Cross-Border E-Commerce Payments

Author(s):  
Noor Nahar Begum ◽  
Md Masudul Hassan

The rapid expansion of the internet provides the world great achievements both in social and economic life. E-commerce has become one of the serenest ways of doing business and has a persuasive impact on the economy. It is the set of transactions that have been conducted through internet connections and computer networks. This chapter aims to look at the cross-border e-commerce payments. Specially, the chapter has focused on the trends in e-commerce payments, methods of online payments, effects of cross-border e-commerce, factors affecting cross-border e-commerce payments, friction of cross-border e-commerce system, drivers and impediments of cross-border e-commerce, growth of cross-border e-commerce in emerging markets. Moreover, this chapter shows how information has become the blood of e-commerce. It has extensive effects on the economy, society, and indeed national security.

2015 ◽  
Vol 14 (04) ◽  
pp. 671-700 ◽  
Author(s):  
SUSAN AARONSON

AbstractHerein, we examine how the United States and the European Union use trade agreements to advance the free flow of information and to promote digital rights online. In the 1980s and 1990s, after US policymakers tried to include language governing the free flow of information in trade agreements, other nations feared a threat to their sovereignty and their ability to restrict cross-border data flows in the interest of privacy or national security.In the twenty-first century, again many states have not responded positively to US and EU efforts to facilitate the free flow of information. They worry that the US dominates both the Internet economy and Internet governance in ways that benefit its interests. After the Snowden allegations, many states adopted strategies that restricted rather than enhanced the free flow of information. Without deliberate intent, efforts to set information free through trade liberalization may be making the Internet less free.Finally, the two trade giants are not fully in agreement on Internet freedom, but neither has linked policies to promote the free flow of information with policies to advance digital rights. Moreover, they do not agree as to when restrictions on information are necessary and when they are protectionist.


2011 ◽  
pp. 1393-1399
Author(s):  
Huayin Si ◽  
Chang-Tsun Li

Traditional government structures are sometimes regarded as overly bulky. However, with the rapid expansion of interconnected computer networks and the progressive development of information technology (IT), it is now possible to exchange massive amounts of data at light speed over great distances. These infrastructures and technologies provide the opportunity for governments to transform themselves from huge monsters to compact and efficient organizations. Realizing the potential benefits of IT, as of summer 2004, 198 governments had started their e-government plans to construct digital government based on the Internet (West, 2004). One of the essential features of e-government is the transmission of confidential information via computer networks. Depending on the sensitivity of the information, the security of some information should be treated at the same level as national security. Although each e-government has its own networks, no government can say no to the Internet, because it would be a waste of resource. However, the Internet is an open environment; therefore, protecting data flowing on the Internet from attacks is a pressing e-government issue. All governments with such strategies have sought help from cryptographers and devoted huge amounts of both money and time to the development of specially designed information systems and advanced cryptosystems to strengthen information security. Unfortunately, cryptography is not adequate in some applications. As computing power keeps increasing and the techniques of cryptanalysis keep advancing, contemporary cryptosystems cannot and will not work forever. At the 24th Annual International Cryptology Conference (CRYPTO’04), MD5 and a series of related cryptosystems, which are currently in widespread use, were proved unreliable (Wang, Feng, Lai, & Yu, 2004). From the last decade, steganology—the technique for digitally hiding and detecting information – is attracting more attention. It is already regarded as a powerful complement to cryptology and a promising technique for ensuring e-national security. Unlike cryptology, which renders the encrypted information completely meaningless, steganology keeps the host media perceptually unchanged after hiding the secret information. This article will provide an in-depth explanation of the two components of steganology, namely steganography and steganalysis, and discuss their potential applications in the realm of e-national security.


Author(s):  
Mohammad Zahedul Alam

Recently, cross-border e-commerce has been growing rapidly among the developed and developing countries. Marketing managers design marketing and advertising strategies targeted to local and across the country. Companies need to develop separate marketing programs for different country and diverse cultural context. In this chapter, the authors discuss cross-border e-commerce, its development, the advertisement and marketing strategies, policies, and programs that are applicable to the arena of cross-border e-commerce. However, advances in communication technologies, transportation, and other technological advances have made the world a much smaller place. To survive in the competitive business environment today, companies need to make their products and services available online as well as offline. Major technological advances including the explosion of the internet have had a major impact on buyers and the marketers who serve them. To thrive in this new digital age—even to survive—marketers must rethink their strategies and adapt them to today's new environment.


Author(s):  
James Griffin

Electronic commerce has been recognised as a source of fundamental, pan-sectoral change to the conduct of business; Chan and Swatman (2000) use the term: “A new paradigm for doing business.” Other authors have gone further, viewing modern IT developments as the latter part of a period starting in the mid-1970s that represents a transition to nothing less than a new phase of capitalist development (Amin, 1994). Benjamin, Rockhart, Scott Morton, and Wyman (1983) also suggest that the world economy has been fundamentally altered by the globalisation of competition which has largely been caused by the declining cost and consequent increasing spread of IT developments.


