Applications of generic framework for electronic commerce, Computer Engineering

Assignment Help:

How are the applications of generic framework for electronic commerce performed?

To perform applications, this is essential to have Supporting Information and Organizational Infrastructure and System that comprises:

• Common Business Services Infrastructure (as electronic payment, security smart cards/authentication and directories/catalogs)

• Messaging and Information Distribution Infrastructure (as e-mail, EDI and Hypertext Transfer Protocol)

• Multimedia Content and Network Publishing Infrastructure (as HTML, Java, VRML and World Wide Web)

• Network Infrastructure (as Telecom, wireless, LAN, Internet, cable TV, VAN, WAN, Extranet, Intranet) And their implementation is dependent upon four main areas as supporting pillars:

• People (as Intermediaries services, Sellers, IS People, Buyers and Management),

• Public policy (as Privacy Issues, Domain Names, Taxes, Legal, Free Speech)

• Technical Standards (as for Documents, Network and Security Protocols,  Payments)

• Organizations (as Partners, Associations, competitors and Govt. Services). The EC management coordinates with all the applications, pillars and Infrastructures.


Related Discussions:- Applications of generic framework for electronic commerce

Fuzzy logic - artificial intelligence, Fuzzy Logic: In the logics we a...

Fuzzy Logic: In the logics we are here described above, what we have been concerned with truth: whether propositions and sentences are true. Moreover, with some natural langua

State some criterias and their effects on a database, It is possible to ent...

It is possible to enter one or more criteria in the rows which can influence your database significantly. >="Callahan" this returns all the several records from Callahan to the

Define far and near procedures, Q. Define Far and Near Procedures? Proc...

Q. Define Far and Near Procedures? Procedure offers the primary means of breaking the code in a program into modules. Procedures have one maindrawbackwhich is they need extra c

Give some examples of malicious data, Give some examples of malicious data....

Give some examples of malicious data.  In May 2002, the Norton Anti-Virus software for Windows operating systems detects about 61000 malicious programs. Some of them are named

How do you save data in bdc tables, How do you save data in BDC tables? ...

How do you save data in BDC tables? The data in BDC tables is saved by using the field name 'BDC_OKCODE' and field value of '/11'.

Distributed workstation cluster, A distributed workstation cluster must be ...

A distributed workstation cluster must be viewed like single computing resource and not as a group of particular workstations'.  Details of cluster were: 150MHz R4400 workstatio

C-programing, c-program for the minimum total number of shelves

c-program for the minimum total number of shelves

Illustrate internal organisation of ram, Q. Illustrate Internal Organisatio...

Q. Illustrate Internal Organisation of RAM? The construction displayed in Figure below is made up of one JK flip-flop and 3 AND gates. The two inputs to system are one input bi

Give a technical description of e-mail, E-mail system is mostly used for se...

E-mail system is mostly used for sending message electronically to group or individuals of individuals in inter and intra office environment. It needs networks to connect them. In

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd