E Business

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 17

E-BUSINESS

Ques 1.
Introduction:
Online marketing is the process of using web-based channels to inform potential customers
about a company's brand, products, or services. Email, social media, display advertising,
search engine optimization (SEO), Google AdWords, and other strategies are utilized for
online marketing. Reaching potential clients through the internet platforms they use for
reading, browsing, purchasing, and socializing is the goal of marketing. The widespread use
of the internet for both personal and professional purposes has led to the creation of new
platforms for advertising and marketing communication, including those described above.
Online marketing, which largely employs digital platforms to attract, engage, and convert
virtual visitors to consumers, has a lot of advantages as well as difficulties. Traditional
marketing, which traditionally includes forms of advertising including print, billboard,
television, and radio, is different from marketing done online. Before the emergence of
internet marketing platforms, the cost to sell goods or services was sometimes prohibitively
high and conventionally hard to assess. Consider how brand recognition levels are monitored
for national TV advertising campaigns using consumer focus groups. Traditionally,
controlled experiments have not been well suited for these procedures. Creating a website and
developing client acquisition campaigns for little to no money nowadays allows everyone
with an online business (as well as the majority of offline firms) to engage in online
marketing. These marketing-related goods and services can also experiment with
optimization to improve the effectiveness and ROI of their campaigns.

Concept and Application:


Online marketing is the practise of informing potential customers about a company's brand,
products, or services using web-based platforms. Email, social media, display advertising,
search engine optimization (SEO), Google AdWords, and other strategies are utilized for
online marketing. Reaching potential clients through the internet platforms they use for
reading, browsing, purchasing, and socializing is the goal of marketing. Additionally, online
marketing encompasses a larger range of digital media than conventional marketing does,
including wireless technology, web, email, and other digital media, as well as digit. Online
marketing harmonizes a company's operations with the design and functionality of its
website. Target market segmentation, proper advertising, and online promotional tools are the
main points of emphasis. An e-commerce company's internet marketing plan serves as its
cornerstone. Its online marketing plan outlines how to get visitors to its website and persuade
them to purchase the goods and services that are offered there. A plan for internet marketing
should detail the following: a strategy to draw in new clients, a strategy to increase sales from
tourists and a strategy to keep and value current consumers. Online marketing, e-marketing,
or web-advertising are terms used to describe the use of the internet for marketing.al
consumer data and electronic customer relationship management systems.
Social
Media
Advertising

