UNIT 3 E-Business
UNIT 3 E-Business
Computer-to-Computer
Computer-to-computer EDI replaces postal mail, fax and email. While email is also an electronic
approach, the documents exchanged via email must still be handled by people rather than
computers. Having people involved slows down the processing of the documents and also
introduces errors. Instead, EDI documents can flow straight through to the appropriate
application on the receiver’s computer (e.g., the Order Management System) and processing can
begin immediately. A typical manual process looks like this, with lots of paper and people
involvement:
Improved operational efficiency: Automating the flow of messages with integrated EDI
improves the speed and efficiency of your operations by eliminating the need to manually rekey
data in multiple systems.
Fewer errors: By removing manual, paper based processes the occurrence of human errors
is dramatically reduced or even eliminated.
Increased accuracy: Automated message validation ensures that errors are flagged and
rectified before they impact your trading partners and data integrity in your internal systems is
maintained.
Increased return on investment (ROI): Automation through integrated EDI enables you to
maximise the benefits of EDI and move beyond simply complying with your customers' EDI
requirements.
Enhanced visibility: EDI provides full transparency of the ordering and invoicing process
for you and your trading partners. This end-to-end visibility enables more informed decisions to
be made and ultimately improves the service delivered to consumers.
Reduced inventory cost: Increased visibility within the supply chain eliminates unknowns
and can therefore enable you to reduce the levels of inventory you need to hold.
EDI STANDARDS:
EDI standards define the location and order of information in a document format. With this automated capability,
data can be shared rapidly instead of over the hours, days or weeks required when using paper documents or other
methods.
Electronic Data Interchange (EDI) is the electronic interchange of business information using a standardized
format; a process which allows one company to send information to another company electronically rather than with
paper. Business entities conducting business electronically are called trading partners.
UN/EDIFACT
ANSI X12
VDA
Integration of EDI Standards with SAP
UN/EDIFACT
United Nations / Electronic Data Interchange for administration is the international standard
developed by the United Nations for trade and transport.
The maintenance and further development of this standard is done through Facilitating United
Nations Trade and Electronic Trade Center affiliated United Nations (UN / CEFACT).
United Nations Center for Trade Facilitation and Electronic Commerce, affiliated with the UN
Economic Commission for Europe (UN / CEFACT). The EDIFACT standard provides a set of
syntax rules for configuration, an interactive exchange protocol, and a set of standard messages
that allow the exchange of multi-country and multi-sectoral electronic business documents.
ANSI X12
The goal of ANSI X12 is to uniform standards for inter-industry electronic exchange of business documents,
namely EDI. ANSI X12 is a global set of rules for the intercompany electronic data exchange between two EDI
Trading Partners.
In 1979, the American National Standards Institute (ANSI) hired the Accredited Standards
Committee (ASC) X12 to develop uniform standards for inter-industry electronic business
transactional exchange, that is, electronic data exchange. ANSI X12 was originally designed to
support companies in different industry sectors in North America, but today there are more than
300,000 companies worldwide using ANSI X12 EDI standards in their day-to-day business
transactions. ANSI X12 also contributes to UN/EDIFACT messages commonly used outside the
United States.
VDA
VDA, one of the regional EDI standards, stands for Verband der Automobil industrie
Automotive Industry Association of Germany. It develops standards and best practices to serve
the needs of companies in the German automotive industry. The VDA maintains a set of fixed
format messages describing the business documents exchanged between automotive
manufacturers and suppliers. Unlike other EDI standards, the VDA specifications do not have
any naming conventions for each item.
EDI COMMUNICATIONS:
EDI Implementation:
Implementing EDI across your organisation and network of trading partners can be complex. Taking a
systematic approach will help you deliver an effective EDI programme. Below is a structured 10- step
implementation process for successful EDI implementation:
Let’s have a quick view on the details that are part of a typical EDI Agreement:
The provisions of the agreement along with Technical Annexe will be mentioned in this section.
Article 2: Definitions
The related description of all the important terms involved in the EDI transaction will be defined in this section.
Electronic Data Interchange (EDI): Exchange of key business documents between many trade partners.
Electronic Data Interchange Message (EDI Message): Set of data elements organized in a standard format. It should be
easily readable/processable by any trading partner’s system.
Electronic Data Interchange Agreement (EDI Agreement): Approved set of standard formats and norms for the exchange
process.
Acknowledgement of receipt: A letter sent by the receiver after accepting the receipt of an EDI message. It usually
includes:
o Network Acknowledgement
o Protocol Acknowledgement
o Functional Acknowledgement
o Technical Acknowledgement
Functional Domain: A particular business area for which this specific EDI exchange process is intended.
Integrity: A feature that ensures the quality and reliability of the data. The data should be sent without any modification in an
unauthorized way.
