0% found this document useful (0 votes)
38 views

2 Marks

To adapt to changing consumer needs, businesses should conduct market research, use agile development, gather user feedback, design for scalability, prioritize security and privacy, and foster adaptability within the organization.

Uploaded by

Sharron Rose H
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views

2 Marks

To adapt to changing consumer needs, businesses should conduct market research, use agile development, gather user feedback, design for scalability, prioritize security and privacy, and foster adaptability within the organization.

Uploaded by

Sharron Rose H
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

IAT 1

1) If email is to be used to exchange EDI between two businesses what are the points on which they
should agree?
When using email for EDI exchange between two businesses, they should agree on:
1. Data Format: Choose a standard format (e.g., ANSI X12, EDIFACT) for consistent data
interpretation.
2. Security Measures: Determine encryption protocols and security measures to protect
sensitive EDI data.
3. Message Content: Define the structure and content of EDI messages (e.g., purchase orders,
invoices).
4. Transmission Method: Agree on how to send and receive EDI messages, ensuring system
compatibility.
5. Communication Guidelines: Establish procedures, responsibilities, and contact information
for effective EDI communication.

2) Mention the purpose of I-way in E-commerce?


"I-way" refers to an interactive electronic pipeline used for transferring various types of content,
including text, graphics, audio, and video in e-commerce. The purpose of "I-way" in e-commerce is to
facilitate the efficient and high-capacity exchange of multimedia content, enabling businesses to
deliver rich and interactive experiences to their online customers. This infrastructure is essential for
enhancing the overall user experience and supporting the diverse content formats commonly used in
modern e-commerce platforms.

3) How to adapt the changing business environment in related to consumer application?

Adapting to a changing business environment in relation to consumer applications requires:


1. Market Research: Continuously monitor consumer trends, preferences, and emerging
technologies to stay informed.
2. Agile Development: Adopt agile methodologies for rapid app development and updates to
meet evolving consumer needs.
3. User Feedback: Gather and incorporate user feedback to improve app features, usability, and
performance.
4. Scalability: Design applications with scalability in mind to handle increased demand and
changing usage patterns.
5. Cybersecurity: Prioritize data security and privacy compliance to build consumer trust in the
digital space.
6. Adaptability: Foster a culture of adaptability and innovation within the organization to
respond swiftly to changing consumer expectations and competitive pressures.
4) List the role of E-Commerce in supply chain management?
E-commerce plays a vital role in supply chain management by:
1. Efficient Order Processing: Streamlining order placement, processing, and tracking,
reducing errors and lead times.
2. Inventory Optimization: Enabling real-time inventory visibility, demand forecasting, and
efficient stock management.
3. Global Reach: Expanding market reach beyond geographical boundaries, reaching a broader
customer base.
4. Data-Driven Insights: Utilizing data analytics for better decision-making, demand
forecasting, and supply chain optimization.
5. Reducing Costs: Lowering operational costs through automation, reduced paperwork, and
streamlined logistics.
6. Customer Satisfaction: Enhancing customer satisfaction by offering convenience,
transparency, and faster order fulfilment.

5) Differentiate bank centric model and operator centric model?


Bank-Centric Model:
1. Primary Role: In the bank-centric model, traditional banks or financial institutions play a
central role in providing mobile financial services.
2. Account Ownership: Users typically need to have a bank account with the partnering bank to
access mobile banking services.
3. Service Delivery: Financial services are directly delivered by the bank through its mobile app
or website.
4. Regulation: This model often adheres to strict banking regulations and is subject to the same
regulatory oversight as traditional banking services.
5. Security: Banks usually have strong security measures in place to protect user data and
transactions.
6. Examples: Mobile banking apps offered by traditional banks like Chase, Bank of America, or
HSBC.
Operator-Centric Model:
1. Primary Role: In the operator-centric model, mobile network operators (MNOs) or telecom
companies take a central role in providing financial services.
2. Account Ownership: Users may not need a traditional bank account; instead, they have a
mobile money account with the telecom operator.
3. Service Delivery: Financial services are delivered through the mobile operator's platform,
often via USSD codes or SMS.
4. Regulation: While subject to some financial regulations, this model may have a different
regulatory framework compared to traditional banks.
5. Security: Security measures may vary but are generally robust, and transactions are often
protected through PINs and other methods.
6. Examples: Mobile money services like M-Pesa in Kenya or GCash in the Philippines, where
users can send money, pay bills, and access other financial services through their mobile
phones without traditional bank accounts.

6) Do mobile network operators are making cloud based mobile intelligence?


Yes, mobile network operators (MNOs) are actively leveraging cloud-based mobile intelligence
solutions to enhance their services and infrastructure. These platforms optimize network performance,
analyse data for insights, and improve the customer experience. Cloud solutions offer scalability and
cost-efficiency for MNOs, enabling them to adapt to changing demands. Cloud tech fosters innovation
and competitive edge, while robust security safeguards data in the digital era.