Online
Email
Marketing Marketing SEO
Tools

SEM

1. Search Engine Optimization (SEO): The art and science of search engine
optimization (SEO) involves raising a page's position in search engines like Google.
Ranking higher in search engines may enhance a website's traffic because search is
one of the primary ways users find material online. Paid advertisements are frequently
displayed at the top of the results page in Google and other search engines, followed
by the normal results, or what search marketers refer to as the "organic search
results." To distinguish it from traffic that comes from sponsored search, SEO traffic
is sometimes referred to as "organic search traffic." Search engine marketing (SEM),
often known as pay-per-click, is another name for paid search (PPC). Software
applications or online tools that track search engine optimization (SEO) activities are
known as SEO marketing tools. The perfect SEO marketing tool should track
performance, provide current ranks, and point out untapped link-building and
keyword potential. It should enable you to gauge performance across various
geographies, languages, or regions, as well as provide you insight into how your
rivals' content and competitors' products fare. Online marketing relies heavily on
search engine optimization because it is one of the main ways that people access the
internet. A site will often see greater traffic if it can move up the list of search results,
which is given in alphabetical order. In order to rank better in the search results, the
search engine optimization method entails tweaking each of these fundamental
elements of search engine algorithms. For each query, search engines like Google
utilise an algorithm or set of rules to decide which sites to display. To decide the
ranks of their SERPs, these algorithms, which have become incredibly complicated
over time, consider hundreds or even thousands of distinct ranking indicators.
2. Social Media Marketing: Software and apps known as social media marketing tools
enable marketers to track mentions, interact with consumers, and schedule
forthcoming content across various social channels. Social media management
software, often known as SMMS, gives you a more comprehensive understanding of
the connections between your customers and your business. To find out how
consumers feel about your business, you may utilise sentiment analysis or follow
social listening for key phrases. And to maintain a sound plan, you may automate post
publication. A social media marketing platform should also have the ability to manage
many channels at once. From Facebook to Pinterest, you should keep an eye on each
network where your people are active. For effectiveness, your tool should also track
campaigns. Utilizing social media networks to engage with customers and eventually
boost website traffic and revenues is known as social media marketing. Online
companies depend on social media to engage with people who increasingly utilise
social networks and mobile devices to access web content. Like other forms of
marketing, social media marketing is focused on attracting and establishing a
relationship with your target market. Instead of bombarding consumers with straight
marketing, utilise social media to really engage with them and explain what makes
your company special.
3. Search Engine Marketing: One of the finest methods for growing your business in a
field that is getting more and more competitive is SEM, or search engine marketing.
Due to the huge number of businesses online vying for the same customers' attention,
search engine marketing is the most effective strategy for increasing sales and
business growth. The technique of marketing a company through paid adverts that
display on search engine results pages is known as "search engine marketing" (or
SERPs). The biggest advantage of search engine marketing is that it gives businesses
the chance to display their adverts in front of motivated consumers who are prepared
to buy at the exact moment those consumers are prepared to do so. To increase a
website's visibility on search engine results pages, digital marketers adopt a strategy
called search engine marketing (SEM) (SERPs). Although it initially applied to both
paid and organic search activities like search engine optimization, the word now
almost exclusively refers to paid search advertising (SEO). Search engine marketing
is also known as paid search and pay per click (PPC). An effective technique for a
business to use its marketing budget is through search engine marketing, because
marketers only pay for impressions that result in traffic. Additionally, each visitor
helps the website's ranks in organic search results rise over time. In contrast to other
websites like social media where users are not expressly seeking for something, when
customers input search queries with the intention of discovering information of a
commercial nature, they are in a great frame of mind to make a purchase. Search
marketing reaches consumers at the perfect time, when they are open to new
information. PPC advertising, in contrast to the bulk of digital advertising, is
unobtrusive and does not interfere with users' duties.
4. E-mail Marketing: When promoting the products or services your business provides,
email marketing is a powerful marketing medium. Email marketing is a type of direct
marketing as well as digital marketing. It might help you notify your customers about
your most recent items or deals by integrating it into your marketing automation
campaigns. Through various forms of marketing emails, it may also be extremely
important in your overall marketing strategy for lead generation, brand recognition,
relationship development, and consumer engagement in between transactions. The use
of email inside your marketing efforts to promote a business’s products and services,
as well as incentivize client loyalty. Customers on your email list may be informed
about new goods, deals, and other services through email marketing. Educating your
audience about the benefits of your brand or maintaining their interest in between
transactions may also be a more subtle way to market. It may potentially fall
somewhere in the middle. Due to the fact that emails remain in the inbox until they
are read, deleted, or archived, email has grown to be a very popular marketing tool for
companies. Email marketing may help you establish a connection with your audience
and increase traffic to your blog, social media accounts, and other websites you want
people to visit. To ensure that consumers are only receiving the content they wish to
view, you may even segment your emails and target users based on demographics.
Businesses may update their contact list of clients about new goods, offers, and other
information by using email marketing, a direct marketing method. The majority of
organisations' total inbound strategy depends on it because of its strong ROI.

Conclusion:
Online advertising is often referred to as web advertising, digital advertising, and search
engine advertising (SEM). Although they are methods used in online marketing, online
advertising and internet advertising are not the same thing. Although there are numerous
potential for businesses to expand their online presence and develop their audiences through
online marketing, there are also inherent difficulties with these strategies. Due to the virtual
nature of message and content distribution to a particular audience, marketing might first
become impersonal. Marketers need to have a thorough grasp of the demands and preferences
of their target audience before developing an internet marketing plan. In addition, online
marketing may be crowded and aggressive. The ability to sell goods and services in both
regional and global markets is powerful, but the competition may be fierce. Because so many
businesses are using internet marketing to advertise their goods and services, businesses that
invest in online marketing may find it challenging to catch customers' attention. As they test
and create marketing campaigns across numerous platforms, marketers must learn to strike a
balance between creating a unique value proposition (UVP) and brand voice. The capability
of measuring the impact of each individual channel as well as how visitors gained via various
channels engage with a website or landing page experience is a significant advantage of
employing online channels for marketing a company or product. Further research may be
performed on the visitors who become paying customers to ascertain which channels are
most successful in attracting worthwhile clients.
Ques 2.
Introduction:
An electronic payment system is a technique to conduct transactions or pay for products and
services online. Due to the expansion of online banking and shopping over the past few
decades, e-payment systems have advanced steadily. The rapid expansion of e-payment
systems and payment processing equipment happens in tandem with technical advancements.
The proportion of transactions using cash is steadily declining because to advancements in
online transaction security, remarkable simplicity, and time-saving features. Electronic
wallets and Visa or Mastercard credit or debit cards are without a doubt the most used e-
payment methods in Europe. In addition to these, new payment methods including bitcoin
wallets, local debit or credit cards, bank transfers, mobile applications, smart cards, and AI-
based payments frequently appear. The evolution of e-payment systems is something that
retailers must keep an eye on. It can open up countless opportunities for growing your
business and attracting new clients. Our banking experience is much improved by e-payment
solutions. Even the most "cash-loyal" of customers became electronic money users as a result
of the Covid-19 outbreak. To fulfil the consumers' rising expectations, businesses must use a
variety of e-payment systems. E-payments are now much more safe and practical thanks to
the rising adoption of NFC technology and biometric security measures. Due to the benefits
of "non-cash" payments, customers and businesses have grown increasingly accepting of
them. You use an electronic payment method when you shop for goods and services online.
E-commerce payment systems, also known as online or electronic payment systems, are
terms used to describe this method of payment, which does not involve utilising cash or
checks. Technology has been created to enhance, improve, and enable secure e-payment
transactions in response to the rising popularity of internet-based banking and shopping.
Paperwork, transaction expenses, and labour costs have all been cut with paperless e-
commerce payments, revolutionising the payment processing industry. The solutions enable
firms expand their market reach and are user-friendly, taking less time than manual
processing.