Data Log: Describes the format in which all the transactions are required to be mentioned. It should be done according to
their processing date and time.
Message Implementation Guideline: Define norms for creating and sending a specific EDI message.
Re-send: A request sent by the receiver to the issuer or the network service provider for resending an EDI message.
Communication Modes:
Information on the method of communication and related protocols are available. Also, a description of the third-party
service providers will be provided.
Codes:
The list of EDI standards along with transaction codes that are going to be used in the exchange process will be stated in
this section.
System Availability:
All the systems involved in the exchange process will be noted in this section. For instance, among many trading partners,
any partner might wish to replace his entire system or some specific parts. The guidelines related to providing information to
other trading partners about this change in the system(s) will also be available.
In this section, all the technical requirements and specifications related to each part of the entire set-up will be available.
All the responsibilities related to damages caused by the firm or any of the trading partners will be noted in this section.
Schedule:
The effective date of the agreement will be
noted in this section.
Termination:
The norms related to the termination of the agreement will be noted in this section. It also includes information on the rights
as well as obligations related to each part involved in this agreement.
They are also known as online payment systems. Normally e-payment is done via debit, credit
cards, direct bank deposits, and e-checks, other alternative e-payment methods like e-wallets,
bitcoin, cryptocurrencies, bank transfers are also gaining popularity.
Internet banking – In this case, the payment is done by digitally transferring the funds over the
internet from one bank account to another.
Card payments – Card payments are done via cards e.g. credit cards, debit cards, smart cards,
stored valued cards, etc. In this mode, an electronic payment accepting device initiates the
online payment transfer via card
Credit/ Debit card – An e payment method where the card is required for making payments
through an electronic device.
Smart card – Also known as a chip card, a smart card, a card with a microprocessor chip is
needed to transfer payments.
Direct debit – Direct debit transfers funds from a customer’s account with the help of a third
party
E-cash – It is a form where the money is stored in the customer’s device which is used for
making transfers.
E-check – This is a digital version of a paper check used to transfer funds within accounts.
E-wallet – Very popular among customers, an E-wallet is a form of prepaid account, where
customer’s account information like credit/ debit card information is stored allowing quick,
seamless, and smooth flow of the transaction.
Mobile wallet – An evolved form of e-wallet, mobile wallet is extensively used by lots of
customers.
It is a virtual wallet, in the form of an app that sits on a mobile device. Mobile wallet stores card
information on a mobile device.
The user-friendly nature of mobile wallets makes them easier to use. It offers a seamless
payment experience making customers less dependent on cash.
Each part of the code contains information. This information can be merchant’s details,
transaction details, etc. To make payments, one has to scan the QR code with a mobile device.
UPI payments – NPCI (National Payment Corporation of India) has developed an instant real-
time payment system to facilitate interbank transactions.
This payment system is titled UPI(Unified Payment Interface). Payments via UPI can be made
via an app on a mobile device.
Biometric payments – Biometric payments are done via using/scanning various parts of the
body, e.g. fingerprint scanning, eye scanning, facial recognition, etc.
These payments are replacing the need to enter the PIN for making transactions making these
payments more accessible and easy to use.
1. Acceptability:-
The payment infrastructure should not only be robust but also available and accessible to a
wide range of consumers and sellers of goods and services. The value stored in the electronic
cash should be honored and accepted by other banks and financial institutions for reconciliation.
2. Reliability:-
Users and businesses want a payment system that is reliable because the availability of
services and smooth running of an enterprise will depend on the availability and successful
3. Security:-
Digital currency should be stored in a form that is resistant to replication, double-spending, and
tampering. At the same time, it should offer protection from the intruders trying to tap it to
4. Usability:-
The user of the payment mechanism should be able to use it as easily as real currency. This
requires that the payment system should be well integrated with the existing applications and
5. Scalability:-
The payment system infrastructure should be scalable, to be able to handle the addition of new
users and merchants, so that systems will perform normally without performance degradation
It should be able to offer the same performance and cost per transaction overheads with a
6. Anonymity, privacy:-
This characteristic refers to the desire of users to protect their privacy, identity and personal
information. In some transactions, the identities of the parties could be protected by anonym it.
Anonymity means that it is not possible to discover someone’s identity or to monitor an
7. Applicability:-
Applicability of a payment system is defined as the extent to which it is accepted for payments
Debit cards and credit cards have high applicability, as one can pay with them in a variety of
places. The applicability of a payment system may vary from country to country.
8. Authorization type:-
Authorization type is defined as the form of control over the validity of transactions. The
authorization type can be offline. Offline authorization means that users of the system can
exchange money while not connected to a network, without a third party mediating the
9. Convertibility:-
Funds represented by one payment system should be easily convertible into funds represented
by other payment systems. Users should be able to transfer money from electronic payment
systems.
