PRINCIPLES OF INFO.SYS.(LL)>CUSTOM PKG<
12th Edition
ISBN: 9781337074674
Author: STAIR
Publisher: CENGAGE C
expand_more
expand_more
format_list_bulleted
Question
Chapter 8, Problem 2TA
Program Plan Intro
Electronic commerce:
- Electronic commerce is a method of buying and selling of products or goods through online. Here, money and data transactions are done using internet.
- Electronic commerce is also called as E-commerce or Internet commerce.
- Even though the technologies available such as e-mail, social media, and mobiles, the modern e-commerce mostly uses the Internet for the online purchasing of products.
- It is the most efficient method to communicate within the organization of business transactions such as maintaining the financial records of the users such as bank balances, name, and address. But it is just a part of e-commerce business.
Six forms of electronic commerce:
- It includes different forms of commerce based on the transactions performed.
- Business-to-Business (B2B):
- It includes the transactions performed between two different businesses like manufacturer and wholesaler, wholesaler and retailer and many such.
- Example: automobile manufacturing.
- Business-to-Consumer (B2C):
- It includes the transactions performed between the companies and the consumers or customers.
- Here, the end users of that company are referred as consumers or customers.
- For example, customer buying a fridge from the electronic retailer is known as B2C transaction.
- Consumer-to-Consumer (C2C):
- It includes the transactions performed between two different customers or consumers.
- Example: Online auctions like OLX.
- Government-to-Business (G2B):
- It includes the transactions performed between the public administration and the enterprises.
- Government-to-Citizen (G2C):
- It includes the transactions performed between the government and the citizen or private individual.
- Example: applying for a certificate.
- Government-to-Government (G2G):
- It includes the transactions performed between two different government agencies.
- Example: Northeast Gang
Information System (NEGIS).
- Business-to-Business (B2B):
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Create a Google account and prepare an online application for the employment opportunity that has been outlined. You will be required to write a 500-word essay as part of the application process explaining why Google should recruit you.
Best practices for designing an e-commerce website include incorporating social media, using security measures to reassure customers regarding their credit card information, requiring registration prior to allowing users to access the online product catalog, and revealing discount options and membership deals at the end of the purchasing process.
b form that contain invalid data in order to call the user’s attention to them.
Find a prevalent issue/problem in your community (Anywhere in PHILIPPINES). Now, list ways technologies can help to solve that problem and how.
(no plagiarism, will check the answer. thank you)
Chapter 8 Solutions
PRINCIPLES OF INFO.SYS.(LL)>CUSTOM PKG<
Ch. 8.3 - Prob. 1DQCh. 8.3 - Prob. 2DQCh. 8.3 - Prob. 1CTQCh. 8.3 - Prob. 2CTQCh. 8.5 - Prob. 1DQCh. 8.5 - Prob. 2DQCh. 8.5 - Prob. 1CTQCh. 8.5 - Prob. 2CTQCh. 8 - Prob. 1SATCh. 8 - Prob. 2SAT
Ch. 8 - Prob. 3SATCh. 8 - Prob. 4SATCh. 8 - Prob. 5SATCh. 8 - Prob. 6SATCh. 8 - Prob. 7SATCh. 8 - Prob. 8SATCh. 8 - Prob. 9SATCh. 8 - Prob. 10SATCh. 8 - Prob. 11SATCh. 8 - Prob. 12SATCh. 8 - Prob. 13SATCh. 8 - Prob. 14SATCh. 8 - Prob. 15SATCh. 8 - Prob. 16SATCh. 8 - Prob. 17SATCh. 8 - Prob. 1RQCh. 8 - Prob. 2RQCh. 8 - Prob. 3RQCh. 8 - Prob. 4RQCh. 8 - Prob. 5RQCh. 8 - Prob. 6RQCh. 8 - Prob. 7RQCh. 8 - Prob. 8RQCh. 8 - Prob. 9RQCh. 8 - Prob. 10RQCh. 8 - Prob. 11RQCh. 8 - Prob. 12RQCh. 8 - Prob. 13RQCh. 8 - Prob. 14RQCh. 8 - Prob. 1DQCh. 8 - Prob. 2DQCh. 8 - Prob. 3DQCh. 8 - Prob. 4DQCh. 8 - Prob. 5DQCh. 8 - Prob. 6DQCh. 8 - Prob. 7DQCh. 8 - Prob. 8DQCh. 8 - Prob. 9DQCh. 8 - Prob. 10DQCh. 8 - Prob. 11DQCh. 8 - Prob. 12DQCh. 8 - Prob. 1PSECh. 8 - Prob. 3PSECh. 8 - Prob. 1TACh. 8 - Prob. 2TACh. 8 - Prob. 2WECh. 8 - Prob. 1CECh. 8 - Prob. 2CECh. 8 - Prob. 1DQ1Ch. 8 - Prob. 2DQ1Ch. 8 - Prob. 1CTQ1Ch. 8 - Prob. 2CTQ1Ch. 8 - Prob. 1DQ2Ch. 8 - Prob. 2DQ2Ch. 8 - Prob. 1CTQ2Ch. 8 - Prob. 2CTQ2Ch. 8 - Prob. 1DQ3Ch. 8 - Prob. 2DQ3Ch. 8 - Prob. 1CTQ3Ch. 8 - Prob. 2CTQ3
Knowledge Booster
Similar questions