Author(s):  
M. Raisinghani

A new form of technology is changing the way commerce is being done globally. This article provides an overall description of mobile commerce and examines ways in which the Internet will be changing. It explains the requirements for operating mobile commerce and the numerous ways of providing this wireless Internet business. While the Internet is already a valuable form of business that has already changed the way the world is doing business, it is about to change again. Telecommunications, the Internet, and mobile computing are merging their technologies to form a new business called mobile commerce or the wireless Internet. This is being driven by consumer demand for wireless devices and the desire to be connected to information and data available through the Internet. There are many new opportunities that have only begun to be explored, and for many this will become a large revenue source for those who capitalize upon this new form of technology. However, like other capital ventures, these new opportunities have their drawbacks, which may limit growth of the mobile commerce market if not dealt with. Mobile e-commerce technology is changing our world of business just as the Internet alone has changed business today.


Author(s):  
Bay Arinze ◽  
Christopher Ruth

Searching for and purchasing personal goods and services on the Internet, termed hereafter as “Web shopping,” has seen tremendous growth over the past 2-3 years. With the advent of the Internet and accompanying technologies such as broader bandwidth modems, more robust browsers and multimedia, growth for Web shopping should explode, sustained only by consumers’ perceptions of this new market channel and their subsequent adoption behavior based on these perceptions. Surprisingly, little research has empirically tested an adoption model to this technology to determine critical factors that may influence adoption decisions at the consumer level.


2021 ◽  
Vol 2 (4) ◽  
Author(s):  
Houqi Ji

The world is witnessing the digitization of the production, exchange and consumption of goods and services in economy. The Internet and cross-border based data flows are becoming important trade channels as more products are traded online or with integrated functions that are based on digital connections. We emphasize the technical emergency element in existing international rules, which shows that technological change is a driving force for competitive regime creation and forum transformation, contributing to the process of fragmentation of the international trading system.


2019 ◽  
Vol 1 (3) ◽  
pp. 77-86
Author(s):  
Samia Bouguerra

The development of the world today in information and communication technologies has affected all aspects of the economic life of the countries, especially with the emergence of the Internet and the new media through social networks such as Facebook, Twitter, Instagram and others. With the emergence of social networks on the Internet, the marketing of services, especially tourism services, depends on the human factor itself through the exchange and exchange of information about tourist areas, traditional products, hotels and others. The new era has begun to depend on the consumers themselves and their contribution to the promotion of services and places... With the rapid development of social networks, especially Facebook, the importance of harnessing these sites to serve the tourism industry in the countries of the world in general and Algeria in particular, where the industry depends largely on the views of consumers and the spread of information among them, which opened a wide door to identify the places of tourism and hotels and offer services from By visiting people and benefiting from their services, which positively affects other users who may one day be tourists in the same areas. Therefore, this study is an attempt to highlight the role of social networks and their contribution to the activation of tourism in general and local tourism in particular, taking the Facebook network model, through the analysis of the Facebook page beaches of Annaba, and answer the following fundamental question:To what extent does Facebook contribute to the activation of local tourism in Algeria? JEL Classification: Z3, M3.


Author(s):  
Monojit Kumar

E-commerce is a trading or facilitation of trading in products or services using computer networks, such as Internet. E-Commerce is one of the biggest forms of doing E-business, that has happened to the Indian cashless economy in recent years. This has created a new flavor of doing business, which has a huge potential and is fundamentally changing the way businesses are done. This provides advantage for both buyers as well as sellers at the core of its phenomenal rise. The economic reforms of India that were amended in 1991, has resulted in opening of the economy with a view to integrate itself with the worldwide economy. As a result, in last few years we have witnessed a technological revolution accompanied by the widespread use of the Internet, web technologies and their applications. As a symbol of globalization, E-commerce represents the cutting edge of success in this digital age and it has changed and is still changing the way business is conducted around the world


Author(s):  
H. Si

Traditional government structures are sometimes regarded as overly bulky. However, with the rapid expansion of interconnected computer networks and the progressive development of information technology (IT), it is now possible to exchange massive amounts of data at light speed over great distances. These infrastructures and technologies provide the opportunity for governments to transform themselves from huge monsters to compact and efficient organizations. Realizing the potential benefits of IT, as of summer 2004, 198 governments had started their e-government plans to construct digital government based on the Internet (West, 2004). One of the essential features of e-government is the transmission of confidential information via computer networks. Depending on the sensitivity of the information, the security of some information should be treated at the same level as national security. Although each e-government has its own networks, no government can say no to the Internet, because it would be a waste of resource. However, the Internet is an open environment; therefore, protecting data flowing on the Internet from attacks is a pressing e-government issue. All governments with such strategies have sought help from cryptographers and devoted huge amounts of both money and time to the development of specially designed information systems and advanced cryptosystems to strengthen information security. Unfortunately, cryptography is not adequate in some applications. As computing power keeps increasing and the techniques of cryptanalysis keep advancing, contemporary cryptosystems cannot and will not work forever. At the 24th Annual International Cryptology Conference (CRYPTO’04), MD5 and a series of related cryptosystems, which are currently in widespread use, were proved unreliable (Wang, Feng, Lai, & Yu, 2004). From the last decade, steganology—the technique for digitally hiding and detecting information – is attracting more attention. It is already regarded as a powerful complement to cryptology and a promising technique for ensuring e-national security. Unlike cryptology, which renders the encrypted information completely meaningless, steganology keeps the host media perceptually unchanged after hiding the secret information. This article will provide an in-depth explanation of the two components of steganology, namely steganography and steganalysis, and discuss their potential applications in the realm of e-national security.


Sign in / Sign up

Export Citation Format

Share Document