scholarly journals Explore the Short Video's Technology in E-commerce in India

Author(s):  
Tanmayee Tushar Parbat ◽  
Rohan Benhal ◽  
Honey Jain ◽  
Dr. Vinayak Musale

In this paper, there is description of videos technology has been used widely as well as tried to explore the transform in the structure of selling as well as buying of the product mainly in short videos. With the emergence of the Internet, online procedure are replacing conventional models in our society. Even so, not many recognize the criticality required in E-commerce industry. Video commerce is the next great thing of marketing. It connects to a web page of a dealer selling or giving services rightly from its portal to the consumers. They use a digital shopping cart structure and permit payment by credit card, debit card or electronic fund transfer payments. The E- commerce services helps in decreasing costs in managing orders while also interacting with a broad range of suppliers as well as trading partners. It also requires any type of business transaction in which the parties interconnect electronically rather than by physical exchanges or direct physical contact.

2003 ◽  
Vol 22 (2) ◽  
pp. 87-93
Author(s):  
James Otto ◽  
Mohammad Najdawi ◽  
William Wagner

With the extensive growth of the Internet and electronic commerce, the issue of how users behave when confronted with long download times is important. This paper investigates Web switching behavior. The paper describes experiments where users were subjected to artificially delayed Web page download times to study the impact of Web site wait times on switching behavior. Two hypotheses were tested. First, that longer wait times will result in increased switching behavior. The implication being that users become frustrated with long waiting times and choose to go elsewhere. Second, that users who switch will benefit, in terms of decreased download times, from their decision to switch.


Author(s):  
Vaishnavi Bhagwat Savant ◽  
Rupali D. Kasar ◽  
Priti B. Savant

The explosive growth of the Internet has brought many good things such as E-commercebanking, E-mail, cloud computing, but there is also a dark side such as Hacking, Backdoors, Trapdoors etc. Hacking is the first big problem faced by Governments, companies, and private citizens around the world. Hacking means reading email’s of someone, stealing passwords, stealing credit card numbers etc. An ethical hacker is one who can help the people who are suffered by this hackings. This paper describes about Ethical hackers, it’s types and phases of hacking


2002 ◽  
Vol 7 (1) ◽  
pp. 9-25 ◽  
Author(s):  
Moses Boudourides ◽  
Gerasimos Antypas

In this paper we are presenting a simple simulation of the Internet World-Wide Web, where one observes the appearance of web pages belonging to different web sites, covering a number of different thematic topics and possessing links to other web pages. The goal of our simulation is to reproduce the form of the observed World-Wide Web and of its growth, using a small number of simple assumptions. In our simulation, existing web pages may generate new ones as follows: First, each web page is equipped with a topic concerning its contents. Second, links between web pages are established according to common topics. Next, new web pages may be randomly generated and subsequently they might be equipped with a topic and be assigned to web sites. By repeated iterations of these rules, our simulation appears to exhibit the observed structure of the World-Wide Web and, in particular, a power law type of growth. In order to visualise the network of web pages, we have followed N. Gilbert's (1997) methodology of scientometric simulation, assuming that web pages can be represented by points in the plane. Furthermore, the simulated graph is found to possess the property of small worlds, as it is the case with a large number of other complex networks.