- Verify whether you or your company has a Twitter or Facebook page. Is there anything that distinguishes them from other similar social networking sites? I was wondering what percentage of organizations rely on these online resources for recruiting. I speak five languages well; is it okay if I use them all here? How do experts network and meet potential customers and partners on these sites?arrow_forwardTroubleshooting Write an advertisement for a user support position. Find one or more ads online or in your local newspaper for information technology and user support positions. Note the format and content of a typical help wanted ad in the IT field. Select a user support description you find through an online search, and then write a classified ad that could be used to attract job applicants for the position whose description you selected. Type up your findings in a Word document.arrow_forwardYou have recently begun working for a prominent beverage producer as a consultant for the company. Your entire marketing strategy has to include a discussion and explanation of what can be done to boost the company's visibility on the internet. This should be included as part of the plan. Make certain that any websites you want to make available to the general public have undergone exhaustive testing.arrow_forward
- Where do you stand on the issue of social media monitoring by employers? What should be the scope of such monitoring? Does your opinion change if you use employer owned equipment and use social media at work?arrow_forwardAssignment: The Evolution of Mobile Technologies Learning Objectives and Outcomes ▪ Describe the features of the generations (1G to 5G) of mobile technology. ▪ Describe the security challenges of each generation and how those challenges have been addressed. Assignment Requirements You are a networking consultant for Secure Systems Solutions (SSS), specializing in wireless and mobile device security. SSS has been asked to make a presentation to a high school computer programming club. The company president, Thomas, encourages employees to become involved in the community, and Claire, a senior manager at SSS, has asked you to create a brief PowerPoint presentation. The programming club has an interest in old technology as well as new. The presentation should focus on how mobile technologies have evolved over the years, from 1G to 5G. For this assignment: 1. Research the generations (1G to 5G) of mobile technology to date. 2. Develop a PowerPoint presentation that describes each…arrow_forwardDescribe how a wireless access point works and the association process. Assignment RequirementsYou are a networking consultant for Secure Systems Solutions (SSS), specializing in wireless and mobile device security. SSS strives to be active in community affairs. The parent-teacher organization within the local school district is planning to host a technology learning event aimed at junior high school students. The organization has come to SSS for assistance. Your manager has asked you to prepare a presentation for the students that describes how a wireless access point works. 1. Develop a presentation that includes: • The purpose of a wireless access point • The purpose of antennas • The association processarrow_forward
- Compare between the some mobile application types, web application and hybrid, then determine the best usable type and justify your choice for the current situation. Using the following criteria for the comparison table The app maintenance cost (app update) The responsiveness and load time of the app (online and off line) The efficiency of the app to take advantage of the device resources The technology used to develop the app Based on the result of the comparison table provide a justification of your design choice for acceptance or rejection for each choicearrow_forwardMobile application developementQ1 Evaluate the areas where mobile applications are applied and used in our everyday lifearrow_forwardBriefly explain the process you follow to evaluate a website's usability. The usability testing will involve users and will take place in a controlled setting.arrow_forward
- Mobile application development is the process of making software for smartphones, tablets and digital assistants, most commonly for the Android and iOS operating systems. The software can be preinstalled on the device, downloaded from a mobile app store, or accessed through a mobile web browser. Mobile design is an important aspect to consider when implementing an e-commerce website. Assess the elements of site and mobile design and recommend the vital elements that should be considered as a part of e-commerce implementationarrow_forwardHow would you address the potential for misleading sharing?arrow_forwardAdding a dedicated group to your Facebook account allows you to meet online and keep in touch with others who share your interest. You can post relevant media, such as photos, articles, and videos. Which role in a social media information system (SMIS) does your group fit into? a. social media facilitator b. social media sponsor c. social media community d. social media providerarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningEnhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,