes the transaction and ships the goods.
7. The settlement process transfers the funds from the issuing bank to the acquiring bank,
then to the merchant's account.
🔹 Security Features
🔹 Advantages
The Electronic Age—driven by the internet, digital technology, and data—has transformed how
businesses operate, compete, and deliver value. A business strategy in the electronic age must
align with this digital environment to stay relevant and successful.
It is a company's long-term plan that leverages digital technologies and online platforms to
gain competitive advantage, improve customer experience, and drive innovation and growth.
🔹 Key Features of Business Strategy in the Electronic Age
1. Digital Integration
o Using digital tools in all areas of business: operations, marketing, HR, finance,
etc.
2. Customer-Centric Approach
o Using data and digital tools to deeply understand and serve customers (e.g.,
personalization).
3. Agility and Innovation
o Adopting flexible models to respond quickly to market changes and technological
disruptions.
4. Global Reach
o Using e-commerce and digital platforms to expand internationally with fewer
barriers.
5. Data-Driven Decision Making
o Using analytics, AI, and big data to guide strategy and operations.
6. Online Channels & Automation
o Leveraging e-commerce, mobile apps, social media, and automation for sales and
services.
An Extranet is a private network that uses internet protocols (such as TCP/IP) to securely
share part of an organization’s information or operations with external parties, like
suppliers, partners, vendors, or customers. It acts as a bridge between an organization’s
internal network (Intranet) and the public internet, with controlled access.
Benefit Description
Improved Collaboration Real-time sharing of documents, orders, and updates
Faster Communication Direct communication with partners/suppliers
Cost Reduction Lowers mailing, printing, and manual processing costs
Efficient Operations Integration with ERP and order systems
Stronger Relationships Builds trust and transparency with stakeholders
🔹 Models of Extranet
There are three common models based on how access is provided and managed:
Model Description Example
One-to-Many (Supplier One company provides access to A car company managing all
Extranet) many suppliers/vendors parts suppliers
Many-to-One Multiple businesses access the Retailers accessing a
(Customer Extranet) system of a larger organization distributor’s inventory
Many-to-Many (Joint Shared platform among multiple A consortium of airlines
Venture Extranet) businesses for collaboration managing booking and logistics
Selling on the web refers to the process of marketing and selling products or services online
through websites or platforms.
24/7 availability
Global reach
Digital payment systems (credit cards, PayPal, UPI)
Product catalogs, customer reviews, order tracking
Secure transactions via SSL, encryption, and secure gateways
Chatting on the web allows real-time text, voice, or video communication between users or
between a customer and a business using the internet.
🔹 Technologies Used:
Multimedia delivery is the transmission and presentation of audio, video, images, animations,
and interactive content over the internet.
🔹 Delivery Methods:
🔹 Technologies Used:
What is Supply Chain? And Porter's Value Chain and its Models?
✅ What is a Supply Chain?
A Supply Chain is the network of people, companies, activities, information, and resources
involved in producing and delivering a product or service from the raw material stage to the
final consumer.
Procurement
Production
Inventory management
Logistics (transport and warehousing)
Order fulfillment
Customer service
The Value Chain, introduced by Michael Porter, is a model that helps businesses analyze their
internal activities to understand how value is created for the customer and how competitive
advantage can be gained.
🔹 Porter's Value Chain Model Structure:
Focus Flow of goods and services Value creation in each step of the business
Includes Suppliers, logistics, distribution All activities (support + primary) that add value
E-checks are commonly used in electronic commerce (e-commerce) for online bill payments,
subscriptions, and business-to-business (B2B) transactions.
1. Authorization
The customer authorizes the payment by providing:
o Bank account number
o Routing number
o Name and amount
2. Authentication & Encryption
The information is securely encrypted and verified by the payment processor.
3. Submission
The e-check request is submitted to the Automated Clearing House (ACH) network.
4. Processing
The ACH system processes the transaction, debiting the payer’s bank and crediting the
recipient’s bank.
5. Settlement
The money is transferred, usually within 3–5 business days.