Users should be able to transfer money from electronic payment systems to another accepted
cash, paper currencies, and deposits in the bank accounts, bank notes or any other financial
instrument.
10.Interoperability:-
A payment system in interoperable if it is not dependent on one company, but it is open and
allows other interested parties to join. This can be achieved by means of open standards for
An interoperable system can faster gain the necessary customer base for future development
11.Multi-currency:-
Effective and efficient payment systems between countries are possible when a system allows
This feature is not implemented in the payment systems of many countries, binding them to a
commerce.
12.Traceability:-
Traceability indicates how easy it is to trace money flows and sources of funds that are going
through a payment system and used for purchases. In electronic payment systems, money can
13. Linkability:-
Linkability of an electronic payment system implies that payments can be associated with a
particular user, or that it is possible to recognize several payments originating from some user.
Users can be linked to their spending even if the system they use is anonymous. A relation
14.Trust:-
Trust refers to the degree of customers confidence that their money and personal information
will be safe, and that all parties involved will not act against users’ interests. Users need to trust
15.Flexibility:-
Payment systems should be in a position to accept several forms of payment rather than limiting
16.Efficiency:-
Efficiency here refers mainly to the cost overheads involved in the operation of digital payments.
EDI SECURITY
An important aspect of EDI is the security of messages during the exchange. It should be ensured that the
interchange of messages is reliable.
EDI standards include controls designed to protect against errors in the message and the corruption of
message during the interchange.
Transmission protocols include protection such as longitudinal control totals in order to detect
any corruption that occurs during transmission. When the corruption of the message is detected, the
network system starts retransmission without the need for outside intervention.
When there is a concern that the transmission might be intercepted and modified, it can be protected by a
digital signature. The digital signature is designed to ensure that the message received is exactly the same
as the message sent. It also ensures that the source of a message is an authorized trading partner and the
message was not altered during the transmission.
Privacy of message:-
In case, when the contents of the message are considered sensitive, the privacy of the message can be
protected during transmission by encrypting the data. Encryption is the process of encoding messages or
information in such a way that only authorized party i.e. the trading partner can read it.
Non-repudiation:-
It is a way to guarantee that the sender of a message cannot later deny having sent the message and that
the recipient cannot deny having received the message. Non-repudiation can be obtained through the use
of digital signatures, confirmation services, and timestamps.
The figure shows the overall facilities for EDI security and privacy:
INTERNET SECURITY:
Cryptography
Cryptography is the study of secure communications techniques that allow only the sender and intended
recipient of a message to view its contents. The term is derived from the Greek word kryptos, which means
hidden.
Cryptography is technique of securing information and communications through use of codes so that
only those person for whom the information is intended can understand it and process it. Thus
preventing unauthorized access to information. The prefix “crypt” means “hidden” and suffix graphy
means “writing”. In Cryptography the techniques which are use to protect information are obtained from
mathematical concepts and a set of rule based calculations known as algorithms to convert messages
in ways that make it hard to decode it. These algorithms are used for cryptographic key generation,
digital signing, verification to protect data privacy, web browsing on internet and to protect confidential
transactions such as credit card and debit card transactions.
Techniques used For Cryptography: In today’s age of computers cryptography is often associated
with the process where an ordinary plain text is converted to cipher text which is the text made such
that intended receiver of the text can only decode it and hence this process is known as encryption.
The process of conversion of cipher text to plain text this is known as decryption.
Features Of Cryptography are as follows:
1. Confidentiality: Information can only be accessed by the person for whom it is intended and no
other person except him can access it.
2. Integrity: Information cannot be modified in storage or transition between sender and intended
receiver without any addition to information being detected.
3. Non-repudiation: The creator/sender of information cannot deny his intention to send information at
later stage.
4. Authentication: The identities of sender and receiver are confirmed. As well as destination/origin of
information is confirmed.
Types Of Cryptography: In general there are three types Of cryptography:
1. Symmetric Key Cryptography: It is an encryption system where the sender and receiver of
message use a single common key to encrypt and decrypt messages. Symmetric Key Systems are
faster and simpler but the problem is that sender and receiver have to somehow exchange key in a
secure manner. The most popular symmetric key cryptography system is Data Encryption
System(DES).
2. Hash Functions: There is no usage of any key in this algorithm. A hash value with fixed length is
calculated as per the plain text which makes it impossible for contents of plain text to be recovered.
Many operating systems use hash functions to encrypt passwords.
3. Asymmetric Key Cryptography: Under this system a pair of keys is used to encrypt and decrypt
information. A public key is used for encryption and a private key is used for decryption. Public key
and Private Key are different. Even if the public key is known by everyone the intended receiver can
only decode it because he alone knows the private key.