Concept and Application:


Flipkart: Flipkart provides a variety of payment options. Whatever online payment method
you choose, you can be sure that Flipkart's reputable payment gateway partners will protect
the privacy of your transaction information at all times by using safe encryption technology.
To pay for your purchase, you can use Internet Banking, a gift card, Cash on Delivery, or
your wallet. In India and 21 other nations, Flipkart also accepts payments made using
credit/debit cards from Visa, MasterCard, Maestro, and American Express. There are no
unforeseen costs when you purchase items on Flipkart. All of the goods' quoted prices are
final and included. You pay precisely what is listed on the product page's pricing. Depending
on the seller's policies, there can be additional delivery fees. Please verify with each vendor
to confirm. You can use the Cash on Delivery (C-o-D) payment option if you are
uncomfortable making an online payment on Flipkart.com. When a product is delivered to
your door using C-o-D, you may pay in cash there and then without having to make an online
payment in advance. The highest order value that may be paid for using Cash on Delivery (C-
o-D) is 50,000. Only cash is accepted as payment for it. C-o-D orders are not eligible for the
use of gift cards or store credit. A C-o-D payment cannot be made in foreign currencies. We
only take Indian Rupees. Credit cards from Visa, MasterCard, and American Express are all
accepted forms of payment. You'll need your credit card number, expiration date, and three-
digit CVV number to pay with a credit card at the checkout (found on the backside of your
card). You will be taken to the bank's page to enter the online 3D Secure password after
providing these data. Debit cards from Visa, MasterCard, and Maestro are accepted as forms
of payment. You will need your card number, expiration date (optional for Maestro cards),
and three-digit CVV number in order to pay with your debit card at the register (optional for
Maestro cards). After that, you'll be sent to a secure page provided by your bank where you
may enter your bank-issued internet password to finish making the payment. For Flyte,
Wallet, and eGV payments/top-ups, credit/debit cards issued outside of the United States are
not accepted. The greatest levels of transaction security currently available on the Internet are
used to protect your online transaction on Flipkart. Your card information is protected by
256-bit encryption technology as it is sent securely by Flipkart to the appropriate banks for
payment processing. On Flipkart, all credit card and debit card payments are conducted
through secure payment gateways run by reputable banks. In order to offer an extra degree of
protection during online transactions, banks now employ the 3D Secure password service.
Flipkart is aware of the value of having effective fraud detection and resolution capabilities.
We regularly check transactions for suspicious behaviour along with our online payment
partners, and we flag possibly fraudulent transactions for human review by our team. In the
most exceptional of circumstances, if our staff is unable to definitely rule out the potential of
fraud, the transaction is put on hold, and the consumer is asked for identification papers. We
can confirm that the purchases were made by a legitimate card user by using the ID papers.
Customers are asked to be patient with us as we work to provide a safe and secure
environment for online transactions. We apologise for any inconvenience this may cause.
Amazon: All popular credit and debit cards, including Visa, Mastercard, American Express,
and others, are accepted by Amazon Business. During checkout, select the Amazon Business
Credit payment method to get credit for your business orders. Cash on Delivery (COD) is a
method of payment that is accepted everywhere or at your doorstep. Additionally, in a few
places, you may pay with a debit or credit card. The same secure methods you use to pay
your present suppliers, NEFT or RTGS, can be used to pay for your orders directly from your
bank accounts. To finish the order placing after adding products to the cart, choose
NEFT/RTGS as the payment option. The order will be held by Amazon for 12 hours.
Therefore, you must pay Amazon by NEFT or RTGS within 12 hours of placing your order.
Within 24 hours, Amazon will automatically transfer any extra or unused cash to the bank
account you used to make the NEFT/RTGS payment. Gift certificates can be redeemed using
many payment options. The gift card won't be seen at the checkout if you're making a
purchase from a shared pay group. You can add a different individual payment option to
finish the order if the gift card does not pay for the entire balance of the purchase. Gift cards
cannot be used on the same order with other payment methods.
Myntra: This E-Gift Card may only be used on the Myntra online shopping platform. The
minimum validity time for this e-gift card is one year. Prior to redeeming their Myntra E-Gift
Cards, all holders of these Gift Cards must first add the value they have placed therein to their
Myntra accounts. The user will be registered for SMS notifications after the Myntra E-Gift
Card has been loaded into their Myntra account. Only users who have registered in
accordance with the aforementioned rules will have their requests for banning Myntra E-Gift
Cards honoured and taken into consideration by Myntra. It is not possible to buy more gift
cards with this E - Gift Card. It is possible to combine many E-Gift Cards into a single order.
At the time of checkout, you may mix up to 15 E- Gift Cards into one order. E-gift cards
cannot be reloaded or exchanged for cash or credit. Only vendors listed on www.myntra.com
or the Myntra Mobile App may use this E-Gift Card online. After the discount has been
applied, the customer will be required to pay the remaining balance, if any, of the item's cost
at the time of purchase. If the order total exceeds the E-Gift Card limit, the remaining balance
must be paid using a credit card, debit card, cash on delivery, or internet banking. If the order
value is less than the value of the E-Gift Card, the remaining balance (after the order value
has been deducted) will appear under the same E-Gift Card and may be applied to future
purchases. E-Gift Cards may only be purchased for individual retail customers on
www.myntra.com or the Myntra Mobile App using the following payment methods: Credit
Card, Debit Card, and Net Banking.
AJIO: There is no charge from AJIO to use the Platforms. In the future, AJIO could think
about charging Users a charge for utilising the Platforms as a whole or for using a specific
function of the Platforms. In such a case, you agree to pay any necessary expenses. AJIO
does not promise or guarantee that it will provide you notice before imposing such a fee levy.
Your continuing use of the Platforms following the charge adjustment will be regarded as
your acceptance of the new terms. AJIO provides users with a variety of payment choices to
enhance user convenience. Without providing Users with prior notice, AJIO retains the right
to add or remove any of the following payment methods: payment using online banking
services, selecting certain credit cards, selecting certain debit cards, Cash on delivery
payments, payments made using the AJIO Wallet, a native closed-loop prepaid payment
method, payments made with prepaid cards and electronic wallets, Payment by equated
monthly instalments ("EMI") and any other payment method that AJIO may from time to
time provide. The term "Payment Choices" will be used going forward to refer to all of the
aforementioned payment options. While efforts are made to provide the Payment Options
through many banking channels, AJIO now only takes payments from a limited few, major
financial routes. The Frequently Asked Questions, which may be read here, include a list of
the financial channels through which AJIO currently takes payments. AJIO does not accept