Benefit Description
Cost-effective Lower fees than credit card transactions
Secure Encrypted and regulated under banking laws
Convenient No need for paper handling or mailing
Good for large payments Preferred for high-value or business transactions
Environment-friendly Reduces paper use and physical proces
Gambling in e-commerce refers to the use of online platforms and digital payment systems to
participate in gambling activities over the internet. This includes casino games, sports betting,
lotteries, poker, and more—all conducted via e-commerce websites or mobile apps.
🔹 Disadvantages
What is Electronic Data Interchange? Explain auctions and services from traditional market to
internet-based EDI. ?
Instead of using paper or email, EDI automates business communication between trading
partners (e.g., manufacturers, suppliers, retailers).
🔸 Traditional EDI:
🔹 What is an Auction?
An auction is a system where buyers bid for goods/services, and the highest bidder wins. EDI
can be used to manage auction-related documents between sellers and buyers.
Type Description
Digital signatures play a critical role in ensuring the security and trust of online and electronic
payment systems.
Cyberattacks can have severe consequences for individuals, businesses, and governments. These
attacks may lead to financial loss, data breaches, reputational damage, and even national
security threats.
✅ 1. Financial Loss
Direct Theft: Hackers may steal money from bank accounts or through fraudulent
transactions.
Ransom Payments: Victims may be forced to pay ransom (e.g., ransomware attacks).
Business Disruption: Downtime due to cyberattacks can halt operations and lead to lost
revenue.
Recovery Costs: Cost of investigation, repair, and strengthening systems.
Personal Data Theft: Hackers can steal sensitive personal information (SSNs, credit
card numbers, etc.).
Business Data Loss: Intellectual property, trade secrets, or customer records may be
exposed or deleted.
Legal Consequences: Organizations may face lawsuits or fines for failing to protect data
(e.g., under GDPR or HIPAA).
✅ 3. Reputational Damage
✅ 4. Operational Disruption
Attackers can steal patents, designs, software code, and research data.
Competitors or foreign states may use stolen IP for economic or military advantage.
✅ 7. Identity Theft
The idea is to leverage users’ networks to organically multiply a brand’s reach, instead of
relying solely on paid advertising.
Feature Description
High Shareability Content is designed to be shared widely
Low Cost Relies more on organic reach than advertising spend
Rapid Spread Can reach millions in a short time
Emotional Appeal Often uses humor, shock, inspiration, or curiosity
Network Effect Grows as more people share with their own circles
E-commerce platforms deal with sensitive data like customer personal details, payment
information, and business transactions. As a result, they are prime targets for various
cybersecurity threats. These threats can compromise confidentiality, integrity, availability,
and trust.
✅ 1. Phishing Attacks
Fake emails or websites that trick users into revealing sensitive info like login
credentials or card numbers.
Often disguised as legitimate company messages.
Malware: Malicious software that steals data, tracks user activity, or damages systems.
Ransomware: Locks files or systems and demands payment to restore access.
✅ 3. SQL Injection
Attackers inject malicious SQL code into website input fields (like search bars or login
forms) to access or manipulate the database.
Overloads the e-commerce site with traffic, making it slow or completely unavailable.
Often used to disrupt business during peak times (like sales events).
An attacker secretly intercepts and possibly alters communication between two parties
(e.g., customer and website) during payment or login.
✅ 8. Insider Threats
Employees or contractors with access misuse their privileges to steal data or sabotage
systems.
Creation of fake online stores or listings to scam users and collect their information or
money.
✅ 10. Insecure APIs
If an e-commerce platform uses APIs (e.g., for payments, inventory), poorly protected
APIs can be exploited by hackers to gain access.
Push and Pull technologies refer to how information or content is delivered to users over a
network, especially in contexts like web services, notifications, and data transfers.
🔄 1. Push Technology
In push technology, the server initiates the communication and sends (pushes) data or updates
to the client without the client specifically requesting it.
