CFP last date
20 January 2025
Reseach Article

The Application of E-commerce in Business Application: Their Problems and Prospects

by Partha Sarathi Bhattacharjee, Shahin Ara Begum
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 49 - Number 10
Year of Publication: 2012
Authors: Partha Sarathi Bhattacharjee, Shahin Ara Begum
10.5120/7665-0781

Partha Sarathi Bhattacharjee, Shahin Ara Begum . The Application of E-commerce in Business Application: Their Problems and Prospects. International Journal of Computer Applications. 49, 10 ( July 2012), 36-40. DOI=10.5120/7665-0781

@article{ 10.5120/7665-0781,
author = { Partha Sarathi Bhattacharjee, Shahin Ara Begum },
title = { The Application of E-commerce in Business Application: Their Problems and Prospects },
journal = { International Journal of Computer Applications },
issue_date = { July 2012 },
volume = { 49 },
number = { 10 },
month = { July },
year = { 2012 },
issn = { 0975-8887 },
pages = { 36-40 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume49/number10/7665-0781/ },
doi = { 10.5120/7665-0781 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:45:57.072153+05:30
%A Partha Sarathi Bhattacharjee
%A Shahin Ara Begum
%T The Application of E-commerce in Business Application: Their Problems and Prospects
%J International Journal of Computer Applications
%@ 0975-8887
%V 49
%N 10
%P 36-40
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The paper outlines the reality of global e-commerce, pointing out inherent risk areas that could threaten the system. This paper investigates the relationship between globalization, ecommerce adoption or acceptance that lead to business performance and effectiveness. In this paper, we will discuss how globalization impact on e-commerce in business with policy implementation, pro and cons of e-commerce enhancement in the increase to business. It will outline the framework of the new policies and regulations needed by e-commerce. There will be future research and conclusion based on what we believe globalization of e-commerce will lead to growth in business. The World Wide Web has become an environment for distributed applications of all kinds. The originally intended use of the Web as distributed system for knowledge-interchange seems to disappear, compared to the increasing number of Electronic Commerce Web applications. Organizations offer products and services in the Web, and use the Web as a means to integrate their heterogeneous business application systems. Offering Web-based products requires combining services of different application systems, which were build on the coarse-grained Web implementation model. Reusing the respective fine-grained services and application systems respectively integrating these cross-platform application systems increases quality and reduces costs of the new product. The Web as a global point of sale seems to be very promising but obviously suffers from its heritage - the coarse-grained implementation model. E-Commerce, an electronic medium that generates revenue on demand, can be demanding in maintaining security administration and management. Ensuring a desktop PC, or a server on the LAN can provide moderate challenges in securing the device, securing a device in an E-Commerce environment can prove most challenging. Whether Consumer or Business, E-Commerce provides extraordinary challenges in that our organization uses this revenue generating medium to provide a service which is highly accessible publicly and privately and usually requires undesirable communication to be opened to these devices. The criticality of E-Data poses additional security measures, sensitive data pertaining to customers and business partners traversing private to public networks requires proactive measures to insure a secure environment. In the problem area, we will describe some attacks in business applications by unauthorized access of business software and their related protocols and in the prospect area, we will conclude some detection methods for the attacks and their prospective prevention methods.

References
  1. Bamogo, D. et. al, (1996), "The Impact of new Communication and Information Technologies in Developing Countries: A Case study of Burkina Faso", international workshop on Information Technology for Development UNU/INTECH, Maastricht, The Netherlands
  2. Brian Cashell, William D. Jackson, Mark Jickling, and Baird Webel (2004) ,"CRS Report for Congress-The Economic Impact of Cyber-Attacks"
  3. Eddie Powell, (2000), "Network Intrusion Detection for the E-Commerce Environment"
  4. ECOM (ed), (1998), "Electronic Commerce – An Introduction, http://ecom. fov. uni-mb. si/center/"
  5. Freeman, C. (1994a) "The Diffusion of Information and Communication Technology in the World"
  6. H. W. Gellersen and M. Gaedke ,(1999), "Object-Oriented Web Application Development", IEEE Internet Computing 1, pp. 60-68
  7. Howell D. ,(2002) "hackers often choose their corporate targets", Investors Business Daily
  8. M. Gaedke, H. -W. Gellersen, A. Schmidt, U. Stegemüller and W. Kurr,(1999), "Object-oriented Web Engineering for Large-scale Web Service Management", 32nd Annual Hawaii International Conference On System Sciences (HICSS-32).
  9. M. Gaedke and K. Turowski, (2000), "Integrating Web-based E-Commerce Applications with Business Application Systems", Netnomics Journal 2, pp. 117-138
  10. Mann D. E. and Christey S. M. ,(1999), "Towards a Common Enumeration of Vulnerabilities", 2nd Workshop on Research with Security Vulnerability Databases, Purdue University, West Lafayette, Indiana
  11. Ptacek T. H. and Newsham T. N. ,(1998) "Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection"
  12. S Terry Brugger and Jedadiah Chow,(2005) "An Assessment of the DARPA IDS Evaluation Dataset Using Snort"
Index Terms

Computer Science
Information Sciences

Keywords

Globalization E-commerce network attacks IDS