foreign debit/credit card payments. All of the Products available for purchase on the Platform
include all applicable taxes. All fees, costs, and charges related to purchasing products from
us will be your responsibility to pay, and you agree to cover all relevant taxes, including but
not limited to VAT/CST, service tax, GST, duties, and cessers. Despite AJIO's best efforts,
there may be occasions where Products are mispriced on the Platforms during or after the
User has completed the purchase process. Although careful verification procedures are
followed before Product prices are published on the Platforms, mistakes and inconsistencies
resulting from technological difficulties and delays are inevitable.
Firstcry India: It accept debit cards from all Indian banks as well as credit cards from VISA,
Mastercard, and American Express that were issued in India. Paypal also accepts
international credit/debit card transactions. Firstcry.com is dedicated to provide you secure
online payment options. All of your online transactions are safeguarded & secured by
GoDaddy.com's SSL (secure socket layer) technology. Your payment card and any other
pertinent data are encrypted during the whole transaction process. Your purchase experience
is safe and secure thanks to this encryption. Firstcry processes all credit card and debit card
payments using safe, reliable payment gateways run by reputable Indian banks and payment
gateway service providers. Firstcry protects your card information while securely delivering
it for processing using the most recent 256-bit encryption technology. Firstcry only gathers
this information during a transaction session and does not keep credit card or debit card
numbers, CVV/security codes, 3D Secure pins, or expiration dates on any of its servers.
However, the risk management and fraud management systems of banks and payment
gateways with the necessary permissions may keep the aforementioned data. Systems for risk
management and fraud management are employed to ensure that payment card frauds are
kept to a minimum and that you, us, and the payment card industry have safe access to all
pertinent payment card information. Credit cards from HDFC, CITI, ICICI, AXIS, HSBC,
KOTAK, SBI, Central Bank of India, and IndusInd Bank presently provide EMI plans with
the ability to pay over time. under an EMI tenure plan of 3, 6, 9, or 12 months. When an
order with an EMI option is successfully completed, the EMI policy use and terms and
conditions of the various banks will be in effect. Any correspondence about an active EMI
programme should be sent to the bank that issued the card. In order to facilitate the EMI
feature, FirstCry.com does not charge any customers a processing or convenience fee.
Customers who have questions about EMI Processing/Convenience Charges must contact the
issuing bank. Can can pay via Cash On Delivery (COD). When receiving the items, you in
this scenario pay the courier in cash. For orders with a total invoice value up to Rs 10,000,
COD payments are permitted.
The complexities of accepting credit cards, debit cards, and other forms of electronic
payment are sometimes overlooked in the midst of the myriad duties that small company
owners must carry out on a daily basis. However, we think that having a solid grasp of the
core phrases and ideas related to merchant services may help a lot. Modern businesses often
accept both closed-loop and open-loop payment methods to provide customers with a more
convenient shopping experience. Open-loop payments are more conventional, worldwide
personal banks and/or credit cards, as opposed to closed-loop payments, which are
concentrated on use by a particular organisation.
Closed-loop System: Any sort of electronic payment card that may only be used from one
company is referred to as a closed-loop payment card. In most cases, closed-loop cards are
issued by the company issuing them (the merchant), working with a backup agency like
Discover or Visa. One of two approaches can be employed with closed-loop payment
systems:
a. Like a debit card Similar to a gift card, these closed-loop cards are often pre-loaded
with money, however they can alternatively be connected to a different account.
b. As an ATM card. Applying for and maintaining credit limits, spending capacity, and
benefits for closed-loop cards that serve as credit cards must be done through the
business or organisation.
Compared to open-loop cards, closed-loop payment systems are typically easier to use and
more secure. This is mainly because closed-loop cards won't function anywhere else; as a
result, taking electronic payments from other sources is more of an internal operation. In
many cases, closed-loop payments can also be completed through proprietary applications or
other mobile payment options.
A financial institution or bank from a third party is not necessary for the operation of this
system. In contrast to the open-loop payment system, the network owner directly provides the
payment services to businesses and cardholders in a closed-loop payment network. The
method involves no outside parties. American Express is an illustration of a closed-loop
system since it provides clients with payment cards for usage at various merchant
establishments while simultaneously enabling the establishments to accept payments with
these cards. American Express is a multinational payments provider that offers charge, credit,
and prepaid cards to individuals and organisations. American Express doesn't just issue cards;
it also manages all card-related transactions, including those using cards from other
companies. The Platinum Card from American Express, the Blue Cash Everyday Card from
American Express, and the Delta Skymiles Blue Card from American Express are just a few
of the cards that have the American Express brand and are used to process transactions.
Open-loop System: The term "open-loop payment card" refers to any electronic payment
card that may be used to make payments at a variety of businesses. Open-loop payment cards
are far more prevalent than closed loop cards. Open-loop cards include conventional credit
cards, debit cards, gift cards, EBT cards, and just about every other type of electronic
payment mechanism, in contrast to closed loop payment cards, which have a more narrow
range of applications. Major financial institutions including Visa, American Express,
MasterCard, Discover, and others issue open-loop cards. Although open-loop card payments
are more difficult, they are also more flexible and have a considerably larger variety of
applications. POS purchases, mobile payments, and e-commerce transactions may all be
processed using open-loop payment systems. Working with a trustworthy merchant service
provider is the essential to ensuring that your company has all of the necessary hardware and
software when it comes to small companies and open-loop cards. With the use of this system,
a bank or other financial institution that issues a consumer a payment card—such as a Visa or
MasterCard—can link with a bank or financial institution that offers banking services to a
merchant. This mechanism regulates the movement of money and information between them.
Among the key characteristics of open-loop network operators like Visa are: They don't
create credit cards or choose the interest rates that customers pay to use their cards. The
issuing banks are responsible for this; they do not choose the fees that businesses pay to
accept credit cards or the merchant discount rate. Banks that serve as acquirers are
accountable for this. Visa and Mastercard are the two largest payment processing networks in
the world. Visa and Mastercard, as opposed to Discover and American Express, issue cards
through the financial institutions that are members of their network. Member banks and credit
unions give Visa and Mastercard credit and debit cards to their customers directly and
frequently through co-branded credit card agreements with travel agencies, hotels, and big-
box retailers.

