2 Marks
2 Marks
1) If email is to be used to exchange EDI between two businesses what are the points on which they
should agree?
When using email for EDI exchange between two businesses, they should agree on:
1. Data Format: Choose a standard format (e.g., ANSI X12, EDIFACT) for consistent data
interpretation.
2. Security Measures: Determine encryption protocols and security measures to protect
sensitive EDI data.
3. Message Content: Define the structure and content of EDI messages (e.g., purchase orders,
invoices).
4. Transmission Method: Agree on how to send and receive EDI messages, ensuring system
compatibility.
5. Communication Guidelines: Establish procedures, responsibilities, and contact information
for effective EDI communication.
IAT 2
1) Outline the need for regulatory framework in M-Commerce?
A regulatory framework in Mobile Commerce (M-Commerce) is essential for several reasons.
First, it ensures consumer protection by establishing rules for secure transactions, data
privacy, and dispute resolution. Second, it promotes fair competition among businesses,
preventing monopolies or unfair market practices. Third, it fosters trust among users by
setting standards for authentication, encryption, and fraud prevention. Fourth, it addresses
taxation and revenue collection in the digital economy, ensuring compliance with tax laws.
Fifth, it enables cross-border transactions by harmonizing regulations internationally. Lastly,
it keeps pace with technological advancements, adapting regulations to address emerging
issues like mobile payment security and digital identity management, fostering a safe and
reliable M-Commerce ecosystem.
2) Associate the fundamental security measures that need to be in place at a point of sale(PoS)
system?
Such measures include whitelisting applications, limiting POS application risks, ensuring
POS software is always up to date, monitoring activity in POS systems, using complex and
secure passwords, deploying two-factor authentication (2FA), using antivirus software, and
considering physical security measures.
6) sketch the main components of directory service in the context of mobile commerce?
Ennaku teriyathu…