SECURITY PROTOCOLS:
In today’s world, we transfer the data in bulk, and the security of this data is very important, so Internet
security provides that feature i.e., protection of data. There are different types of protocol exist like
routing, mail transfer, and remote communication protocol. But the Internet security protocol helps in
the security and integrity of data over the internet. There are many protocols that exist that help in the
security of data over the internet such as Secure Socket Layer (SSL) , Transport Layer Security
(TLS).
Now, let us look at the various types of Internet Security Protocols :
1. SSL Protocol :
SSL Protocol stands for Secure Sockets Layer protocol, which is an encryption-based Internet
security protocol that protects confidentiality and integrity of data.
SSL is used to ensure the privacy and authenticity of data over the internet.
SSL is located between the application and transport layers.
At first, SSL contained security flaws and was quickly replaced by the first version of TLS that’s
why SSL is the predecessor of the modern TLS encryption.
TLS/SSL website has “HTTPS” in its URL rather than “HTTP”.
SSL is divided into three sub-protocols: the Handshake Protocol, the Record Protocol, and the
Alert Protocol.
2. TLS Protocol :
Same as SSL, TLS which stands for Transport Layer Security is widely used for the privacy and
security of data over the internet.
TLS uses a pseudo-random algorithm to generate the master secret which is a key used
for the encryption between the protocol client and protocol server.
TLS is basically used for encrypting communication between online servers like a web browser
loading a web page in the online server.
TLS also has three sub-protocols the same as SSL protocol – Handshake Protocol, Record
Protocol, and Alert Protocol.
3. SHTTP :
SHTTP stands for Secure HyperText Transfer Protocol, which is a collection of security
measures like Establishing strong passwords, setting up a firewall, thinking of antivirus
protection, and so on designed to secure internet communication.
SHTTP includes data entry forms that are used to input data, which has previously been
collected into a database. As well as internet-based transactions.
SHTTP’s services are quite comparable to those of the SSL protocol.
Secure HyperText Transfer Protocol works at the application layer (that defines the shared
communications protocols and interface methods used by hosts in a network) and is thus closely
linked with HTTP.
SHTTP can authenticate and encrypt HTTP traffic between the client and the server.
SHTTP operates on a message-by-message basis. It can encrypt and sign individual
messages.
4. Set Protocol :
Secure Electronic Transaction (SET) is a method that assures the security and integrity of
electronic transactions made using credit cards.
SET is not a payment system; rather, it is a secure transaction protocol that is used via the
internet.
The SET protocol provides the following services:
It establishes a safe channel of communication between all parties engaged in an e-
commerce transaction.
It provides confidentiality since the information is only available to the parties engaged
in a transaction when and when it is needed.
The SET protocol includes the following participants:
Cardholder
Merchant
Issuer
Acquire
Payment Gateway
Certification Authority
5. PEM Protocol :
PEM Protocol stands for privacy-enhanced mail and is used for email security over the internet.
RFC 1421, RFC 1422, RFC 1423, and RFC 1424 are the four particular papers that explain the
Privacy Enhanced Mail protocol.
It is capable of performing cryptographic operations such as encryption, nonrepudiation, and
message integrity.
6. PGP Protocol :
PGP Protocol stands for Pretty Good Privacy, and it is simple to use and free, including its source
code documentation.
It also meets the fundamental criteria of cryptography.
When compared to the PEM protocol, the PGP protocol has grown in popularity and use.
The PGP protocol includes cryptographic features such as encryption, non-repudiation, and
message integrity.
Network Security
Network Security refers to the measures taken by any enterprise or organization to secure its
computer network and data using both hardware and software systems. This aims at securing the
confidentiality and accessibility of the data and network. Every company or organization that handles a
large amount of data, has a degree of solutions against many cyber threats.
The most basic example of Network Security is password protection which the user of the network
oneself chooses. In recent times, Network Security has become the central topic of cyber security with
many organizations inviting applications from people who have skills in this area. The network security
solutions protect various vulnerabilities of the computer systems such as:
1. Users
2. Locations
3. Data
4. Devices
5. Applications
Network Security: Working
The basic principle of network security is protecting huge stored data and networks in layers that
ensure the bedding of rules and regulations that have to be acknowledged before performing any
activity on the data.
These levels are:
1. Physical
2. Technical
3. Administrative
These are explained as following below.
1. Physical Network Security:
This is the most basic level that includes protecting the data and network through unauthorized
personnel from acquiring control over the confidentiality of the network. These include external
peripherals and routers that might be used for cable connections. The same can be achieved by
using devices like biometric systems.
3. Cloud Security:
Now a day, a lot many organizations are joining hands with cloud technology where a large amount
of important data is stored over the internet. This is very vulnerable to the malpractices that few
unauthorized dealers might pertain. This data must be protected and it should be ensured that this
protection is not jeopardized by anything. Many businesses embrace SaaS applications for providing
some of their employees the allowance of accessing the data stored over the cloud. This type of
security ensures creating gaps in the visibility of the data.