Conclusion:
You use an electronic payment method when you shop for goods and services online. E-
commerce payment systems, also known as online or electronic payment systems, are terms
used to describe this method of payment, which does not involve utilising cash or checks.
Technology has been created to enhance, improve, and enable secure e-payment transactions
in response to the rising popularity of internet-based banking and shopping. Paperwork,
transaction expenses, and labour costs have all been cut with paperless e-commerce
payments, revolutionising the payment processing industry. The solutions enable firms
expand their market reach and are user-friendly, taking less time than manual processing. Our
banking experience is much improved by e-payment solutions. Even the most "cash-loyal" of
customers became electronic money users as a result of the Covid-19 outbreak. To fulfil the
consumers' rising expectations, businesses must use a variety of e-payment systems. E-
payments are now much more safe and practical thanks to the rising adoption of NFC
technology and biometric security measures. Due to the benefits of "non-cash" payments,
customers and businesses have grown increasingly accepting of them.An electronic payment
system is a technique to conduct transactions or pay for products and services online. Due to
the expansion of online banking and shopping over the past few decades, e-payment systems
have advanced steadily. The rapid expansion of e-payment systems and payment processing
equipment happens in tandem with technical advancements. The proportion of transactions
using cash is steadily declining because to advancements in online transaction security,
remarkable simplicity, and time-saving features.
Ques 3(a).
Introduction:
An notion of how to provide value for a consumer is the foundation of any business. So, if
someone is seeking for a table, we can make one, promote it, ship it, and be paid for it. That
is how our business operates. The coal that powers our train is the entire amount of money
made, often known as revenue. Revenue will cover production, distribution, marketing, and
other expenditures up until we make a profit, depending on the intricacy of the business
model. But income, not profit, is what sustains the firm. In addition to a straightforward
transactional logic, there are several more ways for us to make money, pay our bills,
distribute goods, and so on. Even more so in the case of software firms: Numerous
opportunities to commercialize code are created by web distribution and the nature of
software. Consider service subscriptions, licensed/freemium apps, and more. All of them are
examples of a specific mechanism that describes how a firm makes money. Its structure is
referred to as a revenue model.