🔹 Examples:
Email notifications
Mobile app alerts (e.g., WhatsApp message)
Stock market price updates
Live sports scores or weather alerts
🔸 Characteristics:
Feature Description
Initiator Server
🔁 2. Pull Technology
In pull technology, the client initiates the request and retrieves (or pulls) data from the server
when it chooses to.
🔹 Examples:
Refreshing a webpage
Downloading a file
Searching on Google
Checking emails manually
🔸 Characteristics:
Feature Description
Initiator Client
🔹 1. Hardware Infrastructure
Includes the physical components that form the base of any e-commerce system.
🔹 2. Software Infrastructure
Essential software and platforms that run and support e-commerce operations.
Web servers (e.g., Apache, Nginx)
E-commerce platforms (e.g., Shopify, WooCommerce, Magento)
Databases (e.g., MySQL, Oracle)
Payment gateways (e.g., PayPal, Stripe, Razorpay)
Inventory management systems
ERP and CRM systems
🔹 3. Network Infrastructure
Facilitates the communication and data transfer between users and systems.
Internet connectivity
LAN/WAN networks
Cloud services and content delivery networks (CDNs)
Secure protocols (e.g., HTTPS, SSL/TLS)
🔹 4. Payment Infrastructure
🔹 5. Security Infrastructure
🔹 7. Support Services
The First Mover Advantage (FMA) refers to the competitive edge a company gains by being
the first to enter a market or industry with a new product or service. In the context of e-
commerce, it means being the first online retailer or service provider in a specific niche or
sector, allowing the company to build brand recognition, customer loyalty, and establish market
dominance before competitors arrive.
1. Brand Recognition
o Being the first to market allows a business to establish itself as the go-to brand,
making it easier to build customer trust and loyalty.
o Example: Amazon as an early mover in the online retail market.
2. Customer Loyalty
o Early entrants can create a strong customer base that continues to buy from
them, even when competitors emerge.
o Example: Early users of Netflix or Spotify are often loyal to the platform, even if
newer competitors appear.
3. Technological Leadership
o First movers often develop innovative technology or services that give them an
advantage over competitors.
o Example: eBay established itself as the first major online marketplace, developing
features and processes that competitors later adopted.
4. Network Effects
o As more users adopt a platform, the value of the service increases (i.e., a large
user base attracts even more users).
o Example: Facebook grew quickly due to the network effect, where the value of
the platform increased as more people joined.
5. Control Over Resources
o First movers can often secure key resources like prime domain names,
trademarks, patents, and distribution channels.
o Example: Google became the dominant search engine by capturing the largest
share of the internet's search queries.
6. Cost Advantages
o Early entrants can scale quickly and achieve economies of scale, which helps
them reduce costs and improve profitability.
o Example: Amazon used its early entry to create an efficient logistics and
fulfillment network, allowing it to offer lower prices and faster shipping.
While E-Commerce and Internet Commerce are often used interchangeably, there are subtle
differences between the two, particularly in terms of scope and medium. Let's explore the
distinctions.
E-commerce refers to any kind of business transaction conducted electronically, whether via
the internet, mobile networks, or other forms of electronic systems.
🔹 Examples of E-Commerce:
2. Internet Commerce
Internet Commerce, on the other hand, is a subset of e-commerce and specifically refers to
commerce conducted via the internet. It focuses on buying, selling, and trading goods and
services exclusively online through web-based platforms.
Can include the internet, mobile networks, Exclusively uses the internet (websites,
Medium
SMS, and other platforms apps)
Websites, mobile apps, in-person systems (like Only web-based platforms and apps
Platform
point-of-sale) (via the internet)
Payment Online payments, digital wallets, bank Online payments like digital cards,
Methods transfers, etc. wallets, or internet banking
1. Improved Communication
o Centralizes communication channels, making it easier for teams and departments
to collaborate efficiently.
o Helps break down silos within the organization.
2. Increased Productivity
o Employees have easy access to resources and tools needed to perform their jobs,
reducing time spent searching for information.
o Real-time updates and notifications keep employees informed and aligned.
3. Enhanced Security
o Sensitive company information is protected by internal security measures,
reducing the risk of data breaches.
o Helps ensure compliance with regulatory requirements like GDPR, HIPAA, etc.