7) List out the services of mobify?


Mobify, as a mobile commerce platform, offered several key services:
1. Mobile Website Development: Mobify helped businesses create mobile-optimized websites
to enhance the mobile shopping experience.
2. Progressive Web Apps (PWAs): They specialized in building PWAs, improving website
performance, and enabling offline access.
3. Mobile Engagement: Mobify provided tools for mobile-specific engagement, including push
notifications and personalized recommendations.
4. Responsive Design: Their services focused on responsive web design to ensure cross-device
compatibility.
5. Mobile Analytics: Mobify offered analytics tools to track user behavior and optimize
conversion rates on mobile platforms.
6. Performance Optimization: They assisted in improving website speed and performance to
reduce bounce rates and increase mobile conversions.

IAT 2
1) Outline the need for regulatory framework in M-Commerce?
A regulatory framework in Mobile Commerce (M-Commerce) is essential for several reasons.
First, it ensures consumer protection by establishing rules for secure transactions, data
privacy, and dispute resolution. Second, it promotes fair competition among businesses,
preventing monopolies or unfair market practices. Third, it fosters trust among users by
setting standards for authentication, encryption, and fraud prevention. Fourth, it addresses
taxation and revenue collection in the digital economy, ensuring compliance with tax laws.
Fifth, it enables cross-border transactions by harmonizing regulations internationally. Lastly,
it keeps pace with technological advancements, adapting regulations to address emerging
issues like mobile payment security and digital identity management, fostering a safe and
reliable M-Commerce ecosystem.
2) Associate the fundamental security measures that need to be in place at a point of sale(PoS)
system?
Such measures include whitelisting applications, limiting POS application risks, ensuring
POS software is always up to date, monitoring activity in POS systems, using complex and
secure passwords, deploying two-factor authentication (2FA), using antivirus software, and
considering physical security measures.

3) How attestation act a as security feature in the category of functional requirement?


Attestation acts as a vital security feature within the category of functional requirements by
ensuring the integrity and trustworthiness of a system. It serves as a mechanism for verifying
the authenticity and legitimacy of various system components, such as hardware, software,
and firmware. This process involves the generation of cryptographic measurements or
signatures that can be verified to confirm that the system has not been tampered with or
compromised. Attestation helps prevent unauthorized changes to system configurations,
software, or firmware, thereby reducing the risk of malicious attacks or unauthorized access.
It plays a critical role in establishing a chain of trust within the system and helps ensure that
only trusted and properly authenticated components are allowed to operate, enhancing the
overall security posture of the system. Furthermore, attestation aligns with regulatory and
compliance requirements, making it an essential component of a robust security framework.

4) How will you ensure the data protection in M-Commerce transactions?


To ensure data protection in M-Commerce transactions:

● Use strong encryption for data in transit.

● Implement tokenization to replace sensitive data.

● Employ secure authentication methods.

● Focus on mobile app security and updates.

● Conduct regular security audits and compliance checks.

● Educate users on safe M-Commerce practices.

● Develop an incident response plan and follow data protection regulations.

5) List the importance of trading activity?


● Price Discovery: Establishes fair asset prices.

● Liquidity: Provides market stability.

● Capital Formation: Supports business growth.

● Risk Management: Enables risk mitigation.

● Investment Options: Diversifies portfolios.

● Economic Indicators: Reflects economic health.

● Wealth Generation: Creates wealth.

● Price Efficiency: Enhances market efficiency.


● Job Creation: Generates employment.

● Global Integration: Drives globalization.

● Innovation: Spurs financial innovation.

● Government Revenue: Funds public services.

● Risk Transfer: Transfers risk.

● Economic Stability: Promotes stability.

● Access to Capital: Supports projects and growth.

6) sketch the main components of directory service in the context of mobile commerce?

Ennaku teriyathu…

7) Define the process of E-tailing with an example?


E-tailing, short for electronic retailing, is the process of selling products or services to
consumers online. The process typically involves:
Online Store Setup: Creating a digital platform (website or app) where customers can
browse and shop for products.
Product Selection: Choosing a range of products or services to offer based on market
demand and target audience.
Marketing and Promotion: Employing digital marketing strategies like SEO, social media,
and email marketing to attract potential customers.
Order Placement: Customers visit the online store, select products, and proceed to checkout,
providing shipping and payment details.
Payment Processing: Securely processing payments through various online methods like
credit cards or digital wallets.
Order Fulfillment: Preparing products for shipping, including packaging, labeling, and
arranging delivery.
Shipping and Customer Support: Delivering purchased products to the customer's address
and offering support through online channels for inquiries and assistance.
For example, Amazon.com, a leading E-tailer, provides an extensive online store with diverse
product offerings, efficient order processing, secure payment handling, and a global shipping
network, exemplifying the E-tailing process.

You might also like