Concept and Application:


A revenue model, which is a component of the business model, describes several methods of
generating income and its sources. This is a high level response to the topic of how we will
make money off the value we provide to a certain consumer segment. A popular blog that
runs advertising to make money is the most straightforward illustration of a revenue model.
Websites that produce material for the general public, such news (value), will leverage their
traffic (audience) to display advertisements. A website's maintenance expenses and employee
wages are covered by the money from the adverts, leaving a profit. A revenue model is
employed to manage the revenue streams of a business, forecast revenue, and alter revenue
strategy. One of the most important KPIs for a firm is the revenue itself. By measuring it
annually or quarterly, we can determine how well our business is doing overall and whether
we need to adjust how we price or sell the items.

Web
Catalogue

Revenu
e Model

Digital
Advertising
Content
Supported
Subscription
1. Web Catalogue Model: The conventional retail revenue model based on catalogues
is essentially an electronic counterpart of the online catalogue revenue model. Since
the time when prospective consumers were mailed catalogues of available items, this
conventional concept has been in use. A key element in building a reputation and
giving a name strength to draw in potential customers has been cultivating familiarity
with a name or branding the products. The development of the information age gave
rise to the online catalogue model. As the internet has grown in popularity, printed
catalogues have either been totally replaced or augmented with digital online
catalogues that can reach a larger audience more quickly. Through online catalogues,
computers, electronics, and home appliances account for a sizable portion of internet
purchases. The web catalogue business model is utilised by several online-only
companies. One such company is Amazon.com, which began as an online bookseller
before diversifying into a variety of other areas, including music, apparel, toys, and
equipment. Customers that are unwilling to transfer their personal information across
the internet present a barrier for the online catalogue concept.
2. Digital Content Subscription Model: Whether it be words, statistics, photos, or
videos, online firms that employ the digital content model either own or have the
rights to this content. The majority of the time, they provide a membership option that
enables users to access the material as well as other features like full-text searches for
various kinds of data. Customers can buy or subscribe to receive digital versions of
published newspapers, journals, and magazines in a variety of ways. The morning
paper can be delivered straight to a subscriber's email. Only the topics that the
subscriber is interested in receiving may be provided as an extra service. Businesses
who subscribe to the service and require legal, financial, corporate, or governmental
information may periodically download it or have a CD supplied to them. Digital
content does not need to be printed or transported, therefore this revenue model
enables businesses to save time and money. The majority of e-business enterprises
that use the internet for information distribution adopt the digital content subscription
revenue model. These organisations are the owners of the textual information's
intellectual property rights. The majority of these businesses use the digital content
revenue model, which entails selling subscriptions to grant access to the material they
possess.
3. Advertising Supported Model: The advertising-supported revenue model is the third
type of revenue model used by e-business firms. The most prevalent forms of this
income model, which has been seen in television, radio, and newspapers, typically
combine free information or entertainment with commercial messaging. Such
organisations are able to stay in operation because to the cash generated by
advertising. Internet advertising has its ups and downs, and recently, there hasn't been
much faith in this strategy. This business strategy for generating money is comparable
to that of broadcast network television corporations. In addition to advertising
messaging, e-business organisations offer adverts for other businesses to showcase
their goods and services to the public. These organisations then receive money in
exchange for advertising, which is enough to pay for the network's activities as well
as the creation or acquisition of adverts. By utilising the data they receive from users,
web portals, directories, and search engines employ this concept. Because users
access other online resources through these kinds of sites, information about their
interests is gathered so that relevant adverts may be presented alongside the online
resources they are visiting.
Issues related to e-business in India:
1. Due to the low credit card adoption rate and poor level of confidence in online
purchases, the majority of individuals in India choose to pay cash on delivery. Manual
cash collection is highly risky, costly, and arduous, unlike computerized payments.
2. In comparison to various western nations like the USA, UK, France, and others,
Internet penetration in India is relatively low. Even yet, the country only receives a
small portion of what other nations do. Additionally, connection in many areas is poor
quality. However, these two issues are gradually going away. The hurdles to e-
business in India will no longer include connection issues in a few years.
3. It is true that there are a lot of first-time purchasers in India's e-business. It indicates
that individuals are still unsure of what to anticipate from e-business websites, making
them vulnerable to pressure sales. When the stuff was finally delivered, they started to
feel bad and returned the merchandise. Therefore, the largest issue in India is remorse
on the part of buyers. Returns are quite expensive for e-commerce companies since
they present certain special difficulties and are made more challenging by cross-
border e-business
4. You will receive a call from the business after placing an online order inquiring as to
your precise location. Since there is usually some degree of uniformity when writing
post addresses, the provided address is insufficient. It is among the top difficulties
India's e-business industry faces.
5. As many individuals still use feature phones rather than smartphones, the overall
number of mobile phone users in India is rather large. While the country is still far
from seeing a shift in favor of smartphones, the consumer group is still unable to
complete e-business purchases while on the go. Online buying is more popular
naturally as there are more people using smartphones.