4. Cost Savings
o Reduces the need for external communication tools and systems.
o Automates many internal processes, saving time and resources.
5. Knowledge Management
o Centralized repositories for documents, policies, and training materials help
preserve organizational knowledge and support onboarding of new employees.
Biometric identification refers to the use of unique biological or behavioral traits to verify
the identity of an individual. Unlike traditional methods of identification, such as passwords or
ID cards, biometric systems rely on physical characteristics or behavioral patterns that are
unique to each person.
Biometric identification is widely used for security purposes, ensuring that only authorized
individuals can access systems, devices, or physical locations.
1. Fingerprint Recognition
o Fingerprint scanners capture and analyze the unique patterns of ridges and
valleys in an individual’s fingertips.
o Common Use Cases: Smartphone unlocking, employee attendance systems, and
security checkpoints.
2. Facial Recognition
o This technology uses unique facial features, such as the distance between eyes,
nose shape, and jawline, to identify individuals.
o Common Use Cases: Security surveillance, phone unlocking, and airports for
passenger identification.
3. Iris Recognition
o Uses the unique patterns in the iris (the colored part of the eye) for identification.
Iris scans are often more accurate than facial recognition.
o Common Use Cases: High-security areas, border control, and healthcare systems.
4. Voice Recognition
o Analyzes unique vocal traits, such as tone, pitch, and cadence, to verify an
individual’s identity.
o Common Use Cases: Voice assistants (e.g., Siri, Alexa), phone banking, and
customer service systems.
5. Retina Scanning
o Examines the unique patterns of the blood vessels in the retina at the back of the
eye.
o Common Use Cases: Secure government buildings, military facilities, and high-
security areas.
6. Palm Print Recognition
o Uses the unique pattern of lines and ridges found in the palm of the hand for
identification.
o Common Use Cases: Access control in sensitive areas, identification for
healthcare applications.
7. Hand Geometry
o Measures the shape and size of the hand, including length, width, and thickness
of the fingers.
o Common Use Cases: Access control, time and attendance systems in workplaces.
8. DNA Recognition
o Analyzes an individual’s DNA sequence to identify them uniquely.
o Common Use Cases: Criminal investigations, forensic science, and paternity
testing (though not widely used for daily access control due to its complexity and
cost).
The most common example of a network of networks is the Internet, where multiple private,
public, academic, business, and government networks are connected to create one vast
network that spans the globe.
🔹 Key Characteristics of a Network of Networks:
1. Interconnectivity
o Different networks (such as local area networks, wide area networks, or private
networks) are connected together, allowing seamless data exchange between
them.
2. Layered Structure
o A network of networks typically operates on multiple layers, from the local level
(LANs) to wide-scale connections (WANs), and internetworking protocols
(such as TCP/IP) are used to enable communication between these different
layers.
3. Scalability
o The network can scale, meaning that as new networks (or devices) are added, the
overall network continues to function without major disruption. New networks or
systems can be plugged in or integrated easily.
4. Routing and Switching
o To ensure smooth communication between different networks, routers and
switches direct the traffic appropriately. These devices determine the pathway
through which data will flow across networks.
1. Global Communication:
o Enables global connectivity, allowing people and organizations to communicate
and share data without boundaries.
2. Increased Efficiency:
o Facilitates better resource sharing, collaboration, and information exchange
between different networks or organizations.
3. Scalability:
o Easy to scale by adding more networks or devices without disrupting the overall
functioning of the system.
4. Redundancy and Reliability:
o Multiple networks can provide backup routes, ensuring that if one path fails, data
can still reach its destination through alternate routes.
