Components of a typical e-commerce transaction, Other Subject


E-commerce does not refer just to a firm putting up a Web site for the reason of selling goods to buyers over the Internet. For e-commerce to be a viable substitute to conventional commercial transactions and for a firm to take full advantage of the profit of e-commerce, a number of technical as well as enabling issues have to be considered. Unusual e-commerce transaction loop involves the following key players and corresponding requisites:

The Seller should have the following mechanism:

  • A corporate intranet so that orders are processed in an efficient manner; and
  • IT-literate employees to handle the information flows and keep the e-commerce system.
  • A commercial Web site with e-commerce capabilities (e.g., a secure transaction server);
  • Transaction partners include:
  • Authentication authority that serves as a trusted third party to ensure the security integrity of transactions; and
  • International and National freight companies to make possible the movement of physical goods within, around and out of the country. For business-to-consumer (B2C) transactions, the system must suggest a means for cost-efficient transport of small packages (such that purchasing books over the Internet, for instance, is not prohibitively more costly than buying from a local store).
  • Consumers (in a business-to-consumer transaction) who:
  • Possess a mindset for purchasing goods over the Internet rather than by physically inspecting items; and
  • Form a vital mass of the population with access to the Internet and disposable income enabling widespread use of credit cards.

Business/Firms (in a business-to-business transaction) that jointly form a significant group of companies (especially within supply chains) with Internet access and the ability to place and take orders over the Internet.

Government, to establish:

  • A official structure governing e-commerce dealings (including electronic documents, signatures, and the like); and
  • Official institutions that would put in force the official structure (i.e., laws and regulations) and keep businesses and consumers from fraud, among others.
  • And lastly the Internet, the successful use of which depends on the following:
  • A reliable and robust Internet infrastructure; and
  • A pricing organization that doesn't punish consumers for spending time on and exchange goods over the Internet (e.g., a flat monthly charge for both ISP access and local phone calls).

For e-commerce to rise, the above factors and requisites have to be in place. The smallest amount developed factor is an obstacle to the increased uptake of e-commerce as an entire. For example, a country with an excellent Internet infrastructure will not have high e- commerce figures if banks do not recommend fulfillment and support services to e-commerce transactions. In countries that have significant e-commerce figures, a positive feedback loop reinforces each of these factors.

Posted Date: 10/12/2012 7:02:58 AM | Location : United States

Related Discussions:- Components of a typical e-commerce transaction, Assignment Help, Ask Question on Components of a typical e-commerce transaction, Get Answer, Expert's Help, Components of a typical e-commerce transaction Discussions

Write discussion on Components of a typical e-commerce transaction
Your posts are moderated
Related Questions
Advantages of using EDI over paper systems EDI and other related technologies keep company money by providing an option to, or replacing information flows that need a great dea

how do i turn this into a positive sentence? "our safety policy forbids us from renting power equipment to anyone who cannot demonstrate proficiency in its use."

Question: (a) You should always ask your commercial printer what they consider as "camera ready" before you start the job. Describe Camera-ready Art? (b) Describe what is ha

If I cheat on a test should I tell the teacher I dit it so? Is there such a thing as an ethical compromise?

Is there a Feminist Methodology? The question of whether feminism has developed distinct methodological principles that could justify the establishment of a distinct methodolog

Cultural anthropology : Cultural anthropology, applies the comparative method and evolutionary perspective to human culture. Culture represents the entire database of knowledge, va

Security key In early 2007, PayPal initiate an optional security key as an supplementary safety measure against fraud. A user account attached to a security key has a customize

role of school imparting family life education

1- Compute the processing times for achieving a process lethality (Fo) of 10 min (z=18F) for the following cases a) fh = 30 min, jch = 1.40, RT = 260F, IT=150F, jcc = 1.6 b) b) fh

Describe the full range of recruitment documents that are used by BSiX in the recruitment and selection of a Learning Centre (Library) Administrator. What documents do you need