Conclusion:
The conduct of online business procedures over the web, internet, extranet, or a mix of these
is known as e-business (electronic business). The purchasing and selling of goods and
services, customer service, payment processing, management of the production and supply
chains, collaboration with business partners, information sharing, operation of automated
employee services, and hiring of personnel are some examples of these customer-, internal-,
and management-focused business processes. A revenue model is employed to manage the
revenue streams of a business, forecast revenue, and alter revenue strategy. One of the most
important KPIs for a firm is the revenue itself. By measuring it annually or quarterly, we can
determine how well our business is doing overall and whether we need to adjust how we
price or sell the items. An notion of how to provide value for a consumer is the foundation of
any business. So, if someone is seeking for a table, we can make one, promote it, ship it, and
be paid for it. That is how our business operates. The coal that powers our train is the entire
amount of money made, often known as revenue. Revenue will cover production,
distribution, marketing, and other expenditures up until we make a profit, depending on the
intricacy of the business model.
Ques 3(b).
Introduction:
Cyberspace is the name for the worldwide network of computers and communication devices.
It is a global network that lets people to communicate, exchange concepts and knowledge,
provide social support, play games, and more. Cyberspace is, however, susceptible to
fraudulent activities carried out by hackers or cybercriminals for immoral motives because of
its broad use. Because it is outside of state authority, cyberspace security is a rising issue of
concern on a global scale. Government agencies from many nations and some illustrious
commercial IT companies have joined forces to develop efficient security solutions in order
to reduce the dangers and threats to its security. Cyberspace is the term used to describe the
virtual computer world and, more specifically, a type of electronic media that is used to
support online communication. In order to facilitate communication and data exchange,
cyberspace often consists of a large computer network made up of several international
computer subnetworks that use the TCP/IP protocol. An interactive and virtual environment
with a wide range of players is the main characteristic of cyberspace. Any system with a
sizable user population or simply a well-designed user interface might be referred to as
"cyberspace" in the common IT language.

Concept and Application:


Cyberspace is the term used to describe the virtual computer world and, more specifically, a
type of electronic media that is used to support online communication. In order to facilitate
communication and data exchange, cyberspace often consists of a large computer network
made up of several international computer subnetworks that use the TCP/IP protocol. An
interactive and virtual environment with a wide range of players is the main characteristic of
cyberspace. Any system with a sizable user population or simply a well-designed user
interface might be referred to as "cyberspace" in the common IT language. Since the
infrastructure of cyberspace is now essential to the operation of national and international
security systems, trade networks, emergency services, basic communications, and other
public and private activities, the control of cyberspace is important for more reasons than just
the actions of individual participants.
Viruses
and
Worms