E-Cash and Stored-Value Cash
E-Cash (Electronic Cash) refers to digital money that functions like cash but exists
electronically. It is a “digital representation of money” that users download or load onto devices,
then spend by deducting the value storedfincen.govfincen.gov. E-cash is typically prepaid with
conventional currency, and each purchase reduces the stored balancefincen.govfincen.gov. It
comes in two forms: smart‐card e-cash (stored on a chip card) and computer e-cash (stored in
software or on hard drives)fincen.gov. For example, cryptocurrencies (like Bitcoin or Ethereum)
and some digital wallet balances act as e-cash: they hold a monetary value that can be transferred
peer-to-peer and spent with merchants or individuals without involving traditional banks
Stored-Value Cash
Stored-value cash refers to prepaid money that is physically stored on a card or device. A
stored-value card (SVC) holds a certain monetary balance on its chip or memory, independent of
any bank accounten.wikipedia.orgjctindia.org. The key feature is that the value is tied to the card
itself, not linked externally. Users load funds onto the card in advance (by depositing cash,
transfer from a bank, payroll, etc.) and then spend from that stored balance whenever they pay
for goods or servicesfiscal.treasury.goven.wikipedia.org. For example, public transit fare cards
(shown below) store money for subway or bus rides; each tap deducts the fare from the card’s
memory.
As e-commerce continues to grow and transform the global marketplace, several ethical and
public policy concerns arise. These issues are critical for both businesses and governments to
address to ensure fair, secure, and responsible practices in the digital space. Below is a detailed
explanation of the primary ethical and public policy issues in e-commerce.
Ethical Concern:
E-commerce businesses collect vast amounts of personal data from their customers (such as
names, addresses, credit card details, and browsing behaviors). This raises concerns over data
privacy and whether businesses are adequately safeguarding this sensitive information.
Risks: Unauthorized data access, misuse of personal information, and potential identity
theft.
Ethical dilemma: How much personal information should be collected? How can
businesses ensure that data is used only for its intended purpose and not exploited for
profit?
Governments around the world have enacted regulations to address privacy concerns in e-
commerce:
General Data Protection Regulation (GDPR) in the European Union mandates strict
guidelines on data usage, user consent, and rights to data erasure.
California Consumer Privacy Act (CCPA) in the U.S. grants consumers the right to
request access to and deletion of their personal data.
Impact: These regulations set standards for businesses on how they collect, store, and share data
but also raise challenges for global businesses operating in various jurisdictions with different
data protection laws.
Ethical Concern:
Cybersecurity is one of the most significant ethical concerns in e-commerce. Hackers may target
online stores and customers to steal payment information, intellectual property, or sensitive data.
Businesses have an ethical responsibility to implement strong security measures to protect their
customers.
Governments have implemented laws and regulations to prevent fraud and secure online
transactions:
Payment Card Industry Data Security Standard (PCI DSS) outlines security
measures for companies handling card payments.
Cybersecurity and Infrastructure Security Agency (CISA) works on securing U.S.
critical infrastructure, including e-commerce platforms.
Impact: E-commerce businesses are required to comply with national and international security
standards to avoid penalties and protect customer trust.
3. Consumer Protection
Ethical Concern:
Consumers are often at a disadvantage in e-commerce transactions because they can’t physically
examine products, and there’s a risk of receiving defective goods or being misled by false
advertising. Businesses must ensure that they adhere to ethical standards in product
representation, pricing, and quality.
Consumer Protection Act in many countries regulates the online selling practices,
requiring accurate product descriptions, clear return policies, and fair pricing.
Online Dispute Resolution (ODR): Some countries promote mechanisms to resolve
consumer complaints without going to court.
Impact: Consumer protection laws are critical to ensuring that online shoppers are treated fairly
and have avenues for resolution in case of disputes. Businesses must provide transparent terms,
return policies, and address customer grievances promptly.
Ethical Concern:
Digital Millennium Copyright Act (DMCA) in the U.S. outlines the legal framework
for digital content protection, especially concerning online platforms.
Intellectual Property (IP) laws in the EU, U.S., and other regions mandate e-commerce
platforms to respond to takedown notices and prevent the sale of counterfeit goods.
Impact: E-commerce companies must take steps to prevent IP violations, such as implementing
proactive measures to stop counterfeit goods from being sold on their platforms.