2019 ◽  
Vol 2 (1) ◽  
pp. 90 ◽  
Author(s):  
Annisa Dwi Kurniawati

Abstract: The development of technology flows is increasing. The internet, which was initially used by several groups as a medium for the transformation of scientific and academic data, has now been used in almost all aspects of people's lives, including e-commerce transactions. E-commerce transactions are transactions carried out without meetings between parties. By using e-commerce, many reservations are obtained from the seller or buyer. The convenience offered doesn't mean it doesn’t rise the problems. For Muslims, understanding the status of e-commerce transactions is important. E-commerce accepts payments with bai’s-salam, which is about non-related transactions and the suspension of goods for payments that have been hastened. It's just that if on Bai 's-Salam a face-to-face meeting is held for the implementation of sighat, it is different with e-commerce that communicate only through chat. E-commerce is permitted in Islam with a note that there is no riba ',gharar, maisir, etc. Therefore, if it is approved by the payment system on e-commerce, it is asked not to use a credit card to avoid riba’.الملخص: يشهد تطوير تدفقات التكنولوجيا زيادة هائلة. يستخدم الإنترنت في جميع جوانب حياة الناس تقريبًا ، بما في ذلك معاملات التجارة الإلكترونية، معاملات التجارة الإلكترونية هي معاملات تتم بدون اجتماع بين الطرفين .باستخدام التجارة الإلكترونية، الكثير من السهولة حصلت من البائع أو المشتري. يتم تقديم التسهيلات المقدمة. التسهيلات المقدمة لايمكن تسبب مشاك. معلومات المسلمين عن حالة المعاملة التجارة الإلكترونية شيء مهمة. التجارة الإلكترونية مثل بيع السلام هي عن العناصر فى المعاملات وتأخير القبض دفعت مقدما. إذا كان بيع السلام يتم عقد اجتماع وجها لوجه في تنفيذ سيغات تختلف عن التجارة الإلكترونية استخدام التواصل مع الدردشة. التجارة الإلكترونية مباحات في الإسلام مع ملاحظة عدم وجود عناصر الربا والغرار والميسر وغيرها لذلك ، إذا كانت مرتبطة بنظام دفع في التجارة الإلكترونية المستحسن عدم استخدام بطاقة الائتمان لتجنب الربا.. Abstrak: Perkembangan arus teknologi mengalami peningkatan yang masif. Internet yang pada awalnya digunakan oleh beberapa kalangan sebagai media transformasi data ilmiah dan akademik, kini telah digunakan di hampir seluruh aspek kehidupan masyarakat, termasuk transaksi jual beli (e-commerce). Transaksi e-commerce merupakan transaksi yang dilakukan tanpa adanya pertemuan antar para pihak. Dengan menggunakan e-commerce, banyak kemudahan yang diperoleh baik dari pihak penjual maupun pembeli. Kemudahan yang ditawarkan bukan berarti tidak menimbulkan masalah. Bagi kaum muslim, mengetahui status dari transaksi e-commerce merupakan hal yang penting. E-commerce  memiliki kesamaan dengan bai’ as-salam yaitu mengenai unsur-unsur terjadinya transaksi serta adanya penangguhan barang untuk pembayaran yang telah disegerakan. Hanya saja, jika pada bai’ as-salam dilakukan pertemuan face to face untuk pelaksanaan sighat, berbeda halnya dengan e-commerce yang melakukan komunikasi via chatting. E-commerce diperbolehkan dalam Islam dengan catatan tidak adanya unsur riba’, gharar, maisir, dsb. Oleh karena itu, jika dihubungkan dengan sistem pembayaran pada e-commerce, maka dianjurkan tidak menggunakan kartu kredit guna menghindari terjadinya riba’.


2021 ◽  
Vol 9 (1) ◽  
pp. 80-91
Author(s):  
Adi Widiatmoko Wastumirad ◽  
Moh Irzam Darmawan

Today, the internet has become the most used tool for delivering information. Through the internet, people can search for information by freely accessing a web page. This freedom of access often raises security issues in the website provider's internal network. These security issues can be in the form of misuse of information, threats, and other attacks on the provider's internal network. Based on these conditions, a technique is needed to protect important data on the website owner's server from various attacks. In this research, a Honeypot security system has been implemented using Dionaea and Kippo in the Demilitarized Zone to increase the security of a network. The methodology of this research is Waterfall Model for software engineering. The system that has been built is able to detect, take action, record attack logs and display them in the form of a website in real time.


2021 ◽  
pp. 116-132
Author(s):  
Nataliya V. Matveeva ◽  

This article investigates abbreviations in different Internet discourse types and genres. For the study, continuous sampling method was used to select 76 abbreviations in hypertexts from 7 Internet English-language sites. The selected units were classified into 3 basic types with further subdivisions: letter-number (figure-for-word, figure-for-word-part, contractions as a result of vowel deletion), graphical (both Latin and English) and lexical (acronyms, initialisms, shortening and partial shortening) abbreviations based on the classification adopted in this research. Among the subdivisions, abbreviations involving figures, initialisms and contractions turned out the most frequent. Most of them were found in social networks, blogs, chats and forums. Further, abbreviations were analyzed in 6 types of Internet discourse: legal, political, personal, mass media, advertising and pedagogical. Particular genres representing the types were studied: a business email, a law firm’s website, a political blog, an Instagram personal page, a network media web page, and an academic institution’s page. It was discovered that on the whole (among 57 examples), lexical abbreviations prevail over graphical ones (56% vs 44%). On the whole, 44% were graphical abbreviations, 28% – initialisms, 23% – acronyms and 5% – shortenings. However, in each discourse, the distribution demonstrated considerable variation. This means that the magnitude of the Internet discourse type effect is very high. Further studies are needed to enlarge the number of examples with the increase in the amount of genres and their samples to achieve better balance.