Spoofing Phishing
Security
Threats

DoS
Sniffing
Attacks

1. Viruses and Worms: Without the user's knowledge, viruses and worms may
replicate themselves on computers or over computer networks, and each new instance
of these harmful programmes has the ability to do the same. The Viruses and Worms
subclass does not include malicious software that spreads over networks, infects
distant devices at the "owner's" command (like backdoors), or makes many copies of
itself but is unable to duplicate itself. How a software spreads is the primary factor
used to decide whether or not it is categorised as a distinct behaviour under the
Viruses and Worms category (i.e. how the malicious programme spreads copies of
itself via local or network resources.) Online security is being threatened by worms
and viruses. They damage data and software by either fully or partially distorting
them. They connect to host systems and steal crucial data and software required for
the system's smooth operation. When people browse malicious websites, download
files from the internet, or utilise external media like pen drives, floppies, or CDs to
transfer data from an infected computer to a new system, viruses are transmitted. A
computer software known as a worm is made to spread over a network from one
machine to another. It spreads via webpages, newsletters, and e-mails.
2. Sniffing: Monitoring and recording all data packets as they move via a network is
known as sniffing. Network and system administrators employ sniffers to monitor and
analyse network data. Data packets carrying sensitive information, such as passwords
and account details, are captured by attackers using sniffers. Sniffers may be placed as
hardware or software in the system. A hostile hacker can record and examine all
network traffic by installing a packet sniffer in promiscuous mode on a network. Data
thefts known as sniffing attacks occur when packet sniffers are used to illegally access
and read unencrypted data on a network. When the data packets move via a computer
network, they are intercepted. The tools or media used to conduct this sniffing attack
and collect the network data packets are known as packet sniffers. The term "network
protocol analyzers" describes them. Hackers will have access to the data unless the
packets are encrypted with sufficient network security. Data thefts referred to as
sniffing attacks happen when packet sniffers that are able to illegally access and read
unencrypted data are used to record network traffic. While moving across a computer
network, the data packets are recorded. The tools or media used to carry out this
sniffing attack and capture network data packets are known as packet sniffers.
Network protocol analyzers is the name given to them. Hackers will be able to read
the data and steal the packets if there isn't robust network security encryption. The
hub-sniffing procedure works like this. All computers on the non-switched or
unbridged network segment can observe any traffic that is travelling through it.
Sniffers function at the network's data connection layer. Every machine connected to
the LAN receives any data that is delivered over it. This is referred to as passive
because sniffers set up by the attackers wait for data to be transferred and passively
gather it.
3. Phishing: Phishing is a type of social engineering attack that is widely used to steal
user data, including login credentials and credit card information. It occurs when an
attacker poses as a trustworthy source via an email, instant message, or text message
to trick the victim into opening it. The receiver is then tricked into clicking a harmful
link. This might result in the installation of malware on the recipient's machine, a
ransomware attack to lock it down, or the release of sensitive information. An assault
can have disastrous consequences. For people, this involves theft of money or
identity, as well as illicit transactions. Furthermore, phishing is frequently used as part
of a wider assault, like an advanced persistent threat (APT) incident, to infiltrate
business or governmental networks. In the latter case, staff members are compromised
in order to get over security barriers, spread malware inside a safe setting, or obtain
access to protected data. A company that falls victim to such an attack usually suffers
significant financial losses as well as diminishing market share, reputation, and
customer confidence. Depending on its size, a phishing effort might turn into a
security issue from which a company would find it challenging to recover.
4. DoS Attacks: A Denial-of-Service (DoS) attack aims to bring down a computer
system or network such that its intended users are unable to access it. DoS attacks do
this by flooding the target with an overwhelming volume of information or traffic,
which results in a crash. Both times, the DoS attack denies the service or resource that
legitimate users (such as workers, members, or account holders) expected. DoS
assaults frequently target the web servers of well-known corporations, including
media, financial, and commercial companies, as well as governmental and
commercial organisations. DoS attacks can cost the victim a lot of time and money to
cope with, even while they normally do not lead to the theft or loss of important
information or other assets. The Distributed Denial of Service (DDoS) assault is
another sort of DoS attack. When several systems coordinate a coordinated DoS
assault on a single target, the result is a DDoS attack. The main distinction is that the
victim is assaulted simultaneously from several locations rather than just one.
Although most types of DoS assaults can be defended against by modern security
technology, DDoS is nevertheless seen as a particularly serious danger and is of more
concern to companies who worry about being the victim of one.
5. Spoofing: Hackers and attackers of all hues employ the tactic of spoofing to pose as
other people, organisations, or even computers in order to trick victims into exposing
personal information. Emails, phone calls, and websites can all be used in spoofing in
addition to more complex techniques like IP spoofing, Address Resolution Protocol
(ARP) spoofing, or DNS servers. In cyberattacks, spoofing is widely used to disguise
the source of attack signals. Spoofing is when internet criminals use deception to
assume the identity of another person or information source. That individual is
capable of manipulating modern technology, including email services and
communications or the internet's core protocols. Spoofing is a general word for the
style of conduct in which a hacker poses as a reliable device or entity in order to
manipulate you into acting in a way that is both harmful to you and advantageous to
the hacker. Spoofing occurs each time an online fraudster assumes a different persona.
Different levels of technological sophistication can be involved in spoofing and it can
be used with a variety of communication routes. Attacks using spoofing frequently
include a social engineering component, in which con artists psychologically
influence their targets by capitalizing on flaws in nature like fear, greed, or technical
ignorance.

Conclusion:
The technique of protecting networks, computers, servers, mobile devices, electronic
systems, and data against hostile intrusions is known as cyber security. It is often referred to
as electronic information security or information technology security. The phrase may be
broken down into a few basic categories and is used in a wide range of applications,
including business and mobile computing. In the linked world of today, cutting-edge cyber-
defense measures are beneficial to everyone. A cybersecurity assault may personally lead to
anything from identity theft to extortion attempts to the loss of crucial information like family
photographs. Critical infrastructure, such as power plants, hospitals, and financial service
providers, is a need for everyone. To keep our society running smoothly, it is crucial to
secure these and other institutions. Everyone benefits from the work of cyberthreat
researchers, like the 250-person threat research team at Talos, who investigate both new and
current hazards as well as cyberattack strategies. They enhance open source tools, expose
new flaws, and inform others about the value of cybersecurity. Their efforts increase
everyone's online safety.

You might also like