Ethical Concern:
As e-commerce enables the easy movement of goods across borders, taxation has become a
complex issue. Businesses may attempt to avoid taxes by operating in countries with lower tax
rates, or some may fail to collect sales tax on cross-border sales, putting local businesses at a
disadvantage.
Risks: Loss of government revenue, unfair competition for local businesses, and tax
evasion.
Ethical dilemma: Should e-commerce businesses be required to collect sales tax on
products sold internationally or just within their operating country?
Governments are focusing on how to tax e-commerce sales, especially cross-border transactions:
Value-Added Tax (VAT) and Sales Tax: Many countries have expanded VAT or sales
tax to apply to online sales (e.g., the EU applies VAT on e-commerce purchases).
OECD guidelines: The Organization for Economic Cooperation and Development
(OECD) has worked on providing recommendations to ensure fair and effective tax
policies for digital businesses.
Impact: Public policy is focused on regulating online tax collections, ensuring tax fairness, and
protecting government revenue. Companies need to understand and comply with global tax laws
when engaging in international e-commerce.
E-commerce businesses must consider their social and environmental impacts, from the sourcing
of products to packaging and delivery. Excessive packaging, carbon footprints from
transportation, and worker exploitation are critical concerns.
Impact: E-commerce businesses are under pressure to adopt sustainable practices, both to meet
regulatory requirements and to address consumer concerns about the environmental impact of
their operations.
Ethical Concern:
The digital divide refers to the gap between those with access to modern information and
communication technologies and those without. Many individuals in rural areas or developing
countries have limited access to the internet, which means they are excluded from participating
in e-commerce.
Broadband initiatives: Public policies aim to expand internet access to rural and
underserved areas.
Digital literacy programs: Governments support education programs to enhance digital
skills.
Impact: Governments encourage policies that support digital inclusivity, enabling e-commerce
businesses to reach underserved populations, which expands market reach and reduces
inequalities.
The Intellectual Property (IP) system in e-commerce refers to the legal and regulatory
framework that protects the creations of the mind—such as inventions, brand names, logos,
artistic works, software, and digital content—that are used, distributed, or sold online. It ensures
that creators and businesses can control and profit from their innovations and content in the
digital marketplace.
1. Copyrights
o Protect original works like digital content, software, websites, music, videos, and
product descriptions.
o In e-commerce, copyright safeguards web design, graphics, marketing material,
and multimedia.
o Example: A business’s product photos or blog content cannot be legally reused
by another seller without permission.
2. Trademarks
o Protect brand identity, including names, logos, slogans, and symbols.
o Trademarks distinguish a seller’s goods/services from competitors.
o Example: The Nike swoosh logo or Amazon’s name is trademarked and legally
protected.
3. Patents
o Protect inventions and technical innovations.
o Useful in e-commerce when selling or promoting patented products or processes.
o Example: Amazon’s original “one-click ordering” method was a patented
process.
4. Trade Secrets
o Protect confidential business information like algorithms, customer lists,
marketing strategies, or recipes.
o Example: Google's search algorithm or Coca-Cola's recipe are considered trade
secrets.
📦 Importance of IP in E-Commerce
🔐 Purpose of SET
1. Cardholder Registration
The customer (cardholder) gets a digital certificate from a Certificate Authority (CA),
which verifies their identity.
2. Merchant Registration
Similarly, the merchant also gets a digital certificate that authenticates their legitimacy.
3. Transaction Process
o The buyer places an order on the merchant's website.
o The buyer’s system generates two messages:
One to the merchant, containing the order details.
One to the bank/payment gateway, containing credit card information.
o These messages are digitally signed and encrypted, ensuring security and non-
repudiation.
4. Payment Authorization
o The merchant sends the payment information to the bank for approval.
o If approved, the merchant is notified and proceeds with the order.
5. Transaction Completion
o The payment is processed securely.
o The order is shipped or delivered to the customer.
Feature Description
Authentication Uses digital certificates to verify both buyer and seller.
Confidentiality Credit card details are encrypted so the merchant never sees them.
Integrity Ensures that the transaction data is not altered during transmission.
Non-repudiation Digital signatures ensure neither party can deny a transaction.