Principles of Information Systems, Loose-Leaf Version
Principles of Information Systems, Loose-Leaf Version
13th Edition
ISBN: 9781305971820
Author: Ralph Stair, George Reynolds
Publisher: Course Technology
Question
Book Icon
Chapter 7, Problem 1TA
Program Plan Intro

Electronic commerce:

  • Electronic commerce is a method of buying and selling of products or goods through online. Here, money and data transactions are done using internet.
  • Electronic commerce is also called as E-commerce or Internet commerce.
  • Even though the technologies available such as e-mail, social media, and mobiles, the modern e-commerce mostly uses the Internet for the online purchasing of products.
  • It is the most efficient method to communicate within the organization of business transactions such as maintaining the financial records of the users such as bank balances, name, and address. But it is just a part of e-commerce business.

Six forms of electronic commerce:

  • It includes different forms of commerce based on the transactions performed.
    • Business-to-Business (B2B)
      • It includes the transactions performed between two different businesses like manufacturer and wholesaler, wholesaler and retailer and so on.
      • Example: automobile manufacturing.
    • Business-to-Consumer (B2C)
      • It includes the transactions performed between the companies and the consumers or customers.
      • Here, the end users of that company are referred as consumers or customers.
      • For example, customer buying a fridge from the electronic retailer is known as B2C transaction.
    • Consumer-to-Consumer (C2C)
      • It includes the transactions performed between two different customers or consumers.
      • Example: Online auctions like OLX.
    • Government-to-Business (G2B)
      • It includes the transactions performed between the public administration and the enterprises.
      • Example: e-learning and government procurement
    • Government-to-Citizen (G2C)
      • It includes the transactions performed between the government and the citizen or private individual.
      • Example: applying for a certificate.
    • Government-to-Government (G2G)
      • It includes the transactions performed between two different government agencies.
      • Example: Northeast Gang Information System (NEGIS).

Blurred answer
Students have asked these similar questions
Distributed Systems: Consistency Models fer to page 45 for problems on data consistency. structions: Compare different consistency models (e.g., strong, eventual, causal) for distributed databases. Evaluate the trade-offs between availability and consistency in a given use case. Propose the most appropriate model for the scenario and explain your reasoning. Link: [https://drive.google.com/file/d/1wKSrun-GlxirS31Z9qoHazb9tC440AZF/view?usp=sharing]
Operating Systems: Deadlock Detection fer to page 25 for problems on deadlock concepts. structions: • Given a system resource allocation graph, determine if a deadlock exists. If a deadlock exists, identify the processes and resources involved. Suggest strategies to prevent or resolve the deadlock and explain their trade-offs. Link: [https://drive.google.com/file/d/1wKSrun-GlxirS31Z9qoHazb9tC440 AZF/view?usp=sharing]
Artificial Intelligence: Heuristic Evaluation fer to page 55 for problems on Al search algorithms. tructions: Given a search problem, propose and evaluate a heuristic function. Compare its performance to other heuristics based on search cost and solution quality. Justify why the chosen heuristic is admissible and/or consistent. Link: [https://drive.google.com/file/d/1wKSrun-GlxirS31Z9qoHazb9tC440 AZF/view?usp=sharing]

Chapter 7 Solutions

Principles of Information Systems, Loose-Leaf Version

Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,