Author(s):  
Bill Karakostas

To improve the overall impact of the Internet of Things (IoT), intelligent capabilities must be developed at the edge of the IoT ‘Cloud.' ‘Smart' IoT objects must not only communicate with their environment, but also use embedded knowledge to interpret signals, and by making inferences augment their knowledge of their own state and that of their environment. Thus, intelligent IoT objects must improve their capabilities to make autonomous decisions without reliance to external computing infrastructure. In this chapter, we illustrate the concept of smart autonomous logistic objects with a proof of concept prototype built using an embedded version of the Prolog language, running on a Raspberry Pi credit-card-sized single-board computer to which an RFID reader is attached. The intelligent object is combining the RFID readings from its environment with embedded knowledge to infer new knowledge about its status. We test the system performance in a simulated environment consisting of logistics objects.


Author(s):  
Zoonky Lee ◽  
Younghwa Lee ◽  
Yongbeom Kim

This chapter presents an empirical investigation of why employees use the Internet for personal purpose during work hours. We are especially interested in perceptual difference between personal Web usage groups and non-personal Web usage groups in the context of non-work-related usage of the Internet. Drawing from previous studies in behavioral intention and human attitude, criminology, and moral and ethical decision-making, a comprehensive model was developed and tested through a field survey of 546 business professionals.


Author(s):  
Sheng-Uei Guan

An emerging outcome of the popularization of the Internet are electronic commerce and payment systems, which present great opportunities for businesses, reduce transaction costs, and provide faster transaction times. More research has been conducted with new technologies like mobile Internet used by business models (Baek & Hong, 2003). However, before using the Internet, it is essential to provide security in transferring monetary value over the Internet. A number of protocols have been proposed for these secure payment systems, including NetBill, NetCheque, Open Market, iKP, Millicent, SET (Sherift, 1998), E-Cash (Brands, 1995), NetCash, CAFÉ (Mjolsnes, 1997), EMV cards (Khu-Smith & Mitchell, 2002), etc. These systems are designed to meet diverse requirements, each with particular attributes. Automation and intelligence is another issue that poses challenges in the development of e-commerce. Agent technology has been incorporated into the area of e-commerce to provide automation and intelligence for the e-trade process. An agent is a software program capable of accomplishing tasks autonomously on behalf of its user. Agents must provide trustworthy consistency and fault tolerance to avoid eavesdropping and fraud. Also, agents should have roaming capability so as to extend their capability well beyond the limitations of owners’ computers. To meet these requirements, this chapter will discuss some related components under the SAFER (Secure Agent Fabrication, Evolution, and Roaming) architecture (Zhu & Guan, 2000) and propose an agent-based payment scheme for SAFER. Different types of electronic payment systems have been developed to meet its diverse requirements, which generally include integrity, authorization, confidentiality, availability, and reliability for security requirements (Asokan, 1997). Payment systems can be classified in a variety of ways according to their characteristics (Dahab & Ferreira, 1998), such as the exchange model (cash-like, check-like, or hybrid), central authority contact (online or offline), hardware requirements (specific or general), payment amounts (micropayment), etc. Among the available payment schemes in the market, E-Cash is one of the best in terms of security, flexibility, and full anonymity. E-Cash is a cash-like online system that uses electronic coins as tokens. E-Cash has unique advantages, such as flexibility, integrity, and full anonymity that cannot be found in electronic check and credit card based systems. It uses cryptographic techniques to provide full anonymity. The agent-based payment scheme for SAFER adopts some similar principles and concepts of E-Cash.


Author(s):  
James G. Williams ◽  
Wichian Premchaiswadi

As the volume of purchases for products and services on the Internet has increased and the chosen method of payment is a credit or debit card, e-commerce merchants must be capable of accepting such payment methods. Unfortunately, cyber-criminals have found ways to steal personal information found on credit cards and debit cards and fraudulently use this information to purchase products and services which costs merchants lost revenue and fees for chargebacks. This article discusses the process by which credit card payments are processed beginning with the e-commerce merchant’s web site to a credit card processor or service gateway to the credit card company’s network to the issuing bank’s network with an accept or decline response being returned to the merchant’s shopping cart system via the same networks. The article addresses the issue of credit card fraud in terms of how the cyber-criminals function and the potential solutions used to deter these attempts by the cybercriminals. A list of preventive measures that should be used by e-commerce merchants is provided.


Sign in / Sign up

Export Citation Format

Share Document